Mon.Sep 06, 2021

article thumbnail

Criminals' Wish List: Who's Their Ideal Ransomware Victim?

Data Breach Today

Revenue, Size, Geography and Level of Access Help Determine Sale Price for Access The most sought-after type of victim for ransomware-wielding attackers is a large, U.S.-based business with at least $100 million in revenue, not operating in the healthcare or education sector, with remote access available via remote desktop protocol or VPN credentials, threat intelligence firm Kela reports.

article thumbnail

“FudCo” Spam Empire Tied to Pakistani Software Firm

Krebs on Security

In May 2015, KrebsOnSecurity briefly profiled “ The Manipulaters ,” the name chosen by a prolific cybercrime group based in Pakistan that was very publicly selling spam tools and a range of services for crafting, hosting and deploying malicious email. Six years later, a review of the social media postings from this group shows they are prospering, while rather poorly hiding their activities behind a software development firm in Lahore that has secretly enabled an entire generation of

Phishing 226
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Irish Police 'Significantly Disrupt' HSE Attackers’ Ops

Data Breach Today

Authorities Target Health Sector Ransom Gang's IT Infrastructure The Irish law enforcement body, the Garda National Cyber Crime Bureau, has conducted a "significant disruption operation" targeting the IT infrastructure of a cybercrime group and seizing several domains used in a May ransomware attack against Ireland’s state health services provider.

article thumbnail

Welcoming the Czech Republic Government to Have I Been Pwned

Troy Hunt

For the last few years, I've been welcome national governments to Have I Been Pwned (HIBP) and granting them full and free access to domain-level searches via a dedicated API. Today, I'm very happy to welcome the Czech Republic's National Cyber and Information Security Agency who can now query their government domains along with the 26 other nations that have come before them.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

TrickBot gang developer arrested at the Seoul international airport

Security Affairs

A Russian man accused of being a member of the infamous TrickBot gang was arrested while trying to leave South Korea. A Russian man accused of being a member of the TrickBot gang was arrested last week at the Seoul international airport. The man has remained stuck in the Asian country since February 2020 due to the COVID-19 lockdown imposed by the local government and the cancelation of international travel.

More Trending

article thumbnail

Tracking People by their MAC Addresses

Schneier on Security

Yet another article on the privacy risks of static MAC addresses and always-on Bluetooth connections. This one is about wireless headphones. The good news is that product vendors are fixing this: Several of the headphones which could be tracked over time are for sale in electronics stores, but according to two of the manufacturers NRK have spoken to, these models are being phased out. “The products in your line-up, Elite Active 65t, Elite 65e and Evolve 75e, will be going out of production

article thumbnail

Malware found pre-installed in cheap push-button mobile phones sold in Russia

Security Affairs

Security researcher ValdikSS found malware preinstalled in four low-budget push-button mobile phones available for sale on Russian e-stores. A Russian security researcher that goes online with the name of ValdikSS has found malware preinstalled in four low-budget push-button mobile phones available for sale on Russian e-stores. The expert noticed that several push-button telephones contain unwanted undocumented functions such as automatically sending SMS messages or going online to transmit purc

Sales 110
article thumbnail

Ireland / Europe: DPC’s record GDPR fine has implications for calculation of GDPR fines and regulatory expectations around transparency rules

DLA Piper Privacy Matters

On 2 September 2021, the Data Protection Commission (DPC) announced it has imposed a €225 million administrative fine against WhatsApp Ireland Limited , as well as a reprimand and an order to bring its processing into compliance. This comes following a lengthy background including the EDPB’s first urgent binding decision in relation to the investigation earlier this year.

GDPR 105
article thumbnail

Netgear addresses severe security flaws in 20 of its products

Security Affairs

Netgear has released security updates to address high-severity vulnerabilities affecting several of its smart switches used by businesses. Netgear has released firmware updates to address high-severity vulnerabilities in more than a dozen of its smart switches used on businesses. The company fixed three security flaws that affect 20 Netgear products, mostly smart switches.

IT 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Episode 225: Unpacking the Azure CHAOS DB Flaw with Nir Ohfeld of Wiz

The Security Ledger

We’re joined by Nir Ohfeld of Wiz. Nir helped discover the recent CHAOS DB flaw in Azure COSMOS DB, the flagship database for Microsoft’s Azure cloud platform. The post Episode 225: Unpacking the Azure CHAOS DB Flaw with Nir Ohfeld of Wiz appeared first on The Security Ledger with Paul F. Roberts. Related Stories Episode 224: Engineering Trust In The Cyber Executive Order Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee Encore Podcast: Is Autonomous Driving Heading for a Crash?

Cloud 98
article thumbnail

FBI IC3 warns of a spike in sextortion attacks

Security Affairs

The FBI Internet Crime Complaint Center (IC3) warns of a spike in sextortion attacks since the beginning of 2021 that caused $8M losses. The FBI Internet Crime Complaint Center (IC3) is warning of a significant increase in sextortion complaints since the beginning of 2021. In a sextortion attack, threat actors threaten to distribute the victims private and sensitive material (e.g. videos or photos) if their demands are not met. .

article thumbnail

Episode 225: Unpacking the Azure CHAOS DB Flaw with Nir Ohrfeld of Wiz

The Security Ledger

We’re joined by Nir Ohfeld of Wiz. Nir helped discover the recent CHAOS DB flaw in Azure COSMOS DB, the flagship database for Microsoft’s Azure cloud platform. The post Episode 225: Unpacking the Azure CHAOS DB Flaw with Nir Ohrfeld of Wiz appeared first on The Security Ledger with Paul F. Roberts. Related Stories Episode 224: Engineering Trust In The Cyber Executive Order Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee Encore Podcast: Is Autonomous Driving Heading for a Crash?

Cloud 83
article thumbnail

Human Fraud: Detecting Them Before They Detect You

Threatpost

Tony Lauro, director of security technology and strategy at Akamai, discusses how to disrupt account takeovers in the exploitation phase of an attack.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Enterprise data visibility: a different look on dark data from every angle

erwin

In a recent global intelligence survey of 1,300 IT, business and executive leaders, more than half estimated that “dark data” comprised 55% or more of their organization’s data – that’s data that is uncaptured, unknown and unused within the organization. IDC has stated the reality could be as high as 90%. No matter the percentage, dark data inhibits strategic and daily operational decision-making, increases organizational risk, reduces employee efficiency and lengthens the timelines of critical

article thumbnail

Statement of solidarity with librarians and archivists in Afghanistan

CILIP

Statement of solidarity with librarians and archivists in Afghanistan. Librarians and archivists at CILIP, Research Libraries UK, and SCONUL stand in solidarity with fellow librarians and archivists in Afghanistan. We are gravely concerned at the threat to the safety and security of librarians and archivists resulting from the change of regime in Afghanistan.

article thumbnail

How smart factories can enable sustainable manufacturing

CGI

The growing global pressure from government, financial institutions and consumers will soon make sustainability mandatory, pushing it higher on the C-suite agenda. For manufacturers, this means weaving sustainability into the very fabric of their DNA. It also means acknowledging an inescapable reality: What we produce and supply makes a big difference — not only to the communities in which we live and work, but also to our organizations’ bottom lines.

article thumbnail

The business benefits to joining the Race to Zero

CGI

Reflecting on the past few months since CGI committed to achieve net zero globally before 2030, I have seen businesses come together to collaborate and take urgent action in the fight against climate change.

52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.