Wed.Jul 20, 2022

article thumbnail

Separating the Quantum Computing Hype From the Reality

Data Breach Today

Future quantum computers will decrypt encrypted data, so businesses feel pressure to find quantum-resistant security solutions for data transmission. Wells Fargo Bank's Peter Bordow discusses the state of quantum computing, approaches to quantum security, and privacy-enhancing technologies.

article thumbnail

New Luna ransomware targets Windows, Linux and ESXi systems

Security Affairs

Kaspersky researchers discovered a new ransomware family written in Rust, named Luna, that targets Windows, Linux, and ESXi systems. Researchers from Kaspersky Lab detailed a new ransomware family named Luna, which is written in Rust and is able to target Windows, Linux, and ESXi systems. Luna ransomware is the third ransomware family that is written in Rust language, other malware strains are BlackCat and Hive.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Romanian Malware Hosting Vendor Extradited to US

Data Breach Today

Mihai Paunescu, aka Virus, Faces 3 Criminal Counts in Court The DOJ extradited from Colombia 37-year-old Mihai Ionut Paunescu, who faces criminal charges for allegedly running a "bulletproof" hosting service that helped cybercriminals launch malware attacks. He is set to undergo trial for conspiracy to commit computer intrusion, bank fraud and wire fraud.

294
294
article thumbnail

Million of vehicles can be attacked via MiCODUS MV720 GPS Trackers

Security Affairs

Multiple flaws in MiCODUS MV720 Global Positioning System (GPS) trackers shipped with over 1.5 million vehicles can allow hackers to remotely hack them. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn of multiple security vulnerabilities in MiCODUS MV720 Global Positioning System (GPS) trackers which are used by over 1.5 million vehicles.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Latest HHS HIPAA Actions Spotlight 'Right of Access' - Again

Data Breach Today

11 New Cases Showcase HHS' Ongoing Top Enforcement Priority A slew of HIPAA enforcement actions is a sign that regulators are impatient with the short shrift that many medical providers give to providing patients access to their health information. No fewer than 11 of the last dozen HIPAA fines focus on a right of access dispute.

Access 245

More Trending

article thumbnail

Compromised Credentials Persist as Data Breaches' Root Cause

Data Breach Today

Vikas Malhotra, India Country Manager at LastPass, on Breaches, Password Management Compromised logon credentials are the root cause of most data breaches, especially because users tend to reuse passwords, says Vikas Malhotra. Passwords are not going anywhere, he says. The LastPass India country manager also discusses password management and managing identities.

article thumbnail

Russia Creates Malware False-Flag App

Schneier on Security

The Russian hacking group Turla released an Android app that seems to aid Ukrainian hackers in their attacks against Russian networks. It’s actually malware, and provides information back to the Russians: The hackers pretended to be a “community of free people around the world who are fighting russia’s aggression”—much like the IT Army.

IT 97
article thumbnail

Major Takeaways: Cyber Operations During Russia-Ukraine War

Data Breach Today

Russian Attacks Continue at Serious Pace, Blunted by Ukrainian Defenses, Failovers What happened to the Russian cyber war? It was almost a universal prediction: cyberattacks against Ukrainian digital infrastructure would help invaders seize control. But Kyiv has managed to resist such efforts. Here are nearly a dozen lessons learned so far from the war's cyber operations.

IT 243
article thumbnail

FBI Warns of Phony Cryptocurrency Investment Apps

KnowBe4

Cryptocurrency investors have lost nearly $43 million to fraudulent cryptocurrency investment apps, according to the US Federal Bureau of Investigation (FBI).

102
102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

GPS Tracker Made in China Conduit for Vehicle Hacking

Data Breach Today

6 Vulnerabilities Detected With No Available Patch Researchers at BitSight say a common GPS tracker used in fleet management by organizations around the globe could be used by hackers to abruptly stop vehicles on highways or disable a car for ransom. Chinese manufacturer MiCODUS hasn't responded to researchers or U.S. officials.

article thumbnail

What InfoSec Pros Can Teach the Organization About ESG

Dark Reading

Security pros' experience with transparency and evaluating third-party partners positions them to act as key environmental, social, and governance advisers.

article thumbnail

How Zero Trust Can Simplify Your Security Infrastructure

Data Breach Today

Forcepoint's Dubey Explains Why VPNs Are Not Relevant Anymore How does a zero trust architecture help reduce the risk of remote access to corporate networks? Ajay Kumar Dubey, channel director at Forcepoint, shares his views on why VPNS are no longer relevant. He also discusses implementing SASE and controlling access to cloud and private apps.

Security 225
article thumbnail

Chaotic LAPSUS$ Group Goes Quiet, but Threat Likely Persists

Dark Reading

The LAPSUS$ group emerged with a big splash at the end of 2021, targeting companies, including Okta, with a "reckless and disruptive" approach to hacking.

98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

TechScape: suspicious of TikTok? You’re not alone

The Guardian Data Protection

The Chinese app is known for its aggressive data collection – but it is a fool’s errand to prove that it is a threat to the west Don’t get TechScape delivered to your inbox? Sign up here What’s the problem with TikTok? It’s a harder question to answer than it seems. The social video app, which has joined Facebook/Instagram, YouTube and Twitter in the list of societally important social networks, is frequently spoken about with an air of suspicion, and it’s not hard to guess why: the app’s Chines

article thumbnail

Lax Security Fuels Massive 8220 Gang Botnet Army Surge

Dark Reading

The threat group 8220 Gang's cryptocurrency miner and botnet reach has exploded to 30,000 global hosts, a notable increase over the past month, researchers say.

article thumbnail

How Rocket® TRUfusion Enterprise’s Windchill and Teamcenter Plugins are Driving Productivity in Manufacturing

Rocket Software

Global manufacturing companies operating within expansive ecosystems (e.g., automotive, aerospace, defense or hi-tech) are vulnerable to slowed flows of raw materials and finished goods, which can substantially disrupt manufacturing workflows and multi-tier collaboration. Supply chain collaboration starts early in the product development lifecycle before manufacturing even begins.

article thumbnail

Feds Recoup $500K From Maui Ransomware Gang

Dark Reading

Law enforcement hopes that retuning ransom payments to impacted businesses will demonstrate that working with the feds following a cybersecurity breach is "good business.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Magecart Serves Up Card Skimmers on Restaurant-Ordering Systems

Threatpost

300 restaurants and at least 50,000 payment cards compromised by two separate campaigns against MenuDrive, Harbortouch and InTouchPOS services.

article thumbnail

How to Mitigate the Risk of Karakurt Data Extortion Group's Tactics, Techniques, and Procedures

Dark Reading

The group has become the new face of ransomware, taking advantage of vulnerabilities and poor encryption.

article thumbnail

The DHS Bought a ‘Shocking Amount’ of Phone-Tracking Data

WIRED Threat Level

The ACLU released a trove of documents showing how Homeland Security contracted with surveillance companies to scour location information.

article thumbnail

'AIG' Threat Group Launches With Unique Business Model

Dark Reading

The rapidly growing Atlas Intelligence Group relies on cyber-mercenaries to carry out its missions.

IT 99
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Most Popular Period-Tracking Apps, Ranked by Data Privacy

WIRED Threat Level

Under increased scrutiny, certain period-tracking apps are seeing a surge of new users. Which are as safe as they claim to be?

article thumbnail

Cybersecurity Professionals Push Their Organizations Toward Vendor Consolidation and Product Integration

Dark Reading

New global study from ESG and ISSA reveals nearly half of organizations are consolidating or plan on consolidating the number of vendors they do business with

article thumbnail

Conti’s Reign of Chaos: Costa Rica in the Crosshairs

Threatpost

Aamir Lakhani, with FortiGuard Labs, answers the question; Why is the Conti ransomware gang targeting people and businesses in Costa Rica?

article thumbnail

Jamf and PKI: A strong foundation for Zero Trust security

Jamf

Discover why a public key infrastructure (PKI) is such an important component to start with when coming up with the architecture for a Zero Trust Network Access (ZTNA) approach.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Mutare Voice Network Threat Survey Shows Nearly Half of Organizations Experienced Vishing or Social Engineering Attacks in Past Year

Dark Reading

Unsecured voice traffic, skyrocketing adoption of Teams-centric enterprise collaboration tools widen enterprise cybersecurity gaps and increase risk of breach.

article thumbnail

Wireless Condition Monitoring Reduces Downtime Across the Whole Factory

HID Global

Wireless Condition Monitoring Reduces Downtime Across the Whole Factory. niandolo. Wed, 07/20/2022 - 15:03.

52
article thumbnail

Employee Spotlight : Judie Cummings

Synergis Software

“The things that make me different are the things that make me, me.” ~Piglet, from Winnie the Pooh.

52