Fri.Jul 29, 2022

article thumbnail

Phishing-as-a-Service Platform Offers Cut-Rate Prices

Data Breach Today

Customers of 'Robin Banks' Platform Have Netted $500,000 Fifty bucks gets cybercriminals access to a phishing-as-a-service platform for campaigns impersonating major brands in the United States and other English-speaking countries. Researchers from IronNet say the prices offered on "Robin Banks" are substantially less than comparable service providers.

Phishing 337
article thumbnail

911 Proxy Service Implodes After Disclosing Breach

Krebs on Security

The 911 service as it existed until July 28, 2022. 911[.]re, a proxy service that since 2015 has sold access to hundreds of thousands of Microsoft Windows computers daily, announced this week that it is shutting down in the wake of a data breach that destroyed key components of its business operations. The abrupt closure comes ten days after KrebsOnSecurity published an in-depth look at 911 and its connections to shady pay-per-install affiliate programs that secretly bundled 911’s proxy so

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine, US Sign Cybersecurity Pact

Data Breach Today

Agreement Focuses on Data Sharing, Conducting Joint Exercises Ukrainian and U.S. officials pledged closer cybersecurity collaboration, announcing a memorandum of cooperation after Ukrainian officials discussed Russian threat actors in a meeting with the FBI in New York. "Cyberthreats cross borders and oceans," said CISA head Jen Easterly.

article thumbnail

Why Bug-Bounty Programs Are Failing Everyone

Dark Reading

In a Black Hat USA talk, Katie Moussouris will discuss why bug-bounty programs are failing in their goals, and what needs to happen next to use bounties in a way that improves security outcomes.

Security 122
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ransomware Ecosystem: Big-Name Brands Becoming a Liability

Data Breach Today

Midsized Businesses Are the New Frontier for Ransomware Demands Here's unwelcome ransomware news: When a ransomware victim chooses to pay a ransom, the average amount has increased to $228,125, reports ransomware incident response firm Coveware. On the upside, however, big-name ransomware groups are having a tougher time attracting affiliates.

More Trending

article thumbnail

ISMG Editors: Privacy Special With Lisa Sotto

Data Breach Today

LockBit 3.0, New US Privacy Laws and FTC Initiatives to Watch Lisa Sotto of Hunton Andrews Kurth LLP joins three ISMG editors to discuss important cybersecurity and privacy issues, including data breach preparedness, the evolution of LockBit 3.0 and the potential impact of the Cyber Incident Reporting for Critical Infrastructure Act of 2022.

Privacy 275
article thumbnail

Microsoft experts linked the Raspberry Robin malware to Evil Corp operation

Security Affairs

Microsoft linked the recently discovered Raspberry Robin Windows malware to the notorious Evil Corp operation. On July 26, 2022, Microsoft researchers discovered that the FakeUpdates malware was being distributed via Raspberry Robin malware. Raspberry Robin is a Windows worm discovered by cybersecurity researchers from Red Canary, the malware propagates through removable USB devices.

article thumbnail

Facebook Slapped With Another Health Data Privacy Lawsuit

Data Breach Today

Proposed Class Action Claims Meta Pixel Tracks Sensitive Patient Info Another proposed federal class action lawsuit alleges Facebook uses its Pixel tracking tool to collect millions of individuals' sensitive health data from healthcare provider websites without patients' knowledge or consent. HIPAA prohibits the use of PHI for marketing purposes without consent.

article thumbnail

Malware-laced npm packages used to target Discord users

Security Affairs

Threat actors used multiple npm packages to target Discord users with malware designed to steal their payment card data. A malicious campaign targeting Discord users leverages multiple npm packages to deliver malware that steals their payment card information, Kaspersky researchers warn. The malicious code hidden in the packages, and tracked as Lofy Stealer, is a modified version of an open-source token logger called Volt Stealer, “The Python malware is a modified version of an open-source

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CyberArk, Delinea, One Identity Top Gartner MQ for PAM

Data Breach Today

CyberArk Keeps Leading the PAM Market, With Delinea and One Identity Close Behind CyberArk continues to lead the privileged access management market, Gartner found, but Delinea and One Identity follow closely behind thanks to big-time acquisitions last year. Gartner once again recognized CyberArk for having the most complete vision and strongest execution ability in PAM.

Marketing 259
article thumbnail

T-Mobile to Pay $500 Million to Settle Claims Related to 2021 Breach

Hunton Privacy

On July 22, 2022, T-Mobile entered into an agreement to settle a class action lawsuit stemming from its 2021 data breach. The breach involved the personal information of 76.6 million U.S. residents and was T-Mobile’s fifth breach over a four year period. The proposed settlement will require T-Mobile to pay $500 million to settle customers’ claims and to bolster its cybersecurity practices. .

article thumbnail

Security Teams Overwhelmed With Bugs, Bitten by Patch Prioritization

Dark Reading

The first half of the year saw more than 11,800 reported security vulnerabilities, but figuring out which ones to patch first remains a thankless job for IT teams.

Security 140
article thumbnail

Microsoft Zero-Days Sold and then Used

Schneier on Security

Yet another article about cyber-weapons arms manufacturers and their particular supply chain. This one is about Windows and Adobe Reader zero-day exploits sold by an Austrian company named DSIRF. There’s an entire industry devoted to undermining all of our security. It needs to be stopped.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Malicious Npm Packages Tapped Again to Target Discord Users

Threatpost

Recent LofyLife campaign steals tokens and infects client files to monitor various user actions, such as log-ins, password changes and payment methods.

article thumbnail

ICYMI: Dark Web Happenings Edition With Evil Corp., MSP Targeting & More

Dark Reading

Dark Reading's digest of other "don't-miss" stories of the week — including a Microsoft alert connecting disparate cybercrime activity together, and an explosion of Luca Stealer variants after an unusual Dark Web move.

81
article thumbnail

Why AI is Essential for Value Stream Management

Micro Focus

In the second installment of his “How to Run and Transform” blog series, Achmad Chadran reviews how Value Stream Management brings the customer experience perspective into key software development and delivery processes and resources to better align operations with business objectives. The challenges of processing DevOps metrics and transforming them into actionable prescriptive analytics makes.

article thumbnail

Malicious npm Packages Scarf Up Discord Tokens, Credit Card Info

Dark Reading

The campaign uses four malicious packages to spread "Volt Stealer" and "Lofy Stealer" malware in the open source npm software package repository.

88
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Happy 23rd Annual SysAdmin Day from KnowBe4!

KnowBe4

It's been 23 years of celebrating all of our fellow System Administrators! Your hard work on daily maintenance of your company's day-to-day computer operations definitely deserves kudos.

article thumbnail

3 Tips for Creating a Security Culture

Dark Reading

Trying to get the whole organization on board with better cybersecurity is much tougher than it may sound.

article thumbnail

Your KnowBe4 Fresh Content Updates from July 2022

KnowBe4

Check out the thirteen new pieces of training content added in July, alongside the always fresh content update highlights and new features.

article thumbnail

Amazon Adds Malware Detection to GuardDuty TDR Service

Dark Reading

The new GuardDuty Malware Protection and Amazon Detective were among 10 products and services unveiled at AWS re:Inforce in Boston this week.

81
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

UK heat wave causes Google and Oracle cloud outages via Bleeping Computer

IG Guru

Check out the article here.

Cloud 75
article thumbnail

Attackers Have 'Favorite' Vulnerabilities to Exploit

Dark Reading

While attackers continue to rely on older, unpatched vulnerabilities, many are jumping on new vulnerabilities as soon as they are disclosed.

77
article thumbnail

Strong Authentication – Robust Identity and Access Management Is a Strategic Choice

Security Affairs

Passwords no longer meet the demands of today’s identity and access requirements. Therefore, strong authentication methods are needed. “ Usernames and passwords are insufficient and vulnerable means of authentication on their own; therefore, it is essential to employ strong authentication techniques like multi-factor authentication (MFA) to confirm users’ identities before granting secure access to resources,” Sarah Lefavrais, Product Marketing Manager, Thales states in her recent article.

article thumbnail

AWS Focuses on Identity Access Management at re:Inforce

Dark Reading

Identity and access management was front and center at AWS re:inforce this week.

Access 83
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Friday Squid Blogging: Evolution of the Vampire Squid

Schneier on Security

Short article on the evolution of the vampire squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

Big Questions Remain Around Massive Shanghai Police Data Breach

Dark Reading

Why was PII belonging to nearly 1 billion people housed in a single, open database? Why didn't anyone notice it was downloaded?

article thumbnail

Justice Department Probing 2020 Federal Court System Breach

Data Breach Today

Senator Accuses Court System of Hiding Attack and National Security Consequences A 2020 breach of US courts' digital docketing system was done by three foreign actors, said Rep. Jerry Nadler, D-N.Y., House Judiciary Committee chairman. Sen. Ron Wyden, a Democratic member of Senate Intelligence, said the US Administrative Office of the Courts is hiding the attack's gravity.

Security 280