Tue.May 16, 2023

article thumbnail

Alleged Babuk Ransomware Hacker 'Wazawaka' Indicted in US

Data Breach Today

Mikhail Matveev Also Faces Sanctions and $10 Million Reward for His Arrest A Russian man the U.S. government says has been a key actor in Russian ransomware hacking faces federal criminal charges, economic sanctions and a $10 million reward for information leading to his arrest. Mikhail Matveev, aka Wazawaka, was a central figure of the Babuk ransomware-as-a-service gang.

article thumbnail

Russian Hacker “Wazawaka” Indicted for Ransomware

Krebs on Security

A Russian man identified by KrebsOnSecurity in January 2022 as a prolific and vocal member of several top ransomware groups was the subject of two indictments unsealed by the Justice Department today. U.S. prosecutors say Mikhail Pavolovich Matveev , a.k.a. “ Wazawaka ” and “ Boriselcin ” worked with three different ransomware gangs that extorted hundreds of millions of dollars from companies, schools, hospitals and government agencies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NextGen Facing a Dozen Lawsuits So Far Following Breach

Data Breach Today

Proposed Class Actions - All Filed in Same Georgia Court - Allege Negligence Cloud-based electronic health records vendor NextGen Healthcare is so far facing a dozen proposed class action lawsuits filed in the last week in the same Georgia federal court following the company's disclosure this month of a data breach affecting 1 million individuals.

article thumbnail

RSAC Fireside Chat: How a well-placed ‘NGWAF’ can staunch the flow of web, mobile app attacks

The Last Watchdog

Attack surface expansion translates into innumerable wide-open vectors of potential unauthorized access into company networks. Related: The role of legacy security tools Yet the heaviest volume of routine, daily cyber attacks continue to target a very familiar vector: web and mobile apps. At RSA Conference 2023 , I had the chance to meet with Paul Nicholson , senior director of product marketing and analyst relations at A10 Networks.

Cloud 198
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

EU Adopts Comprehensive Crypto Regulation

Data Breach Today

The MiCA Regulation Approved In Wake of High Profile Crypto Crashes The European Union formally adopted Tuesday the world's first comprehensive regulatory regime for the cryptocurrency industry in a measure supporters say will tame volatility illustrated by high profile crashes such as FTX. The proposal, known as MiCA, will go into effect progressively.

144
144

More Trending

article thumbnail

Feds Hit Vendor With $350K Settlement in FTP Server Breach

Data Breach Today

Practice Management Software Firm's 2018 Incident Affected Nearly 231,000 Federal regulators fined a practice management software and services vendor $350,000 in the aftermath of an investigation into a 2018 HIPAA breach that involved a file transfer protocol server mishap. The company said the incident was the result of "a singular human error.

144
144
article thumbnail

Unpatched Wemo Smart Plug Bug Opens Countless Networks to Cyberattacks

Dark Reading

Cyberattckers can easily exploit a command-injection bug in the popular device, but Belkin has no plans to address the security vulnerability.

Security 132
article thumbnail

Small Utilities, Hospitals Struggle With Newer Cyber Threats

Data Breach Today

Lack of Money, Expertise Creates Big Challenges For Small Infrastructure Providers Small electric utilities, wastewater facilities and hospitals struggle with defending their organizations against emerging cyber threats given their meager resources, U.S. government officials said. Many utilities have failed to adopt cyber best practices despite the available tools and training.

article thumbnail

Attackers Target macOS With 'Geacon' Cobalt Strike Tool

Dark Reading

Threat actors seen using Go-language implementation of the red-teaming tool on Intel and Apple silicon-based macOS systems.

126
126
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

IBM Buys Polar Security to Find and Protect Cloud, SaaS Data

Data Breach Today

IBM Purchase of DSPM Startup Will Help Customers Ensure PII Isn't Left Unprotected IBM has bought a startup founded by a longtime security leader in the Israeli Prime Minister's Office to ensure personal identifiable information isn't left unprotected. The deal will ensure sensitive data isn't exposed in public cloud data stores or SaaS apps like Slack, SharePoint or Office 365.

Cloud 144
article thumbnail

Severe RCE Bugs Open Thousands of Industrial IoT Devices to Cyberattack

Dark Reading

Researchers found 11 vulnerabilities in products from three industrial cellular router vendors that attackers can exploit through various vectors, bypassing all security layers.

IoT 103
article thumbnail

Efficient Management of Enterprisewide Data Protection

Data Breach Today

Over the years, most organizations acquire multiple tools for protecting data but a variety of personnel and policies make it difficult to manage enterprisewide. Skyhigh Security’s Nate Brady says it’s time to look into the latest security service edge and secure access service edge solutions.

Access 130
article thumbnail

Security 360 highlights: Phishing and social engineering

Jamf

Following the release of the Jamf Security 360: Annual Threat Trends Report 2023 where we highlight security threat trends, we utilize threat intelligence gathered by Jamf to inform security professionals which threats from the previous year most critically affected the enterprise. The data in this blog series helps inform IT and Security teams of the continued reliance on social engineering attacks by threat actors.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Multiple flaws in Teltonika industrial cellular router expose OT networks to hack

Security Affairs

Experts found multiple vulnerabilities in Teltonika industrial cellular routers that could expose OT networks to cyber attacks. A joint analysis conducted by industrial cybersecurity firms Claroty and O torio discovered multiple flaws in Teltonika Networks’ IIoT products that can expose OT networks to remote attacks. Teltonika Networks is a leading manufacturer of networking solutions, widely adopted in industrial environments, including gateways, LTE routers, and modems.

article thumbnail

The Number of Phishing Attacks Continues to Grow at a Rate of 150% Per Year

KnowBe4

The latest Phishing Activity Trends Report from the Anti-Phishing Working Group (APWG) shows an unrelenting upward trend in the number of phishing attacks per quarter.

article thumbnail

President Zelensky imposes sanctions against the Russian IT sector

Security Affairs

Ukraine’s President Zelensky and the country’s Council of National Security introduced new sanctions against individuals and businesses. Ukraine’s President Volodymyr Zelensky and the country’s Council of National Security introduced new sanctions against 351 Russian individuals and 241 business entities. The list of sanctioned entities comprises IT companies operating within the Russian Federation, notably Gazpromneft IT Solutions, RT-Invest Transport Systems, InnoTech, Softline Trade, Zericode

IT 93
article thumbnail

ICRM Board of Regent Special Election Results

IG Guru

April 19, 2023 Dear Candidates & Members: Please join us in congratulating Melissa G. Dederer, CRM, IGP, FAI as the new President-Elect/Treasurer (2023-2025). The term for President-Elect/Treasurer will begin effective immediately. We look forward to her leadership and thank her for her willingness to serve on the ICRM Board of Regents. Thank you to all who participated in the special election.

80
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Lacroix Group shut down three facilities after a ‘targeted cyberattack’

Security Affairs

French electronics manufacturer Lacroix Group shut down three plants after a cyber attack, experts believe it was the victim of a ransomware attack. The French electronics manufacturer Lacroix Group shut down three facilities in France, Germany, and Tunisia in response to a cyber attack. The group designs and manufactures electronic equipment for its customers in multiple sectors, including the automotive, aerospace, industrial, and health sectors.

article thumbnail

Name That Toon: One by One

Dark Reading

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

95
article thumbnail

CISA adds Ruckus bug and another six flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

US Cybersecurity and Infrastructure Security Agency (CISA) added seven new flaws to its Known Exploited Vulnerabilities catalog. U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the following three new issues to its Known Exploited Vulnerabilities Catalog : CVE-2023-25717 – Ruckus Wireless Access Point (AP) software contains an unspecified vulnerability in the web services component.

IT 87
article thumbnail

Qilin Ransomware Operation Outfits Affiliates With Sleek, Turnkey Cyberattacks

Dark Reading

Researchers infiltrate a ransomware operation and discover slick services behind Qilin's Rust-based malware variant.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

University admission platform Leverage EDU exposed student passports

Security Affairs

The popular university admission platform Leverage EDU leaked almost 240,000 sensitive files, including students’ passports, financial documents, certificates, and exam results. The Cybernews research team discovered that Leverage EDU leaked extremely sensitive data due to the misconfiguration of their systems. As no authentication was required, anybody could access all of the student’s personal information needed to apply to universities.

article thumbnail

WhatsApp 2023: New Privacy Features, Settings, and More

WIRED Threat Level

The Meta-owned app offers end-to-end encryption of texts, images, and more by default—but its settings aren't as private as they could be.

Privacy 85
article thumbnail

Circle Security Technology Partnership With ForgeRock to Accelerate the Prevention-First Era in Digital Security

Dark Reading

Joint integration delivers effective DSPM enforcement for self-managed customers starting with credential-free access, risk-based continuous authentication, and protection from data exposure.

article thumbnail

How to achieve high-impact personalization at scale with managed marketing services

IBM Big Data Hub

To help companies better deliver on their marketing vision and scale their marketing business processes, managed marketing services (MMS) offshore has become a fast growing trend. According to an Everest Group® study , offshore MMS centers increased over 50% from 2019 to 2022. What’s more, the number of offshore full-time equivalent employees (FTE) jumped 115%.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

KnowBe4 Celebrates Success of 60,000-Customer Milestone

KnowBe4

We are thrilled to announce we have reached a milestone of 60,000 customer organizations globally, consisting of tens of millions of end users.

81
article thumbnail

XM Cyber Announces Partnership With SAP to Deliver Robust Security for Hybrid Environments

Dark Reading

Partnership will provide SAP customers with comprehensive exposure management capabilities and in-depth visibility of attack surfaces.

article thumbnail

RAIN Alliance – Seattle June 13-15

RFID Global Solution, Inc.

See us at the RAIN Alliance meeting at the University of Washington, Seattle, June 13-15, 2023. The post RAIN Alliance – Seattle June 13-15 appeared first on RFID Global Solution.

52