Mon.May 22, 2023

article thumbnail

Android Fingerprint Biometrics Fall to 'BrutePrint' Attack

Data Breach Today

Dictionary Attack Plus Neural Network Fools Security Checks, Researchers Find Security researchers have demonstrated a practical attack that can be used to defeat biometric fingerprint checks and log into a target's Android - but not Apple - smartphone. Dubbed "BrutePrint," the brute force attack is inexpensive and practical to deploy at a large scale.

Security 292
article thumbnail

Interview With a Crypto Scam Investment Spammer

Krebs on Security

Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. What follows is an interview with a Russian hacker responsible for a series of aggressive crypto spam campaigns that recently prompted several large Mastodon communities to temporarily halt new registrations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

iSpoof Admin Gets Up to 13 Years in 115M Euro Vishing Fraud

Data Breach Today

Tejay Fletcher Made It Easy for Scammers to Impersonate Phone Numbers The mastermind behind a criminal website that sold tools for scammers who defrauded victims globally of more than 115 million euros received a 13-year, four-month prison sentence in the United Kingdom just months after law enforcement seized the site.

IT 261
article thumbnail

The Mysteries Behind ColdIntro and ColdInvite: TL;DR edition

Jamf

Learn about the discovery of a novel threat vector on iPhone that allows attackers to circumvent security mitigations by exploiting under-protected co-processors, leveraging access to further compromise the iOS kernel.

Access 145
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Federal Lawsuits in Fortra Health Data Breach Piling Up

Data Breach Today

Several Proposed Class Actions Filed Against NationsBenefits, Aetna, Others Proposed class action lawsuits are piling up over hackers' use of a vulnerability in Fortra's GoAnywhere secure file transfer and a resulting data breach affecting 3 million individuals. NationsBenefits Holdings disclosed that hackers accessed personal information by using the widely exploited flaw.

More Trending

article thumbnail

Samsung Patches Memory Address Randomization Bypass Flaw

Data Breach Today

Flaw Was Exploited in Chain of Zero-Days Used to Implant Commercial Spyware Android smartphone device manufacturer Samsung has a patch for a flaw used by commercial surveillance hackers to implant malware in the United Arab Emirates. The U.S. Cybersecurity and Infrastructure Security Agency on Friday gave federal agencies until June 9 to patch the vulnerability.

article thumbnail

Cyber Warfare Lessons From the Russia-Ukraine Conflict

Dark Reading

Techniques used in cyber warfare can be sold to anyone — irrespective of borders, authorities, or affiliations. We need to develop strategies to respond at scale.

124
124
article thumbnail

China Bans Micron Chip Sales

Data Breach Today

Micron Says It Is Surprised by the Chinese Cyberspace Administration's Decision China's cybersecurity agency on Sunday banned sales of U.S. chipmaker Micron's products following a cybersecurity review. The decision is the latest in an escalating series of national security-driven moves by Beijing and Washington, D.C., to restrict the market access of their trans-Pacific rival.

Sales 144
article thumbnail

PyPI Shuts Down Over the Weekend, Says Incident Was Overblown

Dark Reading

The climate of concern around open source security and supply chain attacks may have caused a small story to become a big one.

Security 121
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Open-Source Info Stealer RAT Hides in Malicious npm Packages

Data Breach Today

TurkoRat Capable of Credential Harvesting, Contains Features Such as Wallet Grabber Researchers have identified two legitimate-looking malicious npm packages that concealed an open-source info stealer for two months before being detected and removed. Developers downloaded the TurkoRat malware about 1,200 times from open-source repositories.

144
144
article thumbnail

Improving Cybersecurity Requires Building Better Public-Private Cooperation

Dark Reading

Security vendors, businesses, and US government agencies need to work together to fight ransomware and protect critical infrastructure.

article thumbnail

Michael Landon’s Secret Best Friends

Information Governance Perspectives

Actor Michael Landon, best known for his portrayal of Charles Ingalls on television’s Little House on the Prairie was my parent’s closest friend and confidant for nearly three decades. Their friendship was full of highs and lows, marked by a great tragedy, and it’s a fabled story that has never been told. I’ve tried my darndest to bring their incredible relationship back to life in the pages of a colorful new memoir, The Bastard of Beverly Hills , available May 23rd from

IT 98
article thumbnail

Facing your data challenge with a data catalog

Collibra

Recently, we were thrilled to publish Data Catalogs For Dummies, Collibra Special Edition. You might ask: Why the focus on data catalogs? It’s a good question. The answer is that if you’re in business today, you’re probably drowning in data. In fact, data is increasingly becoming a business-critical asset that needs to be visible, understood, and trusted to drive your organization’s profitability, innovation, and growth.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations

Dark Reading

The technology conglomerate has until later this year to end its transfer of European user's data across the Atlantic.

GDPR 120
article thumbnail

A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication

eSecurity Planet

Security researchers recently published a paper detailing an attack they say can be used to bypass smartphone fingerprint authentication. Yiling He of China’s Zhejiang University and Yu Chen of Tencent Security’s Xuanwu Lab are calling the attack BrutePrint , which they say can be used to hijack fingerprint images. An attack like BrutePrint could present a significant threat to passkeys , an increasingly popular way to replace passwords with authentication methods like fingerprint au

article thumbnail

BlackCat Ransomware affiliate uses signed kernel driver to evade detection

Security Affairs

Experts spotted the ALPHV/BlackCat ransomware group using signed malicious Windows kernel drivers to evade detection. Trend Micro researchers shared details about ALPHV/BlackCat ransomware incident that took place on February 2023. A BlackCat affiliate employed signed malicious Windows kernel drivers to evade detection. Experts believe the driver is a new version of the malware reported in December 2022 by Mandiant , Sophos and Sentinel One , via a coordinated disclosure.

article thumbnail

New Top-Level Domains as Potential Phishing Risk

KnowBe4

Google has recently introduced a set of new top-level domains: dad,esq,prof,phd,nexus,foo,zip and.mov. They’re now available for purchase, and it’s the last two that are attracting attention due to the risk of abuse in phishing attacks.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CISA adds iPhone bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added three zero-day vulnerabilities affecting iPhones, Macs, and iPads to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency (CISA) added three zero-day vulnerabilities affecting iPhones, Macs, and iPads to its Known Exploited Vulnerabilities Catalog. The three issues reside in the WebKit browser engine and are tracked as CVE-2023-32409, CVE-2023-28204, and CVE-2023-32373.

IT 90
article thumbnail

IBM's Polar Buy Creates Focus on a New 'Shadow Data' Cloud Security Area

Dark Reading

The purchase gives IBM access to a new category of products called "data security posture management" for security data in cloud and SaaS repositories.

Cloud 96
article thumbnail

Google Is Not Deleting Old YouTube Videos

Schneier on Security

Google has backtracked on its plan to delete inactive YouTube videos—at least for now. Of course, it could change its mind anytime it wants. It would be nice if this would get people to think about the vulnerabilities inherent in letting a for-profit monopoly decide what of human creativity is worth saving.

IT 87
article thumbnail

Dish Network says the February ransomware attack impacted +300,000 individuals

Security Affairs

Satellite TV giant Dish Network disclosed a data breach after the February ransomware attack and started notifying impacted individuals. The American satellite broadcast provider Dish Network went offline on February 24, 2023 , the outage impacted Dish.com, Dish Anywhere app, and many other services owned by the company. In early February, the company admitted that the outage was caused by a ransomware attack.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to use VPN with a VPC hub-and-spoke architecture

IBM Big Data Hub

Site-to-site Virtual Private Network (VPN) has been used to connect distributed networks for decades. This post describes how to use a VPC VPN Gateway to connect an on-premises (enterprise) network to the IBM Cloud VPC in a transit hub-and-spoke architecture: VPN Gateway connectivity to a VPC transit hub and spoke. Each spoke can be operated by a different business unit or team.

Cloud 77
article thumbnail

EU hits Meta with $1.3 billion fine for transferring European user data to the US

Security Affairs

The European Union condemned Meta with a record $1.3 billion fine for transferring European user data to the US. The European Union fined Meta $1.3 billion for transferring user data to the US. This is the biggest fine since the adoption of the General Data Protection Regulation (GDPR) by the European Union (EU) on May 25, 2018. In the past, the social media giant Meta threatened to block its services for users in Europe without a legal basis for data transfers.

GDPR 84
article thumbnail

Cyber Insurance: Is Paying a Ransom Counter-Productive?

KnowBe4

Food for thought as discussed on May 18, 2023, an article posted in The Australian Insurance Council: Banning paying a ransom to cyber hackers is counter-productive where Andrew Hall, the Chief Executive of the Insurance Council of Australia (ICA), stated that “attempts to ban businesses from paying ransoms for cyber attacks risks eroding trust and relationships with government.

article thumbnail

IBM WebSphere Liberty announces InstantOn for cloud-native Java

IBM Big Data Hub

IBM is pleased to announce the availability of WebSphere Liberty InstantOn coming at the end of June 2023. With this new offering, you can start cloud-native Java applications up to 10x faster. IBM WebSphere Liberty is a next-generation application runtime that accelerates the delivery of cloud-native applications. Whether you’re running microservices in a serverless environment or a traditional always-on application, Liberty requires less infrastructure, saving costs by up to 40% , and pr

Cloud 77
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

[New & Improved] QR Code Phishing with Snail Mail Postcards

KnowBe4

One of KnowBe4's long-term employees just send me a picture this morning of a postcard that sure looks like it's phishing, the good old-fashioned way: snail mail ! Here is the picture and you tell me what all the red flags are!

article thumbnail

Meta’s $1.3 Billion Fine Is a Strike Against Surveillance Capitalism

WIRED Threat Level

The record-breaking GDPR penalty for data transfers to the US could upend Meta's business and spur regulators to finalize a new data-sharing agreement.

GDPR 83
article thumbnail

[Free Tool] Find out who falls victim to QR code phishing attacks with our QR Code Phishing Security Test

KnowBe4

According to QRTIGER , an online QR code generator company, dynamic QR code scans increased 433% globally from 2021 to 2022. In 2022, the FBI released a warning that QR codes may be tampered with by cybercriminals to direct victims to malicious sites.