Thu.Mar 16, 2023

article thumbnail

Magniber Ransomware Group Exploiting Microsoft Zero Day

Data Breach Today

Microsoft Patches Another SmartScreen Signature-Based Vulnerability A financial motivated hacking group has been exploiting a now-patched zero-day vulnerability in the Windows operating system to deliver ransomware. Google Threat Analysis Group attributed the campaign to Magniber ransomware group.

article thumbnail

BianLian Ransomware Pivots From Encryption to Pure Data-Theft Extortion

Dark Reading

The ransomware group has already claimed 116 victim organizations so far on its site, and it continues to mature as a thriving cybercriminal business, researchers said

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Healthcare Leaders Call for Cybersecurity Standards

Data Breach Today

Also: Please Help the Sector Pay for Cybersecurity, Execs Tell Senate Panel Healthcare executives called on Congress to ensure minimum cybersecurity standards, saying a wholly voluntary approach is failing clinics and hospitals.

article thumbnail

$3B Crypto-Mixer Money Laundering Operation Seized by Cops

Dark Reading

The 'ChipMixer' cryptocurrency service for cybercriminals was shut down by law enforcement, and its alleged operator has been charged

IT 137
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

Breach Roundup: Med Devices, Hospitals and a Death Registry

Data Breach Today

On Radar: Zoll, CHU Saint-Pierre, Latitude Financial, LA Housing Authority In this week's data breach roundup: medical device manufacturer Zoll, CHU University hospitals, Australian company Latitude Financial, Hawaiian death registry, Los Angeles Housing Authority, Indian Railway ticketing app, updates on U.S.

More Trending

article thumbnail

Microsoft, CrowdStrike Lead Endpoint Protection Gartner MQ

Data Breach Today

Cybereason Enters Leaders Quadrant While Trellix Falls From Leader to Niche Player Microsoft and CrowdStrike once again dominate Gartner's Magic Quadrant for Endpoint Protection. Cybereason has risen to the leaders quadrant and Trellix has fallen to a niche player.

article thumbnail

5 Ways to Fight School Ransomware Attacks

Dark Reading

The challenges are steep, but school districts can fight back with planning

article thumbnail

Australian Non-Bank Lender Discloses Hacks of Customer Data

Data Breach Today

More Than 300,000 Customers Affected by Breach at Latitude Financial Services Australian personal lending provider Latitude Financial Services disclosed to regulators on Thursday hacking incidents affecting more than 300,000 consumers.

article thumbnail

TikTok Banned on UK Government Devices

IT Governance

The UK government has announced plans to ban ministers and civil servants from using TikTok on work devices. It follows concern regarding the data privacy practices of the Chinese-owned app, with the European Parliament making a similar ruling last week.

article thumbnail

Contact vs. Company Intent Signal Data

Intent signal data comes in two types: either companies or individuals signaling interest in products like yours. Which kind of data delivers more advantages to B2B marketers? It depends. Get this infographic to learn about the advantages of intent-based leads and how you can most effectively use both types of data.

article thumbnail

Cryptohack Roundup: ChipMixer, Euler Finance, Unpatched Bugs

Data Breach Today

Also: Dero, Poolz Finance Hack and a Report on Ransomware Financing Every week, ISMG rounds up cybersecurity incidents in the world of digital assets.

article thumbnail

Understanding DMARC Better

KnowBe4

I talk and present often about DMARC (and SPF and DKIM), including here. A lot of people who think they understand how DMARC works, do not really understand it as well as they think they do. This post is aimed to help clarify some common misunderstandings. Phishing KnowBe4

IT 115
article thumbnail

Russia May Be Reviving Cyber Ops Ahead of Spring Offensive

Data Breach Today

article thumbnail

Change Is Coming to the Network Detection and Response (NDR) Market

Dark Reading

After years of relative stability and steady growth, Omdia research indicates the NDR segment is poised for rapid change

Marketing 111
article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

CISOs on the Human Factor: How Well are we Preparing our People to Protect our Organisations?

Data Breach Today

CISOs have faced a broad and varied set of challenges in recent years. Remote environments, increasingly sophisticated threats and expanding supply chains are just some of the many concerns keeping them up at night

article thumbnail

Rapid7 Acquires Minerva Labs to Extend Leading Managed Detection and Response Service

Dark Reading

Minerva's robust technology and talented engineering team extend Rapid7's end-to-end managed threat detection and orchestration capabilities from the endpoint to the cloud

Cloud 97
article thumbnail

CISOs on Advanced Threats: How do we Respond to Rising Cybersecurity Stakes?

Data Breach Today

Cybercriminals have been launching attacks against our people, networks, and services for decades with varying success. So, the need to realign our defences to meet the demands of evolving threats is nothing new

article thumbnail

CISA adds Adobe ColdFusion bug to Known Exploited Vulnerabilities Catalog

Security Affairs

US CISA added an actively exploited vulnerability in Adobe ColdFusion to its Known Exploited Vulnerabilities Catalog.

article thumbnail

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

article thumbnail

UK ICO Issues Updated Guidance on AI and Data Protection

Hunton Privacy

On March 15, 2023, the UK Information Commissioner’s Office (“ICO”) published an updated version of its guidance on AI and data protection (the “updated guidance”), following requests from UK industry to clarify requirements for fairness in AI.

Privacy 119
article thumbnail

Polish intelligence dismantled a network of Russian spies

Security Affairs

Polish intelligence dismantled a cell of Russian spies that gathered info on military equipment deliveries to Ukraine via the EU member. Polish counter-intelligence has dismantled a cell of Russian spies that gathered information on the provisioning of military equipment to Ukraine via the EU member.

article thumbnail

10 Network Security Threats Everyone Should Know

eSecurity Planet

Network security threats weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure.

article thumbnail

Baseband RCE flaws in Samsung’s Exynos chipsets expose devices to remote hack

Security Affairs

Google’s Project Zero hackers found multiple flaws in Samsung ’s Exynos chipsets that expose devices to remote hack with no user interaction.

Risk 82
article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

Microsoft Targets Critical Outlook Zero-Day Flaw

eSecurity Planet

Microsoft’s Patch Tuesday for March 2023 includes patches for more than 70 vulnerabilities, including zero-day flaws in Outlook and in Windows SmartScreen.

article thumbnail

Microsoft sheds light on a year of Russian hybrid warfare in Ukraine

Security Affairs

Russia-linked threat actors targeted at least 17 European nations in 2023, and 74 countries since the start of the invasion of Ukraine. Microsoft revealed that Russia-linked threat actors targeted at least 17 European nations between January and mid-February 2023.

article thumbnail

MER Conference Announces Student Scholarships to their 2023 event

IG Guru

The MER Conference invites you to consider your students for full-tuition scholarship to this May’s MER Conference.

article thumbnail

Multiple threat actors exploited Progress Telerik bug to breach U.S. federal agency

Security Affairs

Multiple threat actors exploited a critical flaw in Progress Telerik to breach an unnamed US federal agency, said the US government.

article thumbnail

Aggregage Intent Signal Service

Aggregage Intent Signal Service helps your sales team reach more active buyers sooner. You’ll get names and contact information of specific in-market buyers plus all companies and job titles signaling intent for your product or service. Get the overview to learn more!

article thumbnail

I-SIGMA (PRISM) Community Mourns the Passing of Former Association Administrator Melissa Burton

IG Guru

Melissa’s obit is here. IG News i-SIGMA Melissa Lynn Burton Obit PRISM

77
article thumbnail

[FREE RESOURCE KIT] New Phishing Security Resource Kit Now Available!

KnowBe4

Phishing emails increase in volume every month and every year, so we created this free resource kit to help you defend against attacks.

article thumbnail

Senator Warner on the Restrict Act and a US TikTok Ban

WIRED Threat Level

WIRED spoke with the coauthor of the Restrict Act, a bipartisan bill to crack down on tech from six “hostile” countries. Security Security / National Security Business / Social Media