Sun.Apr 10, 2022

article thumbnail

Welcoming the North Macedonian Government to Have I Been Pwned

Troy Hunt

In my ongoing bid to make more useful information on data breaches available to impacted national governments , today I'm very happy to welcome the 32nd national CERT to Have I Been Pwned, the Republic of North Macedonia! They now join their counterparts across the globe in having free API-level access to monitor and query their government domains.

article thumbnail

NB65 group targets Russia with a modified version of Conti’s ransomware

Security Affairs

NB65 hacking group created its ransomware based on the leaked source code of the Conti ransomware and targets Russia. According to BleepingComputer , NB65 hacking group is targeting Russian organizations with ransomware that they have developed using the leaked source code of the Conti ransomware. The NB65 hacking group, since the beginning of the invasion, the collective joint the forces with Anonymous and hit multiple Russian targets, including All-Russia State Television and Radio Broadcastin

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apr 03 – Apr 09 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective. Below is the timeline of the events related to the ongoing invasion of Ukraine that occurred in the previous weeks: April 8 – Anonymous and the IT ARMY of Ukraine continue to target Russian entities. The popular hacking Anonymous and the IT ARMY of Ukraine continue to target Russian government entities and private businesses.

article thumbnail

Facebook blocked Russia and Belarus threat actors’ activity against Ukraine

Security Affairs

Facebook/Meta said Russia-linked threat actors are attempting to use the social network against Ukraine with hate speech, bullying, and fake news. Facebook/Meta revealed that Russia-linked threat actors are attempting to weaponize the social network to target Ukraine. The company blocked about 200 accounts operated from Russia that were used to falsely report people for various violations, including hate speech, bullying, and inauthenticity, in an attempt to have them and their posts removed fro

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Security Affairs newsletter Round 360 by Pierluigi Paganini

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here. A DDoS attack took down Finnish govt sites as Ukraine’s President addresses MPs SharkBot Banking Trojan spreads through fake AV apps on Google Play China-linked threat actors target Indian Power Grid organizations A Mirai-based botnet is exploiting