Mon.Mar 21, 2022

article thumbnail

Ransomware Alert: AvosLocker Hits Critical Infrastructure

Data Breach Today

FBI Warns: Operation's Affiliates Employ a Variety of Tactics to Hit Targets The ransomware-as-a-service operation AvosLocker has been amassing "victims across multiple critical infrastructure sectors in the United States," the FBI warns in a new alert that includes known indicators of compromise and tactics employed the group and essential defenses for all organizations.

article thumbnail

McAfee Cloud Launches as Skyhigh Security

eSecurity Planet

The final piece of the complicated Mandiant-FireEye split and subsequent FireEye-McAfee merger fell into place today, as McAfee’s cloud security business was officially spun off under the new name of Skyhigh Security. McAfee Enterprise and FireEye were acquired by Symphony Technology Group last year as Mandiant became a standalone company. STG also owns RSA Security, which remains a separate company.

Cloud 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Illicit Crypto Activity Detected By US Treasury Department

Data Breach Today

US Cyber Official Warns of Potential Russian Cyberattacks Prospects of Russia reviving its economy via cryptocurrency remain limited, officials have said, but the U.S. Treasury Department is reportedly warning that it has detected a rise in the use of digital assets for illicit transactions, including after Feb. 24, when the war began.

IT 246
article thumbnail

Jamf School of Thought Ep. 1: Digital Storytelling

Jamf

Apple Distinguished Educator Michael Hernandez is the first guest on the Jamf School of Thought blogcast, sharing reflections about digital storytelling and media literacy.

Education 119
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Gartner 2022, SASE Day 2022: Event Themes, Takeaways

Data Breach Today

SASE, Cloud and Data Security, Privacy, CISO Strategies in Complex Environments The past month has been filled with action-packed virtual cybersecurity events as the enterprise community continues to deal with a myriad of cybersecurity challenges. While the topics covered were wide-ranging, ISMG analyzed two summits for common themes and shares the significant takeaways.

More Trending

article thumbnail

'Official Dentist' of NBA Team Says Hack Affected 1 Million

Data Breach Today

Texas Dental Practice Says Patient PHI 'Accessed, Copied' in 2021 Malware Incident A Texas dental and orthodontic practice that boasts of being "the official dentist" of the National Basketball Association team the Dallas Mavericks is notifying more than 1 million individuals of a 2021 breach involving patient information being viewed and copied by attackers.

Access 242
article thumbnail

Defending Against Misconfigured MFA & PrintNightmare Vulnerabilities

eSecurity Planet

Using misconfigured multi-factor authentication (MFA) and an unpatched Windows vulnerability, Russian state-sponsored hackers were able to breach a non-governmental organization (NGO) and escalate privileges, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI revealed last week. By using a misconfigured Cisco Duo MFA implementation to force enrollment of a new device, the hackers were then able to use the “PrintNightmare” Windows Print Spooler vulnerability ( CVE

article thumbnail

NRA Finally Confirms Ransomware Attack From 2021

Data Breach Today

Attack Details Came to Light in the Organization's FEC Filing The U.S. National Rifle Association States reportedly fell victim to a ransomware attack in October 2021. The NRA did not acknowledge the attack at the time, but a recent FEC filing explaining a financial discrepancy has forced it to confirm the ransomware attack and detail its impact.

article thumbnail

Developer Sabotages Open-Source Software Package

Schneier on Security

This is a big deal : A developer has been caught adding malicious code to a popular open-source package that wiped files on computers located in Russia and Belarus as part of a protest that has enraged many users and raised concerns about the safety of free and open source software. The application, node-ipc, adds remote interprocess communication and neural networking capabilities to other open source code libraries.

Libraries 101
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Past, Present and Future of SASE

Data Breach Today

235
235
article thumbnail

[BREAKING] White House warns Russia is prepping possible cyberattacks against US

KnowBe4

With the recent cyber-attacks between Russia and Ukraine and the current intelligence coming from the US Government, organizations want to shore up their defenses to reduce the risk of a successful attack by any nation-state.

Risk 99
article thumbnail

Welcoming the Italian Government to Have I Been Pwned

Troy Hunt

For the last 4 years, I've been providing API-level access to national government agencies so that they can search and monitor their government domains on Have I Been Pwned. Today, I'm very happy to welcome the 29th government to join the service, Italy! Via CSIRT-Italia within their National Cybersecurity Agency (ACN), they now have free access to breach data I hope will further empower them to protect their people in the wake of data breaches.

article thumbnail

Hacker leaked a new version of Conti ransomware source code on Twitter

Security Affairs

A Ukrainian security researcher has leaked more source code from the Conti ransomware operation to protest the gang’s position on the conflict. Hacker leaked a new version of the Conti ransomware source code on Twitter as retaliation of the gang’s support to Russia. The attack against the Conti ransomware and the data leak is retaliation for its support for the Russian invasion of Ukraine.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facestealer Trojan Hidden in Google Play Plunders Facebook Accounts

Threatpost

The trojanized Craftsart Cartoon Photo Tools app is available in the official Android app store, but it's actually spyware capable of stealing any and all information from victims' social-media accounts.

IT 84
article thumbnail

Lapsus$ gang claims to have hacked Microsoft source code repositories

Security Affairs

Microsoft is investigating claims that the Lapsus$ hacking group breached its internal Azure DevOps source code repositories. Microsoft announced that is investigating claims that the Lapsus$ cybercrime gang breached their internal Azure DevOps source code repositories and stolen data. Over the last months, the gang compromised other prominent companies such as NVIDIA , Samsung , Ubisoft , Mercado Libre, and Vodafone.

article thumbnail

Browser-in-the-Browser Attack Makes Phishing Nearly Invisible

Threatpost

Can we trust web browsers to protect us, even if they say “https?” Not with the novel BitB attack, which fakes popup SSO windows to phish away credentials for Google, Facebook and Microsoft, et al.

article thumbnail

Italy’s data privacy watchdog investigates how Kaspersky manages Italian users’ data

Security Affairs

Italy’s data privacy watchdog launched an investigation into the “potential risks” associated with the use of Russian antivirus software Kaspersky. Italy’s data privacy watchdog has launched an investigation into potential risks associated with the use of the Kaspersky antivirus. The Italian authority aims at verifying how the Russian company processes the data of Italian users and whether it transfers the collected information outside the EU, including Russia. “The

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

'Unique Attack Chain' Drops Backdoor in New Phishing Campaign

Dark Reading

A threat group combines the use of steganography, open source tools, and Python scripts to target organizations in France.

Phishing 104
article thumbnail

Russia-linked InvisiMole APT targets state organizations of Ukraine

Security Affairs

Ukraine CERT (CERT-UA) warns of spear-phishing ??attacks conducted by UAC-0035 group (aka InvisiMole) on state organizations of Ukraine. The Government Team for Response to Computer Emergencies of Ukraine (CERT-UA) warns of spear-phishing messages conducted by UAC-0035 group (aka InvisiMole) against Ukrainian state bodies. The messages use an archive named “501_25_103.zip”, which contains a shortcut file.

article thumbnail

What is digital sovereignty and how can you achieve it in the cloud?

Thales Cloud Protection & Licensing

What is digital sovereignty and how can you achieve it in the cloud? divya. Tue, 03/22/2022 - 04:42. According to the world economic forum , digital sovereignty refers “to the ability to have control over your own digital destiny – the data, hardware and software that you rely on and create”. As data continues to grow exponentially and modern organizations rely more and more on digital platforms, there is a growing need for digital sovereignty across nations.

Cloud 71
article thumbnail

Serpent backdoor targets French entities with high-evasive attack chain

Security Affairs

A new email campaign aimed at French entities leverages the Chocolatey Windows package manager to deliver the Serpent backdoor. Proofpoint researchers uncovered a targeted attack leveraging an open-source package installer Chocolatey to deliver a backdoor tracked as Serpent. The campaign targeted French entities in the construction, real estate, and government industries.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Crowdsourced Efforts Get Leveraged in Ukraine Conflict

Dark Reading

The battle is not just being waged in the physical world — it's also happening online. And average people are taking part, not just governments.

article thumbnail

DirtyMoe modules expand the bot using worm-like techniques

Security Affairs

The DirtyMoe botnet continues to evolve and now includes a module that implements wormable propagation capabilities. In June 2021, researchers from Avast warned of the rapid growth of the DirtyMoe botnet ( PurpleFox , Perkiler , and NuggetPhantom ), which passed from 10,000 infected systems in 2020 to more than 100,000 in the first half of 2021. Experts defined DirtyMoe as a complex malware that has been designed as a modular system.

Mining 71
article thumbnail

Bridgestone Hit as Ransomware Torches Toyota Supply Chain

Threatpost

A ransomware attack struck Bridgestone Americas, weeks after another Toyota supplier experienced the same and a third reported some kind of cyber hit.

article thumbnail

Name That Toon: Sleep Like a Baby

Dark Reading

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

88
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Digital Asset Management is transforming customer and employee experiences across industries

OpenText Information Management

The growing volume and complexity of digital content in most industries has made DAM a crucial capability in a wide variety of organizations. The post How Digital Asset Management is transforming customer and employee experiences across industries appeared first on OpenText Blogs.

article thumbnail

ForAllSecure Raises $21M to Secure the World’s Software

Dark Reading

Strong demand for application security that supports DevSecOps initiatives drives investment from Koch Disruptive Technologies and New Enterprise Associates.

article thumbnail

ISC2 Announces Changes to the CISSP Exam via their Blog

IG Guru

Check out the post here. The post ISC2 Announces Changes to the CISSP Exam via their Blog appeared first on IG GURU.