Wed.Feb 17, 2021

article thumbnail

3 North Koreans Indicted for Stealing $1.3 Billion

Data Breach Today

Federal Prosecutors Say Hackers Work for Military Intelligence Unit Three North Koreans have been indicted for allegedly taking part in a criminal conspiracy to steal or extort $1.3 billion in cryptocurrency and cash from banks and other organizations around the world, the U.S. Justice Department announced Wednesday.

Military 290
article thumbnail

Browser Tracking Using Favicons

Schneier on Security

Interesting research on persistent web tracking using favicons. (For those who don’t know, favicons are those tiny icons that appear in browser tabs next to the page name.). Abstract: The privacy threats of online tracking have garnered considerable attention in recent years from researchers and practitioners alike. This has resulted in users becoming more privacy-cautious and browser vendors gradually adopting countermeasures to mitigate certain forms of cookie-based and cookie-less track

Paper 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Senators Push for Action on Water Treatment Hack Investigation

Data Breach Today

Warner, Rubio Say Incident Raises Broader Security Issues Sen. Mark Warner, D-Va., is demanding more information from the FBI and the EPA about the Feb. 5 hacking of a water treatment facility in Oldsmar, Florida. Meanwhile, Sen. Marco Rubio, R-Fla., is requesting that the FBI provide "all assistance necessary" to the investigation.

Security 246
article thumbnail

Masslogger Swipes Microsoft Outlook, Google Chrome Credentials

Threatpost

A new version of the Masslogger trojan has been targeting Windows users - now using a compiled HTML (CHM) file format to start the infection chain.

Security 117
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Apple Patches Flaw in macOS Big Sur Upgrade

Data Breach Today

Vulnerability Could Lead to Data Loss Apple has patched a vulnerability in macOS Big Sur 11.2 and 11.3 upgrades that could have resulted in users getting stuck in a boot loop, suffering serious data loss and potentially getting locked out of their data.

205
205

More Trending

article thumbnail

Darknet Markets Compete to Replace Joker's Stash

Data Breach Today

Researchers Identify 6 Underground Markets as Potential Successors Cybercriminal gangs operating darknet stolen payment card marketplaces are scrambling to attract customers from the now-closed Joker's Stash card market, according to the security firms Kela and Flashpoint.

Marketing 205
article thumbnail

TikTok breaching users’ rights “on a massive scale”, says European Consumer Group

IT Governance

TikTok has been accused of breaching users’ rights “on a massive scale” by the European Consumer Group. It is the latest warning for the video sharing app, which has faced numerous complaints over its lax copyright policy and its inability to protect children from harmful content and hidden advertising. The consumer group noted several issues in its complaint to the EU’s network of consumer protection authorities, with TikTok’s terms of service drawing particular criticism.

Privacy 98
article thumbnail

Becoming a CISO: Many Paths to Success

Data Breach Today

Mike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers.

Education 179
article thumbnail

UK Information Commissioner issues letter on transfers of personal data to the U.S. Securities and Exchange Commission

DLA Piper Privacy Matters

The UK’s Information Commissioner (“ ICO ”) has recently issued a letter to the U.S. Securities and Exchange Commission (“ SEC ”) confirming that SEC-regulated UK domiciled firms (“ UK Regulated Firms ”) can share personal data with the SEC when seeking to comply with regulatory obligations, in compliance with the UK GDPR. After a long delay, the ICO’s letter has prompted the SEC to begin accepting applications from UK Regulated Firms.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

File-Sharing App SHAREit for Android Has Remote Code Flaw

Data Breach Today

Trend Micro: Users Face Risk of Data Theft A remote code vulnerability in the Android version of the file-sharing app SHAREit could allow hackers to tamper with the app's permissions, enabling them to steal sensitive data, reports security firm Trend Micro.

Risk 147
article thumbnail

Malware Is Now Targeting Apple’s New M1 Processor

WIRED Threat Level

Two distinct strains of malware have already adjusted to the new silicon just months after its debut.

IT 127
article thumbnail

Centreon says that recently disclosed campaigns only targeted obsolete versions of its open-source software

Security Affairs

French software firm Centreon announced this week that the recently disclosed supply chain attack did not impact its paid customers. The French security agency ANSSI recently warned of a series of attacks targeting Centreon monitoring software used by multiple French organizations and attributes them to the Russia-linked Sandworm APT group. The first attack spotted by ANSSI experts dates back to the end of 2017 and the campaign continued until 2020.

IT 91
article thumbnail

Windows, Linux Devices Hijacked In Two-Year Cryptojacking Campaign

Threatpost

The WatchDog malware has flown under the radar for two years in what researchers call one of the 'largest' Monero cryptojacking attacks ever.

99
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Feds Indict North Korean Hackers for Years of Heists

WIRED Threat Level

The three men are allegedly part of a group that tried to steal $1.3 billion in an extended—and ongoing—cybercrime spree.

Security 103
article thumbnail

Document Retention for US Nonprofits: A Simple Guide via MissionBox

IG Guru

Check out their guide here. The post Document Retention for US Nonprofits: A Simple Guide via MissionBox appeared first on IG GURU.

article thumbnail

Breach Etiquette: How to Mind Your Manners When It Matters

Dark Reading

Panic-stricken as you may be in the face of a cyberattack, keeping calm and, perhaps most importantly, responding appropriately are critical to limiting the damage.

IT 115
article thumbnail

U.S. Accuses North Korean Hackers of Stealing Millions

Threatpost

The feds have expanded the list of financial and political hacking crimes they allege are linked to Lazarus Group and North Korea.

94
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Parler Says It's Back

WIRED Threat Level

The platform was kicked off Amazon's servers. Now it says it's no longer relies on "Big Tech" for its infrastructure.

IT 94
article thumbnail

Ninja Forms WordPress Plugin Bug Opens Websites to Hacks

Threatpost

The popular plugin is installed on more than 1 million websites, and has four flaws that allow various kinds of serious attacks, including site takeover and email hijacking.

article thumbnail

Ransomware? Let's Call It What It Really Is: Extortionware

Dark Reading

Just as the targets of these attacks have shifted from individuals to corporations, so too has the narrow focus given way to applying force and pressure to pay.

IT 109
article thumbnail

Achieving Seamless eDiscovery

OpenText Information Management

Business and litigation go hand in hand in the 21st century. From litigation support personnel to the lawyers themselves, organizations face a common challenge: how to streamline processes and procedures to simplify and thoroughly respond to on-going litigation requests.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Kia Faces $20M DoppelPaymer Ransomware Attack

Dark Reading

Kia Motors America this week experienced a nationwide IT outage; now, reports indicate the company was hit with ransomware.

article thumbnail

US DoJ charges three members of the North Korea-linked Lazarus APT group

Security Affairs

The US DOJ charged three members of the North Korea-linked Lazarus Advanced Persistent Threat (APT) group. The U.S. Justice Department indicted three North Korean military intelligence officials, members of the Lazarus APT group, for their involvement in cyber-attacks, including the theft of $1.3 billion in money and crypto-currency from organizations around the globe.

article thumbnail

Egregor Arrests a Blow, But Ransomware Will Likely Bounce Back

Dark Reading

Similar to previous ransomware takedowns, this disruption to the ransomware-as-a-service model will likely be short-lived, security experts say.

article thumbnail

International data transfers in the post-Schrems II reality

Privacy and Cybersecurity Law

Dentons’ Privacy Community met on 3 February to discuss how to tackle data transfers from the EU and UK to third countries following the CJEU’s decision in the Schrems II case, the European Data Protection Board’s subsequent guidance, and the European Commission’s draft replacement Standard Contractual Clauses (SCCs). Here are the key takeaways: The general picture : When exporting data to third countries based on the SCCs, or Binding Corporate Rules, data exporters must

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

4 Predictions for the Future of Privacy

Dark Reading

Use these predictions to avoid pushback, find opportunity, and create value for your organization.

Privacy 125
article thumbnail

Malware adapts. Even to the M1 chip.

Jamf

Malware authors are rebuilding malware for M1 as universal binaries, and endpoint protection must meet the charge.

52
article thumbnail

US Unseals Indictments Against North Korean Cyberattackers for Thefts Totaling $1.3B

Dark Reading

FBI, CISA, and Treasury Department also release details about North Korean malware used in cryptocurrency thefts since 2018.

77