Thu.Feb 02, 2023

article thumbnail

Ransomware Gang Stole Customer Data, Arnold Clark Confirms

Data Breach Today

Extortionists Dump Private and Corporate Customer Data From European Car Giant Christmastime was bleak for a number of organizations in Britain that got hit with ransomware, including car dealership giant Arnold Clark, which originally reported that no customer data had been stolen. But the business subsequently revised its assessment, after attackers dumped stolen data.

article thumbnail

Introducing the Jamf Learning Hub

Jamf

Check out the new Jamf Learning Hub to find the product technical content you need, when you need it to get the most out of Jamf products and succeed with Apple.

IT 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dragos CEO on Opening Execs' Eyes to OT Security Threats

Data Breach Today

Why COVID-19 Made Leaders Realize Just How Connected OT Networks Really Are Executives underestimated the security risk associated with operational technology based on the erroneous belief that OT networks are highly segmented or air gapped. But COVID-19 made executives realize their OT networks are more connected than they previously thought, says Dragos CEO Robert M.

Security 205
article thumbnail

AIs as Computer Hackers

Schneier on Security

Hacker “Capture the Flag” has been a mainstay at hacker gatherings since the mid-1990s. It’s like the outdoor game, but played on computer networks. Teams of hackers defend their own computers while attacking other teams’. It’s a controlled setting for what computer hackers do in real life: finding and fixing vulnerabilities in their own systems and exploiting them in others’ It’s the software vulnerability lifecycle.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Feds Smack Banner Health With $1.25 Million Fine in Breach

Data Breach Today

2016 Hacking Incident Affected Nearly 3 Million People Federal regulators hit Banner Health, which operates hospitals and other care facilities in multiple states, with a $1.25 million HIPAA settlement in the wake of a 2016 hacking incident that affected nearly 3 million individuals. Banner Health will also implement a corrective action plan.

130
130

More Trending

article thumbnail

Scottish Schools' Use of Facial Recognition Violated GDPR

Data Breach Today

North Ayrshire Schools 'Immediatley Ceased' Use of Facial Recognition A Scottish school system decided not to use facial recognition in its secondary school cafeterias after international outcry. The U.K. Information Commissioner's Office said Tuesday that the North Ayrshire Council failed to obtain free-given consent for the system.

GDPR 130
article thumbnail

Netflix’s US Password-Sharing Crackdown Isn’t Happening—Yet

WIRED Threat Level

Accidental revisions to a US Help Center page sparked confusion about the streamer's next moves. But restrictions on account sharing are still coming soon.

article thumbnail

How Much Did BonqDAO Lose in Smart Contracts Hack?

Data Breach Today

Hacker Exploited Incorrectly Deployed Price Oracle on DeFi Protocol to Steal Funds Another day, another crypto hack: A hacker on Wednesday exploited a smart contract vulnerability on a decentralized platform to steal cryptocurrency. The attacker got away either with $120 million or $1 million. It's complicated.

IT 130
article thumbnail

Initial Access Brokers Leverage Legitimate Google Ads to Gain Malicious Access

KnowBe4

A threat actor tracked as DEV-0569 appears to be using a combination of Google Ads and impersonated websites to compromise credentials and distribute malware to gain network access.

Access 91
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

BlackCat Adds Indian Missile Fuel Maker to Its Victims List

Data Breach Today

Ransomware-as-a-Service Group Purports to Sell Indian Military Data on Dark Web The BlackCat ransomware-as-a-service group says it's selling 2 terabytes worth of military data including classified documents culled from Indian explosives and propellant manufacturer Solar Industries. Ransomware criminals say they've stolen specifications of rocket propellant and warheads.

Military 130
article thumbnail

Yahoo Suddenly Rises in Popularity in Q4 to Become the Most Impersonated Brand in Phishing Attacks

KnowBe4

Completely absent from the top 10 brands for more than two years, Yahoo’s impersonation may indicate that scammers are looking for new attack angles using lesser-used brands.

article thumbnail

Splunk CEO on Enriching the SIEM With UEBA and Threat Intel

Data Breach Today

CEO Gary Steele on Why the 'World of the Old-School SIEM Has Fundamentally Changed' Splunk has infused its SIEM with user behavior analytics and threat intelligence to better identify anomalies and understand what's going on in a customer's environment, says CEO Gary Steele. Adding UEBA to the SIEM makes it easier for organizations to identify, detect and remediate anomalies.

Analytics 130
article thumbnail

Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks

Dark Reading

The group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low risk, high reward, quick, easy, and low effort.

Risk 88
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Checkmarx CEO on Bringing Application, API Security Together

Data Breach Today

Emmanuel Benzaquen on Why API Abuse Is Such a Pervasive Web Application Data Breach Organizations have struggled to understand why APIs are so strategic even though they're an intrinsic way businesses interface with their software, according to Checkmarx CEO Emmanuel Benzaquen. He says API abuse is slated to become one of the most common types of web application data breaches.

article thumbnail

Ransomware Report 2023: Targets, Motives, and Trends

Outpost24

Ransomware Report 2023: Targets, Motives, and Trends 07.Feb.2023 Florian Barre Thu, 02/02/2023 - 04:42 Pol Casas, Jacobo Blancas & Alejandro Villanueva from the KrakenLabs team Threat Intelligence Teaser Our annual Ransomware Report shares the latest trends and developments of the most active threat groups, and their victims to help businesses better protect themselves.

article thumbnail

Ubiquiti Insider Hacker Pleads Guilty

Data Breach Today

Nickolas Sharp Faces 35 Years in Federal Prison for $1.9 Million Extortion Attempt The insider threat hacker who attempted to extort $1.9 million out of Ubiquiti Networks faces sentencing in May after pleading guilty to three crimes in federal court. The hacker, Nickolas Sharp, was the company's cloud lead and was on the team remediating the security incident he caused.

Cloud 130
article thumbnail

Weekly Update 333

Troy Hunt

Getting everything out nice and early today so we can get out there in hit the wake park in the balmy "well over 30C" weather (the radio is talking about "severe heatwave weather" as I write this). But hey, we're surrounded by water and a beer delivery is due today so no crisis 😎 There's also a heap more data breach news and I'll be putting that connected BBQ to use for the first time today, stay tuned for epic pics on all of the above over the coming hours

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Okta Lays Off 300 Employees After Sales Execution Challenges

Data Breach Today

5% of Employees Exit in Cybersecurity Industry's 3rd-Largest Workforce Reduction Okta will execute the third-largest round of layoffs of any cybersecurity company in the current economic downturn, axing 300 workers following customer identity execution challenges. The identity giant plans to reduce its staff by 5% in a push to reduce operating expenses and improve profitability.

Sales 130
article thumbnail

Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter

Dark Reading

Analysts find that 98% of QNAP NAS are vulnerable to CVE-2022-27596, which allows unauthenticated, remote SQL code injection.

98
article thumbnail

'No Pineapple' Hacking Campaign Reveals North Korean Toolkit

Data Breach Today

Espionage Campaign Bore Tell-tale Signs of Pyongyang - And a Major Opsec Failure Researchers from cybersecurity firm WithSecure say they spotted a North Korean espionage campaign they dub "No Pineapple" that reveals a slew of tools in the Pyongyang hacking arsenal. They're confident the hackers were North Korean: One hacker connected to an infected server using a DPRK address.

article thumbnail

BEC Group Launches Hundreds of Campaigns

KnowBe4

A business email compromise (BEC) gang has launched more than 350 attacks against organizations in the US, according to researchers at Abnormal Security. The threat actor, which Abnormal Security tracks as “Firebrick Ostrich,” conducts open-source reconnaissance on their targets in order to construct their scam.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Troublemaker CISO: Defending Against Insider Threat

Data Breach Today

Security Director Ian Keller on the Need for a 'People Leader'

Security 130
article thumbnail

6 Examples of the Evolution of a Scam Site

Dark Reading

Examining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve.

Retail 83
article thumbnail

A High-severity bug in F5 BIG-IP can lead to code execution and DoS

Security Affairs

Experts warn of a high-severity vulnerability that affects F5 BIG-IP that can lead to arbitrary code execution or DoS condition. A high-severity vulnerability in F5 BIG-IP, tracked as CVE-2023-22374 , can be exploited to cause a DoS condition and potentially lead to arbitrary code execution. “A format string vulnerability exists in iControl SOAP that allows an authenticated attacker to crash the iControl SOAP CGI process or, potentially execute arbitrary code.

article thumbnail

Cybersecurity Leaders Launch First Attack Matrix for Software Supply Chain Security

Dark Reading

Current and former cybersecurity leaders from Microsoft, Google, GitLab, Check Point, OWASP, Fortinet and others have already joined the open framework initiative, which is being led by OX Security.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

IBM X-Force Exchange Threat Intelligence Platform

eSecurity Planet

The top-ranked IBM X-Force Exchange threat intelligence platform (TIP) integrates enterprise-grade external security threat information with the tools a security professional needs to analyze how the threat might impact the organization. This article provides more in-depth information on the product and its features. For a comparison with other TIP products, see the complete list of top threat intelligence companies.

Retail 73
article thumbnail

Managing the Governance Model for Software Development in a No-Code Ecosystem

Dark Reading

Forward-leading business and technology leaders are seeing the value of the "do-It-yourself" approach.

article thumbnail

Strengthen information protection with a Zero Trust Information Governance program

OpenText Information Management

“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu, The Art of War A critical element of any security plan is to assert command and control of every route through your defenses. This applies to airport security, military defense, and of course, to … The post Strengthen information protection with a Zero Trust Information Governance program appeared first on OpenText Blogs.