Fri.Jan 06, 2023

article thumbnail

Expect Hacking, Phishing After Leak of 200M Twitter Records

Data Breach Today

Database Will Provide Intelligence of Use to Online Criminals, Expert Warns Expect the recently leaked database containing over 200 million Twitter records to be an ongoing resource for hackers, fraudsters and other criminals operating online, even though 98% of the email addresses it contains have appeared in prior breaches, experts warn.

Phishing 363
article thumbnail

Neeva Combines AI and Search – Now Comes The Hard Part

John Battelle's Searchblog

The Very Hardest Thing. What’s the hardest thing you could do as a tech-driven startup? I’ve been asked that question a few times over the years, and my immediate answer is always the same: Trying to beat Google in search. A few have tried – DuckDuckGo has built itself a sizable niche business, and there’s always Bing, thought it’s stuck at less than ten percent of Google’s market (and Microsoft isn’t exactly a startup.

Marketing 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Software Engineer Charged With 'Office Space-Inspired' Fraud

Data Breach Today

'Shopping Experience' Engineer at Retailer Accused of 'Malicious Software Edits' Seattle police have charged an online retailer's "shopping experience" software programmer with engineering a fraud scheme based on the movie "Office Space," in which malicious software was used to transfer a fraction of every transaction into an outside account.

Retail 233
article thumbnail

ChatGPT Artificial Intelligence: An Upcoming Cybersecurity Threat?

Dark Reading

The role of artificial intelligence in cybersecurity is growing. A new AI model highlights the opportunities and challenges.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Texas County EMS Agency Says Ransomware Breach Hit 612,000

Data Breach Today

Emergency Medical, Ambulance Providers Face Extra Security Threats, Experts Say A municipal ambulance services provider that serves 15 cities in a Texas county has reported to federal regulators a ransomware breach potentially affecting 612,000 individuals, which is equivalent to nearly 30% of the county's 2.1 million population.

More Trending

article thumbnail

Rackspace Finds Ransomware Group Accessed 27 Customers' Data

Data Breach Today

Only Those Hosted Exchange Customers at Risk, CrowdStrike Forensic Probe Concludes Hosting giant Rackspace says the recent ransomware attack resulted in Microsoft Exchange data for 27 customer organizations being accessed by attackers. But it says a digital forensic investigation has found "no evidence" that attackers "viewed, obtained, misused or disseminated emails or data.

Access 157
article thumbnail

Remote Vulnerabilities in Automobiles

Schneier on Security

This group has found a ton of remote vulnerabilities in all sorts of automobiles. It’s enough to make you want to buy a car that is not Internet-connected. Unfortunately, that seems to be impossible.

IT 108
article thumbnail

CEO Dibrov on Armis' Play in Asset Vulnerability Management

Data Breach Today

Yevgeny Dibrov on Why Figuring Out Which Vulnerabilities to Prioritize Is So Vexing Determining which asset vulnerabilities should be prioritized for remediation is one of the biggest challenges for virtually every CISO and CSO, says Armis co-founder and CEO Yevgeny Dibrov. Dibrov says CVE and CVSS scores aren't an effective way to prioritize which vulnerabilities to fix first.

130
130
article thumbnail

PurpleUrchin Gang Embraces DevOps in Massive Cloud Malware Campaign

Dark Reading

The Automated Libra group is deploying all components of its campaign in an automated manner via containers, stealing free trial resources for cryptomining, but the threat could get larger.

Cloud 106
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Women's Health Clinic Suffers Breach in Ransomware Attack

Data Breach Today

Pennsylvania Nonprofit Says Patient Medical, Financial Data Breached in 2022 Attack Pennsylvania-based nonprofit Maternal and Family Health Services this week revealed a ransomware attack in April 2022 that compromised patient medical and financial data. Information accessed in the breach includes names, addresses and Social Security numbers.

article thumbnail

From Ferrari to Ford, Cybersecurity Bugs Plague Automotive Safety

Dark Reading

Security vulnerabilities plague automakers, and as vehicles become more connected, a more proactive stance on cybersecurity will be required — alongside regulations.

article thumbnail

Blind Eagle APT Hunts Banking Victims in Colombia, Ecuador

Data Breach Today

Hacking Group Returns With Updated Tools and Infection Chain A financially motivated threat actor called Blind Eagle returned from its hiatus and is conducting an ongoing campaign directed at Spanish-speaking targets in the banking industry in Colombia and Ecuador. The hacking group appears to have updated its tools and infection chain.

IT 130
article thumbnail

Ransomware and Fraudulent Funds Transfer are the Two Main Drivers of Cyber Loss

KnowBe4

Representing more than half of all cyber loss, new data shows these attacks all begin with employees falling for social engineering , phishing , and business email compromise.

Phishing 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bitdefender released a free decryptor for the MegaCortex ransomware

Security Affairs

Antivirus firm Bitdefender released a decryptor for the MegaCortex ransomware allowing its victims to restore their data for free. Antivirus firm Bitdefender released a decryptor for the MegaCortex ransomware , which can allow victims of the group to restore their data for free. The MegaCortex ransomware first appeared on the threat landscape in May 2019 when it was spotted by security experts at Sophos.

article thumbnail

In Memoriam: Remembering Those Who Passed

Dark Reading

Security stands on the shoulders of giants. We take a moment to remember their contributions toward keeping people, data, and systems safe.

Security 105
article thumbnail

Microsoft details techniques of Mac ransomware

Security Affairs

Microsoft warns of different ransomware families (KeRanger, FileCoder, MacRansom, and EvilQuest) targeting Apple macOS systems. Microsoft Security Threat Intelligence team warns of four different ransomware families ( KeRanger , FileCoder , MacRansom , and EvilQuest ) that impact Apple macOS systems. The initial vector in attacks involving Mac ransomware typically relies on user-assisted methods, such as downloading and running fake or weaponized applications.

article thumbnail

A Look Back at Mobile Government Cyberattacks Shows Increased Attacks and Weaker Security

KnowBe4

A rise in the reliance on unmanaged mobile devices, matched with a lack of patching and increased attacks seeking solely to steal credentials was a perfect storm for government.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack

Security Affairs

The Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack in December that is still impacting medical activity. The Saint Gheorghe Recovery Hospital in Botoşani, in northeastern Romania, was hit by a ransomware attack in December that is still impacting medical operations. The hospital is not able to report the services performed in December 2022 and for this reason, it cannot receive payment for the medical services provided.

article thumbnail

January 6 Report: 11 Details You May Have Missed

WIRED Threat Level

The January 6 Committee’s 841-page report will go down as one of the most important documents in US history. These key details stand out.

article thumbnail

Don't Be Blindsided by Software Bills of Materials

Dark Reading

It's imperative we collaborate and partner to improve software security. This may require developing tools and standards that can enrich SBOMs and provide deeper analysis.

article thumbnail

Rackspace: Play Ransomware gang used a previously unknown exploit to access its Hosted Exchange email environment

Security Affairs

Cloud services provider Rackspace confirmed that the recent data breach was the result of the Play Ransomware gang’s attack. Cloud services provider Rackspace announced this week that the recent data breach was the result of an attack conducted by the Play ransomware group. The ransomware attack took place on December 2, 2022, threat actors exploited a previously unknown security exploit , dubbed OWASSRF by Crowdstrike , to gain initial access to the Rackspace Hosted Microsoft Exchange.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CISOs Are Focused on These 3 Trends. Are You?

Dark Reading

The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.

article thumbnail

Schneier on Security Audiobook Sale

Schneier on Security

I’m not sure why, but Audiobooks.com is offering the audiobook version of Schneier on Security at 50% off until January 17.

Sales 89
article thumbnail

Vice Society Releases Info Stolen From 14 UK Schools, Including Passport Scans

Dark Reading

In what's become a pattern, the cybercriminal ring stole data, demanded payment, and posted personal information when ransom was denied.

86
article thumbnail

5 predictions and 3 trends for life sciences in 2023

OpenText Information Management

As the saying goes, the more things change, the more they stay the same. This is particularly true for the life sciences industry. From cloud to mergers and acquisitions to the supply chain, life sciences priorities for 2023 will largely remain the same as in 2022—but with new applications or challenges to be addressed. Here … The post 5 predictions and 3 trends for life sciences in 2023 appeared first on OpenText Blogs.

Cloud 67
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Twitter Data Leak: What the Exposure of 200 Million User Emails Means for You

WIRED Threat Level

The exposure of hundreds of millions of email addresses puts pseudonymous users of the social network at risk.

Risk 86
article thumbnail

Top 5 information management predictions for the industrial process sector

OpenText Information Management

Hello from Alaska! Around this time last year, I shared my predictions on trends impacting the oil & gas and utility industries. This year, I am expanding my predictions to encompass the industrial process sector. Why? Although segments such as utilities, oil and gas, chemicals, and metals and mining are unique, there are many similarities among … The post Top 5 information management predictions for the industrial process sector appeared first on OpenText Blogs.

Mining 62
article thumbnail

Russia-Linked Turla APT Sneakily Co-Opts Ancient Andromeda USB Infections

Dark Reading

Using command-and-control servers from the decade-old Andromeda malware, the group is installing reconnaissance tools and a backdoor on previously infected systems to target Ukrainian victims.

85