Fri.Feb 24, 2023

article thumbnail

Crime Blotter: Hackers Fail to Honor Promises to Delete Data

Data Breach Today

Police Say Gang Extorted Millions From Victims Not Just by Stealing, But Lying Too Cybercrime experts have long urged victims to never pay a ransom in return for any promise an attacker makes to delete stolen data. That's because, as a recent case highlights, whatever extortionists might promise, stolen personal data is lucrative, and it often gets sold six ways from Sunday.

article thumbnail

Who’s Behind the Botnet-Based Service BHProxies?

Krebs on Security

A security firm has discovered that a six-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies , which offers paying customers the ability to route their web traffic anonymously through compromised computers. Here’s a closer look at Mylobot, and a deep dive into who may be responsible for operating the BHProxies service.

Passwords 214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Authorities Warn Healthcare Sector of Ongoing Clop Threats

Data Breach Today

Group Has Exploited GoAnyWhere MFT Flaw for Ransomware Attacks Federal authorities are urging the healthcare sector to ratchet up defenses against potential assaults by Russian-linked Clop on the heels of the ransomware-as-a-service group's recent alleged mass attacks exploiting a vulnerability in vendor Fortra's secure file transfer software GoAnyWhere MFT.

article thumbnail

EDPB Adopts Three Sets of Guidelines in Final Form

Hunton Privacy

On February 24, 2023, following public consultation, the European Data Protection Board (EDPB) published the following three sets of adopted guidelines: Guidelines on the Interplay between the application of Article 3 and the provisions on international transfers as per Chapter V GDPR (05/2021) ( final version ); Guidelines on certification as a tool for transfers (07/2022) ( final version ); and Guidelines on deceptive design patterns in social media platform interfaces (03/2022) ( final versio

GDPR 123
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Asia-Pacific Faced the Highest Share of Cyberattacks in 2022

Data Breach Today

IBM Data Shows the Region Accounted for 31% of All Incidents Monitored During 2022 The Asia-Pacific region had the dubious distinction of being the global region that faced the most cyberattacks during 2022, as observed by IBM's threat intelligence platform. IBM says the region accounted for 31% of all incidents monitored during 2022.

167
167

More Trending

article thumbnail

CISA Warns of Cyberattacks on Ukraine War Anniversary

Data Breach Today

Russian Groups Have Been Sending DDoS Attacks to Western Countries The United States is warning domestic and European organizations to be extra vigilant about their presence in cyberspace on the one-year anniversary of Russia's 2022 invasion of Ukraine. Friday marks 12 months since Moscow initiated a war of conquest against its European neighbor.

IT 157
article thumbnail

CISA: Beware of DDoS, Web Defacements on Anniversary of Russian Invasion of Ukraine

Dark Reading

The Cybersecurity and Infrastructure Security Agency advises US and European nations to prepare for possible website attacks marking the Feb. 24 invasion of Ukraine by Russia.

article thumbnail

Tesla Revises Camera Settings Following Privacy Concerns

Data Breach Today

An Investigation by Dutch DPC Found Tesla Cars Recorded People Illegally Automaker Tesla revised settings for its in-built cameras after a probe by the Dutch data privacy agency found its default settings enabled illegal recording and retention of data. "Teslas parked on the street were often filming everyone who came near the vehicle," DPA board member Katja Mur said.

Privacy 157
article thumbnail

Tackling Software Supply Chain Issues With CNAPP

Dark Reading

The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain.

Marketing 111
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Intel 471 Promotes Jason Passwaters to CEO to Land Prospects

Data Breach Today

Passwaters Wants to Help Intel 471 Capture Business From Less-Mature Organizations Intel 471 has promoted second-in-command Jason Passwaters to CEO and tasked him with onboarding less-mature security organizations for narrower use cases. The company plans to land more threat intelligence customers by focusing on areas such as vulnerability management and patch prioritization.

Security 144
article thumbnail

Hackers are actively exploiting CVE-2022-47966 flaw in Zoho ManageEngine

Security Affairs

Experts warn of threat actors actively exploiting the critical CVE-2022-47966 (CVSS score: 9.8) flaw in Zoho ManageEngine. Multiple threat actors are actively exploiting the Zoho ManageEngine CVE-2022-47966 (CVSS score: 9.8) in attacks in the wild, Bitdefender Labs reported. “Starting on January 20 2023, Bitdefender Labs started to notice a global increase in attacks using the ManageEngine exploit CVE-2022-47966.” reads the report published by Bitdefender Labs.

article thumbnail

Ukraine Finds 2-Year-Old Russian Backdoor

Data Breach Today

Threat Actor Tracked as UAC-0056 Is Behind the Attacks Russian hackers breached and modified several Ukrainian state websites on Thursday morning using a backdoor planted nearly two years ago. Ukraine identified the hackers as belonging to a group tracked as UAC-0056, also known as SaintBear, UNC2589 and TA471.

144
144
article thumbnail

TikTok Ban Hits EU Commission Phones as Cybersecurity Worries Mount

Dark Reading

Employees of the EU Commission are no longer allowed to use the TikTok app thanks to concerns over data security.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to Fight Check Fraud: Look Beyond Technology

Data Breach Today

M&T Bank's Karen Boyer on Why Check Fraud Can't Be Solved With Technology Alone Tools such as image analysis are of little help to banks dealing with check fraud since, most of the time, checks that are deposited are legitimate, says Karen Boyer, senior vice president for financial crimes at M&T Bank. She says the best way to deal with this fraud is to closely monitor accounts.

144
144
article thumbnail

Highly evasive cryptocurrency miner targets macOS

Security Affairs

Researchers warn of an evasive cryptojacking malware targeting macOS which spreads through pirated applications Jamf Threat Labs researchers reported that an evasive cryptojacking malware targeting macOS was spotted spreading under the guise of the Apple-developed video editing software, Final Cut Pro. Trojanized versions of legitimate applications are being used to deploy XMRig cryptocurrency miner on macOS systems. “Further investigation revealed that this malicious version of Final Cut

Mining 88
article thumbnail

ISMG Editors: Zero Trust Special

Data Breach Today

Zero Trust Creator John Kindervag on ChatGPT, API Security, MFA Bypass In the latest weekly update, John Kindervag, creator of zero trust and senior vice president of cybersecurity strategy at ON2IT, joins ISMG editors to discuss the top zero trust storylines of the year, the impact of ChatGPT on the cybersecurity industry and how to tackle MFA bypass attacks.

article thumbnail

Substantial changes to Hong Kong’s privacy laws coming

Data Matters

In a briefing to the Legislative Council (Hong Kong’s legislative body) on February 20, 2023, the Privacy Commissioner (“ the Commissioner ”) announced that substantive amendments to the Personal Data (Privacy) Ordinance (“ PDPO ”) will take place. The post Substantial changes to Hong Kong’s privacy laws coming appeared first on Data Matters Privacy Blog.

Privacy 109
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Suspected NLBrute Malware Developer Pleads Not Guilty

Data Breach Today

Tool Sold on Underground Markets Often Used for Initial Access in Ransomware Attacks A Russian national accused by U.S. federal prosecutors of developing an application for decrypting login credentials pleaded not guilty during a first appearance in Tampa federal court. The man, Dariy Pankov, faces seven criminal counts, including conspiracy, access device fraud and computer fraud.

article thumbnail

CISA warns of disruptive attacks amid the anniversary of Russia’s invasion of Ukraine

Security Affairs

One year after Russia’s invasion of Ukraine, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns organizations to increase vigilance. Exactly one year, Russia invaded Ukraine, and now one year later the U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals to increase vigilance.

article thumbnail

Canadian Telecom Firm Telus Reportedly Investigating Breach

Dark Reading

A threat actor has leaked data — purportedly, samples of Telus employee payroll data and source code — on a hacker site.

103
103
article thumbnail

Security Operations: Best Recent Reads

Micro Focus

To help shed light on SecOps and the issues surrounding it, this blog post offers a roundup of some of the most insightful content published in various corners of our site. The post Security Operations: Best Recent Reads first appeared on Micro Focus Blog.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

To Safeguard Critical Infrastructure, Go Back to Basics

Dark Reading

CISA's recently released cybersecurity performance goals can help lower risk and thwart the impact of cyberattacks.

article thumbnail

NIS2 Directive: What does it mean to security teams?

Jamf

Part two of this blog series analyses the changes to the Network and Information Security regulations by the European Union, covering aspects of the cybersecurity risk-management measures and how they come together to improve cybersecurity capabilities for organizations.

article thumbnail

Preparing for Quantum. A Conversation with Scott Aaronson

OpenText Information Management

We are on the cusp of a new tech global era. It is no longer good enough to look around corners. We need to look around corners of corners. We need to see the potential before us, and be prepared—to take on new directions, new challenges and new unknowns. We set the stage for the … The post Preparing for Quantum. A Conversation with Scott Aaronson appeared first on OpenText Blogs.

IT 59
article thumbnail

Rishi Sunak faces calls to ban TikTok use by government officials

The Guardian Data Protection

PM under pressure to follow EU and US in taking step over fears Chinese-owned app poses cybersecurity risk Rishi Sunak has been urged to ban government officials from using TikTok in line with moves by the EU and US, amid growing cybersecurity fears over China. Officials in Europe and the US have been told to limit the use of the Chinese-owned social video app over concerns that data can be accessed by Beijing.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Evaluating the Cyberwar Set Off by Russian Invasion of Ukraine

Dark Reading

Preparation and cooperation helped to mitigate the worst of the digital damage, amid cyber sorties from all sides.

71
article thumbnail

UK won the Military Cyberwarfare exercise Defence Cyber Marvel 2 (DCM2)

Security Affairs

Defence Cyber Marvel 2 (DCM2) is the largest Western Europe-led cyber exercise that took place in Tallinn with 34 teams from 11 countries. The Defence Cyber Marvel 2 (DCM2) is the largest training exercise organised by the Army Cyber Association to allow personnel from across the Armed Forces to build their skills within the cyber and electromagnetic domain.

article thumbnail

Top security priorities: responding to security incidents

Jamf

In the last blog of the Top Security Priorities series, we’ll discuss common cyber attack vectors and the stages of incident response.