Mon.Oct 25, 2021

article thumbnail

DarkSide Transfers $7 Million Worth of Bitcoin

Data Breach Today

Move by Colonial Pipeline Attackers Follows Law Enforcement Action Against REvil Following an outage of the REvil - aka Sodinokibi - ransomware operation due to coordinated law enforcement efforts involving the U.S. and foreign partners, the operators behind DarkSide ransomware have moved Bitcoin worth almost $7 million to multiple new wallets, making it more difficult to track.

article thumbnail

Conti Ransom Gang Starts Selling Access to Victims

Krebs on Security

The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti’s malware who refuse to negotiate a ransom payment are added to Conti’s victim shaming blog, where confidential files stolen from victims may be published or sold. But sometime over the past 48 hours, the cybercriminal syndicate updated its victim shaming blog to indicate that it is now selling access to many of the organizations it has hacked.

Access 231
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Memo to Ransomware Victims: Seeking Help May Save You Money

Data Breach Today

Flaw in DarkSide and BlackMatter Enabled Security Firm to Decrypt Files for Free While ransomware might be today's top cybercrime boogeyman, attackers aren't infallible. The latest example: Errors in DarkSide - and its BlackMatter rebrand - enabled security experts to quietly decrypt many victims' files for free, saving millions in potential ransom payments.

article thumbnail

GUEST ESSAY: Here’s why castle-wall defenses utterly fail at stopping deceptive adversaries

The Last Watchdog

When it comes to cyber attacks, most businesses think: “It could never happen to us,” but some plots are just hitting a little too close to home. Related: T-Mobile breach reflects rising mobile device attacks. For instance, if you’ve ever played Grand Theft Auto, you know the goal is quite simply mass destruction: Use whatever resources you have at your disposal to cause as much damage as you possibly can and just keep going.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Troublemaker CISO: Do You Know What You Should Be Doing?

Data Breach Today

The Rant of the Day From Ian Keller, Ericsson In his second Rant of the Day for the CyberEdBoard Profiles in Leadershop blog, Ian Keller, security director at Ericsson and CyberEdBoard executive member, talks about what a CISO does - and what a CISO should do.

Security 293

More Trending

article thumbnail

UK's Tesco Supermarket App and Website Disrupted

Data Breach Today

Retailer Says an Attempt Was Made to Interfere With Its Systems Grocery retailer Tesco said it faced a service disruption on its app and website. The company told ISMG that the outage was likely due to an attempt to interfere with its systems. On Monday, a company spokesperson said that both the website and app were now "back up and running.

Retail 292
article thumbnail

Fight Against Robocalls Is Coming for Telemarketing Text Messages

Hunton Privacy

As reported on the Hunton Retail Resource Blog , on October 20, 2021, a new wave in the fight against “robocalls” is targeting telemarketing text messages. In the past six months, there has been an uptick in activity at both the state and federal level to reign in telemarketing text messages. On July 1, 2021, Florida’s “mini-TCPA” went into effect. The mini-TCPA amends Florida’s Telemarketing Act in several key ways, most notably in allowing consumers to maintain a private cause of action for vi

Sales 108
article thumbnail

Case Study: Intrusion Prevention, Detection in the Cloud

Data Breach Today

Chronic disease management firm Omada Health has been changing its approach to cloud intrusion prevention and detection, which is reducing time spent on investigating false positives, says the company's information security leader, Bill Dougherty.

Cloud 157
article thumbnail

Tesco website and app back online after attempted cyber attack

IT Governance

Tesco’s website and app came back online late last night, following a disruption that began on Saturday. Customers had been unable to use the supermarket’s services after a reported cyber attack. Tesco was initially vague about what happened, calling it simply “an issue”, but an update yesterday clarified that there had been a deliberate attempt to compromise its systems.

Retail 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Effective Security Defined and Refined

Data Breach Today

Horizon3.ai CEO Snehal Antani on Re-Setting Enterprise Security Expectations At a time when ransomware, zero day vulnerabilities and supply chain threats are rampant, what is effective security? Snehal Antani, CEO of Horizon3.ai, defines "effective security" in today's context and describes how enterprises can achieve and maintain it.

Security 157
article thumbnail

NYT Journalist’s iPhone infected twice with NSO Group’sPegasus spyware

Security Affairs

Threat actors infected the iPhone of New York Times journalist Ben Hubbard with NSO Group’s Pegasus spyware between June 2018 to June 2021. The iPhone of New York Times journalist Ben Hubbard was repeatedly infected with NSO Group’s Pegasus spyware. The device was compromised two times, in July 2020 and June 2021. The attacks were documented by the Citizen Lab research team from the University of Toronto, the infections took place while the journalist was wording on a book about Saud

Libraries 103
article thumbnail

Report: SolarWinds Hackers Targeting IT Supply Chain

Data Breach Today

Microsoft Says Nobelium APT Is Eyeing Resellers, Tech Service Providers The actor behind the cyberattack targeting SolarWinds customers - Nobelium - is continuing its campaign to target the global IT supply chain, according to a new advisory from Microsoft, which says 140 resellers and tech service providers have been notified that they have been targeted by the group.

IT 157
article thumbnail

What you need to know about implementing Apple’s latest OS upgrades

Jamf

With macOS Monterey now available, it's a good time to revisit the tips in our recent webinar for Apple OS upgrade season. Learn how you can be an IT hero to your end users by managing expectations and ensuring a secure and successful rollout.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A critical RCE flaw affects Discourse software, patch it now!

Security Affairs

US CISA urges administrators to address a critical remote code execution flaw, tracked as CVE-2021-41163, in Discourse installs. Discourse is a popular open-source Internet forum and mailing list management software application. The US CISA published a security advisory to urge administrators to fix a critical remote code execution flaw, tracked as CVE-2021-41163 , in Discourse installs.

IT 96
article thumbnail

5 Ways CMMC Security Requirements May Impact Universities

Dark Reading

The Cybersecurity Maturity Model Certification puts research universities in a position where they must validate the effectiveness of their security controls before applying for a grant or bidding on a government contract.

article thumbnail

Kansas Man pleads guilty to hacking the Post Rock Rural Water District

Security Affairs

Kansas man Wyatt Travnichek admitted in court to tampering with the computer systems at the Post Rock Rural Water District. Kansas man Wyatt A. Travnichek pleaded guilty to tampering with the computer system at a drinking water treatment facility at the Post Rock Rural Water District. The man also pleaded guilty to one count of reckless damage to a protected computer system during unauthorized access. .

Access 91
article thumbnail

SolarWinds APT Targets Tech Resellers in Latest Supply-Chain Cyberattacks

Threatpost

The Nobelium group, linked to Russia's spy agency, is looking to use resellers as a path to infiltrate their valuable downstream customers - and it's working.

IT 88
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Jamf delivers same-day support for macOS Monterey!

Jamf

macOS Monterey is here and Jamf is ready for same-day support! Upgrade when you're ready, secure your Mac on a deeper level and feel the power of macOS Monterey.

article thumbnail

New York Times Journalist Hacked with NSO Spyware

Schneier on Security

Citizen Lab is that a New York Times journalist was hacked with the NSO Group’s spyware Pegasus, probably by the Saudis. The world needs to do something about these cyberweapons arms manufacturers. This kind of thing isn’t enough; NSO Group is an Israeli company.

article thumbnail

BillQuick Billing App Rigged to Inflict Ransomware

Threatpost

A SQL injection bug in the BillQuick billing app has not only leaked sensitive information, it’s also let malicious actors remotely execute code and deploy ransomware.

article thumbnail

SolarWinds Attacker Targets Cloud Service Providers in New Supply Chain Threat

Dark Reading

Microsoft says the group has attacked more than 140 service providers and compromised 14 of them between May and October of this year.

Cloud 95
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

BQE Web Suite Billing App Rigged to Inflict Ransomware

Threatpost

An SQL-injection bug in the BQE Web Suite billing app has not only leaked sensitive information, it’s also let malicious actors execute code and deploy ransomware.

article thumbnail

How We Can Narrow the Talent Shortage in Cybersecurity

Dark Reading

Filling crucial roles in cybersecurity and addressing the talent shortage requires rethinking who qualifies as a "cybersecurity professional" and rewriting traditional job descriptions.

article thumbnail

Mark Zuckerberg will be added to a Facebook privacy lawsuit via NY Times

IG Guru

Check out the link here. The post Mark Zuckerberg will be added to a Facebook privacy lawsuit via NY Times appeared first on IG GURU.

Privacy 83
article thumbnail

Who's In Your Wallet? Exploring Mobile Wallet Security

Dark Reading

Security flaws in contactless payments for transportation systems could lead to fraud for stolen devices, researchers find.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

CISA Urges Sites to Patch Critical RCE in Discourse

Threatpost

The patch, urgently rushed out on Friday, is an emergency fix for the widely deployed platform, whose No. 1 most trafficked site is Amazon’s Seller Central.

article thumbnail

Industrial Goods & Services Tops Ransomware Targets in 2021

Dark Reading

While the industrial goods and services sector saw a decline in attacks during the third quarter, it remains the most targeted sector for ransomware this year.

article thumbnail

Bridging the data ‘achievement gap’ for financial services

OpenText Information Management

Every financial services organization today understands the importance of data maturity. Data maturity is about maximizing the value of your data to answer business questions, empower employees and deliver an improved customer experience. But there’s a major gap between where banks are and where they want to be. Most financial institutions are striving to combine … The post Bridging the data ‘achievement gap’ for financial services appeared first on OpenText Blogs.