Fri.Aug 05, 2022

article thumbnail

Okta's Marc Rogers on Why Beating Ransomware Is a Team Sport

Data Breach Today

Increased collaboration between the public and private sectors hasn't slowed the increased frequency and ease of ransomware intrusions, but efforts to change the financial incentives of ransomware are having "a pretty good effect," says Marc Rogers, vice president of cybersecurity strategy at Okta.

article thumbnail

New Linux botnet RapperBot brute-forces SSH servers

Security Affairs

RapperBot is a new botnet employed in attacks since mid-June 2022 that targets Linux SSH servers with brute-force attacks. Researchers from FortiGuard Labs have discovered a new IoT botnet tracked as RapperBot which is active since mid-June 2022. The bot borrows a large portion of its code from the original Mirai botnet, but unlike other IoT malware families, it implements a built-in capability to brute force credentials and gain access to SSH servers instead of Telnet as implemented in Mirai.

IoT 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Extradites Russian Accused of Crypto Laundering

Data Breach Today

Alexander Vinnik Makes First Apperance in US Federal Court Accused cryptocurrency money launder Alexander Vinnik made his first appearance in U.S. federal court today. The Russian national faces 55 years imprisonment for his alleged involvement in laundering hacking proceeds through bitcoin on the BTC-e cryptocurrency exchange.

273
273
article thumbnail

Mysterious threat actor TAC-040 used previously undetected Ljl Backdoor

Security Affairs

A threat actor, tracked as TAC-040, exploited Atlassian Confluence flaw CVE-2022-26134 to deploy previously undetected Ljl Backdoor. Cybersecurity firm Deepwatch reported that a threat actor, tracked as TAC-040, has likely exploited the CVE-2022-26134 flaw in Atlassian Confluence servers to deploy a previously undetected backdoor dubbed Ljl Backdoor.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Europe Gets a New DDoS Attack Record

Data Breach Today

DDoS Attacks Intensify Worldwide Amid Geopolitical Unrest An unnamed Eastern Europe company became a victim of that continent's largest-ever distributed denial-of-service attack, says Akamai. The report comes in a season with a record-breaking volume of DDoS attacks, fueled greatly by geopolitical events led by Russia's invasion of Ukraine.

268
268

More Trending

article thumbnail

ISMG Editors: Ransomware Groups Aiming for Smaller Targets

Data Breach Today

Also: BEC Attack Headaches and Inside the Nomad Bridge Hack In the latest weekly update, four editors at Information Security Media Group discuss key takeaways from ISMG's recent Government Summit, how hackers siphoned nearly $200 million from cryptocurrency bridge Nomad and how midsized businesses are the new frontier for ransomware.

article thumbnail

DHS warns of critical flaws in Emergency Alert System encoder/decoder devices

Security Affairs

The U.S. DHS warns of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. The Department of Homeland Security (DHS) warned of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. Threat actors could exploit the flaws to send fake emergency alerts via TV, radio networks, and cable networks.

Security 118
article thumbnail

FFIEC Solicits Comments on Cybersecurity Assessment Tool

Data Breach Today

Council Looks to Enhance Quality, Utility and Clarity Information to Be Collected The Federal Financial Institutions Examination Council is asking for comments regarding the Cybersecurity Assessment Tool, the ostensibly voluntary way for banks and credit unions to self-assess exposure to risk and the maturity of their cybersecurity.

article thumbnail

A Ransomware Explosion Fosters Thriving Dark Web Ecosystem

Dark Reading

For the right price, threat actors can get just about anything they want to launch a ransomware attack — even without technical skills or any previous experience.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Reports: NHS Dealing With IT Outages Due to Cyber Incident

Data Breach Today

A Third-Party Vendor to the UK's Health System Is Apparently at Center of Issues The U.K.'s National Health Service is experiencing IT outages resulting from a cyberattack on a third-party vendor. Birmingham-based technology provider Advanced's Adastra system supplies digital services for urgent healthcare services number 111.

IT 258
article thumbnail

Twitter confirms zero-day used to access data of 5.4 million accounts

Security Affairs

Twitter confirmed that the recent data breach that exposed data of 5.4 million accounts was caused by the exploitation of a zero-day flaw. At the end of July, a threat actor leaked data of 5.4 million Twitter accounts that were obtained by exploiting a now-fixed vulnerability in the popular social media platform. The threat actor offered for sale the stolen data on the popular hacking forum Breached Forums.

Access 103
article thumbnail

Arctic Wolf's Dan Schiappa on Cloud Security in a Recession

Data Breach Today

The impending recession should accelerate cloud adoption as firms look to reduce infrastructure costs, but these moves will introduce a new set of security challenges. Arctic Wolf Chief Product Officer Dan Schiappa predicts many companies will start building security into their applications sooner.

Cloud 244
article thumbnail

The popularity of Dark Utilities ‘C2-as-a-Service’ rapidly increases

Security Affairs

Dark Utilities “C2-as-a-Service” is attracting a growing number of customers searching for a command-and-control for their campaigns. The popularity of the Dark Utilities “C2-as-a-Service” is rapidly increasing, over 3,000 users are already using it as command-and-control for their campaigns. Dark Utilities was launched in early 2022, the platform that provides full-featured C2 capabilities to its users.

Mining 97
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

HHS HC3 Warns Healthcare of IoT Device, Open Web App Risks

Data Breach Today

Advisories Recommend Entities Take Steps for Prevention and Mitigation Federal authorities, in two separate advisories issued Thursday, urge healthcare sector entities to proactively address security risks from internet of things devices equipped with sensors, software and other technologies to connect and exchange data over the internet and from open web applications.

Risk 244
article thumbnail

Open Redirect Flaw Snags Amex, Snapchat User Data

Threatpost

Separate phishing campaigns targeting thousands of victims impersonate FedEx and Microsoft, among others, to trick victims.

Phishing 107
article thumbnail

Nomad Entices Thieves of $190M Hack With Offer to Keep 10%

Data Breach Today

'Give Us Back 90% and We'll Say You're a Good Guy,' Says Cryptocurrency Bridge The hackers who stole $190 million from cross-chain bridge Nomad stand to keep up to 10% of the loot and escape civil liability and criminal prosecution. The only caveat: They must return the rest of the money. Then, the firm says, it will label them as white hats and won't pursue legal action.

IT 225
article thumbnail

Weekly Update 307

Troy Hunt

A very early weekly update this time after an especially hectic week. The process with the couple of data breaches in particular was a real time sap and it shouldn't be this hard. Seriously, the amount of effort that goes into trying to get organisations to own their breach (or if they feel strongly enough about it, help attribute it to another party) is just nuts.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A Digital Home Has Many Open Doors

Dark Reading

Development of digital gateways to protect the places where we live, work, and converse need to be secure and many doors need to offer restricted access.

Access 92
article thumbnail

All the Data Amazon's Ring Cameras Collect About You

WIRED Threat Level

The popular security devices are tracking (and sharing) more than you might think.

Security 100
article thumbnail

Genesis IAB Market Brings Polish to the Dark Web

Dark Reading

As the market for initial access brokers matures, services like Genesis — which offers elite access to compromised systems and slick, professional services — are raising the bar in the underground economy.

article thumbnail

OpenText named a leader in the 2022 Aspire CCM-CXM Leaderboard

OpenText Information Management

Fifth year running as a market leader underpinned by investments in AI, content services and customer data platforms The OpenTextTM Experience Platform for Communications solution was recently recognized as a Leader in the 2022 Aspire LeaderboardTM for Communications Experience Platforms (CXP). The 2022 Aspire Leaderboard analyzed the CXP market for the first time, reflecting the … The post OpenText named a leader in the 2022 Aspire CCM-CXM Leaderboard appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Resolve Permission Issues in CI/CD Pipelines

Dark Reading

This Tech Tip outlines how DevOps teams can address security integration issues in their CI/CD pipelines.

Security 101
article thumbnail

Origins of the ICRM, by Steven D. Whitaker, CRM?

IG Guru

Check out this article featured in 2022 to learn more about the history of the Institute of Certified Records Managers (ICRM).

article thumbnail

Fresh RapperBot Malware Variant Brute-Forces Its Way Into SSH Servers

Dark Reading

Over the past few weeks, a Mirai variant appears to have made a pivot from infecting new servers to maintaining remote access.

IT 81
article thumbnail

A Slack Bug Exposed Some Users’ Hashed Passwords for 5 Years

WIRED Threat Level

The exposure of cryptographically scrambled passwords isn’t a worst-case scenario—but it isn’t great, either.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Stolen Data Gives Attackers Advantage Against Text-Based 2FA

Dark Reading

With names, email addresses, and mobile numbers from underground databases, one person in five is at risk of account compromise even with SMS two-factor authentication in place.

article thumbnail

Three things you need to know to get started in cybersecurity

ITPro.TV

Do you want to get started in a career in cybersecurity but aren’t sure what your first steps should be? There is a huge demand for people like you to build great careers in this growing sector. According to CyberSeek, there are more than 700,000 jobs needed in the cybersecurity field. Starting any career can … Continue reading Three things you need to know to get started in cybersecurity → The post Three things you need to know to get started in cybersecurity appeared first o

article thumbnail

Online Collaboration and Document Sharing: Best Practices

OneHub

Why do companies use online collaboration productivity software? Let’s get right to it. A productive team is one that works together with ease, unhindered by location, time, or technology. Which is why online collaboration software is becoming a must-have for more and more businesses. The advantages of online collaboration tools are many, but at the core it’s about getting the most out of every employee and collaboration partner on every project without wearing people down or burning them out.