Wed.Dec 21, 2022

article thumbnail

Ukraine Takes Down Domestic Pro-Kremlin Bot Farms

Data Breach Today

More Than 100,000 SIM Cards Seized; Some Linked to Russian Mobile Operators Thirteen bot farms transmitting pro-Kremlin messages across more than 1.5 million fake accounts are no longer operating after Ukrainian police raided their locations. Russia's attempted conquest of Ukraine is accompanied by heavy doses of online propaganda aimed at splitting support for Kyiv.

176
176
article thumbnail

Thales collaborates with Hewlett Packard Enterprise to Enhance 5G Subscriber Privacy and Security

Thales Cloud Protection & Licensing

Thales collaborates with Hewlett Packard Enterprise to Enhance 5G Subscriber Privacy and Security. divya. Thu, 12/22/2022 - 05:40. Thales collaborates with Hewlett Packard Enterprise (HPE) to provide enhanced privacy and secure authentication for global 5G users, further extending its partner ecosystem. The Thales Luna 7 Hardware Security Module (HSM), a world-class HSM, will power a foundation of trust around HPE’s Subscriber Data Management (SDM) solutions, ensuring subscriber data, transactio

Privacy 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Paging Hollywood: Hackers Allegedly Hit JFK Airport … Taxis

Data Breach Today

Russians Accused of Aiding Drive to Use Malware to 'Hack the Taxi Industry' Bad hackers so often get portrayed as bombastic villains who can "hack the Gibson" while breathlessly exclaiming, "We're in!" Real-world "hack attacks" are typically much more mundane, including an alleged scheme enabling taxi drivers to jump to the head of the line at JFK Airport.

144
144
article thumbnail

"How I lost my dog and almost my Google credentials."

KnowBe4

A well-trained Knowster posted: " I lost my dog this weekend and my mother in law was trying to be helpful and put my real phone number on a few social media posts she made. Now im getting these kinds of texts and it’s heartbreaking to think someone else may have fallen for this!

112
112
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Managing the Evolving Cyber Risk Posed by Third Parties

Data Breach Today

As major cyber incidents involving vendors surge, healthcare entities must carefully and continuously scrutinize the security practices of their third-party vendors, says Kathy Hughes, CISO of Northwell Health.

Risk 130

More Trending

article thumbnail

Godfather Android Banking Trojan Steals Through Mimicry

Data Breach Today

Trojan Impersionates More than 400 Financial and Crypto Exchange Apps A banking Trojan is on a rampage thanks to its ability to mimic the appearance of more than 400 applications including leading financial and crypto exchange applications in 16 countries. Godfather is an upgraded version of the Anubis banking Trojan, reports cybersecurity firm Group-IB.

article thumbnail

Okta revealed that its private GitHub repositories were hacked this month

Security Affairs

American identity and access management giant Okta revealed that that its private GitHub repositories were hacked this month. Okta revealed that its private GitHub repositories were hacked this month, the news was first reported by BleepingComputer which had access to ‘confidential’ email notification sent by Okta. According to the notification threat actors have stolen the Okta’s source code. “As soon as Okta learned of the possible suspicious access, we promptly placed

IT 97
article thumbnail

Zelensky Makes Case for Ukrainian Support in Washington Trip

Data Breach Today

U.S. Quietly Strengthens Ukrainian Cyber Defenses Ukrainian President Volodymyr Zelensky made a historic visit to Washington in a bid to shore up support in during a critical moment. Behind the scenes, U.S. assistance includes strengthening Ukrainian cyber resiliency. Russian cyber operations remain a threat.

130
130
article thumbnail

XLL Files Used to Deliver Malware

KnowBe4

Attackers are using XLL files to embed malicious code in Office documents, according to researchers at Cisco Talos. Microsoft is phasing out the ability to execute VBA macros in Office documents. These macros have been one of the most popular ways to deliver malware, so attackers are turning to new ways to smuggle malicious code.

97
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Acronis CEO on Why Service Providers Must Host Data Locally

Data Breach Today

Patrick Pulvermueller on Why Acronis Has Built Out a Global Network of Data Centers Acronis plans to use $250 million raised in July to build out a global network of data centers so service providers can host data locally, CEO Patrick Pulvermueller says. Service providers looking to protect client data have to adhere to an ever-increasing set of compliance and governance rules.

article thumbnail

Shoemaker Ecco leaks over 60GB of sensitive data for 500+ days

Security Affairs

CyberNews researchers reported that Ecco, a global shoe manufacturer and retailer, exposed millions of documents. Original post @ [link]. Ecco, a global shoe manufacturer and retailer, exposed millions of documents. Not only could anyone have modified the data, but the server misconfiguration’s severity likely left the company open to an attack that could have affected customers all over the world.

Retail 96
article thumbnail

EU-US Data Privacy Framework in Activist's Crosshairs

Data Breach Today

European Commission Took Key Step in Finalizing Trans-Atlantic Data Flow Framework Europe took a key step in formalizing a framework to underpin the trans-Atlantic flow of commercial data but privacy activists say the EU-U.S. agreement won't stand up to a legal challenge. The Commission on Dec. 13 issued a draft adequacy decision on the EU-U.S. Data Privacy Framework.

article thumbnail

German industrial giant ThyssenKrupp targeted in a new cyberattack

Security Affairs

German multinational industrial engineering and steel production company ThyssenKrupp AG was the target of a cyberattack. German multinational industrial engineering and steel production giant ThyssenKrupp AG announced that the Materials Services division and corporate headquarters were hit by a cyberattack. At this time the company has yet to disclose the type of attack that hit its systems and no cybercriminal group has yet to claim responsibility for the attack.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

’Tis the season for Scam-Folly Fa La La La La

KnowBe4

The festive season is my favorite time of the year. It is a time to celebrate and reconnect with our family, friends and community and the one time in the year where the whole country feels like it is on holiday. In the Southern Hemisphere, it is also called the silly season, on account of the higher than usual number of social engagements, slow down of work activities and general holiday mood.

IT 91
article thumbnail

Ukraine Intercepting Russian Soldiers’ Cell Phone Calls

Schneier on Security

They’re using commercial phones, which go through the Ukrainian telecom network : “You still have a lot of soldiers bringing cellphones to the frontline who want to talk to their families and they are either being intercepted as they go through a Ukrainian telecommunications provider or intercepted over the air,” said Alperovitch. “That doesn’t pose too much difficulty for the Ukrainian security services.” […]. “Security has always been a mess, bot

article thumbnail

Ivanti Report Shows Cybersecurity Practitioners Concentrating on Right Threats

KnowBe4

A recent Ivanti report shows cybersecurity practitioners getting more focused on the threat landscape, but defenders may need to hone their attention to focus on the right threats.

article thumbnail

Why Security Teams Shouldn't Snooze on MFA Fatigue

Dark Reading

Employee education, biometric and adaptive authentication, and zero trust can go a long way in strengthening security.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

KnowBe4 Named a Leader in the Winter 2023 G2 Grid Report for Security Awareness Training

KnowBe4

We are thrilled to announce that KnowBe4 has been named a leader in the latest G2 Grid Report that compares Security Awareness Training (SAT) vendors based on user reviews, customer satisfaction, popularity and market presence.

article thumbnail

Godfather Banking Trojan Masquerades as Legitimate Google Play App

Dark Reading

The malware has resurfaced, using an icon and name similar to the legitimate Google Play app MYT Music, a popular app with more than 10 million downloads.

83
article thumbnail

KnowBe4 Named a Leader in the Winter 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

KnowBe4

We are excited to announce that KnowBe4 has been named a leader in the Winter 2023 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the PhishER platform for the seventh consecutive quarter!

article thumbnail

Ransomware Attackers Bypass Microsoft's ProxyNotShell Mitigations With Fresh Exploit

Dark Reading

The Play ransomware group was spotted exploiting another little-known SSRF bug to trigger RCE on affected Exchange servers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Iran’s Internet Blackouts Are Sabotaging Its Own Economy

WIRED Threat Level

A new US State Department assessment highlights the stark economic toll of Tehran’s recent shutdowns and platform control.

IT 78
article thumbnail

'Russian Hackers' Help Fraudsters Hijack JFK Airport's Taxi Dispatch

Dark Reading

DoJ charges allege they hacked into the taxi dispatch system for profit, selling the ability for cab drivers to skip the line for picking up a fare at JFK terminals.

73
article thumbnail

Episode 247: Into the AppSec Trenches with Robinhood CSO Caleb Sima

The Security Ledger

Paul speaks with Caleb Sima, the CSO of the online trading platform Robinhood, about his journey from teenage cybersecurity phenom and web security pioneer, to successful entrepreneur to an executive in the trenches of protecting high value financial services firms from cyberattacks. The post Episode 247: Into the AppSec Trenches with Robinhood. Read the whole entry. » Click the icon below to listen.

article thumbnail

How to Run Kubernetes More Securely

Dark Reading

The open source container tool is quite popular among developers — and threat actors. Here are a few ways DevOps teams can take control.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Db2 13 for z/OS: Setting Lock Timeout Limit and Deadlock Priority at the Application Level

Robert's Db2

Db2 13 for z/OS, which became generally available about seven months ago, introduced two interesting features that are similar in some ways but differ in one important aspect (about which I'll comment momentarily). These new features allow an application (or, more broadly, a "process") to set its own lock timeout limit and/or its own deadlock priority.

IT 62
article thumbnail

Understanding the 3 Classes of Kubernetes Risk

Dark Reading

The first step toward securing Kubernetes environments is understanding the risks they pose and identifying the ways in which those risks can be mitigated.

Risk 70
article thumbnail

Fortnite Video Game Maker Epic Games to Pay More Than Half a Billion Dollars over FTC Allegations of Privacy Violations and Unwanted Charges via the FTC

IG Guru

Check out the post here.

Privacy 84