Mon.Feb 20, 2023

article thumbnail

Twitter to Charge for Second-Factor Authentication

Data Breach Today

Decision Sparks Concerns That Twitter Accounts Will Be Less Secure Twitter says it will turn off SMS second-factor authentication for all but paying customers starting March 20 in a decision provoking concerns that many customers will be less secure than before. Twitter says 2.6% of active Twitter accounts have activated second-factor authentication.

article thumbnail

GUEST ESSAY: Too many SMBs continue to pay ransomware crooks — exacerbating the problem

The Last Watchdog

Well-placed malware can cause crippling losses – especially for small and mid-sized businesses. Related: Threat detection for SMBs improves Not only do cyberattacks cost SMBs money, but the damage to a brand’s reputation can also hurt growth and trigger the loss of current customers. One report showed ransomware attacks increased by 80 percent in 2022, with manufacturing being one of the most targeted industries.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Darktrace Taps EY to Probe Finances Amid Short-Seller Claims

Data Breach Today

Review Prompted By QCM Alleging Darktrace Overstated Sales, Margins and Growth Rate Darktrace has brought in Ernst & Young to review the cybersecurity AI vendor's financial process and controls following bombshell allegations from short seller Quintessential Capital Management. The review comes weeks after QCM claimed that Darktrace overstated its sales, margins and growth rates.

Sales 130
article thumbnail

Social engineering, deception becomes increasingly sophisticated

Security Affairs

Social engineering techniques are becoming increasingly sophisticated and are exploiting multiple emerging means, such as deep fakes. The increasing use of videoconferencing platforms and the various forms of remote work also adopted in the post-emergency covid make interpersonal collaborations increasingly virtual. This scenario must undoubtedly force organizations to prepare adequately to be able to recognize impersonation attempts based on social engineering attacks, which are also proving in

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Norwegian Authorities Seize $5.86 Million From Lazarus Group

Data Breach Today

Confiscated Cryptocurrency Tied to $620 Ronin Bridge Hack Norwegian authorities confiscated crypto assets worth nearly $5.68 million tied to the 2022 Ronin cryptocurrency bridge hack by North Korean state threat actor Lazarus Group. The authority describes the seizure as Norway's largest-ever crypto seizure.

130
130

More Trending

article thumbnail

New Tools and Integration Are Detecting Check Fraud Faster

Data Breach Today

Trace Fooshee of Aite-Novarica on Detecting Fraud With Image Analysis Solutions The false positive rate for detecting check fraud typically is very high because it's such an analog process. To detect fraudulent checks faster, banks need to pair their legacy detection capabilities with image analysis solutions, says Trace Fooshee, strategic adviser with Aite-Novarica Group.

IT 130
article thumbnail

Lockbit ransomware gang hit the Portuguese municipal water utility Aguas do Porto

Security Affairs

The LockBit ransomware gang claims to have hacked Aguas do Porto, a Portuguese municipal water utility company. The LockBit ransomware gang claims to have hacked Aguas do Porto, a Portuguese municipal water utility company, and is threatening to leak the stolen data. Aguas do Porto is a municipal water utility company that manages the full water cycle including water supply, and wastewater drainage.

article thumbnail

Spanish Court Approves Twitter Hacking Suspect's Extradition

Data Breach Today

British Man Also Charged With Nude Photo Extortion, Swatting, Cryptocurrency Theft Spain's high court has approved the U.S. Department of Justice's request that British national Joseph James O'Connor be extradited to face charges that he helped hack Twitter in 2020 to perpetrate a cryptocurrency scam. The final extradition decision now rests with the Spanish government.

article thumbnail

Majority of Ransomware Attacks Last Year Exploited Old Bugs

Dark Reading

New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Stealc, a new advanced infostealer appears in the threat landscape

Security Affairs

Researchers spotted a new information stealer, called Stealc, which supports a wide set of stealing capabilities. In January 2023, researchers at SEKOIA.IO discovered a new information stealer, dubbed Stealc, which was advertised in the dark web forums. The malware was developed by a threat actor that uses the moniker Plymouth who claims the info-stealer supports a wide set of stealing capabilities.

article thumbnail

How to Implement a Penetration Testing Program in 10 Steps

eSecurity Planet

Penetration tests find security vulnerabilities before hackers do and are critical for keeping organizations safe from cyber threats. You can either create your own pentesting program or hire an outside firm to do it for you. Penetration test services have become common, with many security companies offering them. But they can be expensive and should be done often, so if you have the expertise on staff, consider developing your own penetration testing program.

Sales 79
article thumbnail

Fines as a Security System

Schneier on Security

Tile has an interesting security solution to make its tracking tags harder to use for stalking: The Anti-Theft Mode feature will make the devices invisible to Scan and Secure, the company’s in-app feature that lets you know if any nearby Tiles are following you. But to activate the new Anti-Theft Mode, the Tile owner will have to verify their real identity with a government-issued ID, submit a biometric scan that helps root out fake IDs, agree to let Tile share their information with law e

article thumbnail

Despite Breach, LastPass Demonstrates the Power of Password Management

Dark Reading

What's scarier than keeping all of your passwords in one place and having that place raided by hackers? Maybe reusing insecure passwords.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Corporate Transitions Represent Times of Heightened Danger

KnowBe4

When should organizations be on guard against social engineering ? Always, of course, but there are certain times when they should be especially alert. A study of cyberattacks has found that criminals are particularly attentive to changes in corporate leadership. Research published in The Journal of Strategic Information Systems finds that, “Our interviews with C-suite executives reveal that the chances of someone falling victim to a phishing email are higher during times of leadership change.

article thumbnail

Does paid-for Facebook and Instagram signal end of free-access orthodoxy?

The Guardian Data Protection

Creators and influencers on Meta’s platforms are an obvious market for verified users’ monthly fees Mark Zuckerberg’s social media empire is built on billions of users – and the advertisers who pay vast sums to grab their attention. But that business model is under pressure on several fronts. It is against this backdrop that Meta, the owner of Facebook and Instagram, said on Sunday it is trialling subscriptions for both social media platforms.

Access 74
article thumbnail

Modern Software: What's Really Inside?

Dark Reading

Open source has changed the software game from build or buy to assemble with care.

91
article thumbnail

How to Protect Yourself from Twitter’s 2FA Crackdown

WIRED Threat Level

Twitter is disabling SMS-based two-factor authentication. Switch to these alternatives to keep your account safe.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Researchers Create an AI Cyber Defender That Reacts to Attackers

Dark Reading

The system based on deep reinforcement learning can adapt to defenders' tactics and stop 95% of simulated attacks, according to its developers.

IT 97
article thumbnail

Global Capture & IDP Vertical Market Analysis

Info Source

CAPTURE & IDP MARKET FRAMEWORK Infosource has covered the Capture market for over two decades. It has followed Document Capture since its early stages when the key focus was to replace archives of paper documents and with electronic copies that were searchable, accessible for staff in different locations and compliant with growing requirements for records management.

article thumbnail

Australia Privacy Act review – a blueprint for change?

DLA Piper Privacy Matters

Authors: Sarah Birkett , Nicholas Boyle The Australian Attorney-General has published the (long-awaited) results of the Privacy Act review. The report recommends a number of changes to the Australian privacy framework, including various changes to Australia’s core privacy legislation, the Privacy Act 1988 (Cth). The report does not represent official Government policy and there is no guarantee that the proposed changes will eventually make their way into law.

Privacy 52
article thumbnail

Green Libraries Conference: agenda gaining momentum

CILIP

Green Libraries Conference: agenda gaining momentum A CONFERENCE to highlight the role that libraries and their staff can play in the climate change agenda was one of the key goals set out by the Green Libraries Partnership when it was established last year. Originally set to take place in November 2022, the conference will take place on March 24 at the Wellcome Trust in London.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Imperva CEO on Maximizing Visibility Into Unstructured Data

Data Breach Today

Pam Murphy Explains Why Organizations Need a Single Pane of Glass to Secure Data The adoption of new technologies, multi-cloud architectures and multiple data storage sites has resulted in data residing in more places than ever before. That's why enterprises need a single pane of glass to know who's touching their data and why, says Imperva CEO Pam Murphy.

article thumbnail

Samsung announces Message Guard feature to neutralize zero-click attacks

Security Affairs

Samsung introduces a new protection feature called Message Guard to protect users from zero-click malware attacks. Samsung announced the implementation of a new security feature called Message Guard that aims at protecting users from malicious code that can be installed via zero-click attacks. Zero-click exploits allow attackers to compromise the target device without any user interaction, for example, a threat actor can exploit a zero-day issue by sending an image to the victims. “Threats

article thumbnail

HHS Will Seek HIPAA Changes for Reproductive Health Data

Data Breach Today

What Kinds of New Privacy Protections Under HIPAA Stand a Chance? Federal regulators are working on proposed rule to modify HIPAA to better safeguard the privacy of reproductive health data. The Biden administration last year already issued guidance about the application of the HIPAA Privacy Rule to information about reproductive health.

Privacy 130