Sat.Mar 26, 2022

article thumbnail

Google Observes North Korean APTs Exploiting Chrome

Data Breach Today

North Korean Hackers Launched Now-Patched Zero-Day Exploit in Two Campaigns Google's threat analysis team has detected a new remote code execution flaw leveraged by North Korean nation-states targeting cryptocurrency, fintech and other industries. Although not named in the report, there appears to be a link to the notorious Lazarus cybercrime group.

259
259
article thumbnail

FCC adds Kaspersky to Covered List due to unacceptable risks to national security

Security Affairs

The Federal Communications Commission (FCC) added Kaspersky to its Covered List because it poses unacceptable risks to U.S. national security. The Federal Communications Commission (FCC) added multiple Kaspersky products and services to its Covered List saying that they pose unacceptable risks to U.S. national security. “The Federal Communications Commission’s Public Safety and Homeland Security Bureau today added equipment and services from three entities – AO Kaspersky Lab, China Telecom

Risk 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malicious Crypto Apps Target Mobile Users, Mainly in China

Data Breach Today

Both Android and iOS Users at Risk From Trojanized Fake Cryptocurrency Wallets The ban on cryptocurrency transactions in China has led many users in the country to look for alternatives. But researchers from cybersecurity firm ESET say that threat actors have leveraged this scenario and targeted Chinese users by delivering Trojanized cryptocurrency wallet apps.

article thumbnail

Hunt for Lapsus$ Hackers Leads to a British Teen

WIRED Threat Level

Plus: New details emerge about Russian hacks and hackers as the US warns of potential new attacks.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

20-Year-Olds Charged in NFT 'Rug Pull' Scam Case

Data Breach Today

Victims Allegedly Defrauded of $1 Million; Second Scam Planned for March Two 20-year-olds have been charged in the U.S. for conspiring to commit wire fraud and launder money as part of a million-dollar scheme involving non-fungible tokens - or NFTs. The charges each carry a maximum sentence of 20 years in prison.

236
236
article thumbnail

Estonian Ransomware Operator Gets 66-Month Sentence

Data Breach Today

DOJ: The Accused Specialized in 'Cashouts' and 'Drops' An Estonian national accused of causing more than $53 million in ransomware losses has been sentenced to U.S. federal prison for furthering and facilitating computer intrusions, the movement of fraudulently obtained goods and funds, and the monetization of stolen financial account information.