Mon.Jun 07, 2021

article thumbnail

Hospital Pays Ransom in Exchange for Promised Data Destruction

Data Breach Today

Decision to Pay Highlights Healthcare Sector Challenges The recent decision by a Massachusetts-based hospital to pay a ransom in exchange for promises by the attackers to destroy stolen data spotlights the difficult choices many healthcare entities face in the wake of cyberattacks.

349
349
article thumbnail

Russian cybercrime forums launch contests for cryptocurrency hacks

Security Affairs

Cybercriminals in Russian underground forums have been invited to take part in competitions for hacking cryptocurrency and NFT. Several Russian underground forums have launched competitions for hacking cryptocurrency schema and Non-fungible token (NFT). “Over the past month, operators of one of the top Russian-language cybercrime forums have been running a “contest,” calling for the community to submit papers that examine how to target cryptocurrency-related technology.” reads a post

Paper 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Siloscape Malware Reportedly Targeting Windows Containers

Data Breach Today

Malware Capable of Compromising Kubernetes Clusters, Researchers Say Researchers believe that a malware variant that specifically targets poorly protected or misconfigured Windows containers has been uncovered for the first time, according to a report published by Palo Alto Networks' Unit 42. A successful attack establishes a backdoor and persistence.

313
313
article thumbnail

Welcoming the Uruguayan Government to Have I Been Pwned

Troy Hunt

This week as part of the ongoing initiative to make breach data available to national governments, I'm very happy to welcome the national CERT of Uruguay, CERTuy. They are now the 2nd Latin American country and 20th country worldwide to have free and easy API level access to all their government domains. I'm going to continue onboarding governments as they reach out and ask for access, my hope being that greater visibility to the impact of data breaches helps minimise the disruption they cause t

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

$2.3 Million of Colonial Pipeline Ransom Payment Recovered

Data Breach Today

Justice Department Tracked the Payment to an FBI-Controlled Bitcoin Wallet The U.S. Justice Department reported it recouped $2.3 million of the $4.4 million ransom Colonial Pipeline Co. paid following a May 7 ransomware attack. The DOJ's Ransomware and Digital Extortion Task Force coordinated the effort, in which the FBI tracked payment to a bitcoin wallet it controls.

More Trending

article thumbnail

Identity Theft: Impact on Victims Is Getting Worse

Data Breach Today

ITRC's Eva Velasquez on Reducing ID Fraud and Increasing Victim Resources The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.

276
276
article thumbnail

Top 5 differences between information assurance vs. cybersecurity

OpenText Information Management

There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these terms are used interchangeably but there are key differences between the two. So what are they, why are they important and what does this mean for security professionals?

article thumbnail

Evil by a Different Name: Crime Gang Rebrands Ransomware

Data Breach Today

WastedLocker Ransomware From Evil Corp Disguised as PayloadBin to Avoid Sanctions If you're a Russian cybercrime gang feeling the heat after being sanctioned by the U.S. government, why not rebrand? So goes an apparent move by Evil Corp to disguise its WastedLocker ransomware as rival gang Babuk's PayloadBin, so any ransom payers won't think they're violating U.S. sanctions.

article thumbnail

RockYou2021: largest password compilation of all time leaked online with 8.4 billion entries

Security Affairs

RockYou2021, the largest password compilation of all time has been leaked on a popular hacker forum, it contains 8.4 billion entries of passwords. . Original post at: [link]. What seems to be the largest password collection of all time has been leaked on a popular hacker forum. A forum user posted a massive 100GB TXT file that contains 8.4 billion entries of passwords, which have presumably been combined from previous data leaks and breaches.

Passwords 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Combating Ransomware: Lawmaker Wants Spies 'Hacking Back'

Data Breach Today

Australian Politician Argues 'Releasing the Hounds' Necessary to Deter Attacks Australian spies should be allowed to take offensive action against some of the world's most prominent ransomware gangs, says Tim Watts, a member of Australia's Parliament who says the move, proposed under the Labour Party's push for a national ransomware strategy, would deter attackers.

article thumbnail

Spotlight on Pride Month with Brad Akerberg, Leader of Micro Focus PRIDE Employee Resource Group (ERG)

Micro Focus

At Micro Focus, we join others around the world in celebrating Pride Month in June. This year our theme at Micro Focus is Pride 365, focused on the year-round support of LGBTQ+ colleagues and community. Every day of the year, we encourage our employees to join in the variety of initiatives that champion our approach. View Article.

105
105
article thumbnail

Cobalt Gang Members Sentenced by Kazakhstan District Court

Data Breach Today

Money Mule Convictions Unlikely to Slow Gang Activity A district court in Kazakhstan sentenced two unidentified Cobalt, aka Carbanak, gang members to serve eight years in prison on robbery and attempted robbery charges. The gang members are believed to have been involved in cashing out operations, according to Group-IB.

191
191
article thumbnail

European Court of Human Rights Says Bulk Interception Is Not a Violation of Human Rights

Hunton Privacy

On May 25, 2021, the Grand Chamber of the European Court of Human Rights handed down its judgement in the case of Big Brother Watch and Others v. the United Kingdom , determining that the former surveillance regime in the UK violated Article 8 of the European Convention on Human Rights (“ECHR”), i.e., the right to respect for private and family life.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

US Prosecutors Charge Latvian Woman in Trickbot Gang Case

Data Breach Today

Case Is First Test for DOJ's Ransomware and Digital Extortion Task Force U.S. Justice Department prosecutors have charged a 55-year-old Latvian woman with helping to develop code for the Trickbot gang as well as stealing banking credentials and deploying ransomware, according to a federal indictment. Alla Witte faces more than 30 years in prison if convicted.

article thumbnail

Windows Container Malware Targets Kubernetes Clusters

Threatpost

“Siloscape”, the first malware to target Windows containers, breaks out of Kubernetes clusters to plant backdoors and raid nodes for credentials.

Cloud 115
article thumbnail

Ransomware Hit Another Pipeline Firm—and 70GB of Data Leaked

WIRED Threat Level

LineStar Integrity Services was hacked around the same time as Colonial Pipeline, but radical transparency activists have brought the attack to light.

article thumbnail

Experts found an RCE vulnerability in QNAP Q’center

Security Affairs

Researchers at cybersecurity firm Shielder discovered a remote code execution on QNAP Q’center through a manipulated QPKG installation package. Researchers at cybersecurity firm Shielder discovered a remote code execution flaw on QNAP Q’center through a manipulated QPKG installation package. The vulnerability was discovered by the cyber security expert` zi0Black ` from Shielder.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Book Review: The Filing Cabinet: A Vertical History of Information by Craig Robertson via USAPP

IG Guru

Check out the article here. The post Book Review: The Filing Cabinet: A Vertical History of Information by Craig Robertson via USAPP appeared first on IG GURU.

article thumbnail

Russia behind a massive spear-phishing campaign that hit Ukraine

Security Affairs

Ukraine warned of a “massive” spear-phishing campaign carried out by Russia-linked threat actors against its government and private businesses. Three Ukrainian cybersecurity agencies ( Ukrainian Secret Service , Ukrainian Cyber Police , and CERT Ukraine ), including the Ukrainian Secret Service, warned last week of a “massive” spear-phishing campaign conducted by Russia-linked hackers against its government and organizations in the private industry.

article thumbnail

Bad Apple: App Store Rife with Fraud, Fleeceware

Threatpost

Malicious apps make up 2 percent of top grossing apps in Apple App Store.

Security 125
article thumbnail

Siloscape, first known malware that drops a backdoor into Kubernetes clusters

Security Affairs

Siloscape is a new strain of malware that targets Windows Server containers to execute code on the underlying node and spread in the Kubernetes cluster. Researchers from Palo Alto Networks have spotted a piece of malware that targets Windows Server containers to execute code on the underlying node and then drop a backdoor into Kubernetes clusters. Siloscape is a heavily obfuscated malware that was designed to open a backdoor into poorly configured Kubernetes clusters in order to run malicious co

Cloud 91
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Secure Public Key Infrastructure (PKI) Critical to STIR/SHAKEN

Thales Cloud Protection & Licensing

Secure Public Key Infrastructure (PKI) Critical to STIR/SHAKEN. madhav. Tue, 06/08/2021 - 06:30. We are all too familiar with answering a call only to be greeted with a loud horn followed by the words “you’ve won a cruise”. Sometimes we may not recognize the phone number, while other times we think we do because it appears to be local. Then comes the moment of realization where the thought of lazing around on a free vacation quickly passes, as it is a scam.

article thumbnail

FBI Claws Back Millions of DarkSide’s Ransom Profits

Threatpost

The tables have been turned, the FBI & DOJ said after announcing the use of blockchain technology to track down the contents of DarkSide's cryptocurrency wallet.

article thumbnail

Better patient outcomes happen when you look beyond EMRs

OpenText Information Management

A patient is more than their symptoms and more than their medical records. Keeping that larger, human perspective in mind can deliver better outcomes. Some of the most promising opportunities in healthcare today come from using non-clinical data to improve patient engagement and outcomes. Looking beyond electronic medical records (EMRs) means we gain visibility into … The post Better patient outcomes happen when you look beyond EMRs appeared first on OpenText Blogs.

article thumbnail

Latvian Woman Charged for Role In Crafting Trickbot Malware

Dark Reading

Alla Witte and her associates are accused of using Trickbot to infect tens of millions of computers around the world, the Justice Department reports.

85
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Supreme Court Narrowed the CFAA

Schneier on Security

In a 6-3 ruling , the Supreme Court just narrowed the scope of the Computer Fraud and Abuse Act : In a ruling delivered today, the court sided with Van Buren and overturned his 18-month conviction. In a 37-page opinion written and delivered by Justice Amy Coney Barrett, the court explained that the “exceeds authorized access” language was, indeed, too broad.

Access 71
article thumbnail

Providing a superior experience for commercial banking customers

OpenText Information Management

The banking industry—which includes retail banks and credit unions, wealth and asset management firms, and corporate and treasury divisions—faces severe challenges. It’s become more important than ever to help optimize banking operations and compliance requirements through seamless digital workflows and elevating customer experiences. Banks need to consistently and intelligently use both contextual data and real-time … The post Providing a superior experience for commercial banking custome

article thumbnail

CISA Warns Criminals Seek to Exploit Critical VMware Bug

Dark Reading

Organizations running vCenter Server and VMware Cloud Foundation are urged to apply fixes deployed on May 25.

Cloud 84