Tue.Mar 28, 2023

article thumbnail

North Korean Threat Groups Steal Crypto to Pay for Hacking

Data Breach Today

APT43 Launders Crypto Through Mining, Says Mandiant North Korean hackers are stealing cryptocurrency to fund operations under an apparent mandate from Pyongyang to be self-sufficient, threat intel firm Mandiant says. The regime probably expected its hackers to pay their own way before 2020, but the novel coronavirus pandemic exacerbated its demands.

Mining 291
article thumbnail

UK Sets Up Fake Booter Sites To Muddy DDoS Market

Krebs on Security

The United Kingdom’s National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek to collect information on users, remind them that launching DDoS attacks is illegal, and generally increase the level of paranoia for people looking to hire such services. The warning displayed to users on one of the NCA’s fake booter sites.

Marketing 238
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Essential Steps to Building a Robust API Security Program

Data Breach Today

Gartner's Dionisio Zumerle on API Security Challenges, Risk Assessments and Trends Recent high-profile breaches resulting from API attacks are "just the tip of the iceberg," said Gartner analyst Dionisio Zumerle. "What we have is a new way of exchanging information which is increasingly popular, and almost no organization has the recipe to secure that new way of communicating.

Security 281
article thumbnail

Beware the Spirit vs. the Letter of a Policy

Weissman's World

TL;DR It’s bad enough when an information policy doesn’t align with an organization’s objectives. But it’s far worse when it has more to do with protecting a fiefdom than the greater good. Case in point: the New Hampshire Governor’s Office? There’s an interesting dynamic taking place in the New Hampshire governor’s office that to this… Read More » Beware the Spirit vs. the Letter of a Policy The post <strong>Beware the Spirit vs. the Letter of a Policy</strong> appeare

IT 156
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Phishing Campaign Goes Cutting Edge With IPFS

Data Breach Today

Attackers Using Decentralized File Protocol to Deliver Phishing Pages Credential harvesting attackers are taking advantage of a distributed file protocol to distribute customized phishing links. Because the system, the InterPlanetary File System, is designed to be resilient against content takedowns, scammers are using it to deliver phishing emails at scale.

Phishing 182

More Trending

article thumbnail

Nigerian Sentenced to 4 Years for Scamming US Citizens

Data Breach Today

31-Year-Old and Co-Conspirators Aimed to Steal $1 Million, Justice Department Says A U.S. federal judge sentenced a Nigerian national to four years in prison for running several cyber-enabled schemes aimed at defrauding U.S. citizens out of more than $1 million. The men were arrested four years ago and extradited to Arizona in 2022 from Malaysia and the United Kingdom.

173
173
article thumbnail

What is HR compliance?

OpenText Information Management

What is HR compliance for employee document management? Very broadly, HR compliance refers to the practice of ensuring your HR policies and procedures adhere to all applicable laws, ethics and regulations and updating them as regulations change and your organization grows. It is a critical component of HR’s role, but perhaps one of the most … The post What is HR compliance?

article thumbnail

Health Plan, Mental Health Provider Hit by GoAnywhere Flaw

Data Breach Today

Insurer Notifying Thousands Affected by Breach of Behavioral Health Provider's Data Blue Shield of California is notifying more than 63,000 customers that their data was potentially exfiltrated in a compromise involving Fortra's GoAnywhere secure file transfer software and one of the health plan's covered mental health providers for minors.

Insurance 147
article thumbnail

Mastering the art of data intelligence: empowering Collibra with ChatGPT

Collibra

Don’t you just hate when you are working with a data set and you have no clue what the tables and columns are about? As a Data Scientist in our internal Data Office, I understand that data is the backbone of modern business and unlocking its value requires a thorough understanding. That’s why I rely on Collibra to find, trust, understand, and access my data.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Lawmakers Urge CISA to Devise Better Measures of Performance

Data Breach Today

Jen Easterly Tells Congress Quantifying Impact of CISA Spending Is Difficult to Do Lawmakers urged Director Jen Easterly to devise metrics that quantify how effectively the Cybersecurity and Infrastructure Security Agency uses federal money to cut cyber risk. Rep. Dave Joyce wants CISA to more precisely measure the return on taxpayer spending given the agency's rising budget.

article thumbnail

Search is Everywhere. But What About Collaboration Data?

Hanzo Learning Center

We Take Search for Granted Remember the days when you wanted to look for a document using the file manager on your desktop and you’d forgotten exactly where it was stored? It would take forever and sometimes freeze the operating system, and then you still didn’t find the file you were looking for, so you went to each folder on the C-drive and looked through everything manually.

IT 98
article thumbnail

Relying on the Legitimate Interests Exception under the Personal Data Protection Act 2012

Data Protection Report

In a recent decision (the Decision ), [1] the Personal Data Protection Commission ( PDPC ) considered for the first time a company’s reliance on the Legitimate Interests Exception (as defined below) under the Personal Data Protection Act 2012 ( PDPA ) when the consent procured is invalid. The General Legitimate Interests Exception The general Legitimate Interests Exception was introduced to the PDPA as part of a number of amendments to the PDPA in November 2020 that came into effect on February

article thumbnail

NullMixer Polymorphic Malware Variant Infects 8K Targets in Just a Month

Dark Reading

The NullMixer loader has compromised thousands of endpoints in the US, France, and Italy, stealing data and selling it to Dark Web data dealers, all without setting off alarm bells.

IT 94
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Europol warns of criminal use of ChatGPT

Security Affairs

Europol warns of cybercriminal organizations can take advantage of systems based on artificial intelligence like ChatGPT. EU police body Europol warned about the potential abuse of systems based on artificial intelligence, such as the popular chatbot ChatGPT, for cybercriminal activities. Cybercriminal groups can use chatbot like ChatGPT in social engineering attacks, disinformation campaigns, and other cybercriminal activities, such as developing malicious code.

article thumbnail

Confessions of a Former 'The Inside Man' Skeptic

KnowBe4

I remember sitting in Stu Sjouwerman ’s office with Perry Carpenter and myself being pitched a drama series about cyber security by Jim Shields (Creative Director - Twist & Shout) and Rob McCollum (Writer/Co-Director - Twist & Shout).

article thumbnail

Telecom giant Lumen suffered a ransomware attack and disclose a second incident

Security Affairs

Telecommunications giant Lumen Technologies discovered two cybersecurity incidents, including a ransomware attack. In a filing to the Securities and Exchange Commission, on March 27, 2023, Lumen announced two cybersecurity incidents. One of the incidents is a ransomware attack that impacted a limited number of its servers that support a segmented hosting service.

article thumbnail

Millions of Pen Tests Show Companies' Security Postures Are Getting Worse

Dark Reading

A lack of website protections, Sender Policy Framework (SPF) records, and DNSSEC configurations leave companies open to phishing and data exfiltration attacks.

Phishing 125
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Latitude Data breach is worse than initially estimated. 14 million individuals impacted

Security Affairs

Australian loan giant Latitude Financial Services (Latitude) revealed that a data breach its has suffered impacted 14 million customers. The data breach suffered by Latitude Financial Services (Latitude) is much more serious than initially estimated. The company initially determined that the number of impacted individuals was 328,000, but now confirmed that the real number of affected individuals is 14 million.

article thumbnail

North Korea's Kimsuky Evolves into Full-Fledged, Prolific APT

Dark Reading

In cyberattacks against the US, South Korea, and Japan, the group (aka APT43 or Thallium) is using advanced social engineering and cryptomining tactics that set it apart from other threat actors.

IT 84
article thumbnail

Bitter APT group targets China’s nuclear energy sector 

Security Affairs

Intezer researchers reported that a South Asian espionage group, tracked as Bitter, is targeting the Chinese nuclear energy industry. Intezer researchers uncovered a cyberespionage campaign targeting the Chinese nuclear energy sector, they linked it to the Bitter APT group. The Bitter APT group is a South Asian cyberespionage group active since at least 2021.

article thumbnail

CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks

KnowBe4

CyberheistNews Vol 13 #13 | March 28th, 2023 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks Users need to adapt to an evolving threat landscape in which attackers can use AI tools like ChatGPT to craft extremely convincing phishing emails, according to Matthew Tyson at CSO. "A leader tasked with cybersecurity can get ahead of the game by understanding where we are in the story of machine learning (ML) as a hacking tool," Tyson writes.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Toyota Italy accidentally leaked sensitive data

Security Affairs

Toyota Italy accidentally leaked sensitive data for more than one-and-a-half years, until this March, CyberNews reported. A Japanese multinational accidentally leaked access to its marketing tools, enabling attackers to launch phishing campaigns against its vast pool of customers in Italy. Toyota Italy accidentally leaked sensitive data for more than one-and-a-half years, until this March.

article thumbnail

Security Vulnerabilities in Snipping Tools

Schneier on Security

Both Google’s Pixel’s Markup Tool and the Windows Snipping Tool have vulnerabilities that allow people to partially recover content that was edited out of images.

article thumbnail

[Eyes Only] New Deepfake Pr0n Site Visits Skyrocket

KnowBe4

This is a disgusting topic. It's also a very high social engineering risk. I will keep this post safe-for-work, which is not easy. NBC news just reported on the deepfake economy surging in recent months, because there is a loophole that allows people to pay with normal credit cards.

Risk 80
article thumbnail

New York Attorney General Settles with Law Firm Over Data Breach

Hunton Privacy

On March 27, 2023, New York Attorney General Letitia James announced that a New York-based law firm (Heidell, Pittoni, Murphy & Bach LLP) had agreed to pay $200,000 in penalties and enhance its cybersecurity practices to settle charges stemming from a 2021 data breach. The New York AG alleged that, in November 2021, the firm experienced a cybersecurity incident in which attackers acquired the private data of over 114,000 patients of hospitals who were clients of the firm, including names, S

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

KnowBe4 Debuts Season 5 of Netflix-Style Security Awareness Series - ‘The Inside Man’

KnowBe4

We’re thrilled to announce the long-awaited fifth season of the award-winning KnowBe4 Original Series - “ The Inside Man ” is now available in the KnowBe4ModStore!

article thumbnail

How Does Data Literacy Enhance Data Security?

Dark Reading

With the rise in cloud-based security concerns and other issues, organizations must improve data literacy across the enterprise.

article thumbnail

KnowBe4 Debuts Season 5 of Netflix-Style Security Awareness Series - ‘The Inside Man’

KnowBe4

We’re thrilled to announce the long-awaited fifth season of the award-winning KnowBe4 Original Series - “The Inside Man” is now available in the KnowBe4ModStore!