Mon.Sep 07, 2020

article thumbnail

BEC Scam Losses Surge as the Number of Attacks Diminish

Data Breach Today

Cosmic Lynx the First Russian Gang to Enter the BEC Game The average amount stolen in a business email compromise (BEC) scam increased 48% during the second quarter of 2020, however, this transpired as the number of attacks decreased during that period, reports the Anti-Phishing Working Group.

Phishing 318
article thumbnail

CEOs Could Be Held Personally Liable for Cyberattacks that Kill

Threatpost

As IT systems, IoT and operational technology converge, attacks on cyber-physical systems in industrial, healthcare and other scenarios will come with dire consequences, Gartner predicts.

IoT 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Considerations for Privileged Access Management

Data Breach Today

Recent hacking incidents, including one targeting Twitter, are raising awareness of the importance of privileged access management, says David Boda, group head of information security for Camelot Group, operator of the U.K. National Lottery. He describes PAM best practices.

Access 240
article thumbnail

Catches of the month: Phishing scams for September 2020

IT Governance

In our latest round-up of phishing scams, we look at a novel Instagram scam that targets victims through their direct messages, review the latest campaign that imitates Microsoft Office’s log-in page and discuss how even a cyber security training provider can fall for a malicious email. Instagram ‘help centre’ scam steals your login details. Cyber criminals are targeting Instagram users via direct messages, according to cyber security researchers at Trend Micro.

Phishing 114
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Stung by Ransomware, Australia Urges Better Preparation

Data Breach Today

'Malicious Cyber Activity' Increasing, Australia's Cyber Security Centre Warns Ransomware continues to pose a "significant" threat, and email remains one of the top attack vectors being used by both criminals and nation-states, Australia's Cyber Security Centre warns in its latest "Cyber Threat Report," which urges organizations to improve their defenses.

More Trending

article thumbnail

Ransomware Remains 'Significant' Threat, Australia Warns

Data Breach Today

'Malicious Cyber Activity' Increasing, Says Australia's Cyber Security Centre The volume of online attacks being lobbed at Australia continues to rise, with email-born attacks and particularly ransomware remaining top threats, Australia's Cyber Security Centre warns in its latest "Cyber Threat Report." It urges organizations to better prepare.

article thumbnail

Julian Assange Lays Out His Case Against US Extradition

WIRED Threat Level

The argument hinges in part on psychiatrists' testimony that Assange is a high suicide risk.

Risk 145
article thumbnail

Privacy Framework Proposed to Address HIPAA Gaps

Data Breach Today

The eHealth Initiative and the Center for Democracy and Technology are seeking feedback on their draft privacy framework that addresses gaps in legal protections for consumer health data falling outside of HIPAA's regulatory umbrella, says eHI CEO Jennifer Covich Bordenick.

Privacy 175
article thumbnail

Chilean bank BancoEstado hit by REVil ransomware

Security Affairs

Chilean bank BancoEstado, one of the country’s biggest banks, was forced to shut down all branches following a ransomware attack. Chilean bank BancoEstado, one of the country’s biggest banks, was hit with a ransomware attack that forced its branches to remain closed since September 7. The ransomware encrypted most of the company servers and workstations.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces

Threatpost

The SASE model for remote access and security coupled with Zero Trust can help redefine network and perimeter defenses when a traditional “perimeter” no longer exists.

Access 104
article thumbnail

France national cyber-security agency warns of a surge in Emotet attacks

Security Affairs

The French national cyber-security agency warns of a surge in Emotet attacks targeting the private sector and public administration entities. The French national cyber-security agency published an alert to warn of a significant increase of Emotet attacks targeting the private sector and public administration entities in France. The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542.

Security 102
article thumbnail

How to Boost WhatsApp’s Privacy and Better Protect Your Data

WIRED Threat Level

The Facebook-owned company has end-to-end encryption by default—but that doesn't mean the service’s settings are as private as they could be.

Privacy 86
article thumbnail

US Federal systems must be covered by vulnerability-disclosure policies by March 2021

Security Affairs

A new Cybersecurity and Infrastructure Security Agency (CISA) mandate requires U.S. agencies to implement vulnerability-disclosure policies by March 2021. The U.S. government’s cybersecurity agency CISA has issued a mandate that requires federal agencies to implement vulnerability-disclosure policies (VDPs) by March 2021. The main purpose of vulnerability-disclosure policies is to ensure that required information, other than confidential business information, is disclosed to the public and share

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Buyer’s Guide: 2020 Edition by i-SIGMA

IG Guru

Check out the 2020 i-SIGMA (PRISM/NAID) Buyer’s Guide here. The post The Buyer’s Guide: 2020 Edition by i-SIGMA appeared first on IG GURU.

article thumbnail

Russian national indicted for attempting to recruit Tesla employee to install malware

Security Affairs

US authorities have indicted a Russian national for conspiring to recruit a Tesla employee to install malware onto the company’s infrastructure. Russian national Egor Igorevich Kriuchkov (27) has been indicted in the United States for conspiring to recruit a Tesla employee to install malware onto the company’s network. In August, US authorities arrested the Russian national Egor Igorevich Kriuchkov (27) after attempting to recruit an employee at a targeted company to plant a piece of malware.

Access 82
article thumbnail

SMBs and Cyber Insurance – Third Certainty #27

Adam Levin

With the average cost of a data breach exceeding three million dollars, cyber insurance has become a necessity for SMBs. Find out more on the latest episode of Third Certainty with Adam Levin. The post SMBs and Cyber Insurance – Third Certainty #27 appeared first on Adam Levin.

article thumbnail

Phil Venables Blogging

Adam Shostack

Phil Venables is one of the more reflective and thoughtful CSOs out there, and in this era where everything is a tweet or a linkedin post (sigh) you may have missed that Phil has a blog. This Labor day, why not take the time to catch up on his writing?

40
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Epic Manchego gang uses Excel docs that avoid detection

Security Affairs

A recently discovered cybercrime gang, tracked as Epic Manchego , is using a new technique to create weaponized Excel files that are able to bypass security checks. Security experts from NVISO Labs recently spotted the activity of a new malware gang, tracked as Epic Manchego, that is actively targeting companies across the world with phishing emails since June.

article thumbnail

Preserving content from closed systems part 3: Lotus Notes De-Commissioning and Preservation

Preservica

In this blog series I have been exploring how the combination of applications and data management into a single platform make the trustworthy extraction of information for preservation more complex. The preservation of legacy information from a Lotus Notes Database, often during an application de-commissioning process, is one of the most complex examples and compromises have to be made to manage the process smoothly.