Sat.Sep 26, 2020

article thumbnail

Microsoft Shutters Azure Apps Used by China-Linked Hackers

Data Breach Today

Researchers: Hacking Group Used Cloud Infrastructure for Phishing Attacks Microsoft removed 18 apps from its Azure cloud platform that were being used by hackers as part of their command-and-control infrastructure, according to company researchers. The threat group, called Gadolinium, was abusing the infrastructure to launch phishing email attacks.

Phishing 254
article thumbnail

A powerful DDoS attack hit Hungarian banks and telecoms services

Security Affairs

Hungarian financial institutions and telecommunications infrastructure were hit by a powerful DDoS attack originating from servers in Russia, China and Vietnam. A powerful DDoS attack hit some Hungarian banking and telecommunication services that briefly disrupted them. According to telecoms firm Magyar Telekom, the attack took place on Thursday and was launched from servers in Russia, China and Vietnam.

IT 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bug Bounty FAQ: Top Questions, Expert Answers

Threatpost

Four leading voices in the bug bounty community answer frequently asked questions from bounty hunters, companies and curious cybersecurity professionals.

article thumbnail

Victims of ThunderX ransomware can recover their files for free

Security Affairs

Good news for the victims of the ThunderX ransomware, cybersecurity firm Tesorion has released a decryptor to recover their files for free. Cybersecurity firm Tesorion has released a free decryptor for the ThunderX ransomware that allows victims to recover their files. ThunderX is ransomware that appeared in the threat landscape recently, infections were discovered at the end of August 2020. .

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Windows XP Source Code Got Leaked All Over the Internet

WIRED Threat Level

Plus: A cruel phishing test, ransomware hits Russia, and more of the week's top security news.

More Trending

article thumbnail

Can democracies stand up to Facebook? Ireland may have the answer | John Naughton

The Guardian Data Protection

Governments struggle to tackle the might of the tech giants when it comes to protecting users’ data Last month, the Irish data protection commissioner (DPC) sent Facebook a preliminary order ordering it to stop sending the data of its European users to the US. This was a big deal, because in order to comply with the ruling, Facebook would have to embark on a comprehensive re-engineering of its European operations, or to shut down those operations entirely, at least for a time.

article thumbnail

Weekly Update 210

Troy Hunt

Wow, 4 years already. Regardless of where I've been in the world or the stresses that have been going on in my personal life , every single week without exception there's been a video. This makes 210 of them now, and these days they're live from a much more professional setup in a location that has absolutely no chance of changing for the foreseeable future.