Sun.May 30, 2021

article thumbnail

Interpol has intercepted $83 million from financial cyber crimes

Security Affairs

Interpol has intercepted $83 million in illicit funds transferred from victims to the accounts used by crooks. An operation conducted by Interpol, codenamed HAECHI-I, conducted by more than 40 officers in the Asia Pacific region over six months period allowed to intercept a total of USD 83 million in illicit funds transferred from victims to the cybercriminals.

Phishing 128
article thumbnail

GPs warn over plans to share patient data with third parties in England

The Guardian Data Protection

Doctors say NHS Digital’s proposals could erode the relationship between them and their patients Doctors have warned that plans to pool medical records on to a database and share them with third parties could erode the relationship between them and patients. It came as the Royal College of GPs wrote to NHS Digital urging it to better communicate with the public about the plans and their options for opting out.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

These 2 attacks allow to alter certified PDF Documents

Security Affairs

Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature. Researchers from Ruhr-University Bochum have disclosed two new attack techniques, dubbed Evil Annotation and Sneaky Signature attacks , on certified PDF documents that could potentially allow attackers to modify visible content without invalidating their digital signature.

Privacy 110
article thumbnail

Apple's M1 Chip Has a Fascinating Flaw

WIRED Threat Level

The covert channel bug demonstrates a fundamental fact of CPUs: even new ones have vulnerabilities.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facefish Backdoor delivers rootkits to Linux x64 systems

Security Affairs

Qihoo 360 NETLAB spotted a new backdoor dubbed Facefish that could allow attackers to take over Linux systems and steal sensitive data. Cybersecurity experts from Qihoo 360 NETLAB published details about a new backdoor, dubbed Facefish, which can be used by threat actors to steal login credentials and executing arbitrary commands on Linux systems. The malware was also analyzed by Juniper researchers who observed the use of an exploit against the Control Web Panel (CWP) server administration we

article thumbnail

Security Affairs newsletter Round 316

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. A malware attack hit the Alaska Health Department CVE-2021-31166 Windows HTTP flaw also impacts WinRM servers Zeppelin ransomware gang is back after a temporary pause 13 flaws in Nagios IT Monitoring Software pose serious risk to orgs Anker fixed an issue that caused access to Eufy video camera feeds to random users French intel found flaws in