Thu.Aug 12, 2021

article thumbnail

Back to the Future: Notorious AlphaBay Market Reboots

Data Breach Today

Darknet Market Only Accepts Monero, Promotes Malware and Botnets, Bans Ransomware The notorious AlphaBay darknet marketplace appears to be getting rebooted by "DeSnake," who claims to have been the security administrator for the previous iteration, which law enforcement officials took down in 2017. Whether buyers and sellers will trust it, or the site will survive any takedown efforts, remains to be seen.

Marketing 307
article thumbnail

Digital Ethics: What's Your Plan?

AIIM

We've all been there, adding in our personal information online to complete a form, make a purchase, or sign up for an offer, and before we click the submission button, we think, " Is this information safe? How might it be used? " We ask ourselves these questions more and more as we continue to grow and expand our online experiences using our personal information.

GDPR 196
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Chaos' Malware Builder Rapidly Evolving

Data Breach Today

Trend Micro: Underground Forum Seeks Testers An advertisement on an underground forum seeks testers for an under-construction version of the malware builder called "Chaos," researchers at Trend Micro report.

237
237
article thumbnail

Why No HTTPS? The 2021 Version

Troy Hunt

More than 3 years ago now, Scott Helme and I launched a little project called Why No HTTPS? It listed the world's largest websites that didn't properly redirect insecure requests to secure ones. We updated it December before last and pleasingly, noted that more websites than ever were doing the right thing and forcing browsers down the secure path.

Archiving 143
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Taiwan's Gigabyte Ransomware Attackers Threaten Data Leak

Data Breach Today

RansomEXX Gang Claims It Stole Sensitive Data The RansomEXX gang reportedly hit Taiwan-based computer hardware maker Gigabyte last week with a ransomware attack that temporarily shut down its website and other internal services. The attackers have now reportedly threatened to leak 112GB of business data if a ransom is not paid.

More Trending

article thumbnail

Lawmakers Want Federal Cybersecurity Leaders' Roles Clarified

Data Breach Today

Clearer Lines of Demarcation Needed, House Members Say In a letter sent to National Cyber Director Chris Inglis this week, a bipartisan group of lawmakers says clearer lines of demarcation are needed to better define the responsibilities of federal officials involved in cybersecurity.

article thumbnail

QR Code Scammers Get Creative with Bitcoin ATMs

Threatpost

Threat actors are targeting everyone from job hunters to Bitcoin traders to college students wanting a break on their student loans, by exploiting the popular technology's trust relationship with users.

Security 118
article thumbnail

Cyberspace Solarium Commission Offers Progress Assessment

Data Breach Today

Report: Government Making Cybersecurity Progress, But More Work Needs to Be Done While the U.S. government is making strides in improving the nation's cybersecurity, it needs to do more to protect critical infrastructure from attacks and create public-private partnerships to improve national security, the, the Cyberspace Solarium Commission notes in a report published Thursday.

article thumbnail

Microsoft warns of a evasive year-long spear-phishing campaign targeting Office 365 users

Security Affairs

Microsoft warns of a long-running spear-phishing campaign that has targeted Office 365 customers in multiple attacks since July 2020. Microsoft revealed that a year-long spear-phishing campaign has targeted Office 365 customers in multiple attacks starting with July 2020. The attackers used invoice-themed XLS.HTML attachments, Microsoft reported that they changed obfuscation and encryption mechanisms every 37 days on average, a circumstance that demonstrates high motivation and the threat actors

Phishing 114
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

23 Charged in European Email Fraud Scheme

Data Breach Today

Europol: Scammers Waged Operation Related to COVID-19 Europol says it used a sting operation to derail an organized crime group that waged an email fraud campaign that stole about 1 million euros ($1.1 million).

IT 144
article thumbnail

Microsoft warns of a new unpatched Windows Print Spooler RCE zero-day

Security Affairs

Microsoft is warning of another zero-day Windows print spooler vulnerability, tracked as CVE-2021-36958, that could allow local attackers to gain SYSTEM privileges. Microsoft published a security advisory to warn its customers of another remote code execution zero-vulnerability, tracked as CVE-2021-36958 , that resides in the Windows Print Spooler component.

Security 113
article thumbnail

Why Did a Clinic Notify All Patients, Employees of Attack?

Data Breach Today

Practice Says Determining Exactly Whose Data Might Have Been Exposed Was Too Costly A Houston-based gastroenterology practice notified all 162,000 of its patients and employees that their information had potentially been compromised in a January ransomware incident, saying it would have been too costly and time-consuming to pinpoint which individuals had data exposed.

article thumbnail

Magniber Ransomware operators use PrintNightmare exploits to infect Windows servers

Security Affairs

Threat actors behind the Magniber Ransomware are using PrintNightmare exploits in attacks aimed at Windows servers. Threat actors behind the Magniber Ransomware are exploiting the PrintNightmare flaws ( CVE-2021-1675 , CVE-2021-34527 , and CVE-2021-36958 ) to infect Windows servers. The PrintNightmare flaws reside in the Windows Print Spooler service, print drivers, and the Windows Point and Print feature.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Researchers Identify Backdoor Methods to Access Magento

Data Breach Today

Securi Offers Advice on Risk Mitigation Researchers at Sucuri have discovered five backdoor methods to access Adobe's Magento e-commerce platform. They offer risk mitigation advice.

Access 144
article thumbnail

Ransomware Payments Explode Amid ‘Quadruple Extortion’

Threatpost

Unit 42 puts the average payout at over half a million, while Barracuda has tracked a 64 percent year over year spike in the number of attacks.

article thumbnail

Trend Micro warns customers of zero-day attacks against its products

Security Affairs

Security firms Trend Micro is warning its customers of attacks exploiting zero-day vulnerabilities in its Apex One and Apex One as a Service products. On July 28, Trend Micro released security patches for multiple incorrect permission assignment privilege escalation, incorrect permission preservation authentication bypass, arbitrary file upload, and local privilege escalation vulnerabilities in Apex One and Apex One as a Service products.

IT 105
article thumbnail

Making green hydrogen a viable strategy to drive decarbonization

CGI

Making green hydrogen a viable strategy to drive decarbonization. Green hydrogen is fast emerging as a promising strategy to drive decarbonization and achieve climate goals. It uses electricity from renewable energy sources to split water into hydrogen and oxygen using a process called electrolysis. During this process, no CO2 is produced, making it one of the most encouraging enablers of the energy transition. ravi.kumarv@cgi.com.

IT 98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Italian Garante Publishes Updated Guidelines on Cookies and Other Tracking Technologies

Hunton Privacy

Laura Liguori of Portolano Cavallo reports that on June 10, 2021, the Italian Data Protection Authority ( Garante or “DPA”) adopted a new version of its guidelines for cookies and other tracking mechanisms (the “Guidelines”). The Guidelines replace the resolution dated May 8, 2014, which set out simplified arrangements to provide information and obtain consent regarding cookies.

GDPR 98
article thumbnail

UK: ICO opens consultation on its updated international data transfer guidance and tools

DLA Piper Privacy Matters

On 11 August 2021, the Information Commissioner’s Office ( ICO ) launched a public consultation on its draft international data transfer agreement ( IDTA ) and guidance on data transfers. These updates have been expected for some time to address the UK regulatory position, following exit from the EU, in relation to the Schrems II decision of the CJEU last year and the need to refresh the Standard Contractual Clauses ( SCCs ) for the transfer of personal data to third countries.

IT 98
article thumbnail

Book Recommendation: Tomorrow’s Jobs Today authored by Rafael and Abby Moscatel via IG GURU

IG Guru

Tomorrow’s Jobs Today is written by Rafael Moscatel and his spouse Abby Moscatel. Rafael is a well-respected Information Governance Professional (IGP), Certified Records Manager (CRM), and Certified Information Privacy Manager (CIPM). Abby is a California trial attorney for State Farm Mutual Automobile Insurance Company. Both of their bios are available in the book.

article thumbnail

AdLoad Malware 2021 Samples Skate Past Apple XProtect

Threatpost

A crush of new attacks using the well-known adware involves at least 150 updated samples, many of which aren't recognized by Apple's built-in security controls.

Security 102
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Accenture Attack Highlights Evolving Ransomware Threats

eSecurity Planet

Accenture officials are saying they staved off a ransomware attack this week by a cybercriminal ring using the LockBit malware even as the hacker group claimed to have captured data from the massive global IT and business consulting firm and has threatened to release it. A CNBC reporter on Aug. 11 sent out a series of Tweets noting that the group had posted on the Dark Web that it was proposing selling insider information from Accenture to interested parties and apparently taunting the company,

article thumbnail

Want to See the Future? Forget the Crystal Ball, Ask your CDO

Reltio

A New Business Landscape. Businesses have transformed over the past year in ways we never could have imagined. The world has faced shifts in global supply chains, healthcare, education, and workplace environments that we did not anticipate in 2019. This is true across almost every industry in every part of the globe. As we slowly come out of lockdowns, many are imagining what the future holds for business, and cataloging the ways that things will be different as we move forward.

MDM 90
article thumbnail

How the Far Right Exploded on Steam and Discord

WIRED Threat Level

New research found that several of the major gaming platforms are hosting extremist activity, from racist livestreams to open support for neo-Nazis.

article thumbnail

Microsoft Warns: Another Unpatched PrintNightmare Zero-Day

Threatpost

The out-of-band warning pairs with a working proof-of-concept exploit for the issue, circulating since mid-July.

111
111
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A Simple Software Fix Could Limit Location Data Sharing

WIRED Threat Level

Carriers know where you are every time your phone re-connects to the cell network—but with Pretty Good Phone Privacy, they wouldn't have to.

Privacy 89
article thumbnail

ICO Consultation on International Data Transfer Agreement to Replace SCCs

Hunton Privacy

On August 11, 2021, the UK Information Commissioner’s Office (“ICO”) launched a consultation on its draft international data transfer agreement (“IDTA”) and guidance for organizations on international transfers (the “Guidance”). Once finalized, the IDTA will replace the existing EU Standard Contractual Clauses (“SCCs”) in the UK. The consultation follows both the UK’s exit from the EU, and the July 2020 Schrems II judgment, in which the Court of Justice of the European Union (“CJEU”) (1) invalid

GDPR 78
article thumbnail

Black Hat: Novel DNS Hack Spills Confidential Corp Data

Threatpost

Threatpost interviews Wiz CTO about a vulnerability recently patched by Amazon Route53's DNS service and Google Cloud DNS.

Cloud 87