Fri.Apr 08, 2022

article thumbnail

Big Hacks: 5 Health Data Breaches Affect 1.2 Million

Data Breach Today

Reporting Entities Represent Another Diverse Mix of Healthcare Sector Targets Five recently reported data breaches involving cyberattacks on a variety of different types of healthcare sector entities have affected a total of more than 1.2 million individuals. Experts say the incidents highlight the intensifying threat landscape in the sector.

article thumbnail

How Hackers Evade Detection

eSecurity Planet

Bypassing detection tools is part of a hacker’s routine these days. Despite the incredible evolution of defensive technologies, attackers often remain undetected for weeks or months, earning the label advanced persistent threat (APT). Classic security tools are necessary but less and less sufficient. That’s why most security companies are now focusing on behavioral analysis and active endpoint protection , as evasion keeps becoming easier.

Metadata 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEC Breach Disclosure Rule Makes CISOs Assess Damage Sooner

Data Breach Today

Rule Would Force Firms to Disclose 'Material Cybersecurity Incidents' in 4 Days A proposed rule requiring publicly traded companies to disclose a breach within four days of deeming it material will force CISOs to determine the consequences of breaches sooner. CISOs will need to have board-level conversations within a day or two of discovering an issue to assess materiality.

article thumbnail

AirTags Are Used for Stalking Far More than Previously Reported

Schneier on Security

Ever since Apple introduced AirTags, security people have warned that they could be used for stalking. But while there have been a bunch of anecdotal stories, this is the first vaguely scientific survey: Motherboard requested records mentioning AirTags in a recent eight month period from dozens of the country’s largest police departments. We obtained records from eight police departments.

Security 117
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft Seizes Russian Domains Targeting Ukraine

Data Breach Today

Tech Firm Seizes 7 Domains Used by APT28 /Strontium to Establish Persistent Access Microsoft says it seized control of seven domains belonging to Russian GRU-linked state-sponsored threat group Strontium. The group, also called APT28 and Fancy Bear, used the domains to target Ukrainian media organizations and had U.S. and EU government entities and decision-makers on its radar.

More Trending

article thumbnail

ISMG Editors: Building Cybersecurity Defenses in Wartime

Data Breach Today

Former CISO David Pollino Joins Editors to Discuss Adversaries, 'Great Resignation' David Pollino, former CISO of PNC Bank, joins two editors at ISMG to discuss what organizations can do to harden their cybersecurity defenses, how we need to think about our adversaries differently in today's threat landscape and how the "Great Resignation" is affecting cybersecurity.

article thumbnail

Microsoft disrupted APT28 attacks on Ukraine through a court order

Security Affairs

Microsoft obtained a court order to take over seven domains used by the Russia-linked APT28 group to target Ukraine. Microsoft on Thursday announced it has obtained a court order to take over seven domains used by Russia-linked cyberespionage group APT28 in attacks against Ukraine. The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide.

Military 105
article thumbnail

Google Play Bitten by Sharkbot Info-stealer ‘AV Solution’

Threatpost

Google removed six different malicious Android applications targeting mainly users in the U.K. and Italy that were installed about 15,000 times.

Security 103
article thumbnail

A Ukrainian man is the third FIN7 member sentenced in the United States

Security Affairs

A Ukrainian man was sentenced in the US to 5 years in prison for his criminal activity in the cybercrime group FIN7. Denys Iarmak, a Ukrainian national (32), has been sentenced to five years in prison in the U.S. for high-level hacking activity in the cybercrime group FIN7 (aka Carbanak Group and the Navigator Group). The man was arrested in Bangkok, Thailand in November 2019 at the request of U.S. law enforcement, then he was extradited to the U.S. in May 2020.

Phishing 101
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weekly Update 290

Troy Hunt

I hope scheduling these in advance is working well for everyone, the analytics certainly suggest a much higher viewership so I'm going to keep scheduling these and refining the whole thing further. Other than that, it's same-same this week with the usual array of breaches, tech and life down under. Enjoy 😊 References I keep forgetting to talk about upcoming events (that's a list of what's coming  in 2022, I'll try to remember to discuss it next week given I&

article thumbnail

15 Cybersecurity Measures for the Cloud Era

Security Affairs

Which are the most important cybersecurity measures that businesses can take to protect themselves in the cloud era? We are now firmly in the era of cloud data and storage. In fact, it’s become quite difficult to find a service that doesn’t rely on the cloud in some way. This ubiquity has led to increased concerns about data security, as more and more sensitive information is stored online.

Cloud 96
article thumbnail

ByteChek Founder AJ Yawn Brings Discipline to Everything He Does

Dark Reading

Security Pro File: The former Army captain, whose security startup is on an upward trajectory, works hard to "make compliance suck less.

article thumbnail

KnowBe4's PhishER Platform Named a Leader in the Spring 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR)

KnowBe4

We are excited to announce that KnowBe4 has been named a leader in the Spring 2022 G2 Grid Report for Security Orchestration, Automation, and Response (SOAR) for the fourth consecutive quarter!

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Security Nihilism Is Putting Your Company — and Its Employees — at Risk

Dark Reading

Some enterprise security tactics can backfire, pitting IT and security teams against the employees they’re trying to protect.

IT 104
article thumbnail

The Ransomware Hostage Rescue Checklist: Your Step-by-Step Guide to Preventing and Surviving an Ransomware Attack

KnowBe4

Skyrocketing attack rates, double and triple extortion, increasing ransom demands… cybercriminals are inflicting pain in every way imaginable when it comes to today’s ransomware attacks. And you need to be prepared to protect your network , NOW.

article thumbnail

Big Tech to Congress: Forget About Antitrust, Pass a Privacy Law via Bloomberg.com

IG Guru

Check out the article here. The post Big Tech to Congress: Forget About Antitrust, Pass a Privacy Law via Bloomberg.com appeared first on IG GURU.

Privacy 81
article thumbnail

WatchGuard Didn't Explicitly Disclose a Flaw Exploited by Hackers

WIRED Threat Level

The security vendor kept a critical vulnerability in its firewall appliances quiet even as it was under attack from a Russian hacking group.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Software-as-a-Service Rules the Cloud

Dark Reading

Half of the IT professionals surveyed who use cloud services also employ infrastructure-as-a-service and platform-as-a-service.

Cloud 81
article thumbnail

GooglePlay removes malware that steals Facebook credentials

Jamf

Jamf Threat Labs researchers investigated an Android app (that has since been removed from Google Play on March 22) that was capable of stealing Facebook login credentials (username and password) from users. The app is called Craftsart Cartoon Tools and it was also reported by researchers at Pradeo.

article thumbnail

Google Removes Dangerous Banking Malware From Play Store

Dark Reading

SharkBot was hidden in apps masquerading as antivirus tools.

97
article thumbnail

Mobile Access Augments User Experience In Commercial Real Estate

HID Global

Mobile Access Augments User Experience In Commercial Real Estate. tjohnston. Fri, 04/08/2022 - 10:55.

Access 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

BakerHostetler Launches 2022 Data Security Incident Response Report — Resilience And Perseverance

Dark Reading

Ransomware remained the most prevalent and impactful type of data security incident.

article thumbnail

The ABCs of UWB Technology

HID Global

The ABCs of UWB Technology. pcabble. Fri, 04/08/2022 - 09:03.

52
article thumbnail

Microsoft Sinkholes Russian Hacking Group's Domains Targeting Ukraine

Dark Reading

The operation aimed to disrupt cyber espionage activity a Russian GRU group was using for the Ukraine war.

65
article thumbnail

The KnowledgeLake IDP Platform Now Available for O365 Government Community Cloud and GCC High

Info Source

Government organizations with strict regulatory requirements can leverage intelligent document processing platform in GCC and GCC environments to better ensure data security and compliance. ST. LOUIS, MO., February 8, 2022 — KnowledgeLake , a leading provider of Intelligent Document Processing (IDP), today announced that the company’s cloud-native IDP platform is now available to public sector organizations using Microsoft Office 365 Government Community Cloud (GCC) and GCC High.

Cloud 40
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Hamas-linked threat actors target high-profile Israeli individuals

Security Affairs

Hamas-linked threat actors conducted an elaborate campaign aimed at high-profile Israeli individuals employed in sensitive sectors. Researchers from Cybereason observed a sophisticated cyberespionage campaign conducted by APT-C-23 group campaigns targeting Israeli high-profile targets working for sensitive defense, law enforcement, and emergency services organizations.

article thumbnail

Friday Squid Blogging: Do Squid Have Emotions?

Schneier on Security

Scientists are now debating whether octopuses, squid, and crabs have emotions. Short answer: we don’t know, but can’t rule it out. There may be a point when humans can no longer assume that crayfish, shrimp, and other invertebrates don’t feel pain and other emotions. “If they can no longer be considered immune to felt pain, invertebrate experiences will need to become part of our species’ moral landscape,” she says. “But pain is just one morally relevant

article thumbnail

How Russia's Invasion Triggered a US Crackdown on Its Hackers

WIRED Threat Level

The Biden White House is using “all of the levers of national power” to counter—or preempt—cyberattacks by Russia’s most dangerous hacker groups.

IT 94