Thu.Jul 14, 2022

article thumbnail

Microsoft Says Phishing Campaign Skirted MFA to Access Email

Data Breach Today

Attackers Targeted More Than 10,000 Organizations Since Last September Attackers used a phishing campaign to direct unwitting Microsoft business email customers into supplying logon credentials to a proxy server. Attackers stole online session cookies, allowing them to defeat MFA and access inboxes. From there, they emailed corporate vendors to obtain financial data.

Phishing 361
article thumbnail

DHS Review Board Deems Log4j an 'Endemic' Cyber Threat

Dark Reading

Vulnerability will remain a "significant" threat for years to come and highlighted the need for more public and private sector support for open source software ecosystem, Cyber Safety Review Board says.

143
143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Are Ransomware Attacks Intensifying?

Data Breach Today

The latest edition of the ISMG Security Report analyzes why the number of ransomware attacks and the amounts being paid in ransoms are both on the rise. It also discusses today's cyberthreat landscape and whether organizations should rely on user training to improve security.

article thumbnail

New Phishing Kit Hijacks WordPress Sites for PayPal Scam

Dark Reading

Attackers use scam security checks to steal victims' government documents, photos, banking information, and email passwords, researchers warn.

Phishing 131
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CyberArk Execs: 9 Bets on What's Next in Identity Security

Data Breach Today

CyberArk Has Pushed Beyond Its Legacy in PAM to Address Broader Identity Use Cases CyberArk has pushed beyond privileged access management to address broader identity use cases as the rise of machine identities creates new challenges. The company will offer more holistic protection to user and nonuser identities by expanding into secrets management and cloud privilege security.

Security 315

More Trending

article thumbnail

At Half-Year Mark, Ransomware, Vendor Breaches Dominate

Data Breach Today

Latest Analysis of HHS OCR Health Data Breach Trends A little more than halfway into the year, hacking incidents, and especially ransomware incidents, as well as breaches involving business associates, are dominating the hundreds of major health data breaches affecting millions of individuals being reported to federal regulators.

article thumbnail

China Data Law Update: Certification Rules and Draft Standard Contract Are Issued

Data Matters

As the year approaches its halfway point, Chinese government accelerates the legislation for cross-border data transfers. Certification Rules for Cross-Border Data Processing Activities Are Finalized. Following an exposure draft dated April 29, TC260 finalized and released the Certification Rules for Cross-Border Data Processing Activities on June 24, 2022.

article thumbnail

Deakin Uni Students Suffer Smishing Attack, Data Breach

Data Breach Today

Threat actors carried out smishing attacks on nearly 10,000 Autralian higher education students enrolled at Deakin University and downloaded PII of about 47,000 students. Hackers compromised an employee's credentials to access the university's third-party SMS solutions provider to execute the attack.

article thumbnail

Wegmans Agrees to Pay $400,000 Penalty After Cloud Security Lapse

Hunton Privacy

On June 30, 2022, the New York Office of the Attorney General (“NYOAG”) announced a $400,000 agreement with Wegmans Food Markets, Inc. (“Wegmans”) in connection with a cloud storage security issue. The NYOAG alleges that Wegmans exposed the personal information of three million consumers by storing the data in misconfigured cloud storage containers.

Cloud 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ex-CIA Employee Convicted in Theft of Covert Hacking Info

Data Breach Today

Joshua Schulte Is Guilty on Nine Counts Ranging From Espionage to Obstruction Joshua Schulte now faces a minimum of 80 years in prison after a Manhattan federal jury returned guilty verdicts in all nine counts brought against the former CIA programmer by U.S. prosecutors. Schulte leaked a trove of classified hacking secrets used in espionage.

246
246
article thumbnail

Watchdog Uncovers 12% of Google Ads for Student Loan Relief Could be Malicious

KnowBe4

You may want to be careful about clicking on a student loan forgiveness ad. The Tech Transparency Project reviewed the top Google searches with 'student loan forgiveness' and found almost 12% of the ads were showing potential malicious intent.

article thumbnail

The Nature of Application Code

Data Breach Today

Rui Ribeiro, the founder and CEO of Jscrambler, a company that monitors and obfuscates JavaScript code, discusses the proliferation of web applications that use third-party code, the liability risks that often exist, and how Jscramber's products can increase the security of all application code.

Risk 241
article thumbnail

Hovering Over Links Will Protect You More Than MFA

KnowBe4

Microsoft Security recently released a report which detailed a widely successful phishing attack technique used against over 10,000 of its customers …a phishing attack that worked even if the customers were using supposedly super secure multi-factor authentication (MFA).

Phishing 104
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft published exploit code for a macOS App sandbox escape flaw

Security Affairs

Microsoft published the exploit code for a vulnerability in macOS that can allow an attacker to escape the sandbox. Microsoft publicly disclosed technical details for an access issue vulnerability, tracked as CVE-2022-26706 , that resides in the macOS App Sandbox. “Microsoft uncovered a vulnerability in macOS that could allow specially crafted codes to escape the App Sandbox and run unrestricted on the system.” reads the post published by Microsoft.

Access 102
article thumbnail

10 reasons to attend JNUC 2022

Jamf

For over 10 years, Apple admins from near and far have gathered, be it in person or virtually, at the Jamf Nation User Conference (JNUC). At JNUC, Apple IT, users and InfoSec leaders get a front-row seat to learn new and better ways to manage and secure Apple devices that simplify workflows and keep users productive. This year’s event will be even bigger, better and back in person !

article thumbnail

Facebook-Themed Scam Aims to Steal Your Credentials

KnowBe4

A creative mix of phishing emails, solid social engineering , use of Facebook Messenger, brand and site impersonation, and a sense of urgency all add up to a believable attack.

article thumbnail

Former CIA employee Joshua Schulte was convicted of Vault 7 massive leak

Security Affairs

Former CIA programmer, Joshua Schulte, was convicted in a US federal court of the 2017 leak of a massive leak to WikiLeaks. The former CIA programmer Joshua Schulte (33) was found guilty in New York federal court of stealing the agency’s hacking tools and leaking them to WikiLeaks in 2017. The huge trove of data, called “ Vault 7 ,” exposed the hacking capabilities of the US Intelligence Agency and its internal infrastructure.

IoT 97
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Data quality dimensions: How do they serve your company’s needs?

Collibra

How many data quality dimensions do you have? How do you arrive at those dimensions? . How do they serve your company’s needs? As a former data management consultant, I find that data quality strategy falls into both the tradecraft of data governance and the disruption of complex industry dynamics. The former, tradecraft, is a technological process that challenges leaders to prioritize data governance to the equivalency of any other prized commodity.

article thumbnail

The new Retbleed speculative execution attack impacts both Intel and AMD chips?

Security Affairs

Researchers warn of a new vulnerability, dubbed Retbleed, that impacts multiple older AMD and Intel microprocessors. ETH Zurich researchers Johannes Wikner and Kaveh Razavi discovered a new vulnerability, dubbed Retbleed, that affects multiple older AMD and Intel microprocessors. An attacker can exploit the flaw to bypass current defenses and perform in Spectre -based attacks.

Paper 92
article thumbnail

A New Attack Can Unmask Anonymous Users on Any Major Browser

WIRED Threat Level

Researchers have found a way to use the web's basic functions to identify who visits a site—without the user detecting the hack.

Privacy 110
article thumbnail

Mantis botnet powered the largest HTTPS DDoS attack in June

Security Affairs

The largest HTTPS DDoS attack recently mitigated by Cloudflare was launched by the Mantis botnet. In June 2022, DDoS mitigation firm Cloudflare announced it has mitigated the largest HTTPS DDoS attack that was launched by a botnet they have called Mantis. The Mantis botnet generated 26 million request per second using approximately 5000 hijacked virtual machines and powerful servers. “The Mantis botnet was able to generate the 26M HTTPS requests per second attack using only 5,000 bots.

IT 87
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Journalists Emerge as Favored Attack Target for APTs

Threatpost

Since 2021, various state-aligned threat groups have turned up their targeting of journalists to siphon data and credentials and also track them.

article thumbnail

Phishing Attacks are the Most Prevalent Source of Identity-Related Breaches

KnowBe4

Cybercriminals almost always need to leverage credentials as part of just about any kind of cyberattack. To no surprise, phishing and social engineering play a dominant role.

article thumbnail

Virtual CISOs Are the Best Defense Against Accelerating Cyber-Risks

Dark Reading

A poor, permanent hire can be a very expensive error, whereas a mis-hire on a virtual CISO can be rapidly corrected.

Risk 97
article thumbnail

QuickBooks Phishing Scam is Back

KnowBe4

Scammers are continuing to abuse the QuickBooks tax accounting software to send phishing scams, according to Roger Kay at INKY.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New Browser De-anonymization Technique

Schneier on Security

Researchers have a new way to de-anonymize browser users, by correlating their behavior on one account with their behavior on another: The findings, which NJIT researchers will present at the Usenix Security Symposium in Boston next month, show how an attacker who tricks someone into loading a malicious website can determine whether that visitor controls a particular public identifier, like an email address or social media account, thus linking the visitor to a piece of potentially personal data

article thumbnail

Data Breaches Linked to Ransomware Declined in Q2 2022

Dark Reading

Phishing retained its place as the top root cause of data compromises, according to new data from the Identity Theft Resource Center (ITRC).

article thumbnail

VMware fixed a flaw in vCenter Server discovered eight months ago

Security Affairs

VMware addressed a high-severity privilege escalation flaw, tracked as CVE-2021-22048, in vCenter Server IWA mechanism. VMware addressed a high-severity privilege escalation flaw, tracked as CVE-2021-22048 (CVSSv3 base score of 7.1.), in vCenter Server ‘s IWA (Integrated Windows Authentication) mechanism after eight months since its disclosure.