Thu.Dec 22, 2022

article thumbnail

FTX Probe: Founder Extradited; 2 Executives Plead Guilty

Data Breach Today

Feds Urge Any Participants in 'Misconduct at FTX or Alameda' to Come Forward Now As the U.S. government's probe of bankrupted cryptocurrency exchange FTX continues, two executives have pleaded guilty to unspecified fraud charges, while founder Sam Bankman-Fried waived his extradition rights in the Bahamas, is now in FBI custody, and due to be arraigned in New York.

article thumbnail

North Korea-linked hackers stole $626 million in virtual assets in 2022

Security Affairs

North Korea-linked threat actors have stolen an estimated $1.2 billion worth of cryptocurrency and other virtual assets in the past five years. South Korea’s spy agency, the National Intelligence Service, estimated that North Korea-linked threat actors have stolen an estimated 1.5 trillion won ($1.2 billion) in cryptocurrency and other virtual assets in the past five years.

Military 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

France Fines Microsoft Ireland 60M Euros Over Bing Cookies

Data Breach Today

French Authority Says Microsoft Search Engine Violated Data Protection Practices The French data protection authority fined Microsoft Ireland 60 million euros for privacy and security practices relating to a Bing search engine advertising cookie. The company has three months to get the consent of the French users before further deployment of the cookie.

Privacy 130
article thumbnail

Vice Society ransomware gang is using a custom locker

Security Affairs

The Vice Society ransomware group has adopted new custom ransomware, with a strong encryption scheme, in recent intrusions. SentinelOne researchers discovered that the Vice Society ransomware gang has started using a custom ransomware that implements a robust encryption scheme, using NTRUEncrypt and ChaCha20-Poly1305 algorithms. Vice Society ransomware has been active since June 2021, it is considered by researchers a spin-off of the HelloKitty ransomware , the malware targets both Windows and L

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Medical Device Security Provision Now Part of Spending Bill

Data Breach Today

Senate Sends Spending Bill to House with Resurrected Medical Device Protections A resurrected proposal to enhance medical device security is nestled within the 4,155-page, $1.7 trillion omnibus spending bill that the Senate passed Thursday and sent to the House for approval. Medical device makers would be required to meet cybersecurity standards and disclose vulnerabilities.

Security 130

More Trending

article thumbnail

Judge Denies Motion to Stop Health Data Scraping by Meta

Data Breach Today

Early-Stage Ruling in Proposed Class Action Privacy Lawsuit Could 'Evolve' A federal judge has denied granting a preliminary injunction against Meta to stop the firm's Pixel tracking code in healthcare websites from collecting and disseminating patient information for advertising. But the judge says he could change his mind as more details about patient privacy emerge.

Privacy 130
article thumbnail

New Brand of Security Threats Surface in the Cloud

Dark Reading

Tech Insight report co-produced by Black Hat, Dark Reading, and Omdia examines how cloud security is evolving in a rapid race to beat threat actors to the (cloud) breach.

Cloud 110
article thumbnail

Splunk, Elastic, Microsoft Top Security Analytics: Forrester

Data Breach Today

Elastic Enters Leaders Segment; Exabeam, Securonix and IBM Fall in Latest Rankings A surging Elastic has joined perennial stalwarts Splunk and Microsoft atop the Forrester Wave: Security Analytics 2022 report, toppling SIEM players Exabeam, Securonix and IBM. Elastic went from not even being mentioned in the December 2020 security analytics Forrester Wave to leading the industry.

Analytics 130
article thumbnail

Spear Phishing Campaign Targets Japanese Political Organizations

KnowBe4

Researchers at ESET warn that a Chinese-speaking threat actor dubbed “MirrorFace” targeted Japanese political organizations with spear phishing emails in the run-up to the Japanese House of Councillors election in July 2022.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ransomware Experts Agree: Don't Buy Data Deletion Promises

Data Breach Today

The latest edition of the ISMG Security Report discusses why it is always a bad idea for organizations to pay hackers for data deletion, practical steps organizations can and should take to avoid being at the heart of a data subject complaint, and the latest efforts to tackle the ransomware threat.

article thumbnail

Microsoft Warns of Signed Drivers Being Used to Terminate AV and EDR Processes

KnowBe4

The malicious abuse of several developer program accounts in Microsoft’s Windows Hardware Developer Program allowed threat actors to have malware evade detection.

100
100
article thumbnail

Okta's GitHub Repository Hacked; Code Stolen, Customers Safe

Data Breach Today

Source Code of Only Workforce Identity Cloud Code Repositories Stolen Identity and access management company Okta revealed that its private GitHub repositories were accessed earlier in the month, resulting in the theft of its source code in its Workforce Identity Cloud code repositories. "No customer data was impacted," Okta says.

Cloud 130
article thumbnail

Threat Modeling in the Age of OpenAI's Chatbot

Dark Reading

New technical chatbot capabilities raise the promise that their help in threat modeling could free humans for more interesting work.

106
106
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UK Moves to 'Name and Shame' Firms for Complaints, Breaches

Data Breach Today

Attorney Edward Machin Discusses Impact of ICO's Decision to Release Breach Data In a surprise move, Britain's Information Commissioner's Office recently named names - lots of names - on the data breach front. The ICO has published detailed information about breaches of personal data, complaints and the civil investigations. Attorney Edward Machin explains the implications.

article thumbnail

Google WordPress Plug-in Bug Allows AWS Metadata Theft

Dark Reading

A successful attacker could use the SSRF vulnerability to collect metadata from WordPress sites hosted on an AWS server, and potentially log in to a cloud instance to run commands.

article thumbnail

OneTrust CEO on Regulatory, Automation Issues and Privacy

Data Breach Today

Founder Kabir Barday on Bringing Together Privacy, Security, Governance and Ethics Unifying decision-making about privacy, security, ethics and governance poses a huge challenge from a regulatory and operational perspective, says OneTrust CEO Kabir Barday. OneTrust has created a network of 900 lawyers across 300 jurisdictions that feed intelligence into the company's platform.

Privacy 130
article thumbnail

New Polymorphic Wiper Malware Leaves Attacked Environments “Unrecoverable”

KnowBe4

As an apparent method of political commentary on the war in Ukraine, the new Azov wiper uses a mix of intermittent overwriting and trojanizing Windows binaries to annihilate its’ victims.

IT 85
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Guardian Ransomware Attack May Presage Holiday Blitzkrieg

Data Breach Today

Expert: Victims More Likely to Pay Quickly to 'Start Recovery and Go On Holiday' Stop the presses: Britain's Guardian media group has been hit by a "serious IT incident," believed to be ransomware, that appears to have encrypted numerous systems. Experts say ransomware groups love to strike over the holidays, adding pressure on victims to pay a ransom quickly and quietly.

article thumbnail

What Is Flipper Zero? The Hacker Tool Going Viral on TikTok, Explained

WIRED Threat Level

Don’t be fooled by its fun name and Tamagotchi-like interface—this do-everything gadget is trouble waiting to happen and a whole lot more.

IT 99
article thumbnail

Inside The Next-Level Fraud Ring Scamming Billions Off Holiday Retailers

Dark Reading

"Largest attack of its kind": A potent Southeast Asian e-commerce fraud ring has declared war on US retailers, targeting billions in goods in just the past month and forcing mules into its scheme.

Retail 85
article thumbnail

The Number of Phishing Attacks Grows 15% in One Quarter, Reaching an All-Time High

KnowBe4

New data shows that while ransomware remains somewhat flat, massive increases in business email compromise and response-based email attacks were seen last quarter.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Call for Chapter Submissions: The Handbook of Black Librarianship Third Edition

IG Guru

Call for Chapter Submissions: The Handbook of Black Librarianship Third Edition We are pleased to announce that Rowman & Littlefield has approved a proposal for a Third Edition to The Handbook of Black Librarianship. The First Edition was edited by Dr. E.J. Josey and Ann Allen Shockley in 1977. The Second Edition by Dr. Josey […].

73
article thumbnail

How-to: Granting local admin permissions with Microsoft Forms and Power Automate

Jamf

In this step-by-step guide we will show how to use Microsoft Forms and Microsoft Power Automate to streamline and manage local administrator permissions within a managed macOS fleet.

72
article thumbnail

Zerobot Adds Brute Force, DDoS to Its IoT Attack Arsenal

Dark Reading

Threat actors continue to evolve the malicious botnet, which has also added a list of new vulnerabilities it can use to target devices.

IoT 83
article thumbnail

The 6 R’s – Strategies for cloud migration

OpenText Information Management

The journey to the cloud is different for every organization as there is no one-size-fits-all migration plan. Each IT asset to be migrated is unique in terms of cost, performance, and complexity, so you cannot move all components to the cloud with one common method. Making a roadmap for the migration will answer the questions … The post The 6 R’s – Strategies for cloud migration appeared first on OpenText Blogs.

Cloud 63
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

What Kind of Data Gets Stolen When a Developer is Compromised?

Dark Reading

What is the worst that can happen when a developer's machine is compromised? Depending on the developer's position, attackers gain access to nearly everything: SSH keys, credentials, access to CI/CD pipelines and production infrastructure, the works.

Access 68
article thumbnail

Claimant to Maintain Anonymity in English High Court Cyber Attack Case

Hunton Privacy

On December 20, 2022, the English High Court has granted the victim of a cyber attack a permanent injunction against cyber attackers whilst the victim organization maintains its anonymity. Generally, a claimant’s identity is public in English court proceedings. Injunctions can be made against unknown and unidentifiable defendants enabling them to be granted against individuals who are acting in breach or threatening to commit a breach. .

article thumbnail

Security Is a Second-Class Citizen in High-Performance Computing

Dark Reading

Vendors and operators attempt to balance power and security, but right now, power is the highest goal.