Wed.Feb 08, 2023

article thumbnail

E-Commerce Shops: 12% Are Publicly Exposing Private Backups

Data Breach Today

Hackers Actively Scanning for Backups to Steal Access Credentials, Researchers Warn Researchers at Sansec warn that 12% of e-commerce sites they studied publicly expose private backups and that hackers are actively scanning for them. Such backups can give attackers customer data, passwords and other details required to gain remote, administrator-level access to an environment.

Passwords 244
article thumbnail

Same Recipe, Different Clientele Cooking Up Effective Programs for Records, Data, and Information Governance

Weissman's World

It’s no secret that infogov and records management can be difficult and frustrating – increasingly so as traditional areas like policy development, process improvement, compliance, retention, and destruction have begun banging into once-separate and quickly growing disciplines like privacy and security. What seems to be lesser-known, though, is that there’s a remarkably universal strategic recipe… Read More » Same Recipe, Different Clientele Cooking Up Effective Programs for Records,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Twitter, YouTube, Instagram Crippled By Massive Outages

Data Breach Today

Twitter Falters After Post Length for Twitter Blue Users Rises to 4,000 Characters Three of the planet's largest social media platforms suffered outages Wednesday, blocking some users at Twitter, Instagram and YouTube from accessing their accounts. At Twitter, many users received a message Wednesday saying they were "over the daily limit" and were unable to post.

Access 237
article thumbnail

Cybersecurity Analysts Using ChatGPT for Malicious Code Analysis, Predicting Threats

eSecurity Planet

ChatGPT has raised alarm among cybersecurity researchers for its unnerving ability in composing everything from sophisticated malware to phishing lures – but it’s important to keep in mind that the tool can help support cybersecurity defenses as well. Shiran Grinberg, director of research and cyber operations at Cynet, told eSecurity Planet that too many companies are deterred by ChatGPT, rather than encouraging employees to leverage its functionality. “After all, I doubt you’l

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ontario Hospital Among Latest Healthcare Cyberattack Victims

Data Breach Today

Also: 2 US Hospitals Still Recovering From Incidents Last Week An Ontario hospital says it is operating under "Code Grey" as it deals with a cybersecurity incident that occurred over the weekend. Meanwhile, hospitals in Maryland and Florida say they are still recovering from cyberattacks that hit last week and continue to affect a variety of patient services.

More Trending

article thumbnail

Russian Hackers Suspected of Accessing Email of British MP

Data Breach Today

Scottish National Party MP Stewart McDonald Warns Disinformation May Follow Russian intelligence likely gained access to a Scottish nationalist politician's private email inbox via a phishing attack. Stewart McDonald, a well-known supporter of Ukraine, said his messages may become part of a disinformation campaign. His official inbox was not breached.

Access 130
article thumbnail

FTC Large Enterprise Crackdown Highlights Need for Litigation Preparedness

Hanzo Learning Center

Last year , the FTC announced they were going to “crackdown on harmful commercial surveillance and lax data security,” and have been pursuing a number of lawsuits as a result. Many of these are bold in their approach, which may catch many corporate legal teams off guard.

article thumbnail

Hong Kong Police Disrupt International Phishing Syndicate

Data Breach Today

Criminal Group Impersonated Well-Known Brands to Plant Banking Trojans Hong Kong police and Interpol disrupted an international criminal operation that planted banking Trojans through SMS phishing messages that appeared to originate from a legitimate source. Hong Kong police told the South China Morning Post the gang appears to be based overseas.

Phishing 130
article thumbnail

ChatGPT: What is it and what it could mean for the classroom

Jamf

ChatGPT, the AI-based chatbot is the newest technology in the software sandbox which like most new technologies, has just as many proponents as it does opponents. Specifically in the educational sector, concerns over how the tool is used have spurned debate between detractors worried about what it will do to education and attractors that are enthusiastic to see the changes it will bring.

IT 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ransomware Attack Disrupts Operations at MKS Instruments

Data Breach Today

Semiconductor Equipment Maker Says It Is Investigating the Impact of the Incident A Massachusetts maker of semiconductor manufacturing equipment says it halted operations at some facilities following a ransomware attack. A market analysts tells Information Security Media Group a slowdown in semiconductor demand means the attacks' short-term effects will be limited.

article thumbnail

Researcher compromised the Toyota Supplier Management Network

Security Affairs

The infrastructure of Toyota was compromised again, this time its global supplier management network was hacked by a researcher. The security researcher Eaton Zveare has exploited a vulnerability in Toyota’s Global Supplier Preparation Information Management System (GSPIMS) to achieve system admin access to Toyota’s global supplier management network.

article thumbnail

Craig Box of ARMO on Kubernetes and Complexity

Data Breach Today

In this episode of "Cybersecurity Unplugged," Craig Box, vice president of open source and community at ARMO, discusses the complexity of using Kubernetes in a hybrid cloud environment, the need to understand "how these moving parts work together" and potential use of Kubernetes with 5G.

Cloud 130
article thumbnail

US CISA releases a script to recover servers infected with ESXiArgs ransomware

Security Affairs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a script to recover VMware ESXi servers infected with ESXiArgs ransomware. Good news for the victims of the recent wave of ESXiArgs ransomware attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a script to allow them to recover encrypted VMware ESXi servers.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ransomware: ESXiArgs Campaign Snares at Least 2,803 Victims

Data Breach Today

Unpatched VMware Servers Exploited; Florida State Court System Among Victims As the massive ESXiArgs ransomware campaign continues to target unpatched VMware ESXi hypervisors, cybersecurity experts have released a script that can decrypt at least some affected virtual machines. Ransomware trackers count at least 2,803 victims, primarily in France, the U.S. and Germany.

article thumbnail

Russian national pleads guilty to money laundering linked to Ryuk Ransomware operation

Security Affairs

A Russian national pleaded guilty in the U.S. to money laundering charges linked to the Ryuk ransomware operation. On February 7, 2023, Russian national Denis Mihaqlovic Dubnikov (30) pleaded guilty in the U.S. to one count of conspiracy to commit money laundering for the Ryuk ransomware operation. Denis Mihaqlovic Dubnikov, 30, was arrested in Amsterdam in November 2021 and was extradited to the US in August 2022. “According to the indictment, between at least August 2018 and August 2021,

article thumbnail

Skybox Security Snags Digital Guardian's Mo Rosen as New CEO

Data Breach Today

Rosen Replaces Skybox founder Gidi Cohen, Will Pursue Profitability, SaaS Adoption Skybox Security has landed former Digital Guardian CEO Mo Rosen to pursue profitability and drive adoption of the security policy and vulnerability management vendor's SaaS platform. The San Jose, California-based company tasked Rosen with making Skybox's SaaS tool easier to deploy and use.

Security 130
article thumbnail

[HEADS UP] If You're a Fan of 'The Last of Us' You May be Targeted for These Campaigns

KnowBe4

The success of the TV adaption of this PlayStation game 'The Last of Us' has been a huge hit for fans. Unfortunately, this new series has attracted bad actors to exploit for their own financial gain.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Toyota Global Supply Chain Portal Flaw Put Hacker in the Driver's Seat

Dark Reading

The automaker closed a hole that allowed a security researcher to gain system administrator access to more than 14,000 corporate and partner accounts and troves of sensitive data.

article thumbnail

Anomali ThreatStream: Threat Intelligence Product Overview and Insight

eSecurity Planet

The Anomali ThreatStream threat intelligence platform (TIP) integrates hundreds of threat information feeds with the analytics a security professional needs to understand how a specific threat might impact the organization. This article provides more in-depth information on the product and its features. For a comparison with other TIP products, see our list of the top threat intelligence companies.

article thumbnail

Gigamon Exits NDR Market, Sells ThreatInsight Business to Fortinet

Dark Reading

Omdia has learned that Gigamon sold its ThreatInsight NDR business to Fortinet for approximately $31 million. The deal highlights what may be a pivot point for the NDR market.

article thumbnail

Experts published a list of proxy IPs used by the pro-Russia group Killnet

Security Affairs

SecurityScorecard’s researchers released a list of proxy IPs used by the pro-Russia group Killnet to neutralize its attacks. SecurityScorecard’s researchers published a list of proxy IPs used by the pro-Russia group Killnet with the intent to interfere with its operation and block its attacks. “To help organizations better protect themselves, SecurityScorecard has published a list of proxy IPs to help block the Killnet DDoS bot.” reads the post published by the security firm Securi

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Jailbreak Trick Breaks ChatGPT Content Safeguards

Dark Reading

Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls.

IT 94
article thumbnail

New Graphiron info-stealer used in attacks against Ukraine

Security Affairs

A Russia-linked threat actor has been observed deploying a new information stealer dubbed Graphiron in attacks against Ukraine. Researchers from Broadcom Symantec spotted a Russia-linked ATP group, tracked as Nodaria (aka UAC-0056), deploying new info-stealing malware, dubbed Graphiron, in attacks against Ukraine. The Nodaria APT group has been active since at least March 2021, it focuses on Ukraine, despite it has been involved in attacks on targets in Kyrgyzstan and Georgia.

article thumbnail

ActZero Unveils Next-Generation MDR Platform

Dark Reading

Latest release gives small and mid-sized enterprises AI-driven analysis tools and unified visibility across IT environments for stronger ransomware protection.

article thumbnail

Russian e-commerce giant Elevel exposed buyers’ delivery addresses

Security Affairs

A leading electrical engineering company in Russia, Elevel, has exposed its customers’ personally identifiable information (PII,) including full names and addresses. Original post at [link] Founded in 1991, Elevel (previously Eleko) positions itself as the leading Russian electrical engineering company that runs both an e-commerce business and wholesale stores.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Be Wary of Survey Scams

KnowBe4

Online surveys are too often scams designed to steal personal or financial information, warns Phil Muncaster at ESET.

article thumbnail

How to Optimize Your Cyber Insurance Coverage

Dark Reading

From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks.

article thumbnail

The Political Theater Behind the State of the Union Data Privacy Push

WIRED Threat Level

Biden’s speech calling for better data protections got a standing ovation from both sides of the aisle. So, where’s a federal privacy law?

Privacy 75