Fri.May 05, 2023

article thumbnail

The Double-Edged Sword of Crypto in Ransomware

Data Breach Today

Hackers Treasure Crypto's Anonymity, Cybercrime Defenders its Traceability Ransomware hackers' favorite currency is cryptocurrency. Digital assets transfer millions of dollars each year from victims to cybercriminals. But that dependency is also an opportunity for law enforcement to hit ransomware hackers in their most vulnerable spot.

article thumbnail

Apple Patches Bluetooth Flaw in AirPods, Beats

Dark Reading

Users can check for the updated firmware version of their wireless headphones in the Bluetooth settings of their iPhone, iPad, or Mac devices.

131
131
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission Proposes Network of Cross-Border SOCs

Data Breach Today

Cyber Solidarity Act Seeks to Improve EU Responses to Cyber Incidents The European Commission is proposing to spend more than 1 billion euros on cybersecurity operations centers amid long-standing worries that cyberthreats against the members of the continental alliance go undetected, concerns made more urgent by Russia's invasion of Ukraine.

article thumbnail

Fortinet fixed two severe issues in FortiADC and FortiOS

Security Affairs

Fortinet has addressed a couple of high-severity vulnerabilities impacting FortiADC, FortiOS, and FortiProxy. Fortinet addressed nine security vulnerabilities affecting multiple products, including two high-severity issues, tracked as CVE-2023-27999 and CVE-2023-22640, in FortiADC, FortiOS, and FortiProxy. The CVE-2023-27999 flaw (CVSS score 7.6) is a command injection issue in the external resource module. “An improper neutralization of special elements used in an OS command vulnerability

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ukrainian Forces Shutter Bot Farms and Illicit VPN Provider

Data Breach Today

Arrests Made and Computer Equipment Seized Ukrainian law enforcement dismantled more than half a dozen bot farms and a virtual private network infrastructure spreading disinformation and fake Russian propaganda. Ukrainian authorities have dismantled a string of botnet operations in December, September and August of 2022.

157
157

More Trending

article thumbnail

Tennessee Medical Clinic Patient Services Hampered by Attack

Data Breach Today

'Sophisticated Criminal Attack' Included Effort to Steal Data, Entity Says A Tennessee medical clinic and surgery center is still struggling to fully recover two weeks after a "sophisticated criminal cyberattack" - which included an attempt to steal data - forced the entity to take its IT systems offline and cancel most patient services.

IT 144
article thumbnail

Fleckpe Android malware totaled +620K downloads via Google Play Store

Security Affairs

Fleckpe is a new Android subscription Trojan that was discovered in the Google Play Store, totaling more than 620,000 downloads since 2022. Fleckpe is a new Android subscription Trojan that spreads via Google Play, the malware discovered by Kaspersky is hidden in photo editing apps, smartphone wallpaper packs, and other general-purpose apps. The malicious campaign has been active since 2022, the experts discovered eleven apps infected with Fleckpe on Google Play, which have been installed on mor

article thumbnail

ISMG Editors: Special Focus on Cybersecurity in Government

Data Breach Today

Also: AI and SBOMs; CISA's Push for Secure Software Development In the latest weekly update, Venable's Grant Schneider joins ISMG editors to discuss takeaways from the RSA Conference 2023, the state of software supply chain security post-SolarWinds, safeguards to prevent unintended adverse impacts of AI, and whether AI could be used to write and digest SBOMs.

article thumbnail

Pro-Russia group NoName took down multiple France sites, including the French Senate one

Security Affairs

The French Senate’s website was taken offline by a DDoS attack launched by the pro-Russian hacker group NoName. The pro-Russia hacker group NoName is claiming responsibility for a DDoS attack that took the website of the French Senate offline. “Access to the Senate website has been disrupted since this morning, our team is fully mobilized to remedy the malfunctions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Meta Cracks Down on South Asian Cyberespionage Groups

Data Breach Today

South Asian Cyberespionage Actors Used Fake Facebook Profiles to Trick Victims Social media giant Meta took down hundreds of fake Facebook and Instagram accounts used by South Asia advanced persistent threat groups to glean sensitive information and coax users into installing malware. It found activity by threat actors affiliated with India and Pakistan.

IT 144
article thumbnail

Attackers Route Malware Activity Over Popular CDNs

Dark Reading

One way to hide malicious activity is to make it look benign by blending in with regular traffic passing through content delivery networks (CDNs) and cloud service providers, according to a Netskope report.

Cloud 79
article thumbnail

[New Feature] Show Your C-Suite the ROI of Security Awareness Training with KnowBe4 Executive Reports

KnowBe4

Do you spend too much time creating custom security awareness reports for your C-suite or board of directors? If so, we’re happy to share our new KMSAT feature, Executive Reports.

article thumbnail

2 Years After Colonial Pipeline, US Critical Infrastructure Still Not Ready for Ransomware

Dark Reading

Sweeping changes implemented since the May 2021 cyberattack are helping — but more work remains to be done, security experts say.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google and Commoditization: Anyone Need a BackRub?

John Battelle's Searchblog

The first Google logo, when the project was called BackRub and focused on Internet “backlinks.” Lore has it the hand is co-founder Larry Page’s. Once upon a time when search was new, Google came along and put the whole darn Internet in RAM. This was an astonishing (and expensive) feat of engineering at the time – one that gave Google a significant competitive moat.

IT 69
article thumbnail

A Master Class on IT Security: Roger Grimes Teaches You Phishing Mitigation

KnowBe4

Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they’re more targeted, more cunning and more dangerous. And this enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more.

article thumbnail

KnowBe4 Launches Password Kit to Celebrate World Password Day

Dark Reading

KnowBe4 is offering a no-cost password kit to help end users practice good password hygiene and strengthen their defenses against social engineering.

article thumbnail

The Latest Learnings on eDiscovery from the Chicago Master’s Conference

eDiscovery Daily

By Catherine Ostheimer In a packed room at Seyfarth Shaw’s offices in Chicago, eDiscovery, information governance and privacy experts exchanged points of view and insights at The Master’s Conference last Tuesday. New ways of thinking about and managing short message/modern data, investigations, and data privacy were raised in a series of panel discussions.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Judge Spares Former Uber CISO Jail Time Over 2016 Data Breach Charges

Dark Reading

Tell other CISO's "you got a break," judge says in handing down a three-year probation sentence to Joseph Sullivan.

article thumbnail

KrakenLabs' Threat Actors Naming Convention

Outpost24

KrakenLabs' Threat Actors Naming Convention 09.May.2023 Florian Barre Fri, 05/05/2023 - 03:54 Borja Rodriguez - Threat Hunting Team Lead at Outpost24 Threat Intelligence Teaser KrakenLabs has developed a new naming convention that uses poisonous plants to represent the origin and criminal activities of threat actors. This approach provides a creative way to classify different types of threat actors, allowing security professionals to quickly understand the nature and behavior of the threat actor

article thumbnail

The (Security) Cost of Too Much Data Privacy

Dark Reading

The online fraud prevention industry has taken the brunt of increased privacy actions.

Privacy 85
article thumbnail

2023 Adapture Dink and Drink Photos

Adapture

Dink and Drink Photos Thank you to everyone in the Atlanta IT Community and beyond who came together for this awesome event. We dinked, we drinked, and we thinked forward! Together we raised $15,000 for Dubois Integrity Academy! See you next year! (Don’t forget to tag Adapture in your photos!) Watch the highlight video! The post 2023 Adapture Dink and Drink Photos appeared first on Adapture.

IT 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Browser Isolation Adapts to Remote Work, Greater Cloud Usage

Dark Reading

As browsers become the center of many workers' days, isolation technologies shift to protecting the extended enterprise.

Cloud 96
article thumbnail

What’s new in OpenText CX-E Voice

OpenText Information Management

We are pleased to announce the 23.2 release of OpenText™ CX-E Voice. CX-E Voice delivers powerful applications to enhance your existing infrastructure – speech-enabled automated attendant and personal assistant, unified messaging, transcription, voicemail, call center, interactive voice response (IVR) and notify to increase productivity while maintaining secure, compliant business practices.

article thumbnail

Satori Unveils Universal Data Permissions Scanner, A Free Open-Source Tool that Sheds Light on Data Access Authorization

Dark Reading

Addressing data access blindspots commonly faced by enterprises, data security leader launches the first open-source authorization analysis tool to provide universal visibility into data access permissions across multiple data stores.

Access 53
article thumbnail

e-DAT Practice Group Co-Chair Quoted in Recent Article on Videoconference Recordings as Evidence

eDiscovery Law

Julie Anne Halter, a co-chair of the K&L Gates e-Discovery Analysis & Technology (“e-DAT”) Group and a partner in the firm’s Seattle office, was recently quoted in a Bloomberg Law article on the increasing focus of government investigators on videoconference recordings as evidence in their investigations.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft could offer private ChatGPT to businesses for “10 times” the normal cost via arsTechnica

IG Guru

Check out the article here.

75
article thumbnail

e-DAT Practice Group Co-Chair Quoted in Recent Article on Videoconference Recordings as Evidence

eDiscovery Law

Julie Anne Halter, a co-chair of the K&L Gates e-Discovery Analysis & Technology (“e-DAT”) Group and a partner in the firm’s Seattle office, was recently quoted in a Bloomberg Law article on the increasing focus of government investigators on videoconference recordings as evidence in their investigations.

article thumbnail

FTC, DOJ, CFPB and EEOC Release Joint Statement on Enforcement Against Unlawful Use of Automated Systems

Hunton Privacy

On April 25, 2023, officials from the Federal Trade Commission, Consumer Financial Protection Bureau (“CFPB”), Department of Justice’s Civil Rights Division (“DOJCRD”) and the Equal Employment Opportunity Commission (“EEOC”) released a Joint Statement on Enforcement Efforts against Discrimination and Bias in Automated Systems (“Statement”), also sometimes referred to as “artificial intelligence” (“AI”).