Thu.May 11, 2023

article thumbnail

Data Breach Roundup: Attempted Extortion Attack on Dragos

Data Breach Today

Also: Twitter Hacker Pleads Guilty, Seoul National University Hospital and Sysco In this week's data breach, the spotlight was on Dragos, a guilty plea from a Twitter hacker and cryptocurrency thief and North Korean hackers. Also, Sysco, a Ukrainian border truck queuing system and an update on Western Digital. Plus, a new tool for decrypting partially encrypted files.

article thumbnail

RSAC Fireside Chat: Keeping persistent email threats at bay requires deeper, cloud-layer vigilance

The Last Watchdog

Email remains by far the no.1 business communications tool. Meanwhile, weaponized email continues to pose a clear and present threat to all businesses. Related: The need for timely training At RSA Conference 2023 , I learned all about a new category of email security — referred to as integrated cloud email security ( ICES ) – that is helping companies more effectively keep email threats in check.

Cloud 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Parliament Rejects EU-US Data Framework

Data Breach Today

Non-Binding Vote Urges European Commission to Re-Open Negotations With US The European Parliament called on the European Commission to reject a draft legal framework facilitating trans-Atlantic commercial data flows in a non-binding vote. A majority said the EU-U.S. Data Privacy Framework fails to protect European citizens from American bulk online surveillance.

article thumbnail

European Parliament Adopts EU-U.S. Data Privacy Framework Resolution

Hunton Privacy

On May 11, 2023, at a plenary session, the European Parliament voted to adopt a resolution on the adequacy of the protection afforded by the EU-U.S. Data Privacy Framework (the “Framework”) which calls on the European Commission (the “Commission”) to continue negotiations with its U.S. counterparts with the aim of creating a mechanism that would ensure equivalence and provide the adequate level of protection required by EU data protection law.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Elementary Data Breach Questions Remain, My Dear Capita

Data Breach Today

Beyond $25M in Estimated Cleanup Costs, The Game Remains Afoot for Victim Details In the annals of attempting to downplay the impact of a data breach, here's a new one: British outsourcing giant Capita says the hackers who hit it - steling data pertaining to customers, suppliers and employees - accessed "less than 0.1% of its server estate.

More Trending

article thumbnail

Hacking with a Conscience: Exploring the World of Ethical Hacking

Data Breach Today

2 Experts Discuss Why Ethical Hackers Are Key Assets to Security Teams Two experts from HackerOne - Marten Mickos, CEO, and Alex Rice, CTO and co-founder - provide insights on the similarities and differences between ethical hackers and in-house red teams, as well as the misconceptions around engaging with ethical hackers.

Security 157
article thumbnail

Building Trustworthy AI

Schneier on Security

We will all soon get into the habit of using AI tools for help with everyday problems and tasks. We should get in the habit of questioning the motives, incentives, and capabilities behind them, too. Imagine you’re using an AI chatbot to plan a vacation. Did it suggest a particular resort because it knows your preferences, or because the company is getting a kickback from the hotel chain?

article thumbnail

Feds Warn of Rise in Attacks Involving Veeam Software Flaw

Data Breach Today

Alert Concerns Vendor's Veeam Backup & Replication Product Federal authorities are warning healthcare sector entities of a rise in cyberattacks against Veeam's Backup & Replication software. Some incidents appear tied to exploitation of a high-severity vulnerability in the vendor's software in that was disclosed in March.

144
144
article thumbnail

How to Tackle the Cybersecurity Careers Gap

Lenny Zeltser

Too many people are unsure how to enter or grow in the cybersecurity industry. It's a relatively young field, and we haven’t done a good job of defining what it means to have a career in it. Hiring managers who are worried about finding candidates because of the much-discussed cybersecurity skills gap should consider the underlying issue, which I'd like to call the cybersecurity careers gap.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Why Datadog and Rubrik Are In Talks to Buy Laminar for $200M

Data Breach Today

Laminar Has Landed Multiple M&A Suitors Just 18 Months After Emerging from Stealth The purchase of promising early-stage startup Laminar by a large tech vendor would match many M&A deals seen in 2023. The downturn has made it tough for small startups to raise additional funding at an increased valuation, while the push for profitability has left big firms open to only tuck-in M&A.

IT 144
article thumbnail

Multiple Ransomware Groups Adapt Babuk Code to Target ESXi VMs

Dark Reading

Two years ago, a popular ransomware-as-a-service group's source code got leaked. Now other ransomware groups are using it for their own purposes.

article thumbnail

Akamai Lays Off Nearly 300 Staff to Hit Profitability Goals

Data Breach Today

Digital Experience Vendor Pursues $40M in Cost Cuts by Eliminating 3% of Workforce Akamai will shrink its workforce by 3% as its shifts resources from its shrinking content delivery business to growth areas in cloud computing and security. The company will shrink its 9,960-person staff by 299 positions as it looks to sustain its profitability levels despite economic headwinds.

Cloud 144
article thumbnail

Dragos Employee Hacked, Revealing Ransomware, Extortion Scheme

Dark Reading

Attackers compromised the personal email of a new employee and, when the initial attack failed, attempted through socially engineered messages to get the company to pay them off.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cryptohack Roundup: $34M MEV Bot Attack, $1.2M BitFlyer Fine

Data Breach Today

Also: Insider Trading, the IRS Trains Up Ukraine and Proposed Cybersec Regulations A hacker made $34 million from MEV bot attacks, NYDFS penalized Bitflyer for lax cybersecurity, Ishan Wahi was sentenced in the Coinbase insider trading case, the IRS is training Ukraine in blockchain forensics and the New York AG proposed a crypto cybersecurity bill.

article thumbnail

A zero-click vulnerability in Windows allows stealing NTLM credentials

Security Affairs

Researchers shared technical details about a flaw in Windows MSHTML platform, tracked as CVE-2023-29324 , that could be abused to bypass security protections. Cybersecurity researchers have shared details about a now-patched security flaw, tracked as CVE-2023-29324 (CVSS score: 6.5), in Windows MSHTML platform. An attacker can exploit the vulnerability by crafting a malicious URL that would evade zone checks. “An attacker can craft a malicious URL that would evade zone checks, resultin

article thumbnail

Texas Senate Passes Texas Data Privacy and Security Act

Hunton Privacy

On May 10, 2023, the Texas Senate passed H.B. 4 , also known as the Texas Data Privacy and Security Act (“TDPSA”). The TDPSA now heads to a conference committee between the Texas Senate and House to rectify the differences between the Senate and House versions. If the TDPSA is signed into law, Texas could become the tenth state to enact comprehensive privacy legislation.

article thumbnail

Eurovision Organisers Concerned About the Threat of Cyber Attacks

IT Governance

The Eurovision Song Contest is set to take place in Liverpool this weekend, but amid the pageantry and political jostling, organisers are concerned about the threat of a cyber attack. Broadcasters at the BBC have said it’s their “biggest worry” ahead of the event, which is expected to be watched by more than 200 million people. Cyber attacks are becoming increasingly common with live broadcasts, but the political nature of the Eurovision Song Contest – and this year’s one in particular – h

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Experts share details of five flaws that can be chained to hack Netgear RAX30 Routers 

Security Affairs

Researchers disclosed the details of five vulnerabilities that can be chained to take over some Netgear router models. Industrial and IoT cybersecurity firm Claroty disclosed technical details of five vulnerabilities that be exploited to hack some Netgear router models. “Team82 disclosed five vulnerabilities in NETGEAR’s Nighthawk RAX30 routers as part of its research and participation in last December’s Pwn2Own Toronto hacking competition.” reads the advisory published by the sec

article thumbnail

Billy Corgan Paid Off Hacker Who Threatened to Leak New Smashing Pumpkins Songs

Dark Reading

Corgan got FBI involved to track down the cybercriminal, who had stolen from other artists as well, he said.

112
112
article thumbnail

Google will provide dark web monitoring to all US Gmail users and more

Security Affairs

Google announced the opening of the dark web monitoring report security feature to all Gmail users in the United States. Google is going to offer dark web monitoring to all U.S. Gmail users, the feature allows them to search for their email addresses on the dark web. Dark web scans for Gmail address was previously only available to Google One subscribers in the US.

article thumbnail

Microsoft Authenticator to Enforce Number Matching

Dark Reading

As a way to enhance the security of MFA, Microsoft will require users to authorize login attempts by entering a numeric code into the Microsoft Authenticator app.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A flaw in the Essential ‘Addons for Elementor’ WordPress plugin poses 1M sites at risk of hacking

Security Affairs

Experts warn of an unauthenticated privilege escalation flaw in the popular Essential ‘Addons for Elementor’ WordPress plugin. Essential ‘Addons for Elementor’ WordPress plugin is a collection of 90+ creative elements and extensions Enhance that allow admins to enhance Elementor page building experience. The plugin has more than one million active installations.

Risk 91
article thumbnail

U.K. Advance Fee Scams Increase by Over 600% in Less Than Two Years

KnowBe4

New data from the U.K.’s Office of National Statistics shows that this often overlooked scam has grown significantly in interest – likely because it pays off.

IT 86
article thumbnail

North Korea-linked APT breached the Seoul National University Hospital

Security Affairs

The Korean National Police Agency (KNPA) warns that a North Korea-linked APT group had breached the Seoul National University Hospital (SNUH). The Korean National Police Agency (KNPA) revealed that a North Korea-linked APT group has breached one of the largest hospitals in the country, the Seoul National University Hospital (SNUH). The security breach took place between May and June 2021 and was aimed at stealing sensitive medical information and personal details.

article thumbnail

Why Economic Downturns Put Innovation at Risk & Threaten Cyber Safety

Dark Reading

Supplementing staff by hiring hackers to seek holes in a company's defense makes economic sense in a downturn. Could they be cybersecurity's unlikely heroes in a recession?

Risk 81
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

We are in the final! Please vote for Security Affairs and Pierluigi Paganini

Security Affairs

Dear readers and friends, once again we are in the final of the European Cybersecurity Blogger Awards 2022 and I need your support. Please help me in reaching this new target. I work hard every day to provide updated news to students, passionate readers, and of course, cyber security professionals. I do it for passion and it is a pleasure for me to share with you my experience and lessons learned on the field.

article thumbnail

Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains

Dark Reading

New data shows cyberattacks targeting software supply chains will cost the global economy $80.6 billion annually by 2026.

96
article thumbnail

EU Moving Closer to an AI Act – Key Areas of Impact for Life Sciences/MedTech Companies

Data Matters

The European Union is moving closer to adopting the first major legislation to horizontally regulate artificial intelligence. Today, the European Parliament ( Parliament ) reached a provisional agreement on its internal position on the draft Artificial Intelligence Regulation ( AI Act ). The text will be adopted by Parliament committees in the coming weeks and by the Parliament plenary in June.