Tue.May 30, 2023

article thumbnail

Gouda Hacker: Charges Tie to Ransomware Hit Affecting Cheese

Data Breach Today

Mikhail Matveev Indictment Shows Police Tracking Top Alleged Ransomware Affiliates How many hackers can claim to have caused a national cheese shortage, not least in the Gouda-loving Netherlands? Enter Mikhail Matveev, a Russian national who's been indicted for wielding not one but three strains of ransomware, in what experts say is a needed focus on ransomware affiliates.

article thumbnail

Discord Admins Hacked by Malicious Bookmarks

Krebs on Security

A number of Discord communities focused on cryptocurrency have been hacked this past month after their administrators were tricked into running malicious Javascript code disguised as a Web browser bookmark. This attack involves malicious Javascript that is added to one’s browser by dragging a component from a web page to one’s browser bookmarks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Invoice and CEO Scams Dominate Fraud Affecting Businesses

Data Breach Today

UK Financial Services Firms Record $1.5 Billion in Losses Last Year Due to Fraud Losses to fraud reported by Britain's financial services sector exceeded $1.5 billion in 2022, declining by 8% from 2021, says trade association UK Finance. About 40% of losses tied to authorized push payment fraud, in which victims get tricked into transferring funds to attackers.

article thumbnail

Pending Updates to Regulations of Archives in Colombia

AIIM

This article was written by AIIM Florida Chapter Board Member Alvaro Arias Cruz , District Director of Archives of Bogotá. It was originally published in the AIIM Florida Chapter Newsletter in April 2023. Learn more about the AIIM Florida Chapter at [link]. Colombia has one of the most robust and comprehensive archives laws in the Latin American region, identified as the General Archives Law (Law 594 of 2000).

Archiving 141
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Synopsys Extends Lead in Gartner MQ for App Security Testing

Data Breach Today

Snyk Rises to Leader, HCL Software Falls to Challenger as Supply Chain Takes Focus Synopsys stands head and shoulders above the competition in Gartner's application security testing rankings, with Snyk rising and HCL Software falling from the leaders category. Longtime app security players Veracode, Checkmarx and OpenText joined Synopsys and Snyk atop the Gartner Magic Quadrant.

Security 130

More Trending

article thumbnail

Apple Patched System Integrity Protection Bypass Vuln

Data Breach Today

Microsoft Researchers Say Flaw Allowed Hackers to Load Undetectable Malware A now-patched macOS vulnerability allows attackers with root access to bypass a kernel-level security feature that prevents malicious software from modifying protected files. An attacker could use the exploit to load malware itself shielded by Apple's System Integrity Protection.

Access 130
article thumbnail

How Generative AI Will Remake Cybersecurity

eSecurity Planet

In March, Microsoft announced its Security Copilot service. The software giant built the technology on cutting-edge generative AI – such as large language models (LLMs) – that power applications like ChatGPT. In a blog post , Microsoft boasted that the Security Copilot was the “first security product to enable defenders to move at the speed and scale of AI.

article thumbnail

Microsoft Revises Bing Cookie Policy in France

Data Breach Today

Computing Giant Avoid 60,000 Euro Daily Fines from French Privacy Regulator Microsoft Ireland revised its cookie policy for the Bing search engine in France after it received a reprimand from the country's data protection agency for privacy violations. The revision ensures Microsoft will not pay an additi0oanl 60,000 euro fine for each day of noncompliance.

Privacy 130
article thumbnail

421M Spyware Apps Downloaded Through Google Play

Dark Reading

A Trojan SDK snuck past Google Play protections to infest 101 Android applications, bent on exfiltrating infected device data.

128
128
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Where Hospitals Are Still More Cyber Reactive Than Proactive

Data Breach Today

Steve Low of KLAS Research and Ed Gaudet of Censinet Discuss New Benchmarking Study Many hospitals are still more reactive than proactive in terms of embracing recommended best practices that can advance their cybersecurity maturity level, said Steve Low, president of KLAS Research, and Ed Gaudet, CEO of consulting firm Censinet, who discuss findings of a recent benchmarking study.

article thumbnail

FTC Asserts COPPA Does Not Preempt State Laws

Hunton Privacy

On May 22, 2023, the Federal Trade Commission filed an amicus brief in support of a ruling by the United States Court of Appeals for the Ninth Circuit that COPPA does not preempt state laws claims that are consistent with COPPA. The brief was filed in the case of Jones v. Google. The lawsuit, which was brought by parents on behalf of their children, alleges that video sharing platform YouTube, which is owned by Google, and specific YouTube channel owners violated state laws by collecting persona

Privacy 106
article thumbnail

Ediscovery Best Practices for Slack and MS Teams from Information Governance Through Litigation

Hanzo Learning Center

Workplace collaboration tools like Slack and MS Teams have become ubiquitous in many organizations. However, they also present unique challenges for data governance and ediscovery in the event of litigation. To avoid potential legal issues and fines, it is crucial to have a tailored retention policy, acceptable use policy, and employee training in place.

article thumbnail

Digitizing Records: Quality Management

National Archives Records Express

Digitization project at Archives 1 (Room 18W2) National Archives Identifier: 184341402 This is our fourth blog post taking a deep dive into 36 CFR 1236 Subpart E–Digitizing Permanent Records , which takes effect next week. In this post, we address quality management (QM) which includes the quality assurance (QA) and quality control (QC) requirements provided in the regulation.

Metadata 101
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

6 unbeatable benefits of Collibra Data Quality & Observability pushdown

Collibra

Are you relying on data for reporting and analytics but questioning the accuracy of the data? Are you spending a fortune on testing the quality of your data? Are you making decisions based on obsolete data? Are you concerned about the additional cost of quality as your business scales up? Data quality challenges As a data user, you want your data to be high quality and ready for use as soon as it arrives.

Cloud 98
article thumbnail

Beware of the new phishing technique “file archiver in the browser” that exploits zip domains

Security Affairs

“file archiver in the browser” is a new phishing technique that can be exploited by phishers when victims visit a.ZIP domain. A new phishing technique called “file archiver in the browser” can be used by phishers to “emulate” a file archiver software in a web browser when a victim visits a.ZIP domain. The security researcher mr.d0x detailed the new attack technique.

article thumbnail

Brute-Forcing a Fingerprint Reader

Schneier on Security

It’s neither hard nor expensive : Unlike password authentication, which requires a direct match between what is inputted and what’s stored in a database, fingerprint authentication determines a match using a reference threshold. As a result, a successful fingerprint brute-force attack requires only that an inputted image provides an acceptable approximation of an image in the fingerprint database.

article thumbnail

Tips from Customer Panel on Combining Security Awareness and Compliance Culture Training

KnowBe4

At KB4-CON 2023, we had a customer panel that I hosted discussing the connection between security and compliance training content when trying to change organizational security culture.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Human-Assisted CAPTCHA-Cracking Services Supercharge Shopper Bots

Dark Reading

On-demand human solvers are now augmenting automated website cyberattacks, offering a better way around tougher anti-bot puzzles.

106
106
article thumbnail

“Magic Link” Phishing Attacks Scamming Users With Fake McAfee Renewals

KnowBe4

Threat actors are using encoded phishing links to evade security filters, according to Jeremy Fuchs at Avanan. The phishing emails purport to be notifications from McAfee informing the user that they need to renew their subscription.

article thumbnail

Pentagon Leaks Emphasize the Need for a Trusted Workforce

Dark Reading

Tightening access controls and security clearance alone won't prevent insider threat risks motivated by lack of trust or loyalty.

Risk 104
article thumbnail

PyPI enforces 2FA authentication to prevent maintainers’ account takeover

Security Affairs

PyPI is going to enforce two-factor authentication (2FA) for all project maintainers by the end of this year over security concerns. Due to security concerns, PyPI will be mandating the use of two-factor authentication (2FA) for all project maintainers by the end of this year. Over the past few years, there has been a rise in supply chain attacks targeting the Python software repository.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Undetected Attacks Against Middle East Targets Conducted Since 2020

Dark Reading

Targeted attacks against Saudi Arabia and other Middle East nations have been detected with a tool that's been in the wild since 2020.

101
101
article thumbnail

BrutePrint Attack allows to unlock smartphones with brute-forcing fingerprint

Security Affairs

Researchers devised an attack technique, dubbed BrutePrint Attack, that allows brute-forcing fingerprints on smartphones to bypass authentication. Researchers have devised an attack technique, dubbed BrutePrint, that allows to brute-force fingerprints on smartphones to bypass user authentication. The attack technique exploits two zero-day vulnerabilities, called Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL), in the smartphone fingerprint authentication (SFA) framework.

article thumbnail

[EPIC AI FAIL] Lawyer cites fake cases invented by ChatGPT

KnowBe4

Found this highly amusing article: Legal Twitter is having tremendous fun right now reviewing the latest documents from the case Mata v. Avianca, Inc. (1:22-cv-01461).

article thumbnail

WebSphere Application Server support

IBM Big Data Hub

IBM continues to be committed to supporting your journey with the WebSphere platform. There is no planned end-of-support date for WebSphere 8.5.5 and 9.0.5. IBM intends on supporting these WebSphere releases beyond Oracle’s stated extended support date for Java 8. For more details, see the WebSphere Application Server traditional Lifecycle. The post WebSphere Application Server support appeared first on IBM Blog.

80
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FTC Publishes Proposed Order Against Ed Tech Provider Edmodo

Hunton Privacy

On May 22, 2023, the Federal Trade Commission announced a proposed order against education technology provider Edmodo, LLC (“Edmodo”) for violations of the Children’s Online Privacy Protection Rule (“COPPA Rule”) and Section 5 of the FTC Act. As alleged in the FTC’s complaint , until approximately September 2022, Edmodo offered a platform for virtual classes to schools and teachers in the United States and collected the personal information of students ( e.g. , name, email address, date of birth

article thumbnail

IBM Tech Now: May 30, 2023

IBM Big Data Hub

​Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published. IBM Tech Now: Episode 77 This episode, we’re covering the following topics: IBM Watson Code Assistant IBM Hybrid Cloud Mesh IBM Event Automation Stay plugged in You can check out the IBM Blog Announcements for a full rundown of all cloud news, ann

Cloud 72
article thumbnail

Spotlight on 2023 Dan Kaminsky Fellow: Dr. Gus Andrews

Dark Reading

As the second Kaminsky Fellow, Dr. Andrews will study the use of threat intelligence to track campaigns against the human rights community.

72