Tue.Jul 18, 2023

article thumbnail

Spanish Police End a Decade on the Run for Ukrainian Hacker

Data Breach Today

Police Also Apprehend a Smishing Fraudster and Break Up a Phishing Nexus Spanish law enforcement officers scored several recent wins against cybercriminals this month. Police nabbed a Ukrainian hacker on the run for 10 years, arrested a fraudster known to have run a smishing campaign that amassed 1.2 million euros, and broke up a phishing nexus - all in two weeks.

Phishing 246
article thumbnail

LeakedSource Owner Quit Ashley Madison a Month Before 2015 Hack

Krebs on Security

[This is Part III in a series on research conducted for a recent Hulu documentary on the 2015 hack of marital infidelity website AshleyMadison.com.] In 2019, a Canadian company called Defiant Tech Inc. pleaded guilty to running LeakedSource[.]com , a service that sold access to billions of passwords and other data exposed in countless data breaches.

Passwords 190
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Alert: Exploit Chain Actively Hits ColdFusion

Data Breach Today

Attackers Drop Web Shell; Flaw Is Not Fixed, But Latest Patch Offers Protection Warning: Hackers are actively exploiting a flaw in Adobe's ColdFusion rapid web application development platform to execute malicious code. While Adobe attempted to patch the flaw, researchers say attackers appear to have found a way to bypass it by chaining together multiple flaws.

Security 246
article thumbnail

Introducing: Ruminant AI (You Heard it Here First)

Weissman's World

It is my pleasure and honor to introduce to you a new buzzword. It’s “Ruminant AI,” which I invented just last week and named after animals like cows and sheep that chew on previously ingested material (the cud). Here’s why: AI engines like ChatGPT ingest information from as many sources as they can be provided… Read More » Introducing: Ruminant AI (You Heard it Here First) The post Introducing: Ruminant AI (You Heard it Here First) appeared first on Holly Group.

IT 156
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Netcraft Snags $100M, Names Former DigiCert Executive as CEO

Data Breach Today

Ryan Woodley Doubles Down on US Growth, Real-Time Attack Identification, Takedown Netcraft landed a DigiCert and Progressive Leasing executive as its CEO to expand the company's footprint in the U.S. and better identify cyberattacks in real time. The firm tapped Ryan Woodley to capitalize on the $100 million raised from Spectrum Equity by bringing more scalability via automation.

IT 243

More Trending

article thumbnail

Understanding Your Adversary

Data Breach Today

What Health System Leaders Need to Know About Cyberattackers and Risk Drivers Resilience, not just compliance, is becoming healthcare's primary goal in managing cyber risk. Moving to a more resilient state requires continuous cyber risk management, which requires knowing how an adversary thinks and attacks to ensure that the appropriate safeguards are in place.

article thumbnail

News Alert: HostingAdvice poll finds one in three Americans hacked upon visiting sketchy websites

The Last Watchdog

Gainesville, Fla., July 18, 2022 – Around 30,000 websites get hacked every day , with the majority of those cyberattacks due to human error. This has projected costs associated with cybercrimes to hit the tens of trillions by 2025, highlighting the vital need for web hosts to implement staunch security. A new study by HostingAdvice, the premier authority on web hosting, found that 32% of Americans say they’ve gotten hacked from visiting a sketchy website and of those, 53% got a computer virus

Phishing 100
article thumbnail

Utility Experts Highlight Chinese Threat to US Electric Grid

Data Breach Today

Compromised Equipment, AI Leave US Electric Grid Susceptible to Chinese Attacks China poses a growing threat to U.S. electric infrastructure and could potentially disrupt the power grid, gas and pipeline systems by exploiting compromised equipment and harnessing emerging artificial intelligence technologies for cyberattacks, experts told Congress on Tuesday.

article thumbnail

G2 Summer 2023 Report

Jamf

The phrase “lightning never strikes the same place twice” is a commonly held belief that holds little grounding in science. In fact, lightning can and does strike the same place multiple times and nowhere is that as evident as Jamf solutions once again scoring top marks in G2’s Summer 2023 report.

98
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Why Bitcoin Is No Longer Cybercriminals' Currency of Choice

Data Breach Today

Use of the Token for Cybercrime Fell From 97% to 19% Within 7 Years Cryptocurrency hackers are shifting their focus from bitcoin to other tokens and newer blockchain services such as cross-chain bridges for illicit activity. Why is the oldest crypto token so unappealing to hackers these days, and what do other options offer? Ari Redbord of TRM Labs explained.

article thumbnail

Embracing responsible AI in the move from automation to creation

CGI

As a data scientist and AI practitioner, I am excited to see so many positive AI use cases happening and being leveraged to bring quick information and insights to experts and business people – the potential of the rapidly evolving AI technology is truly limitless.

98
article thumbnail

China Raises Cybersecurity Barriers to Tech Investments

Data Breach Today

Beijing Solidifies Control Over Cyberspace Despite Weakening Investor Sentiment President Xi Jinping directed state agencies to strengthen the government’s control over the internet and information technology sector, potentially discouraging investment in the country. Among the obstacles is a new Counter-Espionage Law focused on investigating foreign companies.

article thumbnail

Microsoft Unsure How Chinese Hackers Stole MSA Key to Breach U.S. Agencies

eSecurity Planet

Microsoft has hardened security following a Chinese hack of U.S. government agency email accounts, but some details remain a mystery. Even as the threat has passed, Microsoft officials are still analyzing how a Chinese threat group was able to access U.S. government accounts using a stolen inactive Microsoft account (MSA) consumer signing key. Chinese hacker group Storm-0558 breached an undisclosed number of email accounts belonging to 25 organizations, including U.S. government agencies, over t

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

FIN8 Group spotted delivering the BlackCat Ransomware

Security Affairs

The cybercrime group FIN8 is using a revamped version of the Sardonic backdoor to deliver the BlackCat ransomware. The financially motivated group FIN8 (aka Syssphinx) was spotted using a revamped version of a backdoor tracked as Sardonic to deliver the BlackCat ransomware (aka Noberus ransomware). Sardonic is a sophisticated backdoor that supports a wide range of features that was designed to evade detection.

article thumbnail

E-commerce and EDI: What’s the difference?

OpenText Information Management

There are lots of different terms used to describe B2B process automation. These terms can be confusing, partly because they are so inter-related. This article will go into detail on these terms to dispel some of the confusion and explain common terms used within B2B process automation, including the differences between Ecommerce and EDI. First, … The post E-commerce and EDI: What’s the difference?

B2B 95
article thumbnail

Virustotal data leak exposed data of some registered customers, including intelligence members

Security Affairs

The online malware scanning service VirusTotal leaked data associated with some registered customers, German newspapers reported. German newspapers Der Spiegel and Der Standard reported that the online malware scanning service VirusTotal leaked data associated with some registered customers. At the end of June, a small file of 313 kilobytes containing a list of 5,600 names was exposed online.

article thumbnail

Fourth Amendment Is Not for Sale Act Goes Back to Congress

WIRED Threat Level

A bill to prevent cops and spies from buying Americans’ data instead of getting a warrant has a fighting chance in the US Congress as lawmakers team up against surveillance overreach.

Sales 89
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FIA World Endurance Championship driver passports leaked

Security Affairs

Le Mans Endurance Management, operating the FIA World Endurance Championship’s website, exposed the data of hundreds of drivers by leaking their IDs and drivers’ licenses, the Cybernews research team has discovered. On June 16th, our researchers came across two misconfigured, meaning publicly exposed, Google Cloud Storage buckets. Both combined, they contained over 1.1 million files.

GDPR 95
article thumbnail

Disabling Self-Driving Cars with a Traffic Cone

Schneier on Security

You can disable a self-driving car by putting a traffic cone on its hood: The group got the idea for the conings by chance. The person claims a few of them walking together one night saw a cone on the hood of an AV, which appeared disabled. They weren’t sure at the time which came first; perhaps someone had placed the cone on the AV’s hood to signify it was disabled rather than the other way around.

IT 84
article thumbnail

Hacking campaign targets sites using WordPress WooCommerce Payments Plugin

Security Affairs

Threat actors are actively exploiting a critical flaw, tracked as CVE-2023-28121, in the WooCommerce Payments WordPress plugin. Threat actors are actively exploiting a recently disclosed critical vulnerability, tracked as CVE-2023-28121 (CVSS score: 9.8), in the WooCommerce Payments WordPress plugin. The flaw is an authentication bypass issue that can be exploited by an unauthenticated attacker to impersonate arbitrary users, including an administrator, potentially leading to the site takeover.

article thumbnail

Linux Ransomware Poses Significant Threat to Critical Infrastructure

Dark Reading

Organizations running Linux distributions need to prepare to defend their systems against ransomware attacks. Steps to ensure resiliency and basics such as access control reduce major disruptions.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

JumpCloud revealed it was hit by a sophisticated attack by a nation-state actor

Security Affairs

Software firm JumpCloud announced it was the victim of a sophisticated cyber attack carried out by a nation-state actor. JumpCloud is a cloud-based directory service platform designed to manage user identities, devices, and applications in a seamless and secure manner. It allows IT administrators to centralize and simplify their identity and access management tasks across various systems and applications.

IT 94
article thumbnail

Microsoft Takes Security Copilot AI Assistant to the Next Level

Dark Reading

The company's AI for security operations centers continues to add integrations, as the industry looks to large language models for progress.

article thumbnail

How to improve employee productivity with BYOD

Jamf

Allowing staff to use the personal devices they love for work has a lot of upsides. Primary among them: well-connected employees are more productive employees.

75
article thumbnail

Sogu, SnowyDrive Malware Spreads, USB-Based Cyberattacks Surge

Dark Reading

Two separate threat actors are using poisoned USB drives to distribute malware in cyber-espionage campaigns targeting organizations across different sectors and geographies.

73
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Argentina Personal Data Protection Bill Sent to Congress

Hunton Privacy

Pablo A. Palazzi from Allende & Brea in Argentina reports that on June 30, 2023, the Argentine Executive Branch sent the new proposed Personal Data Protection Bill (the “Bill”) to the National Congress for consideration. The Bill was drafted by the Argentine Data Protection Authority ( Agencia de Acceso a la Información Pública , or “AAIP”) and seeks to amend the current Personal Data Protection Act (Law No. 25,326 of 2000).

article thumbnail

Attackers Pummel Millions of Websites via Critical WooCommerce Payments Flaw

Dark Reading

A barrage of targeted attacks against vulnerable installations peaked at 1.3 million against 157,000 sites over the weekend, aimed at unauthenticated code execution.

74
article thumbnail

eIDAS 2.0 REGULATION WILL CHANGE IDP USE CASES INCLUDING ID CAPTURE IN THE EU

Info Source

By Petra Beck, Senior Analyst Capture Software, Infosource Key Takeaways The expanded eIDAS (electronic Identification, Authentication and Trust Services) 2.0 regulation is entering implementation stage in the EU. It will become mandatory for government agencies and businesses in select verticals within the next 2 years. The expanded regulation has far reaching implications for software vendors, service providers and public and private organisations with a focus on Government to Consumer (G2C) a