Wed.Aug 23, 2023

article thumbnail

Jury Finds 2 Teenagers Perpetrated Lapsus$ Group Hacks

Data Breach Today

Rockstar, Uber, Okta, Microsoft and Other Big-Name Players Fell to Group's Attacks A British jury found that two teenagers had been members of the Lapsus$ hacking group that attacked Uber, Okta, Rockstar and other organizations. Lapsus$ earned notoriety for stealing data via low-complexity attacks and holding it to ransom, taunting victims and leaking stolen data.

IT 245
article thumbnail

Spear Phishing Prevention: 10 Ways to Protect Your Organization

eSecurity Planet

Spear phishing is a more targeted and effective phishing technique that attempts to exploit specific individuals or groups within an organization. While phishing uses a broader range of tactics, such as mass emailing to random recipients, spear phishing is often well-researched and tailored to high-value targets. A typical spear phishing attack follows a familiar pattern of emails with attachments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MOVEit Health Data Breach Tally Keeps Growing

Data Breach Today

More Hacks Compromising Protected Health Info Being Reported to Regulators The tally of entities notifying federal regulators about mega health data breaches involving Clop cybercrime group hacks on Progress Software's MOVEit file transfer application keeps growing, and millions of additional individuals have been affected.

article thumbnail

How we used generative AI to run a generative AI hackathon

Collibra

As the data intelligence company, we’ve long anticipated broad adoption of AI, and Collibrians with data science and machine learning expertise have been working diligently on ways to apply AI/ML. Disruptive technologies such as ChatGPT , Bard , and other generative AI technologies suddenly made AI accessible to everyone, regardless of their level of data science expertise.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Threat Actor Targets Hong Kong With Korplug Backdoor

Data Breach Today

Previously Unknown APT Uses Supply Chain Hack to Reach Victims A previously unknown threat group orchestrated a supply chain attack using a Chinese encryption app to target victims mostly located in Hong Kong. Korplug, the backdoor incorporated into the encryption app, "is known to be used by multiple APT groups," Symantec says.

More Trending

article thumbnail

US FBI Urges Action on Barracuda ESG Hacking

Data Breach Today

Chinese Hackers Adapt to Countermeaures The U.S. FBI urged the removal of email security appliances made by Barracuda Networks in a Wednesday flash alert, injecting fresh urgency in a push to stymie what's been called the broadest Chinese cyber spying campaign in years. Mandiant linked the hack to Beijing with "high confidence.

Security 240
article thumbnail

Data Breach Costs in Healthcare Rise 53% to More than Double the Average

KnowBe4

It appears that one of the most regulated industries also holds the title for the highest average data breach costs – coming in at just under $11 million per breach.

article thumbnail

Speed Demons: Ransomware Attackers' Dwell Time Shrinks

Data Breach Today

Seeking Every Advantage, Most Ransomware Groups Attack Outside of Business Hours Ransomware-wielding hackers are moving faster than ever to pull the trigger on malicious encryption - but they could be bumping up against the limits of how fast they can go, say security researchers at Sophos. Better endpoint detection may be spurring ransomware hackers into acting faster.

article thumbnail

Social Engineering Is the Number One Cybersecurity Problem by Far

KnowBe4

The number one way that hackers and malware compromise people, devices, and networks is social engineering. No one argues that anymore, but it was not always known or discussed that way. Even though social engineering has been the number one way hackers and malware exploit people and devices since the beginning of network computers, it was not generally known or discussed as such until just five or 10 years ago.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Carderbee APT targets Hong Kong orgs via supply chain attacks

Security Affairs

A previously unknown APT group, tracked as Carderbee, was behind a supply chain attack against Hong Kong organizations. Symantec Threat Hunter Team reported that a previously unknown APT group, tracked as Carderbee, used a malware-laced version of the legitimate Cobra DocGuard software to carry out a supply chain attack aimed at organizations in Hong Kong.

article thumbnail

Deceptive Links, Brand Impersonation, and Identity Deception Top the List of Phishing Attack Tactics

KnowBe4

As phishing attacks continue to dominate as an initial attack vector, new data shows that attackers maintain the use of tried-and-true techniques as the means to successful attacks.

article thumbnail

December’s Reimagining Democracy Workshop

Schneier on Security

Imagine that we’ve all—all of us, all of society—landed on some alien planet, and we have to form a government: clean slate. We don’t have any legacy systems from the US or any other country. We don’t have any special or unique interests to perturb our thinking. How would we govern ourselves? It’s unlikely that we would use the systems we have today.

article thumbnail

Ransomware Attacks Rise 69% and 1500 Organizations Feel the Hurt

KnowBe4

A new report from Rapid7 has found that the number of ransomware attacks increased by 69% in the first half of 2023. Rapid7 incident response data found that at least 1500 organizations were attacked by ransomware during this period.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

How to Talk to Your Kids About Social Media and Mental Health

WIRED Threat Level

Here’s what the science really says about teens and screens—and how to start the conversation with young people of any age.

article thumbnail

Data Breaches Involving Social Engineering Attacks Take Longer to Identify and Contain

KnowBe4

Continuing coverage of IBM’s recently-released Cost of a Data Breach report, we focus on the impact attacks involving social engineering have on data breach costs.

article thumbnail

FBI Warns of Cryptocurrency Heists by North Korea's Lazarus Group

Dark Reading

The most recent stolen bitcoin comes just after three major operations occurred in June, with millions stolen in each heist.

86
article thumbnail

Scammers Impersonate the Australian Tax Office

KnowBe4

The Australian Taxation Office (ATO) has warned of an increase in SMS and email phishing attacks targeting taxpayers, News.com.au reports. The scams attempt to steal credentials or personal information in order to commit identity theft.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Threat Actor Exploits Zero-Day in WinRAR to Target Crypto Accounts

Dark Reading

Attacks targeting the now-patched bug have been going on since at least April 2023, security vendor says.

article thumbnail

Phishing Tops the List as the Most Costly Initial Attack Vector in Data Breaches

KnowBe4

After you come to grips with the massive average cost of a data breach to an enterprise organization measured in the millions, it’s time to look at the factors that increase – and lower – that cost.

article thumbnail

eSentire Labs Open Sources Project to Monitor LLMs

Dark Reading

The eSentire LLM Gateway provides monitoring and governance of ChatGPT and other Large Language Models being used in the organization.

article thumbnail

Phishing Campaigns Targeting Microsoft Login Credentials Jump an Unprecedented 6100%

KnowBe4

Monitoring of traffic to phishing pages hosted on the free hosting service Cloudflare R2 show an unheard of spike of 6100%, many going undetected by many security solutions due to the evasive techniques used.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Ransomware Reaches New Heights

Dark Reading

It's not going anywhere: Easy-to-exploit bugs like MOVEit, leaks of stolen data, and rapid-fire escalation are keeping ransomware attacks as painful as ever.

article thumbnail

LinkedIn Deception: How a Chinese Spy Tricked Thousands of UK Officials

KnowBe4

In last few years, cyber espionage has taken a new form. A recent investigation by The Times has unveiled a Chinese intelligence officer's extensive use of LinkedIn to target UK officials. Operating under the alias "Robin Zhang," this spy has been luring thousands of officials, scientists, and academics to hand over state secrets and sensitive technology information.

70
article thumbnail

5 Early Warning Indicators That Are Key to Protecting National Secrets

Dark Reading

The Defense Department must modernize user activity monitoring by prioritizing data that can be used early to proactively mitigate insider risk.

Risk 71
article thumbnail

Why data governance is essential for enterprise AI

IBM Big Data Hub

The recent success of artificial intelligence based large language models has pushed the market to think more ambitiously about how AI could transform many enterprise processes. However, consumers and regulators have also become increasingly concerned with the safety of both their data and the AI models themselves. Safe, widespread AI adoption will require us to embrace AI Governance across the data lifecycle in order to provide confidence to consumers, enterprises, and regulators.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Name That Toon: Swift as an Arrow

Dark Reading

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

77
article thumbnail

How to Search for Numbers and Special Characters in Axcelerate 

OpenText Information Management

When I was a litigation paralegal, it was always a hassle trying to search records within an eDiscovery database for terms that included numbers and symbols – an issue that came up quite frequently. Searching for currency values, product numbers, serial numbers, patent numbers, and so on, are common. How does your eDiscovery software handle … The post How to Search for Numbers and Special Characters in Axcelerate appeared first on OpenText Blogs.

article thumbnail

Attackers Dangle AI-Based Facebook Ad Lures to Hijack Business Accounts

Dark Reading

The offending ads and pages leveraged interest in AI to spread a malicious credential-stealing browser extension.

71