Fri.Sep 01, 2023

article thumbnail

Tech Companies on Precipice of UK Online Safety Bill

Data Breach Today

Bill 'Poses a serious threat' to end-to-end encryption, Apple Says U.S. tech companies are stepping up warnings to British lawmakers over a government proposal they say will fatally weaken security and privacy protections for users. The House of Lords is set to return the bill to the House of Commons after a third reading scheduled to begin Wednesday.

article thumbnail

Why is.US Being Used to Phish So Many of Us?

Krebs on Security

Domain names ending in “ US ” — the top-level domain for the United States — are among the most prevalent in phishing scams, new research shows. This is noteworthy because.US is overseen by the U.S. government, which is frequently the target of phishing domains ending in.US. Also,US domains are only supposed to be available to U.S. citizens and to those who can demonstrate that they have a physical presence in the United States.US is the “country code top-level doma

Phishing 228
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: Identity Security Special

Data Breach Today

Identity Security Expert Jeremy Grant on AI and Digital Identity Risks In the latest weekly update, Jeremy Grant of Venable joins three ISMG editors to discuss why the U.S. government is taking a back seat on digital identity issues, the risks of artificial intelligence, and takeaways from the U.S. Cyber Safety Review Board's recent report on cybercrime group Lapsus$.

article thumbnail

MSSQL Databases Under Fire From FreeWorld Ransomware

Dark Reading

The sophisticated attacks, tracked as DB#JAMMER, run shell commands to impair defenses and deploy tools to establish persistence on the host.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Experts Urge Immediate Juniper Firewall and Switch Patching

Data Breach Today

Attackers Actively Attempting to Chain Vulnerabilities for Remote Code Execution Security experts are warning organizations with Juniper Networks SRX firewalls and EX switches to update them immediately to patch multiple vulnerabilities attackers have been targeting to remotely execute code, and which may allow them to pivot to internal networks.

Security 277

More Trending

article thumbnail

'Earth Estries' APT Hackers Are Cyberespionage Pros

Data Breach Today

Trend Micro Calls the Group Well-Resourced and Sophisticated A cyberespionage campaign by a well-funded but lesser-known hacking group is using previously unknown backdoors to hack government agencies and tech companies. The group, dubbed Earth Estries by Trend Micro, appears well practiced in cA cyberespionage campaign by a well-funded but lesser-known hacking group is using previously unknown backdoors to hack government agencies and tech companies.

article thumbnail

Researchers released a free decryptor for the Key Group ransomware

Security Affairs

Researchers released a free decryptor for the Key Group ransomware that allows victims to recover their data without paying a ransom. Threat intelligence firm EclecticIQ released a free decryption tool for the Key Group ransomware (aka keygroup777) that allows victims to recover their data without paying a ransom. The Key Group ransomware gang has been active since at least January 2023.

article thumbnail

Threat Modeling Essentials for Generative AI in Healthcare

Data Breach Today

It's critical for healthcare sector entities considering - or already using - generative AI applications to create an extensive threat modeling infrastructure and understand all attack vectors, said Mervyn Chapman, principal consultant at consulting and managed services firm Ahead.

IT 265
article thumbnail

Types of cyberthreats

IBM Big Data Hub

In the simplest sense, a cybersecurity threat, or cyberthreat, is an indication that a hacker or malicious actor is attempting to gain unauthorized access to a network for the purpose of launching a cyberattack. Cyberthreats can range from the obvious, such as an email from a foreign potentate offering a small fortune if you’ll just provide your bank account number, to the deviously stealthy, such as a line of malicious code that sneaks past cyberdefenses and lives on the network for month

Phishing 117
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

UK Cyber Agency Warns of Prompt Injection Attacks in AI

Data Breach Today

Hackers Can Deploy Prompt Injection Attacks to Gain Access to Confidential Data Threat actors are manipulating the technology behind large language model chatbots to access confidential information, generate offensive content and "trigger unintended consequences," warns the U.K. National Cyber Security Center. Prompt injection attacks are "extremely difficult" to mitigate.

Access 183
article thumbnail

NYC Subway Disables Trip-History Feature Over Tap-and-Go Privacy Concerns

Dark Reading

The move by New York's Metropolitan Transit Authority (MTA) follows a report that showed how easy it is for someone to pull up another individual's seven-day ride history through the One Metro New York (OMNY) website.

Privacy 113
article thumbnail

LIVE Webinar | What Not To Do: Avoiding GRC Red Flags for a Successful Business Case

Data Breach Today

forecasted spending of $47.

265
265
article thumbnail

Talos wars of customizations of the open-source info stealer SapphireStealer

Security Affairs

Cisco reported that multiple threat actors are customizing the SapphireStealer information stealer after the leak of its source code. Cisco Talos researchers reported that multiple threat actors have created their own version of the SapphireStealer after that the source code of the stealer was released on GitHub. SapphireStealer is an open-source information stealer written in.NET, which is available in multiple public malware repositories since its public release in December 2022.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

New Adversary in the Middle Platform Circumvents MFA Protections “At Scale”

KnowBe4

As Phishing as a Service (PhaaS) kits continue to evolve, news like recent attacks using the Greatness toolkit demonstrate how easy it is for novice attackers to access accounts despite multi-factor authentication (MFA) being enabled.

Phishing 112
article thumbnail

Spyware Vendor Hacked

Schneier on Security

A Brazilian spyware app vendor was hacked by activists: In an undated note seen by TechCrunch, the unnamed hackers described how they found and exploited several security vulnerabilities that allowed them to compromise WebDetetive’s servers and access its user databases. By exploiting other flaws in the spyware maker’s web dashboard—used by abusers to access the stolen phone data of their victims—the hackers said they enumerated and downloaded every dashboard record, including every

Access 107
article thumbnail

Cyberattacks Targeting Government Agencies and Institutions Increases in Q2 by 40%

KnowBe4

New data shows a massive uptick in attacks across all industries, but a particularly worrisome growth in interest in targeting the public sector – and the indicators of who’s responsible may surprise you.

article thumbnail

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs

Dark Reading

The Security and Exchange Commission's Proposed Rule for Public Companies (PPRC) is ambiguous.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New “Early Warning” System in the U.K. Tips Off Ransomware Targets

KnowBe4

British Intelligence has come up with a potentially very effective means to disrupt ransomware attacks, but there seems to still be a few kinks in the system.

article thumbnail

US Government Denies Blocking Sales of AI Chips to Middle East

Dark Reading

Nvidia and AMD do face expanded export rules for their A100 and H100 artificial intelligence (AI) chips in the Middle East, but it's not yet clear why.

article thumbnail

Nearly One-Quarter of Financial-Themed Spam Emails are Phishing Attacks

KnowBe4

While spam tends to be dismissed as being more an annoyance, new research shows that there is a very real and ever-present threat in emails that are marked as “spam”.

article thumbnail

Key Group Ransomware Foiled by New Decryptor

Dark Reading

Researchers crack Key Group's ransomware encryption and release free tool for victim organizations to recover their data.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

What Is Cloud Workload Protection? Ultimate Guide

eSecurity Planet

Cloud workload protection (CWP) is the process of monitoring and securing cloud workloads from threats, vulnerabilities, and unwanted access, and is typically accomplished via Cloud Workload Protection Platforms (CWPP). Cloud workloads are everything needed to run an application in the cloud, such as databases, containerized environments, and the application itself.

Cloud 86
article thumbnail

Inaugural Pwn2Own Automotive Contest Dangles $1M for Car Hackers

Dark Reading

The competition encourages automotive research and allows for contestants to take part in person or remotely.

103
103
article thumbnail

You Asked and Here It Is! KnowBe4's New Content Manager Feature is Unveiled

KnowBe4

We heard you, and we're thrilled to tell you about the all-new Content Manager feature for KMSAT!

IT 99
article thumbnail

Will the AI Arms Race Lead to the Pollution of the Internet?

Dark Reading

Content creators want to protect their intellectual property from AI by poisoning data. Could this destroy the machine learning ecosystem?

102
102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Accounts payable automation: What they didn’t tell you

OpenText Information Management

It is no secret that the advantages of accounts payable (AP) automation are widely acknowledged. In short, the concept is a compelling proposition. It allows organizations to eliminate the laborious and time-intensive tasks linked to the payables process. Just removing these manual responsibilities from the equation is a proposal anyone would jump at.

IT 57
article thumbnail

Navigate your path to scale with Spot by NetApp

Adapture

Unlock Kubernetes Day 2 Success with Spot by NetApp and Adapture Kubernetes has revolutionized cloud computing, but as your environment matures, managing it can become complex and time-consuming. Adapture, in partnership with Spot by NetApp, brings you the solution. Seize Control of Your Kubernetes Day 2 Strategy Answer the crucial questions that prepare DevOps for Day 2 success.

Cloud 52
article thumbnail

Transform workflows with cloud fax

OpenText Information Management

Digital fax remains an integral part of mission-critical communications. Meet the team inventing the future of fax – we recently caught up with Josee Martin, Senior Product Manager, to talk about the future of secure information exchange and document delivery. Why is fax so critical? The main strength is security – it’s why people and … The post Transform workflows with cloud fax appeared first on OpenText Blogs.

Cloud 57