Thu.May 05, 2022

article thumbnail

Ransomware Payments: Just 46% of Victims Now Pay a Ransom

Data Breach Today

Average Ransom Payment, When a Victim Pays, Drops to $211,529, Coveware Reports Two signs that the tide may finally, if slowly, be turning on ransomware: The number of victims who choose to pay continues to decline, while the amount they pay - when they choose to do so - recently dropped by one-third, reports ransomware incident response firm Coveware.

article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Ransomware? I think you may have heard of it, isn’t the news full of it? Well, the stats are even scarier with over 50% increase in ransomware attacks in 2021, compared to 2020. Related: Make it costly for cybercriminals. The media paid close attention to ransomware attacks last year, as they had a significant impact on Colonial Pipeline, the nation’s largest fuel distributor, and JBS, the nation’s largest meat distributor.

Access 227
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Connecticut Becomes 5th US State to Get Data Privacy Law

Data Breach Today

Rules Similar to Privacy Laws Passed in California, Colorado, Virginia and Utah Connecticut has just become the fifth U.S. state to get a comprehensive data privacy and online monitoring law, as Senate Bill No. 6 passed into law on Wednesday. The law will go into effect on July 1, 2023, which means that organizations in the state have just 14 months to prepare for compliance.

article thumbnail

Why so many schools prefer Apple

Jamf

Yes; Apple devices have a lower cost of ownership when compared to other technology in the classroom. But it’s not just about the bottom line. Apple devices better prepare schools for remote education, improve digital literacy and teach students skills that will be required in tomorrow’s workplace.

Education 137
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Chinese APT Group Winnti Is Stealing Intellectual Property

Data Breach Today

Forensic Analysis Used to Detect the Group's Involvement, Cybereason Says A new malicious campaign that siphons off intellectual property and sensitive data - including documents, blueprints, diagrams, formulas and manufacturing-related proprietary data - has been identified by researchers at Cybereason as being the work of Chinese APT Winnti, based on forensic analysis.

More Trending

article thumbnail

Report: Unsecured AWS Bucket Leaked Cancer Website User Data

Data Breach Today

Researchers Say Nonprofit's Data Exposure Affects Tens of Thousands Researchers say an unsecured cloud storage bucket belonging to a nonprofit cancer organization has exposed to the internet sensitive images and related data of tens of thousands of individuals. The mishap is the latest health data-related incident involving misconfigured information technology.

Cloud 241
article thumbnail

Why You Should Care About World Password Day

IT Governance

“My password was hacked”: it’s one of the oldest excuses in the book for people who post something regrettable online. But it’s also a growing reality, with Verizon’s 2021 Data Breach Investigations Report discovering that 61% of all data breaches involve stolen credentials. All of us have dozens of accounts that are only one password breach away from compromising sensitive information.

Passwords 105
article thumbnail

Cloudflare, Rapid7 SentinelOne Hit Hardest in Stock Selloff

Data Breach Today

16 Security Stocks Fared Worse Than the Nasdaq Thursday, While Just 11 Did Better Cybersecurity companies took Thursday's selloff on the chin, with Rapid7, Cloudflare and SentinelOne experiencing double-digit stock price drops in Wall Street's worst day of 2022. The Nasdaq Composite Index fell 5% Thursday amid concerns around inflation and soft earnings from online retailers.

Retail 234
article thumbnail

Critical Cisco VM-Escape Bug Threatens Host Takeover

Dark Reading

The vendor also disclosed two other security vulnerabilities that would allow remote, unauthenticated attackers to inject commands as root and snoop on sensitive user information.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ransomware: Is the Tide Finally Turning Against Criminals?

Data Breach Today

This ISMG Security Report analyzes the decline in the number of organizations hit by ransomware who choose to pay a ransom to the attackers. It also examines how to better protect digital identities in the healthcare sector and how security decision-makers can use metrics to achieve better outcomes.

article thumbnail

Why IDMP compliance requires adaptive data governance

Collibra

The regulatory landscape in life sciences is both complex and in flux. Pharmaceutical, biotech and medical devices firms, among others, must comply with a plethora of regulations. Virtually all regulations are updated periodically with amendments to existing guidelines or with new mandates introduced as add-ons. This requires every company to perform gap analysis to determine what is required and then update their systems, processes, workflows and data management strategy accordingly to ensure c

article thumbnail

A Marketer's Competition

Data Breach Today

In this episode of "Cybersecurity Unplugged," David Bruce of Broadcom discusses the competition and noise that marketers face today, why product builders and marketers should communicate about strategy, and how to describe your product in a way that lets customers know why it's important.

Marketing 219
article thumbnail

Cozy Bear Goes Typosquatting

KnowBe4

Researchers at Recorded Future’s Insikt Group warn that the Russian threat actor NOBELIUM (also known as APT29 or Cozy Bear) is using typosquatting domains to target the news and media industries with phishing pages.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Can't Fight That REvil Ransomware Feeling Anymore?

Data Breach Today

Criminals' Beloved Ransomware Brands Seem to Have a Life of Their Own Does it ever feel like you can't fight that REvil/Sodinokibi ransomware feeling anymore? Victims might be all out of love with attacks launched under the banner of the group, which is tied to more than $200 million in losses, but despite repeated disruptions, REvil keep returns - at least in name.

article thumbnail

Key Repatriation, the first step in re-establishing Cloud Data Digital Sovereignty

Thales Cloud Protection & Licensing

Key Repatriation, the first step in re-establishing Cloud Data Digital Sovereignty. divya. Thu, 05/05/2022 - 05:43. Repatriation is the process of returning an asset, an item of symbolic value, or a person—voluntarily or forcibly—to its owner or their place of origin or citizenship. 1. When meeting with executives who are leading organizations through digital transformations, I find many have jumped feet first into cloud delivered digital services and systems without much consideration for the s

Cloud 87
article thumbnail

Tackling 2022's Emerging Social Engineering & Fraud Scams Plaguing Financial Services

Data Breach Today

article thumbnail

NIST Issues Guidance for Addressing Software Supply-Chain Risk

Dark Reading

Amid ongoing software supply-chain jitters, the US' top tech division is offering a finalized, comprehensive cybersecurity control framework for managing risk.

Risk 97
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Protect Your Digital Privacy if Roe v. Wade Falls

WIRED Threat Level

Reproductive rights are still largely guaranteed in the United States. Here are some key privacy concepts to adopt in the event that they're not.

Privacy 98
article thumbnail

Microsoft is Leading the Way to a Password-Less Future

KnowBe4

As we observe World Password Day to create awareness around the need for password security, Microsoft is looking for frictionless ways to eliminate passwords entirely.

article thumbnail

Heroku: Cyberattacker Used Stolen OAuth Tokens to Steal Customer Account Credentials

Dark Reading

The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says.

83
article thumbnail

Google addresses actively exploited Android flaw in the kernel

Security Affairs

Google released the May security bulletin for Android, 2022-05-05 security patch level, which fixed an actively exploited Linux kernel flaw. Google has released the second part of the May Security Bulletin for Android, which includes a fix for an actively exploited Linux kernel vulnerability tracked as CVE-2021-22600. The CVE-2021-22600 is a privilege escalation issue that resides in the Linux kernel, an attacker can trigger it via local access.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why Security Matters Even More in Online Gaming

Dark Reading

As the gaming sector booms, game publishers and gaming networks have been heavily targeted with distributed denial-of-service (DDoS) attacks in the last year.

article thumbnail

15.3 Million Request-Per-Second DDoS Attack

Schneier on Security

Cloudflare is reporting a large DDoS attack against an unnamed company “operating a crypto launchpad.” While this isn’t the largest application-layer attack we’ve seen , it is the largest we’ve seen over HTTP S. HTTPS DDoS attacks are more expensive in terms of required computational resources because of the higher cost of establishing a secure TLS encrypted connection.

article thumbnail

Microsoft, Apple, and Google Promise to Expand Passwordless Features

Dark Reading

The passwordless future just became closer to reality, as Microsoft, Apple, and Google pledged to make passwordless possible across operating systems and browsers.

86
article thumbnail

A couple of 10-Year-Old flaws affect Avast and AVG antivirus?

Security Affairs

Researcher discovered a couple of high-severity security flaws that affect a driver used by Avast and AVG antivirus solutions. SentinelOne researcher Kasif Dekel discovered two high-severity security vulnerabilities, tracked as CVE-2022-26522 and CVE-2022-26523, that affect a driver used by Avast and AVG antivirus solutions. The bugs reside in the anti-rootkit kernel driver named aswArPot.sys which is the “Avast anti-rootkit,” digitally signed by AVAST Software.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

1,000+ Attacks in 2 Years: How the SideWinder APT Sheds Its Skin

Dark Reading

Researcher to reveal fresh details at Black Hat Asia on a tenacious cyber-espionage group attacking specific military, law enforcement, aviation, and other entities in Central and South Asia.

article thumbnail

F5 warns its customers of tens of flaws in its products

Security Affairs

Cybersecurity provider F5 released security patches to address tens of vulnerabilities affecting its products. Security and application delivery solutions provider F5 released its security notification to inform customers that it has released security updates from tens of vulnerabilities in its products. The company addressed a total of 43 vulnerabilities, the most severe one is a critical issue tracked as CVE-2022-1388 (CVSS score of 9.8).

IT 75
article thumbnail

A Third of Americans Use Easy-to-Guess Pet Passwords

Dark Reading

Far too many turn to Jingles, Mittens, or Bella for password inspiration, given that these are some of the easiest passwords to crack.