Sat.Sep 17, 2022

article thumbnail

Analyzing Twitter's Security Nightmare

Data Breach Today

The latest edition of the ISMG Security Report discusses the appearance at a Senate hearing this week by the former head of security for Twitter; the top-performing web application and API protection vendors, according to Gartner's Magic Quadrant 2022; and threat trends to watch for in 2023.

Security 246
article thumbnail

Botched Crypto Mugging Lands Three U.K. Men in Jail

Krebs on Security

Three men in the United Kingdom were arrested this month for attempting to assault a local man and steal his virtual currencies. The incident is the latest example of how certain cybercriminal communities are increasingly turning to physical violence to settle scores and disputes. Shortly after 11 p.m. on September 6, a resident in the Spalding Common area in the district of Lincolnshire, U.K. phoned police to say three men were acting suspiciously, and had jumped a nearby fence. “The thre

Access 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT and OT: A Tale of Two Technologies Under Fire

Data Breach Today

Operational Technology Security Takes Center Stage Through Public-Private Programs The vulnerabilities of OT systems have been known and ignored for years, but breaches, an increasingly hostile threat environment and government programs to promote information sharing, training and cyber grant funding could finally put IT and OT security on equal ground.

IT 246
article thumbnail

[HEADS UP] Bank of America Warns About Recent Scams That Request Zelle Payment Due to 'Suspicious Activity'

KnowBe4

Bank of America recently sent a customer service email warning users to watch out for this new phishing attack.

Phishing 129
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

SandboxAQ Buys Cryptosense to Fuel Post-Quantum Cryptography

Data Breach Today

Cryptosense Will Help Banks, Hospitals Protect Key Stores, HSMs in a Quantum World SandboxAQ bought French vendor Cryptosense to help organizations migrate and defend key stores and hardware security modules using post-quantum cryptography architecture. Combining SandboxAQ's network scanning capabilities with Cryptosense's visibility will help firms discard RSA-based encryption.

More Trending

article thumbnail

How the FTC Is Sharpening Its Health Data Privacy Focus

Data Breach Today

Former FTC Consumer Protection Bureau Leader Daniel Kaufman Discusses Top Concerns As the Federal Trade Commission focuses on data brokers that collect and share consumers' sensitive information, any company that participates in those activities needs to carefully review its practices, says attorney Daniel Kaufman, former acting director of the FTC's Consumer Protection Bureau.

article thumbnail

The Uber Hack’s Devastation Is Just Starting to Reveal Itself

WIRED Threat Level

An alleged teen hacker claims to have gained deep access to the company’s systems, but the full picture of the breach is still coming into focus.

Access 98
article thumbnail

The Ransomware Files, Episode 11: The Adult Boutique

Data Breach Today

Dain Drake was CEO of a steel fabrication factory. In June 2019, Drake found himself standing outside a closed adult boutique in Houston at 10:00 a.m. on a Sunday. He called the owner and pleaded for him to come. He needed something inside, which might just save his business - from ransomware.

article thumbnail

DDoS Attack Against Eastern Europe Target Sets New Record

Dark Reading

The target has been under relentless DDoS attack, which ultimately set a new packets-per-second record for Europe.

100
100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ISMG Editors: Ransomware Gangs Are Using Partial Encryption

Data Breach Today

Also: Improving Private-Public Collaboration, ISMG'S Africa Summit Four editors at Information Security Media Group analyze private-public partnerships today, preview ISMG's upcoming cybersecurity summit in Africa and discuss the increasing use of intermittent or partial encryption by ransomware gangs as a means to extort money from victims faster.

article thumbnail

US Border Agents May Have a Copy of Your Text Messages

WIRED Threat Level

Plus: An AI artist exposes surveillance of Instagram users, the US charges Iranians over a ransomware campaign, and more.

article thumbnail

Tackling Financial Fraud With Machine Learning

Dark Reading

Financial services firms need to learn how — and when — to put machine learning to use.

article thumbnail

The SEC Charged Several Individuals and Entities in a Fraudulent Hacking Scheme

Hunton Privacy

On August 16, 2022, the Securities and Exchange Commission (“SEC”) charged 18 individuals and entities in relation to their involvement in a fraudulent hacking scheme. The scheme targeted and hacked 31 online retail brokerage accounts and forced them to make large purchases of certain stocks from two public microcap companies: Lotus Bio-Technology Development Corp.

Retail 58
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Keep Today's Encrypted Data From Becoming Tomorrow's Treasure

Dark Reading

Building quantum resilience requires C-suite commitment, but it doesn't have to mean tearing out existing infrastructure.

article thumbnail

Substance Use Disorder Patient Records: Important Limitations on Disclosure in Litigation or Otherwise

eDiscovery Law

Under 42 U.S.C. 290dd-2, federal law requires “records of the identity, diagnosis, prognosis, or treatment of any patient which are maintained in connection with the performance of any program or activity relating to substance use disorder education, prevention, training, treatment, rehabilitation, or research, which is conducted, regulated, or directly or indirectly assisted by any department […].

article thumbnail

Bitdefender releases Universal LockerGoga ransomware decryptor

Security Affairs

Bitdefender has released a free decryptor to allow the victims of the LockerGoga ransomware to recover their files without paying a ransom. The cybersecurity firm Bitdefender has released a free decryptor to allow LockerGoga ransomware victims to recover their encrypted files without paying a ransom. “We’re pleased to announce the availability of a new decryptor for LockerGoga, a strain of ransomware that rose to fame in 2019 with the attack of the Norsk Hydro company.” reads the ann

article thumbnail

Friday Squid Blogging: Mayfly Squid

Schneier on Security

This is surprisingly funny. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Attacker Apparently Didn't Have to Breach a Single System to Pwn Uber

Dark Reading

Alleged teen hacker claims he found an admin password in a network share inside Uber that allowed complete access to ride-sharing giant's AWS, Windows, Google Cloud, VMware, and other environments.

Passwords 141