Fri.Jun 12, 2020

article thumbnail

City Pays Ransom Despite Pre-Ransomware Outbreak Hack Alert

Data Breach Today

DoppelPaymer Hit Comes as Ransomware Attacks - and Data-Leaking Shakedowns - Surge The attack sounds ripped from an episode of TV show "24": Hackers have infiltrated a government network, and they're days away from unleashing ransomware. Unfortunately for Florence, a city in Alabama, no one saved the day, and officials are sending $300,000 in bitcoins to attackers for a decryption key.

article thumbnail

Gamaredon group uses a new Outlook tool to spread malware

Security Affairs

Russia-linked Gamaredon APT use a new module for Microsoft Outlook that creates custom emails with malicious documents and sends them to a victim’s contacts. Reseaerchers from ESET reported that Russia-linked Gamaredon APT has a new tool in its arsenal, it is a module for Microsoft Outlook that creates custom emails with malicious documents and sends them to a victim’s contacts.

Military 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kubeflow Targeted in XMRig Monero Cryptomining Campaign

Data Breach Today

Researchers: Admin Shortcut May Have Opened the Door to Hackers Microsoft's Azure Security Center has detected a new hacking campaign that for the first time specifically targets the Kubeflow platform on Kubernetes and uses XMRig cryptominer to mine for monero across multiple clusters.

Mining 299
article thumbnail

City of Florence to Pay $300,000 Ransom after ransomware attack

Security Affairs

Florence City in Alabama will pay a $300,000 ransom worth of Bitcoins after its computer system was infected with a ransomware. The Council of Florence City voted unanimously at an emergency meeting this week pay the ransom requested by attackers that hit the City’s system. The payment will me made using the city’s insurance fund in an effort to preserve information of city workers and customers and quickly resume operations.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Academic Study Finds Security Flaws in Online Voting Tool

Data Breach Today

OmniBallot Voting Platform Is Vulnerable to Hacking, Researchers Say Researchers at MIT and the University of Michigan have uncovered multiple security flaws in the online voting platform OmniBallot which could allow hackers to access and manipulate voter data. The platform is currently in use in three states for military personnel and disabled residents.

Military 230

More Trending

article thumbnail

COVID-19: Privacy, Security Concerns as Businesses Reopen

Data Breach Today

As businesses reopen, they need to carefully consider the privacy, security and legal implications of collecting COVID-19 related information from customers, employees and other individuals, says privacy attorney Iliana Peters of the law firm Polsinelli.

Privacy 175
article thumbnail

Facebook Helped Develop a Tails Exploit

Schneier on Security

This is a weird story : Hernandez was able to evade capture for so long because he used Tails, a version of Linux designed for users at high risk of surveillance and which routes all inbound and outbound connections through the open-source Tor network to anonymize it. According to Vice, the FBI had tried to hack into Hernandez's computer but failed, as the approach they used "was not tailored for Tails.

Risk 115
article thumbnail

Inside Europol's Latest Anti-Financial Crime Center

Data Breach Today

The latest edition of the ISMG Security Report discusses Europol's launch of the European Financial and Economic Crime Center, and also details the London Met's perspective on recent cybercrime trends, and to need to maintain a paper audit trail for mobile voting.

Paper 147
article thumbnail

Spies Can Eavesdrop by Watching a Light Bulb's Vibrations

WIRED Threat Level

The so-called lamphone technique allows for real-time listening in on a room that's hundreds of feet away.

Security 135
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Knoxville Ransomware Attack Leads to IT Network Shutdown

Threatpost

The ransomware attack hit the Tennessee city of Knoxville this week, causing disruptions in various services.

article thumbnail

FCC Proposes Largest Fine in Its History for Telemarketing Violations

Hunton Privacy

On June 9, 2020, the Federal Communications Commission (“FCC”) announced a proposed $225 million fine, the largest in the history of the FCC, against several individuals for telemarketing violations. The FCC alleged that John C. Spiller and Jakob A. Mears made over one billion spoofed robocalls to sell health insurance plans under a variety of business names including Rising Eagle and JSquared Telecom.

article thumbnail

Austria’s largest ISP A1 Telekom discloses security breach

Security Affairs

A1 Telekom, the leading fixed and mobile network operator in Austria, has admitted to have suffered a security breach, following the revelation of a whistleblower. A1 Telekom Austria is the leading fixed and mobile network operator in Austria, with 5.4 million mobile and 2.3 million fixed-line customers. The company has admitted having suffered a security breach after the revelation of a whistleblower named Libertas.

article thumbnail

COVID-19 and its effects on cyber espionage and national security

IT Governance

COVID-19 has seen a major shift in the tactics used by cyber criminals. We’ve previously discussed the way scammers have used the disruption of the pandemic to target people with social engineering attacks, but there have also been far more ambitious attacks. There is a lot of valuable information sitting on government and medical research facility databases, and no shortage of actors trying to get their hands on this information.

IT 90
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Inside Stealthworker: How It Compromises WordPress, Step-by-Step

Dark Reading

A new wave of attacks using old malware is threatening WordPress sites that don't have strong password policies.

IT 112
article thumbnail

Researchers Expose a New Vulnerability in Intel's CPUs

WIRED Threat Level

The Software Guard eXtension is supposed to protect encryption keys and other sensitive data. But this isn't the first time it's been defeated.

article thumbnail

Android ‘ActionSpy’ Malware Targets Turkic Minority Group

Threatpost

Researchers warn that the Earth Empusa threat group is distributing the spyware by injecting code into fake and watering-hole pages.

article thumbnail

Decentralizing Social Platforms

PerezBox

The past few years I have grown more disenfranchised with closed-platforms, specifically social platforms. This idea that a conglomerate is built on our information, our data, is wrong. It provides. Read More. The post Decentralizing Social Platforms appeared first on PerezBox.

IT 80
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Coder-Turned-Kingpin Paul Le Roux Gets His Comeuppance

WIRED Threat Level

The programmer who became a flagrant drug lord and weapons trafficker was sentenced in New York City to 25 years in prison.

article thumbnail

The U.S. Office of the Comptroller of the Currency Seeks Comment on Digital Innovation by Banks

Data Matters

The U.S. Office of the Comptroller of the Currency (OCC) has issued an Advance Notice of Proposed Rulemaking (ANPR) 1 seeking input on how best to accommodate new technology and innovation in the business of banking, in connection with the OCC’s “comprehensive review” of its regulations at 12 C.F.R. part 7, subpart E (national banks), and part 155 (federal savings associations) (collectively, Rules).

article thumbnail

Knoxville Pulls IT Systems Offline Following Ransomware Attack

Dark Reading

Knoxville's government took its network offline and turned off infected servers and workstations after a ransomware attack this week.

article thumbnail

Sam Wong brings answers through analytics during a global pandemic

IBM Big Data Hub

This story is part of Analytics Heroes, a series of profiles on leaders transforming the future of business analytics.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hackers Exploit Black Lives Matter to Spread Malware

Adam Levin

The U.S. and global protests of the killing of George Floyd are being used to spread malware according to the cybersecurity non-profit organization abuse.ch. . The Zurich-based group identified a phishing campaign that capitalizes on the Black Lives Matter movement to distribute malware. Emails with the subject line “Vote anonymous about ‘Black Lives Matter’” have been sending a variant of TrickBot, a trojan-style program designed to steal credentials and data from computers running Windows.

article thumbnail

Cloud: The operating engine for information-fueled business transformation

OpenText Information Management

Guest blog by Melanie Posey, Research Vice President and General Manager, Voice of the Enterprise, 451 Research. In times of crisis, resiliency is the key to survival. The disruption generated by the global COVID-19 pandemic has accelerated the drive toward a digital economy, forcing organizations to move even faster to transform longstanding ways of doing … The post Cloud: The operating engine for information-fueled business transformation appeared first on OpenText Blogs.

Cloud 62
article thumbnail

15 Individuals Plead Guilty to Multimillion-Dollar Online Auction Fraud Scheme

Dark Reading

Members of Romanian gang used fraudulent ads for nonexistent products to extract money from US Internet users, DoJ says.

82
article thumbnail

Sonatype Report on DevSecOps

Adam Shostack

The Sonatype 2020 DevSecOps Community Survey is a really interesting report. Most interesting to me is the importance of effective communication, with both tools and human communication in developer happiness. But even more important is my belief that to reach developers Star Wars is better than Star Trek is confirmed. No bias there.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

7 Must-Haves for a Rockin' Red Team

Dark Reading

Follow these tips for running red-team exercises that will deliver added insight into your operations.

85
article thumbnail

Data Innovator Spotlight - Interview with Charles Joseph, DataZed

Reltio

Name: Charles Joseph. Title: Founder & Data Governance Consultant. Company: DataZed. 1 sentence company description: DataZed is a consultancy that works with organizations to improve their data quality, data governance and data strategy. Years in Position: Over 10 years. 1-2 Previous Roles & Companies: Worked as a consultant with general insurers, Lloyd’s market firms, brokers and reinsurers, including Beazley Group and RSA.

article thumbnail

Cryptominers Found in Azure Kubernetes Containers

Dark Reading

Images from a public repository contained cryptominers that Microsoft researchers found in Kubeflow instances running on Azure.

73