Wed.Sep 16, 2020

article thumbnail

Two Russians Charged in $17M Cryptocurrency Phishing Spree

Krebs on Security

U.S. authorities today announced criminal charges and financial sanctions against two Russian men accused of stealing nearly $17 million worth of virtual currencies in a series of phishing attacks throughout 2017 and 2018 that spoofed websites for some of the most popular cryptocurrency exchanges. The Justice Department unsealed indictments against Russian nationals Danil Potekhin and Dmitirii Karasavidi , alleging the duo was responsible for a sophisticated phishing and money laundering campaig

Phishing 334
article thumbnail

Iranian Hackers Exploiting Unpatched Vulnerabilities

Data Breach Today

CISA Alert Says 'Pioneer Kitten' Group Targeting U.S. Businesses, Agencies The hacking group "Pioneer Kitten," which has suspected ties to the Iranian government, is taking advantage of several unpatched vulnerabilities and using open source tools to target U.S. businesses as well as federal government agencies, according to the Cybersecurity and Infrastructure Security Agency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Should You Care About Bots?

AIIM

Growing up, my parents taught me that there are some questions that aren’t appropriate to ask. Generally, it’s safe to avoid asking people their age, their salary, their weight, their politics, etc. Some questions can make the people being asked feel uncomfortable and so should be avoided. Are bots one of these hot-button topics that we avoid asking about at work?

article thumbnail

2 Alleged Hackers Indicted for Defacing US Websites

Data Breach Today

DOJ: Campaign Was Retaliation Following Death of Iranian General The Justice Department has unsealed an indictment of two alleged hackers for defacing over 50 U.S. websites in what federal prosecutors call a campaign of retaliation following the death of Iranian Major General Qasem Soleimani earlier this year.

264
264
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

New MrbMiner malware infected thousands of MSSQL DBs

Security Affairs

A threat actor is launching brute-force attacks on MSSQL servers in the attempt to access them to install a new crypto-mining malware dubbed MrbMiner. A group of hackers is launching brute-force attacks on MSSQL servers with the intent to compromise them and install crypto-mining malware dubbed MrbMiner. According to security firm Tencent, the team of hackers has been active over the past few months by hacking into Microsoft SQL Servers (MSSQL) to install a crypto-miner. “Tencent Security

Mining 136

More Trending

article thumbnail

Source code of Cerberus banking Trojan leaked on underground forums

Security Affairs

The source code of the infamous Cerberus banking Trojan has been released for free on underground hacking forums following a failed auction. . The author of the Cerberus banking Trojan has released the source code of the malware on underground hacking forums following a failed auction. . In July, the authors of the notorious Cerberus Android banking trojan auctioned their project for a price starting at $50,000, but buyers could have had closed the deal for $100,000.

IT 134
article thumbnail

10 ways insurers can — and should — adapt their business models now

DXC Technology

The insurance industry is in the midst of a brutal stress test, due to the current environment. The loss of customers who become unemployed, already an issue, is likely to worsen. Some insurance products may become uneconomical. And many insurers will come under pressure to reduce their spending. Given this fast-changing business environment, insurers need […].

Insurance 125
article thumbnail

NSA publishes guidance on UEFI Secure Boot customization

Security Affairs

The US National Security Agency (NSA) published guidance on the Unified Extensible Firmware Interface (UEFI) Secure Boot customization. The United States National Security Agency (NSA) has published guidance on how the Unified Extensible Firmware Interface (UEFI) Secure Boot feature that can be customized organizations. The Unified Extensible Firmware Interface (UEFI) is a specification that defines a software interface between an operating system and platform firmware.

Security 126
article thumbnail

Bluetooth Spoofing Bug Affects Billions of IoT Devices

Threatpost

The 'BLESA' flaw affects the reconnection process that occurs when a device moves back into range after losing or dropping its pairing, Purdue researchers said.

IoT 127
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

h2c Smuggling: A New 'Devastating' Kind of HTTP Request Smuggling

Dark Reading

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, say researchers. Here's what infosec pros should know.

122
122
article thumbnail

Hackers Continue Cyberattacks Against Vatican, Catholic Orgs

Threatpost

The China-linked threat group RedDelta has continued to launch cyberattacks against Catholic institutions since May 2020 until as recently as last week.

Access 125
article thumbnail

How the FIN7 Cybercrime Gang Operates

Schneier on Security

The Grugq has written an excellent essay on how the Russian cybercriminal gang FIN7 operates. An excerpt: The secret of FIN7’s success is their operational art of cyber crime. They managed their resources and operations effectively, allowing them to successfully attack and exploit hundreds of victim organizations. FIN7 was not the most elite hacker group, but they developed a number of fascinating innovations.

100
100
article thumbnail

Report Looks at COVID-19’s Massive Impact on Cybersecurity

Threatpost

Cynet's report shares several interesting data points and findings, such as the cyberattack volume change observed in various industry sectors, the increased use of spearphishing as an initial attack vector, and the approaches being used to distribute malware in spearphishing attacks.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Phishing Campaign Pretends to be Phishing Training Reminder

Adam Levin

A phishing campaign is targeting employees with phony email reminders for cybersecurity and phishing awareness training. . In a clever spin on more widely known phishing methods, hackers are sending emails pretending to be from KnowBe4, a company specializing in training employees to recognize phishing scams. . Source: Cofense.com. The emails prompt their targets to click links to complete “required” training sessions, which redirect them to spoofed Outlook.com login pages hosted at a Russian t

article thumbnail

Likely Links Emerge Between Lazarus Group and Russian-Speaking Cybercriminals

Dark Reading

Researchers examine security incidents over the past several years that seemingly connect North Korea's Lazarus Group with Russian-speaking attackers.

Security 110
article thumbnail

Shopping around for RM software? Technical questions you need to ask – Part Two

TAB OnRecord

In last week’s blog post we started to outline the key technical questions to ask before purchasing records management software. Understanding the technical aspects of the solution up front helps avoid frustration and disappointment later on. We will complete our list with five more technical factors to explore. Read More. The post Shopping around for RM software?

article thumbnail

Most Organizations Plan to Make COVID-19 Changes Permanent

Dark Reading

After the pandemic, companies will continue to invest in improving IT infrastructure and security as well as automate tasks to reduce errors and improve network resiliency.

Security 128
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DDoS Attacks Skyrocket as Pandemic Bites

Threatpost

More people being online during lockdowns and work-from-home shifts has proven to be lucrative for DDoS-ers.

Security 118
article thumbnail

Cybersecurity Bounces Back, but Talent Still Absent

Dark Reading

While the demand for cybersecurity talent rebounds, organizations will need to focus on cyber-enabled roles to fill immediate skills gaps.

article thumbnail

US CISA report shares details on web shells used by Iranian hackers

Security Affairs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a malware analysis report (MAR) that includes technical details about web shells employed by Iranian hackers. A web shell is a code, often written in typical web development programming languages (e.g., ASP, PHP, JSP), that attackers implant on web servers to gain remote access and code execution.

Passwords 100
article thumbnail

Meet the Computer Scientist Who Helped Push for Paper Ballots

Dark Reading

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi.

Paper 95
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Jamf delivers same-day support for mobile operating systems, enterprise enhancements

Jamf

With the announcement of Apple's new operating systems, Jamf is proud to bring you same-day support and much more.

111
111
article thumbnail

CISA Joins MITRE to Issue Vulnerability Identifiers

Dark Reading

The Cybersecurity and Infrastructure Security Agency will become a peer of MITRE in the CVE program, likely leading to continued increases in disclosed vulnerabilities.

article thumbnail

What is cloud content management?

OpenText Information Management

The first versions of content management were all about control and risk minimization. They primarily revolved around the needs of records management and legal departments. Little thought was put into the experience of the knowledge workers who created and filed the actual content. These platforms didn’t aid in productivity or efficiency. They required extra labor, … The post What is cloud content management?

Cloud 82
article thumbnail

Guest Blog: Preparedness Awareness

The Texas Record

Contributing Author: Normel Chatmon Records Analyst Fort Bend ISD Police Department. September is National Preparedness Month. However, for some local governments, being prepared may be challenging—especially in the records world and specifically, in ISD police department records. So the question to all of Texas independent school district police departments: is your records management department prepared for the unexpected?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

US Charges Five Members of China-Linked APT41 for Global Attacks

Dark Reading

The five Chinese nationals are among seven defendants arrested for intrusion campaigns into more than 100 organizations, the DoJ reports.

96
article thumbnail

Feds Charge Chinese Hackers With Ripping Off Video Game Loot From 9 Companies

WIRED Threat Level

A group known as Barium allegedly attacked hundreds of targets around the globe—and manipulated in-game goods and currency.

article thumbnail

h2c Smuggling: A New 'Devastating' Kind of HTTP Request

Dark Reading

The newly discovered form of HTTP request smuggling could have widespread impact because any proxy can be affected, researchers say. Here's what infosec pros should know.

74