Fri.Feb 03, 2023

article thumbnail

Hackers Posing as Ukrainian Ministry Deploy Info Stealers

Data Breach Today

Spoofed Polish Police Websites Also Found Ukrainian and Polish cyber defenders are warning against a slew of phishing websites that mimic official sites, in particular a page that mimics the Ministry of Foreign Affairs of Ukraine.

Phishing 244
article thumbnail

Iran-Backed Actor Behind 'Holy Souls' Cyberattack on Charlie Hebdo, Microsoft Says

Dark Reading

The January attack was in retaliation for the satirical French magazine's decision to launch a cartoon contest to lampoon Iran's Supreme Leader

104
104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IBM Security GM on Seeing a Target Through the Hacker's Eyes

Data Breach Today

Mary O'Brien on How External Attack Surface Management Finds Internet-Facing Issues Companies can be blinded by their inside-out view and often benefit from another set of eyes that see their business the same way an attacker would, says IBM's Mary O'Brien.

article thumbnail

How the Cloud Is Shifting CISO Priorities

Dark Reading

The greatly expanding attack surface created by the cloud needs to be protected

Cloud 98
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

Cyberattack Wave on Healthcare Reaches Florida and Maryland

Data Breach Today

Hospitals Restrict Patient Services In At Least One Ransomware Incident A Florida healthcare system says it is diverting emergency patients and is only accepting certain Level 1 trauma cases while it deals with an "IT security incident."

More Trending

article thumbnail

Cyber Insurer Sees Remote Access, Cloud Databases Under Fire

Data Breach Today

Reminder: Real-World Attacks Often Focus on Small Subset of Known Vulnerabilities Criminals lately have been prioritizing two types of attacks: exploiting Remote Desktop Protocol and penetrating cloud databases.

Honeypots 130
article thumbnail

What CISOs Can Do About Brand Impersonation Scam Sites

Dark Reading

Apply these nine tips to proactively fight fraudulent websites that use your brand to rip people off

97
article thumbnail

CrowdStrike CEO on Why It's Tough to Defend Sensitive Assets

Data Breach Today

George Kurtz on How Reposify Helps Customers Locate and Safeguard Priority Assets Organizations today struggle with both new attack surface challenges such as cloud configuration and exposed buckets and long-standing ones around vulnerable ports and infrastructure.

article thumbnail

VMware Workstation update fixes an arbitrary file deletion bug

Security Affairs

VMware addressed a high-severity privilege escalation vulnerability, tracked as CVE-2023-20854, in VMware Workstation. VMware fixed a high-severity privilege escalation flaw, tracked as CVE-2023-20854, that impacts Workstation.

article thumbnail

Contact vs. Company Intent Signal Data

Intent signal data comes in two types: either companies or individuals signaling interest in products like yours. Which kind of data delivers more advantages to B2B marketers? It depends. Get this infographic to learn about the advantages of intent-based leads and how you can most effectively use both types of data.

article thumbnail

CEO Faitelson on How Varonis' SaaS Migration Helps Customers

Data Breach Today

Yaki Faitelson on How a SaaS Delivery Model Reduces the Hardware, Personnel Burden Varonis has dedicated most of its engineering resources to SaaS since the onset of COVID-19 to provide more automation to customers, says CEO Yaki Faitelson.

article thumbnail

Your KnowBe4 Fresh Content Updates from January 2023

KnowBe4

Check out the 39 new pieces of training content added in January, alongside the always fresh content update highlights, events and new features. Security Awareness Training KnowBe4

article thumbnail

Jeetu Patel on Having a Consistent Design at Cisco Security

Data Breach Today

article thumbnail

Cisco fixed command injection bug in IOx Application Hosting Environment

Security Affairs

Cisco fixed a high-severity flaw in the IOx application hosting environment that can be exploited in command injection attacks. Cisco has released security updates to address a command injection vulnerability, tracked as CVE-2023-20076, in the Cisco IOx application hosting environment.

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

Indian Official Highlights Djvu Ransomware as Threat

Data Breach Today

Djvu Camouflages Itself as Cracked Software An Indian cybersecurity official highlighted Djvu ransomware as a threat, saying that "maximum companies" are attacked by the malware, a variant of the Stop family of ransomware.

article thumbnail

Atlassian fixed critical authentication vulnerability in Jira Software

Security Affairs

Atlassian fixed a critical flaw in Jira Service Management Server and Data Center that can allow an attacker to impersonate another user and gain access to a Jira Service Management instance.

article thumbnail

Manipulating Weights in Face-Recognition AI Systems

Schneier on Security

article thumbnail

Russia-linked Gamaredon APT targets Ukrainian authorities with new malware

Security Affairs

Russia-linked threat actor Gamaredon employed new spyware in cyber attacks aimed at public authorities and critical information infrastructure in Ukraine.

article thumbnail

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

article thumbnail

The Chinese Spy Balloon Shows the Downsides of Spy Balloons

WIRED Threat Level

A popular military tool during the Cold War, spy balloons have since fallen out of favor—for good reason. Security Security / National Security

article thumbnail

Exploitation attempts for Oracle E-Business Suite flaw observed after PoC release

Security Affairs

Threat actors started exploiting a critical Oracle E-Business Suite flaw, tracked as CVE-2022-21587, shortly after a PoC was published.

article thumbnail

OpenAI: Platform or Destination?

John Battelle's Searchblog

Sam Altman, CEO of OpenAI (left), and Microsoft CEO Satya Nadella. Image Microsoft Do generative AI innovations like OpenAI’s ChatGPT and Google’s LaMDA represent a new and foundational technology platform like Microsoft Windows, Apple iOS or the Internet?

article thumbnail

It Is Now More Difficult For International Pharma To Transfer Data Out Of China

Data Matters

China’s new Measures for the Security Assessment of Outbound Data Transfers (the Measures) came into force on September 1, 2022.

article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

Conquering state and local agencies’ data challenges with Collibra Data Intelligence Cloud

Collibra

It’s no secret: state and local agencies are deluged with data. To speed modernization, we’ve seen the introduction of solutions like Collibra that can help agencies overcome data challenges and data silos.

article thumbnail

Preparing for an exam? Review our most up to date acronym list on the website via the ICRM

IG Guru

Check out the page here. ICRM Sponsored Acronyms Certification Records Management

article thumbnail

Congress Has a Lo-Fi Plan to Fix the Classified Documents Mess

WIRED Threat Level

As unsecured docs pile up, a bipartisan group of lawmakers is itching to overhaul the nation’s secret secret-sharing operation. Security Security / National Security Business / National Affairs

article thumbnail

A Hacker’s Mind News

Schneier on Security

A Hacker’s Mind will be published on Tuesday. I have done a written interview and a podcast interview about the book. It’s been chosen as a “ February 2023 Must-Read Book ” by the Next Big Idea Club. And an “Editor’s Pick”—whatever that means—on Amazon. There have been three reviews so far. I am hoping for more. And maybe even a published excerpt or two. Amazon and others will start shipping the book on Tuesday.

article thumbnail

Aggregage Intent Signal Service

Aggregage Intent Signal Service helps your sales team reach more active buyers sooner. You’ll get names and contact information of specific in-market buyers plus all companies and job titles signaling intent for your product or service. Get the overview to learn more!

article thumbnail

GoodRx to Pay $1.5 Million in First Ever FTC Health Breach Notification Rule Enforcement Action

Hunton Privacy

article thumbnail

Friday Squid Blogging: Studying the Colossal Squid

Schneier on Security

A survey of giant squid science. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Uncategorized squid