Wed.Feb 22, 2023

article thumbnail

DDoS Attacks Becoming More Potent, Shorter in Duration

Data Breach Today

US, India and East Asia Were Top Targets in 2022, Microsoft Report Says In a new report, tech giant Microsoft says distributed denial-of-service attacks became shorter in duration but more potent in 2022. The United States, India and East Asia were the top regions affected by DDoS attacks, and IoT devices continued to be the preferred mode of attack.

IoT 284
article thumbnail

Scammers Mimic ChatGPT to Steal Business Credentials

Dark Reading

Hackers will take anything newsworthy and turn it against you, including the world's most advanced AI-enabled chatbot.

IT 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New HardBit 2.0 Ransomware Tactics Target Insurance Coverage

Data Breach Today

Hackers Demand Info on Victim's Cyber Insurance Policy to Negotiate Ransom Demand The newly relaunched HardBit 2.0 ransomware group is now demanding victims disclose details of their cyber insurance coverage before negotiating a ransom demand. The group, which has been active since 2022, has demanded that one victim pay $10 million in ransom, according to researchers at Varonis.

Insurance 262
article thumbnail

What is SaaS Sprawl and How Does it Affect Enterprise Ediscovery?

Hanzo Learning Center

In ediscovery, most of the information collected during litigation involves email and other communication data (e.g. Slack and MS Teams). But the growing use of SaaS applications adds an additional element to the blanket term “collaboration data.” These applications encompass many uses, including project management, ticketing services, content management, sales data, and more.

IT 98
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

5 Lawsuits Filed in Ransomware Breach Affecting 3.3 Million

Data Breach Today

Proposed Class Actions Against Regal Medical Group Allege Negligence, Other Claims Five proposed class action lawsuits have been filed so far in the wake of a California medical group's Feb. 1 report of a ransomware attack last December affecting more than 3.3 million individuals. The incident is the largest health data breach reported to federal regulators so far this year.

More Trending

article thumbnail

Why Is AT&T Cybersecurity Such a Good Acquisition Target?

Data Breach Today

Analysts Praised AT&T Cybersecurity for Bringing Threat Intel and MSS Together AT&T wants to unload its cyber assets just five years after doubling down on security through its $600 million purchase of threat intelligence vendor AlienVault. The Dallas-based carrier has been working with British banking firm Barclays to solicit bids for its cybersecurity business, Reuters said.

article thumbnail

Google Delivers Record-Breaking $12M in Bug Bounties

Dark Reading

Google's Android and Chrome Vulnerability Reward Programs (VRPs) in particular saw hundreds of valid reports and payouts for security vulnerabilities discovered by ethical hackers.

article thumbnail

Yes, Virginia, ChatGPT Can Be Used to Write Phishing Emails

Data Breach Today

But for All AI Malicious Use Cases, Better Alternatives Abound - At Least So Far Will large language models such as ChatGPT take cybercrime to new heights? Researchers say AI for malicious use so far remains a novelty rather than a useful and reliable cybercrime tool. But as AI capabilities and chatbots improve, the cybersecurity writing is on the wall.

Phishing 176
article thumbnail

VMware addressed a critical bug in Carbon Black App Control

Security Affairs

VMware released security updates to address a critical vulnerability, tracked as CVE-2023-20858, in the Carbon Black App Control product. VMware addressed a critical injection vulnerability, tracked as (CVSSv3 score 9.1), Carbon Black App Control. VMware Carbon Black App Control allows organizations to ensure that only trusted and approved software is allowed to execute on their critical systems and endpoints.

Access 98
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Australia Unveils Game Plan to Guard Critical Infrastructure

Data Breach Today

New Risk Management Program to Strengthen Critical Infrastructure Resilience In the wake of recent cyberthreats aimed at Australia's critical infrastructure, the country has adopted a new risk management program to strengthen its resilience and security in these key sectors. The new rules will help businesses prepare for, prevent and mitigate emerging threats.

Risk 144
article thumbnail

Phishing Fears Ramp Up on Email, Collaboration Platforms

Dark Reading

It's a banner year for attacks coming through traditional email as well as newer collaboration technologies, such as Slack and Microsoft Teams. What's next?

Phishing 100
article thumbnail

How the Economic Downturn Has Affected Security Funding, M&A

Data Breach Today

M&A, Funding, Stock Prices Drop Sharply in the Back Half of 2022 Amid Economic Woes The cybersecurity industry experienced a dramatic drop-off in funding, stock prices and M&A activity as the economic downturn took hold in late 2022. Venture capital financing tumbled to $18.5 billion in 2022, 39% lower than the record-breaking $30.4 billion invested in 2021, Momentum Cyber found.

Security 130
article thumbnail

Coinbase Attack Used Social Engineering

KnowBe4

Coinbase describes a targeted social engineering attack that led to the theft of some employee data. The attacker first sent smishing messages to several Coinbase employees, urging them to click a link and log in to their Coinbase work account. One employee fell for the attack, and the threat actor then attempted to use the victim’s account to gain access to Coinbase’s internal systems.

Access 92
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

2 Health Data Hacks Affect More Than 1 Million Individuals

Data Breach Today

New Jersey Healthcare System and Alabama Cardiac Care Clinic Are Notifying Patients Two recent separate hacking incidents involving attackers stealing copies of sensitive protected health information have affected more than 1 million patients of a New Jersey healthcare system and an Alabama cardiovascular clinic. Victims get free credit monitoring and identity restoration services.

130
130
article thumbnail

CISA adds IBM Aspera Faspex and Mitel MiVoice to Known Exploited Vulnerabilities Catalog

Security Affairs

US CISA added actively exploited flaws in IBM Aspera Faspex and Mitel MiVoice to its Known Exploited Vulnerabilities Catalog. US CISA added the following actively exploited flaws to its Known Exploited Vulnerabilities Catalog : CVE-2022-47986 (CVSS score: 9.8) – IBM Aspera Faspex Code Execution Vulnerability – A remote attacker can trigger the vulnerability to execute arbitrary code on the system.

article thumbnail

Pennsylvania Health System CEO Confirms BlackCat Attack

Data Breach Today

Physician Practices Network Hit by Russian-Backed Group on Heels of National Alert Lehigh Valley Health Network, which operates 13 hospitals and numerous physician practices and clinics in eastern Pennsylvania, says it has been hit with an attack by Russian-based ransomware-as-a-service group BlackCat. The network says it didn't pay a ransom and operations were not disrupted.

article thumbnail

The number of devices infected by the MyloBot botnet is rapidly increasing

Security Affairs

Researchers warn that the MyloBot botnet is rapidly spreading and it is infecting thousands of systems worldwide. The MyloBot botnet has been active since 2017 and was first detailed by cybersecurity firm Deep Instinct in 2018. MyloBot is a highly evasive Windows botnet that supports advanced anti-analysis techniques. The first sample of the bot analyzed by the experts (dated October 20, 2017) had three different stages.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Nikesh Arora: ChatGPT Best Thing That's Happened to Security

Data Breach Today

Palo Alto Networks CEO on How AI Can Help Businesses Make More Sense of Their Data The revolution ChatGPT drove in the consumer market has prompted enterprises to more closely examine how AI can help safeguard data, says Palo Alto Networks CEO Nikesh Arora. The demands from AI in the enterprise are far more exacting, with firms insisting AI be clean, comprehensive and real time.

Marketing 130
article thumbnail

Exploit Code Released for Critical Fortinet RCE Bug

Dark Reading

Organizations are urged to update to the latest versions of FortiNAC to patch a flaw that allows unauthenticated attackers to write arbitrary files on the system.

93
article thumbnail

What Is a Good Survey Rating for Security and Compliance Training?

KnowBe4

We received great feedback from many of you after sharing data about completion percentages last month so much that we thought, “What other things can we share from our vast amount of training data?

article thumbnail

1 in 4 CISOs Wants to Say Sayonara to Security

Dark Reading

Thanks to burnout and stress, Gartner predicts churn and even departure from profession among half of today's security leaders by 2025.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Ukraine Suffered More Wiper Malware in 2022 Than Anywhere, Ever

WIRED Threat Level

As Russia has accelerated its cyberattacks on its neighbor, it's barraged the country with an unprecedented volume of different data-destroying programs.

IT 81
article thumbnail

UL Solutions Advances Automotive Safety and Security

Dark Reading

A combined team of UL Solutions safety science experts will address automotive cybersecurity, functional safety, automated driving and software development processes to help customers bring safer, more secure innovations to market.

article thumbnail

DAA Launches the CMP Complement

Hunton Privacy

On February 14, 2023, the Digital Advertising Alliance (“DAA”) announced the creation of the CMP Complement, billed as a uniform approach for brands and publishers to offer privacy controls on sites and apps through Consent Management Platforms (CMPs) and the AdChoices program. The CMP Complement integrates the AdChoices Icon into participating CMPs’ user flows and provides easier user access to both CMP-specific controls and other interest-based advertising choice tools offered through the DAA’

Privacy 58
article thumbnail

US Military Emails Exposed via Cloud Account

Dark Reading

A DoD email server hosted in the cloud (and now secured) had no password protection in place for at least two weeks.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Data catalogs, data governance, and the journey to data intelligence

Collibra

You’re on a journey. From the CDO to the data analyst to front-line customer support, everyone is using data to do their job and advance their organizational goals. Increasingly, data leaders require data intelligence to achieve success. But you can’t implement data intelligence if your data isn’t governed. Data governance is the process of managing data as a strategic asset so it is accurate, accessible, secure, and consistent.

article thumbnail

7 Tips for Mitigating Cyber-Risks to Your Corporate Social Media

Dark Reading

How to stay safe, even when tech-savvy admins can't tell the difference between a scam and the truth.

Risk 94
article thumbnail

Vacancy Announcement

National Archives Records Express

Our office has posted a vacancy announcement for an Electronic Records Policy Analyst on our Policy and Standards Team (ACPS). This announcement will be open until Wednesday, March 1, 2023. As an Electronics Records Policy Analyst, you will work with experts with technology and archival backgrounds to develop and communicate practical and understandable guidance, policies, standards, and advice for the government-wide management of federal electronic records, information, and data.