Mon.Dec 07, 2020

article thumbnail

Ransomware: Call Centers Cold-Call Victims to Demand Ransom

Data Breach Today

Such Specialization Highlights Ransomware Operators' Increasing Business Savvy Ransomware innovation seems to know no bounds, as crime gangs seek new ways to make crypto-locking malware ever more profitable. Beyond data-leak sites and affiliate programs, gangs have also been using call centers to cold-call victims, tell them they've been hit by ransomware, and request payment.

article thumbnail

A ransomware attack hit the Greater Baltimore Medical Center

Security Affairs

The Greater Baltimore Medical Center, Maryland, was hit by a ransomware attack that impacted computer systems and operations. The Greater Baltimore Medical Center in Towson, Maryland was a victim of a ransomware attack that impacted its IT systems. At the time of this writing, it is not clear the family of ransomware that hit the healthcare providers, it only confirmed that the security breach forced some procedures scheduled for Monday to be canceled. “On the morning of Sunday, December 6

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NSA: Russian Hackers Exploiting VMware Vulnerability

Data Breach Today

Warning Urges Federal Agencies to Patch Vulnerable Systems Immediately The U.S. National Security Agency is warning that Russian state-sponsored threat actors are attempting to exploit a known vulnerability in several VMware products, according to an alert. Federal agencies are urged to apply fixes as soon as possible.

Security 327
article thumbnail

Hiding Malware in Social Media Buttons

Schneier on Security

Clever tactic : This new malware was discovered by researchers at Dutch cyber-security company Sansec that focuses on defending e-commerce websites from digital skimming (also known as Magecart) attacks. The payment skimmer malware pulls its sleight of hand trick with the help of a double payload structure where the source code of the skimmer script that steals customers’ credit cards will be concealed in a social sharing icon loaded as an HTML ‘svg’ element with a ‘path&

Security 110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers Breached Israeli Water Reservoir HMI System

Data Breach Today

Researchers Say Attack May Have Links to Iran, But Lacked Sophistication Hackers with possible links to Iran appear to have breached an unprotected human-machine interface system at an Israeli water reservoir that connected directly to the internet. The system appeared to lack security protocols, according to researchers with Otorio.

Security 277

More Trending

article thumbnail

Europol Warns of COVID-19 Vaccine Crime Gangs

Data Breach Today

Latest Warning About Online Fraudsters, Supply Chain Threats As the time for distribution of COVID-19 vaccines comes closer, law enforcement agencies across the world are warning of organized crime threats, including schemes to sell counterfeit vaccines on the dark web, as well as physical and virtual attacks targeting supply chain companies.

232
232
article thumbnail

The NSA Warns That Russia Is Attacking Remote Work Platforms

WIRED Threat Level

A vulnerability in VMWare has prompted a warning that companies—and government agencies—need to patch as soon as possible.

article thumbnail

The Impending Transaction Dispute Avalanche

Data Breach Today

Ryan Battles of EY Details Increasing Friendly Fraud Trends E-commerce has skyrocketed in 2020, but so have transaction disputes. Ryan Battles of EY explains the cause, the impact, as well as how merchants can reduce incidents of this so-called "friendly" fraud.

225
225
article thumbnail

Russia-linked hackers actively exploit CVE-2020-4006 VMware flaw, NSA warns

Security Affairs

The National Security Agency (NSA) warns that Russia-linked hackers are exploiting a recently patched VMware flaw in a cyberespionage campaign. The US National Security Agency has published a security alert warning that Russian state-sponsored hackers are exploiting the recently patched CVE-2020-4006 VMware flaw to steal sensitive information from their targets.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Egregor Ransomware Slams HR Firm and Transport Agency

Data Breach Today

Dutch Staffing Firm, Canadian Public Transportation Agency Still Recovering Dutch HR firm Randstad and the public transportation agency of Vancouver, Canada, are continuing to recover from ransomware attacks. Both incidents appear to have involved Egregor ransomware, with Randstad reporting that data was exfiltrated and is now being leaked by attackers to try and force payment.

article thumbnail

Critical Flaws in Millions of IoT Devices May Never Get Fixed

WIRED Threat Level

Amnesia:33 is the latest in a long line of vulnerabilities that affect countless embedded devices.

IoT 123
article thumbnail

2 Charged With Hacking Italian Defense Contractor Leonardo

Data Breach Today

Police Say Backdoor Trojan Malware Spread Using USB Drive Italian authorities arrested two employees of the Italian defense contractor Leonardo S.p.A. for installing a backdoor Trojan into the company's systems and exfiltrating 10GB of data over a two-year period, according to local law enforcement officials.

147
147
article thumbnail

Phishing Campaign Targets 200M Microsoft 365 Accounts

Dark Reading

A well-organized email spoofing campaign has been seen targeting financial services, insurance, healthcare, manufacturing, utilities, and telecom.

Phishing 136
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Rana Android Malware Updates Allow WhatsApp, Telegram IM Snooping

Threatpost

The developers behind the Android malware have a new variant that spies on instant messages in WhatsApp, Telegram, Skype and more.

Access 103
article thumbnail

Chart: Cyberthreats Follow Workers Home

Dark Reading

The COVID-19 crisis has raised the level of cyber-risk significantly over previous Dark Reading Strategic Security surveys.

Risk 103
article thumbnail

Asia-Pacific: Navigating Asia-Pacific data breach notification requirements

DLA Piper Privacy Matters

Data breach notification obligations throughout Asia-Pacific are in a state of flux, with several jurisdictions either introducing new requirements or updating their existing regimes in late 2020 and 2021. Against this backdrop, the number of cyber incidents reported continues to grow year-on-year, as increasingly sophisticated threat actors look to take advantage of the disruption caused by COVID-19.

article thumbnail

Europol Warns COVID-19 Vaccine Rollout Vulnerable to Fraud, Theft

Threatpost

With the promise of a widely available COVID-19 vaccine on the horizon, Europol, the European Union’s law-enforcement agency, has issued a warning about the rise of vaccine-related Dark Web activity. The agency joins a chorus of security professionals that have concerns about widespread attacks on the COVID-19 vaccine rollout. The warning comes after Europol discovered […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Avoiding a 1984-Like Future

Dark Reading

We must not simply trust technology to be safe. Technology providers and users should agree on severe security practices, and these standards must be implemented wherever data goes.

article thumbnail

NSA Warns: Patched VMware Bug Under Active Attack

Threatpost

Feds are warning that adversaries are exploiting a weeks-old bug in VMware’s Workspace One Access and VMware Identity Manager products.

Access 95
article thumbnail

As DNA Synthesis Evolves, Cyber-Physical Attack Worries Grow

Dark Reading

Israeli scientists warn that cybersecurity around DNA synthesis devices needs improvement -- or else the industry risks harmful DNA produced through cyber means.

article thumbnail

‘Free’ Cyberpunk 2077 Downloads Lead to Data Harvesting

Threatpost

The hotly anticipated game -- featuring a digital Keanu Reeves as a major character -- is being used as a lure for cyberattacks.

Privacy 91
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

DoppelPaymer ransomware gang hit Foxconn electronics giant

Security Affairs

Electronics contract manufacturer Foxconn is the last victim of the DoppelPaymer ransomware operators that hit a Mexican facility. DoppelPaymer ransomware operators infected the systems at a Mexican facility of Foxconn electronics giant over the Thanksgiving weekend. The plan is located in Ciudad Juárez, Chihuahua, Mexico. The hackers also claim to have stolen unencrypted files before encrypting the targeted systems.

article thumbnail

Healthcare in Crisis: Diagnosing Cybersecurity Shortcomings in Unprecedented Times

Threatpost

In the early fog of the COVID-19 pandemic, cybersecurity took a back seat to keeping patients alive. Lost in the chaos was IT security.

article thumbnail

Cisco fixes exploitable RCEs in Cisco Security Manager

Security Affairs

Cisco released security updates to fix multiple pre-authentication RCE flaws with public exploits affecting Cisco Security Manager. Cisco has released security updates to address multiple pre-authentication remote code execution vulnerabilities with public exploits affecting Cisco Security Manager (CSM). CSM provides a comprehensive management solution for CISCO devices, including intrusion prevention systems and firewalls (i.e.

article thumbnail

Insider Report: Healthcare Security Woes Balloon in COVID-Era

Threatpost

As hackers put a bullseye on healthcare, Threatpost spotlights how hospitals, researchers and patients have been affected and how the sector is bolstering their cyber defenses.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Name That Toon: Winter Forecast

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

78
article thumbnail

RansomExx Ransomware Gang Dumps Stolen Embraer Data: Report

Threatpost

The group published files stolen from the Brazilian aircraft manufacturer in a ransomware attack last month.

article thumbnail

NortonLifeLock Acquires Avira for $360M

Dark Reading

The all-cash transaction is expected to broaden NortonLifeLock's international presence and bring a freemium business model into its portfolio.

IT 101