Fri.Jun 25, 2021

article thumbnail

US Secret Service Releases 'Most Wanted' Cyber Fugitive List

Data Breach Today

Agency Offering $1 Million Rewards for Information on 2 Ukrainian Suspects The U.S. Secret Service has published a Most Wanted Fugitives list featuring 10 suspects wanted in connection with financial cybercrimes The agency is offering rewards of up to $1 million for information on two Ukrainian suspects who allegedly targeted the SEC in 2016.

322
322
article thumbnail

MyBook Users Urged to Unplug Devices from Internet

Krebs on Security

Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious hackers are remotely wiping the drives using a critical flaw that can be triggered by anyone who knows the Internet address of an affected device. One of many similar complaints on Western Digital’s user forum.

Access 288
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

High-Ranking FIN7 Gang Member Receives 7-Year Prison Term

Data Breach Today

Prosecutors Say Andrii Kolpakov Was a 'Pen Tester' for Payment Card Theft Group A high-ranking member of the FIN7 payment card theft group has been sentenced to seven years in federal prison. Andrii Kolpako worked as a "pen tester" for the organization, prosecutors say.

318
318
article thumbnail

Cisco ASA Bug Now Actively Exploited as PoC Drops

Threatpost

In-the-wild XSS attacks have commenced against the security appliance (CVE-2020-3580), as researchers publish exploit code on Twitter.

Security 138
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Binance Says It Helped With Clop Money Laundering Bust

Data Breach Today

Cryptocurrency Exchange Acknowledges Flow of Illicit Funds a Big Problem Cryptocurrency exchange Binance says it recently assisted police in tracking down individuals accused of laundering money for the Clop ransomware group. The exchange acknowledges that illicit money from cyberattacks circulating on virtual currency exchanges is a big security problem.

IT 308

More Trending

article thumbnail

Sizing Up the Security Features Slated for Windows 11

Data Breach Today

Microsoft Promises Better 'Zero Trust' Capability, Passwordless Access Security specialists are offering preliminary feedback on Microsoft's sneak peek at the new security measures to be included in the Windows 11 operating system, which is slated for release in December.

Security 275
article thumbnail

Getting to know Declarative Management

Jamf

Apple gave us a glimpse of its vision for the future of mobile device management (MDM) at its 2021 World Wide Developers Conference with the introduction of Declarative Management.

MDM 107
article thumbnail

DarkSide Created a Linux Version of Its Ransomware

Data Breach Today

AT&T's Alien Labs: Malware Designed to Target Servers Hosting VMware Virtual Machines The DarkSide Russian-speaking cybercrime group, which announced May 13 it was closing its ransomware-as-a-service operation, had earlier completed a Linux version of its malware designed to target ESXi servers hosting VMware virtual machines, according to AT&T’s Alien Labs.

article thumbnail

Flaws in FortiWeb WAF expose Fortinet devices to remote hack

Security Affairs

Fortinet has recently fixed a high-severity vulnerability affecting its FortiWeb web application firewall (WAF) that can be exploited by remote attackers to execute arbitrary commands. Fortinet has recently addressed a high-severity vulnerability ( CVE-2021-22123 ) affecting its FortiWeb web application firewall (WAF), a remote, authenticated attacker can exploit it to execute arbitrary commands via the SAML server configuration page.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ISMG Editors’ Panel: Examining Open-Source Software Security

Data Breach Today

Also: Updating SOCs, Communicating With the Board In the latest weekly update, a panel of Information Security Media Group editors discusses key topics, including open-source software vulnerabilities, and provides insights on updating SOCs and communicating effectively with the board.

Security 242
article thumbnail

Mercedes-Benz Customer Data Flies Out the Window

Threatpost

For over three years, a vendor was recklessly driving the cloud-stored data of luxury-car-owning customers and wannabe buyers.

Cloud 109
article thumbnail

Tulsa: Ransomware Attackers Leaked 18,000 Files

Data Breach Today

Information Handled by the Police Department Exposed The city of Tulsa issued a warning this week that a ransomware group that attacked the city in May leaked more than 18,000 city files on the dark web; it's advising residents to take precautions.

article thumbnail

PS3 Players Ban: Latest Victims of Surging Attacks on Gaming Industry  

Threatpost

Every Sony PlayStation 3 ID out there was compromised, provoking bans of legit players on the network.

Cloud 120
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Analysis: CISA's Conclusions on Firewall Missteps

Data Breach Today

This edition of the ISMG Security Report features an analysis of CISA's finding that agencies could have prevented follow-on attacks after the SolarWinds supply chain attack by properly configuring firewalls. Also featured: Congressman discusses deterring nation-state attacks; insider threat mitigation tips.

Security 175
article thumbnail

Data Privacy Is in 23andMe CSO's DNA

Dark Reading

How serious is the company about safeguarding its customers and their genetic information? "We're hiding data even from ourselves," says the biotech and genetic testing company's head of security.

article thumbnail

Hackers Crack Pirated Games with Cryptojacking Malware

Threatpost

Threat actors have so far made about $2 million from Crackonosh, which secretly mines Monero cryptocurrency from affected devices.

Mining 103
article thumbnail

AI-Piloted Fighter Jets

Schneier on Security

News from Georgetown’s Center for Security and Emerging Technology: China Claims Its AI Can Beat Human Pilots in Battle: Chinese state media reported that an AI system had successfully defeated human pilots during simulated dogfights. According to the Global Times report , the system had shot down several PLA pilots during a handful of virtual exercises in recent years.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

My Book Live Users Wake Up to Wiped Devices, Active RCE Attacks

Threatpost

“I am totally screwed,” one user wailed after finding years of data nuked. Western Digital advised yanking the NAS storage devices offline ASAP: There's an exploit.

article thumbnail

European Data Protection Board Issues Final Schrems II Recommendations

Data Matters

The European Data Protection Board (“ EDPB ”), adopted on 18 June 2021 its final recommendations describing how controllers and processors transferring personal data outside the European Economic Area (“ EEA ”) may comply with the Schrems II ruling (“ Final Schrems II Recommendations ”). The Final Schrems II Recommendations, together with the new Standard Contractual Clauses (“ SCCs” ) adopted by the European Commission on 4 June 2021, will now allow organizations to proceed with addressing inte

article thumbnail

Hackers exploit 3-years old flaw to wipe Western Digital devices

Security Affairs

Threat actors are wiping many Western Digital (WD) My Book Live and My Book Live Duo NAS devices likely exploiting an old vulnerability. Owners of Western Digital (WD) claim that their My Book Live and My Book Live Duo network-attached storage (NAS) devices have been wiped. Threat actors forced a factory reset on the devices resulting in the deletion of all files. “When I couldn’t access any of the 4 Network drives I created, I went to Network and double clicked on the MyBookLive Icon, whi

article thumbnail

US Takedown of Iranian Media Sites Extends a Thorny Precedent

WIRED Threat Level

Free speech advocates raised concerns after the Justice Department seized more than 30 domains this week.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Epsilon Red – our research reveals more than 3.5 thousand servers are still vulnerable

Security Affairs

CyberNews researchers analyzed the recently discovered Epsilon Red operations and found that more than 3.5K servers are still vulnerable. Several weeks later, security researchers from Sophos have discovered a new ransomware variant known as Epsilon Red. Now, we know exactly how it was carried out – and what you should do to be safe from it. Seemingly, a variant of the ransomware , Epsilon Red , relies on vulnerable Microsoft Exchange servers.

article thumbnail

FIN7 ‘Pen Tester’ Headed to Jail Amid $1B in Payment-Card Losses

Threatpost

One of the Carbanak cybergang's highest-level hackers is destined to serve seven years while making $2.5 million in restitution payments.

article thumbnail

Clop gang members recently arrested laundered over $500M in payments

Security Affairs

The Clop ransomware members that were recently arrested laundered over $500M in ransomware payments for several malicious actors. The members of the Clop ransomware gang that were recently arrested in Ukraine laundered over $500M for several cybercrime groups. Data related to the money laundering activities were provided by the cryptocurrency exchange portal Binance, who tracked the group as FancyCat , the funds resulted from the operations of Clop and Petya ransomware.

article thumbnail

The 7 most common data quality issues

Collibra

Data-driven organizations are depending on modern technologies and AI to get the most out of their data assets. But they struggle with data quality issues all the time. Incomplete or inaccurate data, security problems, hidden data – the list is endless. Several surveys reveal the extent of cost damages across many verticals due to the problems associated with data quality.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New NYC Biometric Law Takes Effect In Two Weeks – Is Your Organization Ready?

Privacy and Cybersecurity Law

On January 10, 2021, the New York City Council enacted a new biometric law requiring certain commercial establishments within New York City that collect “biometric identifier information” to prominently display signage that such information is being collected and prohibiting those establishments from selling or sharing the information with others.

Sales 52
article thumbnail

What’s new in OpenText Axcelerate

OpenText Information Management

The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ Axcelerate™. Check out the latest updates below. June 2021: What’s new in OpenText Axcelerate CE 21.2 Legal teams and law firms are under pressure to contain the cost of eDiscovery against rising data volumes and new forms of data such as … The post What’s new in OpenText Axcelerate appeared first on OpenText Blogs.

Cloud 52
article thumbnail

NATO Warns it Will Consider a Military Response to Cyber-Attacks via Information Security Magazine

IG Guru

Check out the article here. The post NATO Warns it Will Consider a Military Response to Cyber-Attacks via Information Security Magazine appeared first on IG GURU.