Fri.Jun 25, 2021

article thumbnail

US Secret Service Releases 'Most Wanted' Cyber Fugitive List

Data Breach Today

Agency Offering $1 Million Rewards for Information on 2 Ukrainian Suspects The U.S. Secret Service has published a Most Wanted Fugitives list featuring 10 suspects wanted in connection with financial cybercrimes The agency is offering rewards of up to $1 million for information on two Ukrainian suspects who allegedly targeted the SEC in 2016.

318
318
article thumbnail

MyBook Users Urged to Unplug Devices from Internet

Krebs on Security

Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious hackers are remotely wiping the drives using a critical flaw that can be triggered by anyone who knows the Internet address of an affected device. One of many similar complaints on Western Digital’s user forum.

Access 303
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

High-Ranking FIN7 Gang Member Receives 7-Year Prison Term

Data Breach Today

Prosecutors Say Andrii Kolpakov Was a 'Pen Tester' for Payment Card Theft Group A high-ranking member of the FIN7 payment card theft group has been sentenced to seven years in federal prison. Andrii Kolpako worked as a "pen tester" for the organization, prosecutors say.

316
316
article thumbnail

Cisco ASA Bug Now Actively Exploited as PoC Drops

Threatpost

In-the-wild XSS attacks have commenced against the security appliance (CVE-2020-3580), as researchers publish exploit code on Twitter.

Security 138
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Binance Says It Helped With Clop Money Laundering Bust

Data Breach Today

Cryptocurrency Exchange Acknowledges Flow of Illicit Funds a Big Problem Cryptocurrency exchange Binance says it recently assisted police in tracking down individuals accused of laundering money for the Clop ransomware group. The exchange acknowledges that illicit money from cyberattacks circulating on virtual currency exchanges is a big security problem.

IT 304

More Trending

article thumbnail

Sizing Up the Security Features Slated for Windows 11

Data Breach Today

Microsoft Promises Better 'Zero Trust' Capability, Passwordless Access Security specialists are offering preliminary feedback on Microsoft's sneak peek at the new security measures to be included in the Windows 11 operating system, which is slated for release in December.

Security 268
article thumbnail

Getting to know Declarative Management

Jamf

Apple gave us a glimpse of its vision for the future of mobile device management (MDM) at its 2021 World Wide Developers Conference with the introduction of Declarative Management.

MDM 107
article thumbnail

DarkSide Created a Linux Version of Its Ransomware

Data Breach Today

AT&T's Alien Labs: Malware Designed to Target Servers Hosting VMware Virtual Machines The DarkSide Russian-speaking cybercrime group, which announced May 13 it was closing its ransomware-as-a-service operation, had earlier completed a Linux version of its malware designed to target ESXi servers hosting VMware virtual machines, according to AT&T’s Alien Labs.

article thumbnail

What the Pentagon’s New UFO Report Reveals About Humankind

WIRED Threat Level

The document says less about the search for life in the universe, and more about our current cultural climate and distrust of expertise.

Security 121
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

ISMG Editors’ Panel: Examining Open-Source Software Security

Data Breach Today

Also: Updating SOCs, Communicating With the Board In the latest weekly update, a panel of Information Security Media Group editors discusses key topics, including open-source software vulnerabilities, and provides insights on updating SOCs and communicating effectively with the board.

Security 236
article thumbnail

Hackers exploit 3-years old flaw to wipe Western Digital devices

Security Affairs

Threat actors are wiping many Western Digital (WD) My Book Live and My Book Live Duo NAS devices likely exploiting an old vulnerability. Owners of Western Digital (WD) claim that their My Book Live and My Book Live Duo network-attached storage (NAS) devices have been wiped. Threat actors forced a factory reset on the devices resulting in the deletion of all files. “When I couldn’t access any of the 4 Network drives I created, I went to Network and double clicked on the MyBookLive Icon, whi

article thumbnail

Tulsa: Ransomware Attackers Leaked 18,000 Files

Data Breach Today

Information Handled by the Police Department Exposed The city of Tulsa issued a warning this week that a ransomware group that attacked the city in May leaked more than 18,000 city files on the dark web; it's advising residents to take precautions.

article thumbnail

AI-Piloted Fighter Jets

Schneier on Security

News from Georgetown’s Center for Security and Emerging Technology: China Claims Its AI Can Beat Human Pilots in Battle: Chinese state media reported that an AI system had successfully defeated human pilots during simulated dogfights. According to the Global Times report , the system had shot down several PLA pilots during a handful of virtual exercises in recent years.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Analysis: CISA's Conclusions on Firewall Missteps

Data Breach Today

This edition of the ISMG Security Report features an analysis of CISA's finding that agencies could have prevented follow-on attacks after the SolarWinds supply chain attack by properly configuring firewalls. Also featured: Congressman discusses deterring nation-state attacks; insider threat mitigation tips.

Security 170
article thumbnail

Mercedes-Benz Customer Data Flies Out the Window

Threatpost

For over three years, a vendor was recklessly driving the cloud-stored data of luxury-car-owning customers and wannabe buyers.

Cloud 109
article thumbnail

Data Privacy Is in 23andMe CSO's DNA

Dark Reading

How serious is the company about safeguarding its customers and their genetic information? "We're hiding data even from ourselves," says the biotech and genetic testing company's head of security.

article thumbnail

PS3 Players Ban: Latest Victims of Surging Attacks on Gaming Industry  

Threatpost

Every Sony PlayStation 3 ID out there was compromised, provoking bans of legit players on the network.

Cloud 120
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

European Data Protection Board Issues Final Schrems II Recommendations

Data Matters

The European Data Protection Board (“ EDPB ”), adopted on 18 June 2021 its final recommendations describing how controllers and processors transferring personal data outside the European Economic Area (“ EEA ”) may comply with the Schrems II ruling (“ Final Schrems II Recommendations ”). The Final Schrems II Recommendations, together with the new Standard Contractual Clauses (“ SCCs” ) adopted by the European Commission on 4 June 2021, will now allow organizations to proceed with addressing inte

article thumbnail

Hackers Crack Pirated Games with Cryptojacking Malware

Threatpost

Threat actors have so far made about $2 million from Crackonosh, which secretly mines Monero cryptocurrency from affected devices.

Mining 103
article thumbnail

US Takedown of Iranian Media Sites Extends a Thorny Precedent

WIRED Threat Level

Free speech advocates raised concerns after the Justice Department seized more than 30 domains this week.

article thumbnail

My Book Live Users Wake Up to Wiped Devices, Active RCE Attacks

Threatpost

“I am totally screwed,” one user wailed after finding years of data nuked. Western Digital advised yanking the NAS storage devices offline ASAP: There's an exploit.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Epsilon Red – our research reveals more than 3.5 thousand servers are still vulnerable

Security Affairs

CyberNews researchers analyzed the recently discovered Epsilon Red operations and found that more than 3.5K servers are still vulnerable. Several weeks later, security researchers from Sophos have discovered a new ransomware variant known as Epsilon Red. Now, we know exactly how it was carried out – and what you should do to be safe from it. Seemingly, a variant of the ransomware , Epsilon Red , relies on vulnerable Microsoft Exchange servers.

article thumbnail

FIN7 ‘Pen Tester’ Headed to Jail Amid $1B in Payment-Card Losses

Threatpost

One of the Carbanak cybergang's highest-level hackers is destined to serve seven years while making $2.5 million in restitution payments.

article thumbnail

Clop gang members recently arrested laundered over $500M in payments

Security Affairs

The Clop ransomware members that were recently arrested laundered over $500M in ransomware payments for several malicious actors. The members of the Clop ransomware gang that were recently arrested in Ukraine laundered over $500M for several cybercrime groups. Data related to the money laundering activities were provided by the cryptocurrency exchange portal Binance, who tracked the group as FancyCat , the funds resulted from the operations of Clop and Petya ransomware.

article thumbnail

The 7 most common data quality issues

Collibra

Data-driven organizations are depending on modern technologies and AI to get the most out of their data assets. But they struggle with data quality issues all the time. Incomplete or inaccurate data, security problems, hidden data – the list is endless. Several surveys reveal the extent of cost damages across many verticals due to the problems associated with data quality.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

New NYC Biometric Law Takes Effect In Two Weeks – Is Your Organization Ready?

Privacy and Cybersecurity Law

On January 10, 2021, the New York City Council enacted a new biometric law requiring certain commercial establishments within New York City that collect “biometric identifier information” to prominently display signage that such information is being collected and prohibiting those establishments from selling or sharing the information with others.

Sales 52
article thumbnail

What’s new in OpenText Axcelerate

OpenText Information Management

The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ Axcelerate™. Check out the latest updates below. June 2021: What’s new in OpenText Axcelerate CE 21.2 Legal teams and law firms are under pressure to contain the cost of eDiscovery against rising data volumes and new forms of data such as … The post What’s new in OpenText Axcelerate appeared first on OpenText Blogs.

Cloud 52
article thumbnail

NATO Warns it Will Consider a Military Response to Cyber-Attacks via Information Security Magazine

IG Guru

Check out the article here. The post NATO Warns it Will Consider a Military Response to Cyber-Attacks via Information Security Magazine appeared first on IG GURU.