Fri.May 06, 2022

article thumbnail

Pro-Ukraine Groups Exploit Containers to Launch DoS Attacks

Data Breach Today

Unsuspecting Hosts Are Potential Targets for Retaliation Containers and cloud-based resources are being used to launch DoS attacks against Russian, Belarusian and Lithuanian websites. Cybersecurity firm CrowdStrike's researchers say that through their Docker Engine honeypots, they observed two different Docker images targeting these assets.

Honeypots 246
article thumbnail

The growing need for digital forensic investigators

OpenText Information Management

The statistics about increased cybercrime are everywhere you turn. According to the FBI’s 2021 Internet Crime Report, the FBI Internet Crime Complaint Center saw a record 847,376 complaints in 2021, representing a 7% increase from the prior year. Perhaps more disturbing is the cybercrimes committed against the most vulnerable in society – our children.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Illuminate Education Mega-Breach Affects K-12 Students

Data Breach Today

Probe Finds 1 Million Students' Personal Details Stolen From Unencrypted Database New York state officials are investigating a data breach at Illuminate Education, maker of a widely used software platform for K-12 schools. More than 1 million current and former New York students' personal details were exposed, and some students in Colorado and Connecticut were also affected.

Education 246
article thumbnail

Weekly Update 294

Troy Hunt

It's back to business as usual with more data breaches, more poor handling of them and more IoT pain. I think on all those fronts there's a part of me that just likes the challenge and the opportunity to fix a broken thing. Or maybe I'm just a sucker for punishment, I don't know, but either way it's kept me entertained and given me plenty of new material for this week's video 😊 References The book is almost ready to launch!

IoT 106
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Evolving Ransomware Trends in the Healthcare Sector

Data Breach Today

HHS HC3 Report Spotlights How Threat Actors' TTPs Are Changing Financially motivated and state-sponsored threat actors continue to evolve their tactics, techniques and procedures for successful attacks against healthcare and public health sector entities, federal authorities warn in a new report on the latest ransomware trends in healthcare.

More Trending

article thumbnail

EU Grants Europol Supervised Data Processing Powers

Data Breach Today

Powers Remove GDPR Restrictions; Independent Authority Will Oversee Use The European Parliament has granted Europol permission to receive and process datasets from private parties and pursue research projects for better handling of security-related cases. Use of these powers will be overseen by the European Data Protection Supervisor and the Fundamental Rights Officer.

GDPR 240
article thumbnail

Scammer Infects His Own Machine with Spyware, Reveals True Identity

Dark Reading

An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he infected himself with Agent Tesla.

article thumbnail

Stock Selloff: Cloudflare, Rapid7, SentinelOne Hardest Hit

Data Breach Today

16 Security Stocks Fared Worse Than the Nasdaq Thursday, While Just 11 Did Better Cybersecurity companies took Thursday's selloff on the chin, with Rapid7, Cloudflare and SentinelOne experiencing double-digit stock price drops in Wall Street's worst day of 2022. The Nasdaq Composite Index fell 5% Thursday amid concerns around inflation and soft earnings from online retailers.

Retail 238
article thumbnail

NetDooka framework distributed via a pay-per-install (PPI) malware service

Security Affairs

Researchers discovered a sophisticated malware framework, dubbed NetDooka, distributed via a pay-per-install (PPI) malware service known as PrivateLoader. Trend Micro researchers uncovered a sophisticated malware framework dubbed NetDooka that is distributed via a pay-per-install (PPI) service known as PrivateLoader and includes multiple components, including a loader, a dropper, a protection driver, and a full-featured remote access trojan (RAT) that implements its protocol for C2 communication

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ISMG Editors: Zero Trust Special

Data Breach Today

Father of Zero Trust John Kindervag Joins Editors John Kindervag, creator of Zero Trust, and two ISMG editors discuss whether we have advanced or regressed in security technology, implementing Zero Trust security in OT environments, and how federal agencies are progressing with Zero Trust adoption a year after the cybersecurity executive order.

article thumbnail

QNAP fixes multiple flaws, including a QVR RCE vulnerability

Security Affairs

QNAP addressed multiple vulnerabilities, including a critical remote execution flaw affecting the QVR video surveillance solution. QNAP has addressed multiple vulnerabilities, including a critical security issue, tracked as CVE-2022-27588 (CVSS score of 9.8), that could be exploited by a remote attacker to execute arbitrary commands on vulnerable QVR systems.

article thumbnail

The Ransomware Files, Episode 7: Ryuk's Rampage

Data Breach Today

Rockford Public Schools in Rockford, Illinois, was hit by Ryuk ransomware days after the school year started in September 2019. The attack encrypted more than 6 million files, wrecked applications and locked up servers. But the district kept classes running while mounting a mighty recovery effort.

article thumbnail

How the thriving fraud industry within Facebook attacks independent media

Security Affairs

Experts investigate how stolen Facebook accounts are used as part of a well-established fraud industry inside Facebook. No eyebrows were raised in Quriums security operation center when the independent Philippine media outlet Bulatlat once again got DDoSed , as they are a frequent target of such digital attacks. However, when we noticed that the attack traffic came from valid users in Vietnam, we started to smell a rat….

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Post-Quantum Cryptography Set to Replace RSA, AES, ECC

Dark Reading

In the next 10 years, public-key encryption needs to be replaced by post-quantum techniques that can stand up to the new challenges.

article thumbnail

Your KnowBe4 Fresh Content Updates from April 2022

KnowBe4

Check out the 67 new pieces of training content added in April, alongside the always fresh content update highlights and new features.

article thumbnail

Small Drones Are Giving Ukraine an Unprecedented Edge

WIRED Threat Level

From surveillance to search-and-rescue, consumer drones are having an unprecedented impact on Ukraine’s defense against Russia.

article thumbnail

Anonymous and Ukraine IT Army continue to target Russian entities

Security Affairs

The Anonymous collective and the volunteer group Ukraine IT Army continues to launch cyber attacks on Russian entities. The Anonymous collective continues its cyber war on Russian businesses and government organizations. Below is the list of the most recent organizations targeted by the collective that also leaked stolen data through the DDoSecrets platform: CorpMSP is a federal institution providing support to small and medium-sized businesses.

IT 79
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What We've Learned in the 12 Months Since the Colonial Pipeline Attack

Dark Reading

The attack may have been "a major wake-up call" about the need for greater resilience in IT environments, but have security teams hit the snooze bar one too many times?

article thumbnail

Ukraine IT Army hit EGAIS portal impacting Russia’s alcohol distribution

Security Affairs

Ukraine IT Army launched massive DDoS attacks on the EGAIS portal that has a crucial role in Russia’s alcohol distribution. The collective of hacktivists Ukraine IT Army has launched a series of massive DDoS attacks on the Unified State Automated Alcohol Accounting Information System (EGAIS) portal, which is considered crucial for alcohol distribution in Russia. “Producers and distributors of alcohol for the first May holidays could not ship products to their customers due to a large

IT 76
article thumbnail

Ikea Canada Breach Exposes 95K Customer Records

Dark Reading

An unauthorized employee accessed Ikea's customer database, but it's unclear what the intention was.

Access 98
article thumbnail

Vulnerable Docker Installations Are A Playhouse for Malware Attacks

Security Affairs

Uptycs researchers identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API. The Uptycs Threat Research team has identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API port 2375. The attacks are related to crypto miners and reverse shells on the vulnerable servers using base64-encoded commands in the cmdline, built to evade defense mechanisms.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Passwords: Do Actions Speak Louder Than Words?

Dark Reading

For most of us, passwords are the most visible security control we deal with on a regular basis, but we are not very good at it.

article thumbnail

USB-based Wormable Malware Targets Windows Installer

Threatpost

Activity dubbed ‘Raspberry Robin’ uses Microsoft Standard Installer and other legitimate processes to communicate with threat actors and execute nefarious commands.

article thumbnail

Colonial Pipeline 1 Year Later: What Has Yet to Change?

Dark Reading

The incident was a devastating attack, but it exposed gaps in cybersecurity postures that otherwise would have gone unnoticed.

article thumbnail

VPN Providers Threaten to Quit India Over New Data Law via Wired

IG Guru

Check out the article here. The post VPN Providers Threaten to Quit India Over New Data Law via Wired appeared first on IG GURU.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

AT&T Expands Access to Advanced Secure Edge and Remote Workforce Capabilities

Dark Reading

AT&T SASE with Cisco Meraki offers fully integrated network and security tools for convenient, high-performing, and protected access from anywhere

Access 73
article thumbnail

What is the most popular EDI transaction? 

OpenText Information Management

I’m often asked about the most popular EDI transaction. As OpenText™ Trading Grid is the world’s largest B2B/EDI integration platform handling over 33 billion EDI transactions every year, I contacted our engineering team to find out. The report that was provided to me, proved that visibility into transactions and the supply chain is key for … The post What is the most popular EDI transaction?

B2B 59
article thumbnail

Top Questions To Ask When Moving Your Infrastructure To The Cloud

Adapture

More and more companies are moving infrastructure and data to the cloud. The cloud offers a number of advantages, such as reduced IT costs, business continuity, automatic app updates, and more. The cloud also gives employees access to company applications and data from anywhere with an internet connection. However, moving to the cloud is a massive undertaking, and it might not always be the right choice.

Cloud 52