Sun.Mar 29, 2020

article thumbnail

Source code of Dharma ransomware now surfacing on public hacking forums

Security Affairs

The source code of the infamous Dharma ransomware is now available for sale on two Russian-language hacking forums. The source code of one of the most profitable ransomware families, the Dharma ransomware , is up for sale on two Russian-language hacking forums. The Dharma ransomware first appeared on the threat landscape in February 2016, at the time experts dubbed it Crysis.

article thumbnail

Return of the eDiscovery Daily Thought Leader Interviews!: eDiscovery Trends

eDiscovery Daily

Let’s face it, we need something to take our mind off the COVID-19 pandemic more than ever. So, with that in mind, the appearance of the dancing light bulb can only mean one thing – it’s time for another thought leader series! Given that there’s not a lot of eDiscovery-specific news to cover right now with Federal and State courts closed and other eDiscovery activities limited , I thought now might be a good time to bring back the Thought Leader interviews that I conducted at Legaltech for eigh

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Coronavirus-themed attacks March 22 – March 28, 2020

Security Affairs

In this post, I decided to share the details of the Coronavirus-themed attacks launched from March 22 to March 28, 2020. Threat actors exploit the interest in the COVID19 outbreak while infections increase worldwide, experts are observing new campaigns on a daily bases. Below a list of attacks detected this week. March 23 – COVID19-themed campaign delivers a new variant of Netwalker Ransomware.

article thumbnail

Homographic Hacking: What It Is and How It Works

Adam Levin

If you are moving fast as we tend to do during the workday, the following four web addresses may not look so different from each other: Google.com. Google.?om. Goog?e.c?m. ? oogle.com. Google.c ? m. While some examples are more noticeable than others, in each version of the above URL address one letter or character has been replaced with a letter from non-Latin, or Roman, alphabet.

IT 81
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FIN7 hackers target enterprises with weaponized USB drives via USPS

Security Affairs

The FIN7 APT group has been targeting businesses with malicious USB drives and Teddy Bears sent to the victims, the FBI warns. The FBI is warning of a new wave of attacks carried out by the FIN7 APT group that is sending to the victims devices acting as a keyboard (HID Emulator USB) when plugged into a computer. “Recently, the cybercriminal group FIN7,1 known for targeting such businesses through phishing emails, deployed an additional tactic of mailing USB devices via the United States Po

Phishing 102