Mon.Dec 05, 2022

article thumbnail

Fresh CryWiper Wiper Malware Aims to Destroy Russian Data

Data Breach Today

Fake Ransomware Isn't First Wiper to Target Windows Systems in Russia for Deletion Windows systems in Russia are being stalked by a new Trojan that purports to be ransomware but is really designed to wipe PCs and leave them unrecoverable, security researchers say. Dubbed CryWiper, it's one of a number of wipers - mostly targeting Ukraine - seen in the wild this year.

article thumbnail

Judge Orders U.S. Lawyer in Russian Botnet Case to Pay Google

Krebs on Security

In December 2021, Google filed a civil lawsuit against two Russian men thought to be responsible for operating Glupteba , one of the Internet’s largest and oldest botnets. The defendants, who initially pursued a strategy of counter suing Google for interfering in their sprawling cybercrime business, later brazenly offered to dismantle the botnet in exchange for payment from Google.

Mining 220
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Warns of Growing Russian Digital Threats to Europe

Data Breach Today

Russia May Target Supply Chain Operations and Boost Influence Operations Russian actors may be more willing this winter to use digital tools to coerce and influence Europe away from its support of Ukraine, computing giant Microsoft warns. The Kremlin has at its disposal ransomware and active digital disinformation operations.

article thumbnail

CAPTCHA

Schneier on Security

This is an actual CAPTCHA I was shown when trying to log into PayPal. As an actual human and not a bot, I had no idea how to answer. Is this a joke? (Seems not.) Is it a Magritte-like existential question? (It’s not a bicycle. It’s a drawing of a bicycle. Actually, it’s a photograph of a drawing of a bicycle. No, it’s really a computer image of a photograph of a drawing of a bicycle.

IT 121
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hacked French Hospital Suspends Emergency Operations

Data Breach Today

Six Patients Transferred; 'Total Reorganization' Ongoing, Says Health Minister A French hospital in the Parisian suburbs scrambled to respond to a weekend cyber incident by transferring patients, directing emergency cases elsewhere and bringing on additional staffers to observe patients. The incident does not appear to have spread beyond the Hospital Center of Versailles.

147
147

More Trending

article thumbnail

Snyk's Iain Rose on How to Secure Cloud-Native Environments

Data Breach Today

Rose on Why Apps and Dev Workflows Must Embrace the Cloud's Rapid Rate of Change Organizations should build apps and design development workflows in a way that embraces how quickly cloud-native architectures change, says Snyk Solutions Engineer Iain Rose. Unlike traditional on-premises environments, containerized applications are designed to be ephemeral, Rose notes.

Cloud 130
article thumbnail

Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web

Security Affairs

Resecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers and operators. “In the Box” dark web marketplace is leveraged by cybercriminals to attack over 300 financial institutions (FIs), payment systems, social media and online-retailers in 43 countries. Resecurity, the California-based cybersecurity company protecting major Fortune 500 companies, has identified a new underground marketplace in the Dark Web oriented towards

Retail 98
article thumbnail

Rackspace Hosted Exchange Still Offline Over Security Issue

Data Breach Today

Thousands of Affected Customers Urged to Use Microsoft 365 - At Least Temporarily Thousands of Rackspace customers continue to face hosted Microsoft Exchange Server outages after the managed services giant took the offering offline after being affected by an unspecified security incident Thursday. Rackspace urges affected customers to at least temporarily move to Microsoft 365.

Security 130
article thumbnail

Met police illegally filmed children as young as 10 at climate protest

The Guardian Data Protection

Big Brother Watch’s FoI request shows force rebuked by watchdog for recording 2019 school strike action in London Police unlawfully spied on children as young as 10 taking part in a climate strike protest in London, documents have shown. The previously unseen papers reveal the Metropolitan police were rebuked by the information commissioner’s office (ICO) for video surveillance of the March 2019 protest, which was attended by up to 10,000 children and young people.

Paper 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to Predict New Account Risk

Data Breach Today

Robin Love of Early Warning on How to Look at Fraud Risk Holistically Application fraud has spiked - particularly bogus new accounts - and organizations are scrambling to improve fraud detection mechanisms without negatively affecting the legitimate customer's experience. Robin Love of Early Warning shares insights on how to better predict new account risk.

Risk 130
article thumbnail

Successfully implementing a data quality & observability solution

Collibra

Each organization has its own unique challenges when it comes to data. There is enough understanding of how poor-quality data affects business decisions. But the challenges of delivering high-quality data may be overwhelming. There may be data silos, the technology stack may be constrained to detect all quality issues, and there may be a lack of trust.

Cloud 98
article thumbnail

Securonix Taps Ivanti, BMC, SAP Vet Nayaki Nayyar as New CEO

Data Breach Today

Nayyar Is First Female CEO, Longtime CEO Ends 12-Year Run Securonix has snagged longtime Ivanti, BMC Software and SAP executive Nayaki Nayyar as CEO to strengthen product capabilities and customer experience. One of seven female CEOs in the vendor community, she was praised for doubling Ivanti's total addressable market during her 30 months as president.

article thumbnail

Credential Phishing with Apple Gift Card Lures

KnowBe4

A phishing campaign is impersonating Apple and informing the user that their Apple account has been suspended due to an invalid payment method, according to researchers at Armorblox.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Privacy War Is Coming

Dark Reading

Privacy standards are only going to increase. It's time for organizations to get ahead of the coming reckoning.

Privacy 123
article thumbnail

Critical Ping bug potentially allows remote hack of FreeBSD systems

Security Affairs

A critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD systems. The maintainers of the FreeBSD operating system released updates to address a critical flaw, tracked as CVE-2022-23093, in the ping module that could be potentially exploited to gain remote code execution. The ping utility allows testing the reachability of a remote host using ICMP messages, it requires elevated privileges to use raw sockets.

IT 96
article thumbnail

Ransomware Professionalization Grows as RaaS Takes Hold

Dark Reading

As ransomware's prevalence has grown over the past decade, leading ransomware groups such as Conti have added services and features as part of a growing trend toward professionalization.

article thumbnail

French hospital cancels operations after a ransomware attack

Security Affairs

A French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the weekend. France’s health ministry announced that the Hospital Centre of Versailles was hit by a cyber attack over the weekend. Hospital Centre of Versailles, which includes Andre-Mignot Hospital, Richaud Hospital and the Despagne Retirement Home, canceled operations and transferred some patients due to the cyberattack.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Infostealer Malware Market Booms, as MFA Fatigue Sets In

Dark Reading

The successful combo of stolen credentials and social engineering to breach networks is increasing demand for infostealers on the Dark Web.

article thumbnail

Micro Focus Communities—Industry Gold Award Winner

Micro Focus

Verint’s Innovate Awards 2022 presented its Gold Award for Driving Digital-First Engagement to the Micro Focus Community site in recognition of its transforming customer and employee engagement through innovation, talent, and technology. The post Micro Focus Communities—Industry Gold Award Winner appeared first on Micro Focus Blog.

IT 73
article thumbnail

The New External Attack Surface: 3 Elements Every Organization Should Monitor

Dark Reading

In short, the global Internet is now part of your external attack surface. Here’s how to better protect your users and data.

93
article thumbnail

Drizly FTC Order Introduces Significant Minimization, Deletion and Retention Requirements

Data Matters

On October 24, 2022, the Federal Trade Commission (“ FTC ”) issued an order (the “ Order ”) against the online alcohol marketplace, Drizly, and its CEO, James Cory Rellas, alleging security failures that resulted in a data breach exposing the personal information of approximately 2.5 million consumers. In reaching this conclusion, the FTC alleges that Drizly failed to implement reasonable safeguards to protect the personal information it collected and stored, such as, two-factor authentication f

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cybersecurity Should Focus on Managing Risk

Dark Reading

Preventing all data breaches is an unrealistic goal. Instead, focus on finding and minimizing the greatest risks.

Risk 98
article thumbnail

Gain the information advantage with a complete 360-degree customer view – Part 2

OpenText Information Management

In part 1 of our blog series about gaining the information advantage with a complete 360-degree customer view, we discussed how better customer information management can boost operational efficiency and enables you to sell faster. Capture, manage, and deliver mission-critical documents to eliminate wasted time, duplicated work, and inefficient processes.

article thumbnail

Cyberattack Shuts Down French Hospital

Dark Reading

Patients transferred and operations canceled following a recent network breach at a hospital in the outskirts of Paris.

95
article thumbnail

HHS: Online trackers without prior authorization and BAAs can violate HIPAA

Data Protection Report

On the evening of December 1, 2022, the U.S. Department of Health and Human Services (HHS) issued a 12-page Bulletin titled “ Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates (the “Bulletin”). In the Bulletin, HHS stated that covered entities using third-party trackers on websites or mobile applications that collect or obtain protected health information (PHI) need, among other things, to have a business associate agreement (BAA) with that third party, or el

Privacy 62
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Palo Alto Networks Announces Medical IoT Security to Protect Connected Devices Critical to Patient Care

Dark Reading

The comprehensive zero trust security solution for medical devices lets healthcare organizations automate zero trust policy recommendations and manage new connected technologies quickly and securely.

IoT 69
article thumbnail

Accelerating partner innovation through digital self-serve co-create experience with IBM

IBM Big Data Hub

IBM invests in our partner ecosystem because we want to ensure that partners like you have the resources to build your business and develop software for your customers using IBM’s industry-defining hybrid cloud and AI platform. Together, we build and sell powerful solutions that elevate our clients’ businesses through digital transformation. To that end, IBM recently announced a set of embeddable AI libraries that empower partners to create new AI solutions.

article thumbnail

Hive Social Buzzing With Security Flaws, Analysts Warn

Dark Reading

Twitter alternative Hive Social took down its servers after researchers discovered several critical vulnerabilities.