Wed.Feb 15, 2023

article thumbnail

Government Sanctions: No Ransomware Please, We're British

Data Breach Today

UK Toughens Anti-Cybercrime Stance by Sanctioning Accused Operators for First Time As ransomware continues to disrupt British organizations, the U.K. for the first time has sanctioned alleged cybercriminals, including accused Conti and TrickBot operators. Ransomware victims must conduct due diligence before paying any ransom, as violating sanctions carries severe penalties.

article thumbnail

European Parliament Committee Opposes Adequacy Under EU-U.S. Data Privacy Framework in Draft Opinion

Hunton Privacy

On February 14, 2023, in a Draft Motion for a Resolution on the adequacy of the protection afforded by the proposed EU-U.S. Data Privacy Framework (the “Framework”), the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs (the “Committee”) urged the European Commission not to adopt adequacy based on the Framework, on the basis that it “fails to create actual equivalence” with the EU in the level of data protection that it provides.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Royal Mail Refused 'Absurd' LockBit Extortion Demand

Data Breach Today

Hackers Demanded $80 Million in Ransom Negotiations between the LockBit ransomware-as-a-service gang and Royal Mail appear to have broken down shortly after a postal representative called the criminal group's $80 million extortion demand "absurd." A LockBit ransomware attack incapacitated Royal Mail's international shipping operation.

article thumbnail

Microsoft Patch Tuesday Includes Three Exploited Zero-Day Vulnerabilities

eSecurity Planet

Microsoft’s February 2023 Patch Tuesday fixes 75 vulnerabilities, nine of them rated critical, and three (all rated important) that are being exploited. “This is only the second Patch Tuesday of the year, and we have already tripled the number of weaponized threats that need to be fixed in this release,” Syxsense CEO and founder Ashley Leonard told eSecurity Planet. “We also have five patches that resolve vulnerabilities with a CVSS score of more than 9 (critical), which

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russian Found Guilty of Insider Trading in Hacking Case

Data Breach Today

$90 Million in Proceeds Illegally Netted by Using Pre-Public Earnings Information Vladislav Klyushin, who ran a Moscow-based IT services firm associated with the Russian government, has been found guilty of running a criminal hacking scheme that earned $90 million via insider trading. He faces up to 50 years in prison. His four alleged co-conspirators remain at large.

More Trending

article thumbnail

Oakland Declares Emergency Following Ransomware Attack

Data Breach Today

Police Say Responses to Nonemergencies Are Delayed; Emergency Systems Unaffected The California city of Oakland is in a state of emergency as its response to a ransomware attack enters its second week. The attack did not affect emergency systems, including 911 dispatch and fire services, or the city's financial systems, the city says.

article thumbnail

Australians able to opt out of targeted ads and erase their data under proposed privacy reforms

The Guardian Data Protection

Individual rights could be modelled on the EU’s general data protection regulation or GDPR, a review by the attorney general’s department says Get our morning and afternoon news emails , free app or daily news podcast Australians would gain greater control of their personal information, including the ability to opt out of targeted ads, erase their data and sue for serious breaches of privacy, under a proposal to the Albanese government.

Privacy 96
article thumbnail

Deepwatch Raises $180M in Splunk-Backed Funding to Boost MDR

Data Breach Today

MDR Firm Will Use Money to Boost Threat Analytics, Security Scoring, User Interface Managed detection and response titan Deepwatch has received a $180 million investment to strengthen its threat analytics, user interface and security scoring for clients. The money from Splunk, Springcoast and Vista will allow Deepwatch to invest in R&D, platform innovation and threat intelligence.

Analytics 130
article thumbnail

New Survey Reveals Employees are the Attack Surface

KnowBe4

A survey by Tanium has found that IT security professionals in the UK say that 64% of avoidable cyber attacks are due to human error, which usually involves falling for phishing attacks. More than half of the respondents said that loss of productivity would be their main concern following a cyber attack.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Feds Urge Health Sector Entities to Guard Against DDoS

Data Breach Today

HHS Guidance Comes After Attack Campaigns by Russian Nuisance Hackers Federal authorities are urging healthcare sector entities to take steps to protect their web applications, connected devices and other critical systems against distributed denial-of-service attacks. The warning comes weeks after a wave of DDoS attacks from Russian nuisance hacking group KillNet.

130
130
article thumbnail

Russian Cybercriminal Faces Decades in Prison for Hacking and Trading Operation

Dark Reading

Vladislav Klyushin and co-conspirators used SEC filings stolen from the networks of Tesla, Roku, and other publicly traded companies to earn nearly $100 million in illegal trades.

88
article thumbnail

Open Systems Splits Ontinue MDR Division From SASE Business

Data Breach Today

Split Will Help Open Systems, Ontinue Optimize Engineering Stack and Selling Motion Open Systems has split its MDR and SASE businesses into separate divisions with unique executive teams to help each optimize its engineering stack and selling motion. The 300-person MDR division will be known as Ontinue and led by Geoff Haydon, who had served as Open Systems CEO since February 2021.

IT 130
article thumbnail

US Border Patrol Is Finally Able to Check E-Passport Data

WIRED Threat Level

After 16 years, the agency has implemented the software to cryptographically verify digital passport data—and it’s already caught a dozen alleged fraudsters.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Demisto Founders Launch Passwordless Authentication Company

Data Breach Today

Descope to Help Developers Make Authentication Part of Application Build Process The founding team behind SOAR vendor Demisto has started a passwordless authentication and user management platform company that caters to the developer community. Descope helps developers embed authentication in the application build process and competes with Auth0 in the CIAM space.

article thumbnail

Reddit is the Latest Victim of a Spear Phishing Attack Resulting in a Data Breach

KnowBe4

There is a lot to learn from Reddit's recent data breach, which was the result of an employee falling for a “sophisticated and highly-targeted” spear phishing attack.

article thumbnail

Adobe addressed critical bugs in Illustrator, After Effects Software

Security Affairs

Adobe Patch Tuesday addressed at least a half dozen vulnerabilities, including critical issues that expose Windows and macOS to hack. Adobe released security updates to address at least a half dozen vulnerabilities impacting Photoshop, Illustrator and After Effects for both Windows and macOS users. Adobe addressed four critical issues (CVE-2022-24094, CVE-2022-24095, CVE-2022-24096, and CVE-2022-24097) affecting the After Effects products, successful exploitation could lead to arbitrary code exe

article thumbnail

FTC: Romance Scams Cost U.S. Victims a Total of $1.3 Billion

KnowBe4

Seemingly repeating the previous year, the FTC’s latest report highlights that nearly 70,000 people reported being the victim of a romance scam last year.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Citrix released security updates for multiple High-Severity flaws in its products

Security Affairs

Citrix released security updates for multiple High-Severity flaws in Virtual Apps and Desktops, and Workspace apps for Windows and Linux. Citrix released security patches to fix multiple vulnerabilities in Virtual Apps and Desktops, and Workspace apps for Windows and Linux. The first issue listed in the support Knowledge Center of the company, tracked as CVE-2023-24483 , is a Privilege Escalation to NT AUTHORITYSYSTEM on the vulnerable VDA. “A vulnerability has been identified that, if exp

IT 85
article thumbnail

Security Awareness: The Top Trend of 2023

KnowBe4

The Dutch organization Supply Value (a specialist in network optimalisation) together with the website Computable , published an article on their annual research into the top trends in IT for 2023.

article thumbnail

GAO Calls for Improved Data Privacy Protections

Dark Reading

US federal watchdog agency outlines key measures for better protecting sensitive data under the federal government's control.

article thumbnail

City of Oakland issued a local state of emergency after recent ransomware attack

Security Affairs

The City of Oakland has declared a local state of emergency due to the effect of the ransomware attack that hit the city on February 8, 2023. The City of Oakland disclosed last week a ransomware attack , the security breach began on February 8, 2023. In an abundance of caution, the City of Oakland has taken impacted systems offline, while they work to secure the impacted infrastructure.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Brivo Reveals Top Security Trends for 2023: Convenience Is King in Securing the Hybrid Workplaces of the Future

Dark Reading

Factoring user experience and convenience into how employees and tenants access buildings is top concern for security professionals says benchmark industry survey.

article thumbnail

Deepfake Crackdown After 4Chan Users Make Celebrity Voices Say Racist, Transphobic, and Violent Things

KnowBe4

As deepfake technology continues to improve, creators of deepfake technology seek to lock down and safeguard the use of their technology after inappropriate use shows up on the web.

77
article thumbnail

ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally

Dark Reading

Incident response triage and software vulnerability discovery are two areas where the large language model has demonstrated success, although false positives are common.

Security 111
article thumbnail

The Pain of Double Extortion Ransomware

Thales Cloud Protection & Licensing

The Pain of Double Extortion Ransomware divya Thu, 02/16/2023 - 06:10 Ransomware perpetrators are adopting more sophisticated attack techniques with much success. Attackers are increasingly threatening double and triple extortion in addition to ransom demands, putting more pressure on victims to comply. According to a recent market study 1 , 71% of individuals surveyed said double and triple extortion tactics have grown in popularity over the last 12 months, and 65% agree that these new threats

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Community Health Systems data breach caused by GoAnywhere MFT hack

Security Affairs

Community Health Systems (CHS) disclosed a data breach, attackers exploited the zero-day vulnerability in Fortra’s GoAnywhere MFT platform. Community Health Systems (CHS) is one of the nation’s leading healthcare providers. CHS operates 79 acute-care hospitals and more than 1,000 other sites of care, including physician practices, urgent care centers, freestanding emergency departments, occupational medicine clinics, imaging centers, cancer centers and ambulatory surgery centers.

article thumbnail

Descope Handles Authentication So Developers Don't Have To

Dark Reading

Developers don't have to build authentication and user management from scratch, and can devote their energies to the core functions of the application, instead.

article thumbnail

What to Look for When Buying a Security Camera (2023): Tips and Risks

WIRED Threat Level

Eufy's recent scandal shows it's not so much about the data breach but about how a company responds. Here are a few ways to shop smart.