Mon.Mar 20, 2023

article thumbnail

Why You Should Opt Out of Sharing Data With Your Mobile Provider

Krebs on Security

A new breach involving data from nine million AT&T customers is a fresh reminder that your mobile provider likely collects and shares a great deal of information about where you go and what you do with your mobile device — unless and until you affirmatively opt out of this data collection. Here’s a primer on why you might want to do that, and how.

Privacy 293
article thumbnail

How Russia's Ukraine War Disrupted the Cybercrime Ecosystem

Data Breach Today

War Upended Russian Brotherhood, Supply, Demand and Pricing, Says Intel Analyst Russia's invasion of Ukraine in 2022 threw Russia's cybercrime ecosystem into a state of upheaval that still exists to this day. "We identified disruptions to literally every single form of commodified cybercrime," said Alexander Leslie, associate threat intelligence analyst at Recorded Future.

249
249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation

The Last Watchdog

One common misconception is that scammers usually possess a strong command of computer science and IT knowledge. Related: How Google, Facebook enable snooping In fact, a majority of scams occur through social engineering. The rise of social media has added to the many user-friendly digital tools scammers, sextortionists, and hackers can leverage in order to manipulate their victims.

article thumbnail

Hacker Exploits Months-Old Bug to Steal Crypto From ATMs

Data Breach Today

Now-Patched Bug Allowed Thief to Remotely Steal User Passwords, Private Keys Bitcoin ATM manufacturer General Bytes suspended its cloud services supporting more than 15,000 machines after a hacker exploited a vulnerability in its software to steal user passwords and private keys and made off with cryptocurrency worth millions of dollars.

Passwords 195
article thumbnail

Beware of Pixels & Trackers: A Client-Side Security Report

At the beginning of 2023, concern grew over pixels and trackers, which load into the browser as a part of the software supply chain, being used by data harvesting platforms to collect user data. The data is then transferred to the servers of the companies owning the pixels/trackers as a part of their advertising and marketing business. Aggressive data harvesting practices increase the likelihood and/or actual transfer of sensitive data, which may cause unintended consequences, including expensiv

article thumbnail

Shouldering the Increasingly Heavy Cloud Shared-Responsibility Model

Dark Reading

There are a number of solutions that can help ensure security and compliance mandates are met in the cloud, but organizations should prioritize integration and policy-based management.

Cloud 133

More Trending

article thumbnail

FTC Announces Orders to Address Deceptive Advertising on Social Media and Video Streaming Platforms

Hunton Privacy

On March 16, 2023, the Federal Trade Commission announced it issued orders to eight social media and video streaming platforms seeking Special Reports on how the platforms review and monitor commercial advertising to detect, prevent and reduce deceptive advertisements, including those related to fraudulent healthcare products, financial scams and the sale of fake goods.

article thumbnail

Lawsuit Against Clinic Seeks Long List of Cyber Improvements

Data Breach Today

Proposed Class Action Filed Over Data Exfiltration Breach Affecting Nearly 442,000 An Alabama cardiovascular clinic is facing a proposed class action lawsuit filed by one of the nearly 442,000 individuals affected by a data exfiltration breach reported last month. The lawsuit seeks a detailed list of security improvements by the clinic and 10 years of court compliance monitoring.

article thumbnail

DOJ Publishes New Corporate Compliance Guidance Related to Communications Platforms and Messaging Applications

Hunton Privacy

On March 3, 2023, the U.S. Department of Justice (“DOJ”) released an update to its Evaluation of Corporate Compliance Programs guidance (“ECCP Guidance”). The ECCP Guidance serves as a guidance document for prosecutors when evaluating a corporate compliance program. Among other updates, the ECCP Guidance now includes new guidance for assessing how companies govern employees’ use of personal devices, communication platforms and messaging applications.

article thumbnail

It's Raining Zero-Days in Cyberspace

Data Breach Today

Chinese Hackers and Others Increasingly Favor Unpatched Vulnerabilities Last year was another bonanza in zero-days for Chinese state hackers, say security researchers in a report predicting a permanent uptick in nation-state exploitation of yet-unpatched vulnerabilities. "Attackers seek stealth and ease of exploitation," writes cybersecurity firm Mandiant.

article thumbnail

Why You Need to Use Case Studies in Sales and Marketing (and How to Start Now)

Case studies are proof of successful client relations and a verifiable product or service. They persuade buyers by highlighting your customers' experiences with your company and its solution. In sales, case studies are crucial pieces of content that can be tailored to prospects' pain points and used throughout the buyer's journey. In marketing, case studies are versatile assets for generating business, providing reusable elements for ad and social media content, website material, and marketing c

article thumbnail

CIPL Publishes Key Takeaways from Age Assurance and Age Verification Tools Roundtable

Hunton Privacy

On February 16, 2023, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP held a virtual roundtable to discuss the role of age assurance and age verification tools as part of its Children’s Data Privacy Project. Representatives from CIPL member companies, data protection authorities, civil society and experts exchanged views on the effectiveness of different methodologies and emerging best practices to shield minors from harmful or inappropriate content.

article thumbnail

Cyberattackers Hoop NBA Fan Data via Third-Party Vendor

Dark Reading

The basketball playoffs are around the corner and convincing social-engineering attacks on fans using NBA-themed lures could be too.

119
119
article thumbnail

Bill 96 in Québec Brings Up Important Point About Training in Native Language Everywhere

KnowBe4

A new law in Québec, Canada, that goes into effect this June will require all policies and training materials assigned to employees within the province be provided in French.

article thumbnail

From Data Chaos to Data Clarity: Four Trends Reshaping Data Management in the Digital Age

Reltio

Data has always been a valuable asset for businesses, but it has become crucial for survival in the digital age. With the explosion of data from digital channels and IoT devices, organizations find storing, managing and analyzing information increasingly challenging. The recent evolution of data management has responded to this challenge as businesses strive to make sense of the vast amounts of data and turn it into actionable insights.

MDM 97
article thumbnail

Apache Cassandra® NoSQL for the Relational DBA

Unleash the power of NoSQL with "Apache Cassandra® NoSQL for the Relational DBA." Learn from Lewis DiFelice, an experienced Professional Services Consultant at Instaclustr, as he shares his journey transitioning from SQL to managing a 40-node Cassandra cluster. Gain insights into Cassandra's architecture, configuration strategies, and best practices.

article thumbnail

ChatGPT Gut Check: Cybersecurity Threats Overhyped or Not?

Dark Reading

UK cybersecurity authorities and researchers tamp down fears that ChatGPT will overwhelm current defenses, while the CEO of OpenAI worries about its use in cyberattacks.

article thumbnail

[Eye Popper] The AI Genie Has Escaped: Stanford copied ChatGPT for a few hundred bucks

KnowBe4

Yikes. Loz Blain at NewAtlas just reported that Stanford has copied the ChatGPT AI for less than $600. The article started out with: "Stanford's Alpaca AI performs similarly to the astonishing ChatGPT on many tasks – but it's built on an open-source language model and cost less than US$600 to train up. It seems these godlike AIs are already frighteningly cheap and easy to replicate.

IT 94
article thumbnail

Unpatched Samsung Chipset Vulnerabilities Open Android Users to RCE Attacks

Dark Reading

Users of affected devices that want to mitigate risk from the security issues in the Exynos chipsets can turn off Wi-Fi and Voice-over-LTE settings, researchers from Google's Project Zero say.

Risk 98
article thumbnail

Acropalypse flaw in Google Pixel’s Markup tool allowed the recovery of edited images

Security Affairs

The Acropalypse flaw in the Markup tool of Google Pixel allowed the partial recovery of edited or redacted screenshots and images. Security researchers Simon Aarons and David Buchanan have discovered a vulnerability, named ‘Acropalypse,’ in the Markup tool of Google Pixel. The Markup tool is a built-in Markup utility, released with Android 9 Pie that allows Google Pixel users to edit (crop, add text, draw, and highlight) screenshots.

article thumbnail

Finding The Application Modernization Strategy That Is Right For Your Business

As a business leader, you know it's important to update your apps, but it can be tough to figure out the best approach. This whitepaper helps you in upgrading your current applications using modernization strategies without any business disruptions.

article thumbnail

Mirai Hackers Use Golang to Create a Bigger, Badder DDoS Botnet

Dark Reading

With HinataBot, malware authors have created a beast many times more efficient than even the scariest botnets of old, packing more than 3Tbit/s DDoS speeds.

98
article thumbnail

Emotet is back after a three-month hiatus

Security Affairs

The infamous Emotet malware is back after a short hiatus, threat actors are spreading it via Microsoft OneNote email attachments. The Emotet malware returns after a three-month hiatus and threat actors are distributing it via Microsoft OneNote email attachments to avoid detection. The Emotet banking trojan has been active at least since 2014, the botnet is operated by a threat actor tracked as TA542.

article thumbnail

Report Shows Business Email Compromise (BEC) Attacks Increase and Phishing Used as Initial Attack Vector in the Last Year

KnowBe4

Secureworks has published a report looking at cybercrime over the course of 2022, finding that business email compromise (BEC) attacks nearly doubled last year. Additionally, attacks in which phishing was used as the initial access vector (IAV) increased by nearly three times last year.

article thumbnail

Cops Nab BreachForums Boss in New York

Dark Reading

The alleged mastermind of hacker forum Breach Forums, "pompompurin," has been arrested in New York City, according to court documents.

110
110
article thumbnail

From Hadoop to Data Lakehouse

Getting off of Hadoop is a critical objective for organizations, with data executives well aware of the significant benefits of doing so. The problem is, there are few options available that minimize the risk to the business during the migration process and that’s one of the reasons why many organizations are still using Hadoop today. By migrating to the data lakehouse, you can get immediate benefits from day one using Dremio’s phased migration approach.

article thumbnail

Self-Sovereign Identities, The Next Step in Privacy-First User Experience

Thales Cloud Protection & Licensing

Self-Sovereign Identities, The Next Step in Privacy-First User Experience divya Tue, 03/21/2023 - 06:10 There is a growing momentum around Self-Sovereign Identities (SSI) with real value to be captured by individuals, countries, and businesses. When privacy is at stake, SSI puts individuals back in control of their personal data. Moreover, it helps organizations to operate in an environment they trust and control to significantly reduce Know Your Customer (KYC) and GDPR costs and to more easily

Privacy 71
article thumbnail

AI Has Your Business Data

Dark Reading

No-code has lowered the barrier for non-developers to create applications. AI will completely eliminate it.

IT 125
article thumbnail

Threat actors abuse Adobe Acrobat Sign to distribute RedLine info-stealer

Security Affairs

Threat actors are abusing the legitimate Adobe Acrobat Sign service to distribute the RedLine information stealer. Avast researchers reported that threat actors are abusing the legitimate Adobe Acrobat Sign service to distribute the RedLine information stealer. Adobe Acrobat Sign allows registered users to sign documents online and send a document signature request to anyone.

article thumbnail

The Scorched-Earth Tactics of Iran’s Cyber Army

WIRED Threat Level

Amid ongoing protests, the Iranian regime has lost control of its image, pushing it to employ increasingly drastic tactics where everyone loses.

IT 75
article thumbnail

Finding The Application Modernization Strategy That Is Right For Your Business

As a business leader, you know it's important to update your apps, but it can be tough to figure out the best approach. This whitepaper helps you in upgrading your current applications using modernization strategies without any business disruptions.

article thumbnail

IAM Startup Aembit Secures How Workloads Connect to Services

Dark Reading

Aembit launches from stealth with a cloud-based identity access management platform for enterprise workloads.

article thumbnail

What is intelligent document processing?

OpenText Information Management

While digitizing content is a critical first step for digital transformation, going paperless is no longer enough for managing the increasingly high volume of enterprise content. According to IDC research, more than half of the documents that require processing now originate as digital file types – emails, attachments, SMS, PDF, PNG, and more – and … The post What is intelligent document processing?

article thumbnail

Managing Bots with Cloudflare

Adapture

Bot attacks are on the rise. From record breaking DDoS attacks to credential stuffing attacks , businesses are paying with lost profits and customer trust. For websites that rely on online sales, the effects can be devastating. While many already have measures in place to mitigate bot traffic, these measures are often not enough. In response to this increasing need, many businesses have begun managing bots with Cloudflare.