Sat.Feb 18, 2023 - Fri.Feb 24, 2023

article thumbnail

New HardBit 2.0 Ransomware Tactics Target Insurance Coverage

Data Breach Today

Hackers Demand Info on Victim's Cyber Insurance Policy to Negotiate Ransom Demand The newly relaunched HardBit 2.0 ransomware group is now demanding victims disclose details of their cyber insurance coverage before negotiating a ransom demand.

Insurance 267
article thumbnail

GUEST ESSAY: Too many SMBs continue to pay ransomware crooks — exacerbating the problem

The Last Watchdog

Well-placed malware can cause crippling losses – especially for small and mid-sized businesses. Related: Threat detection for SMBs improves Not only do cyberattacks cost SMBs money, but the damage to a brand’s reputation can also hurt growth and trigger the loss of current customers. One report showed ransomware attacks increased by 80 percent in 2022, with manufacturing being one of the most targeted industries.

Cleanup 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Scammers Mimic ChatGPT to Steal Business Credentials

Dark Reading

Hackers will take anything newsworthy and turn it against you, including the world's most advanced AI-enabled chatbot

IT 143
article thumbnail

DDoS Attacks Becoming More Potent, Shorter in Duration

Data Breach Today

US, India and East Asia Were Top Targets in 2022, Microsoft Report Says In a new report, tech giant Microsoft says distributed denial-of-service attacks became shorter in duration but more potent in 2022.

IoT 290
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

Cyberwar Lessons from the War in Ukraine

Schneier on Security

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “ The Cyber Defense Assistance Imperative ­ Lessons from Ukraine.” ” Its conclusion: Cyber defense assistance in Ukraine is working.

Security 122

More Trending

article thumbnail

'New Class of Bugs' in Apple Devices Opens the Door to Complete Takeover

Dark Reading

With the right kind of exploit, there's hardly any function, app, or bit of data an attacker couldn't access on your Mac, iPad, or iPhone

Access 145
article thumbnail

Crime Blotter: Hackers Fail to Honor Promises to Delete Data

Data Breach Today

Police Say Gang Extorted Millions From Victims Not Just by Stealing, But Lying Too Cybercrime experts have long urged victims to never pay a ransom in return for any promise an attacker makes to delete stolen data.

article thumbnail

Putting Undetectable Backdoors in Machine Learning Models

Schneier on Security

This is really interesting research from a few months ago: Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task of learning to a service provider.

Paper 140
article thumbnail

AUTHOR Q&A: China’s spy balloons reflect a cyber warfare strategy America must counter

The Last Watchdog

The attack surface of company networks is as expansive and porous as ever. Related: Preparing for ‘quantum’ hacks That being so, a new book, Fixing American Cybersecurity , could be a long overdue stake in the ground. This is a well-reasoned treatise collaboratively assembled by board members of the Internet Security Alliance ( ISA.) Laid out in two parts, Fixing American Cybersecurity dissects the drivers that got us here and spells out explicitly what’s at stake.

article thumbnail

Contact vs. Company Intent Signal Data

Intent signal data comes in two types: either companies or individuals signaling interest in products like yours. Which kind of data delivers more advantages to B2B marketers? It depends. Get this infographic to learn about the advantages of intent-based leads and how you can most effectively use both types of data.

article thumbnail

87% of Container Images in Production Have Critical or High-Severity Vulnerabilities

Dark Reading

At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain

145
145
article thumbnail

Breach Roundup: Activision, SAS, Dole, Atlassian, VGTRK

Data Breach Today

article thumbnail

Should You Click on Unsubscribe?

KnowBe4

Some common questions we get are “Should I click on an unwanted email’s ’Unsubscribe’ link? Will that lead to more or less unwanted email?” Phishing

Phishing 115
article thumbnail

Top 9 reasons to modernize

OpenText Information Management

How do your top reasons stack up? Nine strategic reasons to put modernization at the top of your list: Reason #1 – Improve total experience Customer experience and employee experience are inextricably linked – there is no one without the other.

article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

CISA: Beware of DDoS, Web Defacements on Anniversary of Russian Invasion of Ukraine

Dark Reading

The Cybersecurity and Infrastructure Security Agency advises US and European nations to prepare for possible website attacks marking the Feb. 24 invasion of Ukraine by Russia

article thumbnail

Twitter to Charge for Second-Factor Authentication

Data Breach Today

Decision Sparks Concerns That Twitter Accounts Will Be Less Secure Twitter says it will turn off SMS second-factor authentication for all but paying customers starting March 20 in a decision provoking concerns that many customers will be less secure than before. Twitter says 2.6%

article thumbnail

You Can’t Trust App Developers’ Privacy Claims on Google Play

WIRED Threat Level

Mozilla researchers found that apps often provide inaccurate data use disclosures, giving people “a false sense of security.” Security Security / Privacy

Privacy 104
article thumbnail

Evasive cryptojacking malware targeting macOS found lurking in pirated applications

Jamf

Over the past few months Jamf Threat Labs has been following a family of malware that resurfaced and has been operating undetected, despite an earlier iteration being a known quantity to the security community.

Security 143
article thumbnail

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

article thumbnail

Tackling Software Supply Chain Issues With CNAPP

Dark Reading

The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain

Marketing 143
article thumbnail

The Security Perks and Perils of OpenAI on Microsoft Bing

Data Breach Today

OpenAI on Bing Carries Code and Traffic Risks But Will Also Simplify Code Analysis Embedding OpenAI technology in Microsoft Bing will help both hackers and cyber defenders.

article thumbnail

Is Google Truly F*cked?

John Battelle's Searchblog

Yes, I used Dall_e … Is it over for Google? This question is pulsing through most of the conversations I’ve been having with tech and media industry folk these past few weeks. The company’s narrative has shifted dramatically in the wake of Microsoft’s partnership with OpenAI.

article thumbnail

Coinbase Attack Used Social Engineering

KnowBe4

Coinbase describes a targeted social engineering attack that led to the theft of some employee data. The attacker first sent smishing messages to several Coinbase employees, urging them to click a link and log in to their Coinbase work account.

Access 98
article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

TikTok Ban Hits EU Commission Phones as Cybersecurity Worries Mount

Dark Reading

Employees of the EU Commission are no longer allowed to use the TikTok app thanks to concerns over data security

article thumbnail

5 Lawsuits Filed in Ransomware Breach Affecting 3.3 Million

Data Breach Today

Proposed Class Actions Against Regal Medical Group Allege Negligence, Other Claims Five proposed class action lawsuits have been filed so far in the wake of a California medical group's Feb. 1 report of a ransomware attack last December affecting more than 3.3 million individuals.

article thumbnail

PoC exploit code for critical Fortinet FortiNAC bug released online

Security Affairs

Researchers released a proof-of-concept exploit code for the critical CVE-2022-39952 vulnerability in the Fortinet FortiNAC network access control solution.

article thumbnail

A New Kind of Bug Spells Trouble for iOS and macOS Security

WIRED Threat Level

Security researchers found a class of flaws that, if exploited, would allow an attacker to access people’s messages, photos, and call history. Security Security / Cyberattacks and Hacks

Access 95
article thumbnail

Aggregage Intent Signal Service

Aggregage Intent Signal Service helps your sales team reach more active buyers sooner. You’ll get names and contact information of specific in-market buyers plus all companies and job titles signaling intent for your product or service. Get the overview to learn more!

article thumbnail

This Will Be the Year of the SBOM, for Better or for Worse

Dark Reading

Sharing attestations on software supply chain data that are formed into a policy will give us a framework to interpret risk and develop compliance directives

article thumbnail

Why Is AT&T Cybersecurity Such a Good Acquisition Target?

Data Breach Today

Analysts Praised AT&T Cybersecurity for Bringing Threat Intel and MSS Together AT&T wants to unload its cyber assets just five years after doubling down on security through its $600 million purchase of threat intelligence vendor AlienVault.

article thumbnail

Hackers are actively exploiting CVE-2022-47966 flaw in Zoho ManageEngine

Security Affairs

Experts warn of threat actors actively exploiting the critical CVE-2022-47966 (CVSS score: 9.8) flaw in Zoho ManageEngine. Multiple threat actors are actively exploiting the Zoho ManageEngine CVE-2022-47966 (CVSS score: 9.8) in attacks in the wild, Bitdefender Labs reported.