Tue.May 09, 2023

article thumbnail

Feds Dismember Russia's 'Snake' Cyberespionage Operation

Data Breach Today

Operation Medusa: FBI Tool Instructs Turla Group's Malware to Self-Destruct Federal officials say a global operation has disrupted Snake, the Russian government's "foremost cyberespionage tool," wielded by its Turla nation-state hacking group. The sophisticated malware has been tied to the theft of secret and classified information from numerous governments and businesses.

article thumbnail

Microsoft Patch Tuesday, May 2023 Edition

Krebs on Security

Microsoft today released software updates to fix at least four dozen security holes in its Windows operating systems and other software, including patches for two zero-day vulnerabilities that are already being exploited in active attacks. First up in May’s zero-day flaws is CVE-2023-29336 , which is an “elevation of privilege” weakness in Windows which has a low attack complexity, requires low privileges, and no user interaction.

Access 220
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally

The Last Watchdog

One meeting I had at RSA Conference 2023 , was a briefing about a new partnership , announced this morning, between a top-rung Silicon Valley tech giant and the leading provider of digital trust. Related: Centralizing control of digital certificates I had the chance to sit down with Deepika Chauhan , DigiCert’s Chief Product Officer, and Mike Cavanagh , Oracle’s Group Vice President, ISV Cloud for North America.

Cloud 195
article thumbnail

Feds Take Down 13 More DDoS-for-Hire Services

Krebs on Security

The U.S. Federal Bureau of Investigation (FBI) this week seized 13 domain names connected to “ booter ” services that let paying customers launch crippling distributed denial-of-service (DDoS) attacks. Ten of the domains are reincarnations of DDoS-for-hire services the FBI seized in December 2022, when it charged six U.S. men with computer crimes for allegedly operating booters.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

PEGA Committee Calls for Limits on Commercial Spyware

Data Breach Today

Final Recommendations Drop Call for Moratorium A European Parliament committee investigating commercial spyware tools such as Pegasus recommended new regulatory safeguards but dropped a preliminary call for a moratorium. Members condemned "major violations of EU law in Poland and Hungary" for those governments' use of commercial spyware.

More Trending

article thumbnail

US Court Rules for Corellium In Apple Copyright Case

Data Breach Today

Appeals Court Says Corellium Can Virtualize iOS; Remands Two Copyright Claims A U.S. federal appeals court sided with a company that simulates iPhones for security researchers after Apple sued, claiming copyright infringement. The court dismissed a claim that the company had infringed its copyright over iOS and remanded two other claims related to icons and wallpapers.

Security 143
article thumbnail

Accelerate your speed of business with IBM Event Automation

IBM Big Data Hub

Customer needs and market dynamics are constantly shifting from one moment to the next. There are thousands of business events flowing through every part of your organization every day. These events can provide a wealth of information about what’s actually happening across your business at any moment in time. Organizations that can capitalize on this continual stream of business intelligence can spot trends, issues and opportunities, address threats, and act quickly.

Marketing 106
article thumbnail

4 Best Practices to Build Better ESG and Sustainability Programs

Hanzo Learning Center

In recent years, there has been an increasing trend for companies to claim environmental sustainability, making public commitments to lower carbon emissions and other eco-friendly measures. However, this rise in environmental claims has also led to the concern of greenwashing, where companies make false or exaggerated statements about their environmental practices.

Risk 98
article thumbnail

At IBM Think, partners are front and center

IBM Big Data Hub

If you’ve followed IBM over the past few years, you know how critical the IBM Ecosystem is to our growth strategy. It’s why we gave partners access to the same training and enablement as IBMers last year, launched a new partner program in January, and continue investing in and growing the IBM Ecosystem. So, it should come as no surprise that partners are front and center during our annual Think conference this week.

Cloud 101
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Fortinet warns of a spike of the activity linked to AndoryuBot DDoS botnet

Security Affairs

A DDoS botnet dubbed AndoryuBot has been observed exploiting an RCE, tracked as CVE-2023-25717, in Ruckus access points. FortiGuard Labs researchers have recently observed a spike in attacks attempting to exploit the Ruckus Wireless Admin remote code execution vulnerability tracked as CVE-2023-25717. The activity is associated with a known DDoS botnet tracked as AndoryuBot that first appeared in February 2023.

article thumbnail

FBI Disarms Russian FSB 'Snake' Malware Network

Dark Reading

Operation "Medusa" disabled Turla's Snake malware with an FBI-created tool called Perseus.

134
134
article thumbnail

Microsoft Patch Tuesday for May 2023 fixed 2 actively exploited zero-day flaws

Security Affairs

Microsoft Patch Tuesday Security updates for May 2023 address a total of 40 vulnerabilities, including two zero-day actively exploited in attacks. Microsoft’s May 2023 security updates address 40 vulnerabilities, including two zero-day flaws actively exploited in attacks. The flaws affect Microsoft Windows and Windows Components; Office and Office Components; Microsoft Edge (Chromium-based); SharePoint Server; Visual Studio; SysInternals; and Microsoft Teams.

article thumbnail

SideWinder Strikes Victims in Pakistan, Turkey in Multiphase Polymorphic Attack

Dark Reading

The APT is exploiting a remote template injection flaw to deliver malicious documents that lure in government officials and other targets with topics of potential interest.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

A Linux NetFilter kernel flaw allows escalating privileges to ‘root’

Security Affairs

A Linux NetFilter kernel flaw, tracked as CVE-2023-32233, can be exploited by unprivileged local users to escalate their privileges to root. Netfilter is a framework provided by the Linux kernel that allows various networking-related operations to be implemented in the form of customized handlers. Netfilter offers various functions and operations for packet filtering, network address translation, and port translation, which provide the functionality required for directing packets through a netw

article thumbnail

Reshaping IT automation with IBM Watson Code Assistant

IBM Big Data Hub

In today’s digital world, business and IT leaders are turning to automation to improve operational efficiency, increase employee productivity and, ultimately, boost business performance. At IBM, we believe that organizations need AI coupled with automation to help developers reduce time to productivity. By empowering employees with automation and AI technologies like machine learning , deep learning , and natural language processing , IT organizations can narrow skills gaps and enable deve

IT 93
article thumbnail

Dallas Police Department is the Latest Victim of a Ransomware Attack

KnowBe4

Unfortunately ransomware attacks have taken another victim. The City of Dallas recently confirmed that their police department suffered a ransomware attack. This attack shutdown essential services along with some 911 dispatch systems.

article thumbnail

Iran-linked APT groups started exploiting Papercut flaw

Security Affairs

Microsoft warns of Iran-linked APT groups that are targeting vulnerable PaperCut MF/NG print management servers. Microsoft warns that Iran-linked APT groups have been observed exploiting the CVE-2023-27350 flaw in attacks against PaperCut MF/NG print management servers. The CVE-2023-27350 flaw is a PaperCut MF/NG Improper Access Control Vulnerability.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Microsoft Patches 2 Zero-Day Vulnerabilities

Dark Reading

The 49 CVE's in Microsoft's May security update is the lowest volume in nearly two years.

Security 126
article thumbnail

PIPEDREAM Malware against Industrial Control Systems

Schneier on Security

Another nation-state malware , Russian in origin: In the early stages of the war in Ukraine in 2022, PIPEDREAM, a known malware was quietly on the brink of wiping out a handful of critical U.S. electric and liquid natural gas sites. PIPEDREAM is an attack toolkit with unmatched and unprecedented capabilities developed for use against industrial control systems (ICSs).

article thumbnail

More InterPlanetary File System Services Use Also Means Phishing Abuse by Cybercriminals

KnowBe4

The InterPlanetary File System (IPFS), a distributed file-sharing system that represents an alternative to the more familiar location-based hypermedia server protocols (like HTTPS), is seeing more use in file-storage, web-hosting, and cloud services. As might be expected, more use is accompanied by more abuse via phishing attacks.

article thumbnail

FBI seized 13 domains linked to DDoS-for-hire platforms

Security Affairs

The U.S. DoJ announced the seizure of 13 new domains associated with DDoS-for-hire platforms as part of Operation PowerOFF. The U.S. Justice Department announced the seizure of 13 domains linked to DDoS-for-hire services as part of a coordinated international law enforcement effort known as Operation PowerOFF. DDoS-for-hire or ‘booter’ services allows registered users to launch order DDoS attacks without specific knowledge.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services

WIRED Threat Level

For a decade, a group called Big Pipes has worked behind the scenes with the FBI to target the worst cybercriminal “booter” services plaguing the internet.

article thumbnail

The global food distribution giant Sysco discloses a data breach

Security Affairs

Sysco, the global food distribution giant, disclosed a data breach, the compromised data includes customer and employee data. Sysco Corporation is an American multinational corporation involved in marketing and distributing food products, smallwares, kitchen equipment and tabletop items. BleepingComputer, who has seen an internal memo sent to employees on May 3, first reported that threat actors may have had access to customer and supplier data in the U.S. and Canada, as well as personal inform

article thumbnail

Bring light to the black box

IBM Big Data Hub

It is well known that Artificial Intelligence (AI) has progressed, moving past the era of experimentation to become business critical for many organizations. Today, AI presents an enormous opportunity to turn data into insights and actions, to help amplify human capabilities, decrease risk and increase ROI by achieving break through innovations. While the promise of AI isn’t guaranteed and may not come easy, adoption is no longer a choice.

article thumbnail

[Finger on the Trigger] How the FBI Nuked Russian FSB's Snake Data Theft Malware

KnowBe4

The Five Eyes member nations' cybersecurity and intelligence agencies dismantled the infrastructure of the Snake cyber-espionage malware that was operated by Russia's Federal Security Service (FSB).

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Royal Ransomware Expands to Target Linux, VMware ESXi

Dark Reading

The ransomware gang has also started using the BatLoader dropper and SEO poisoning for initial access.

article thumbnail

New CACTUS ransomware appeared in the threat landscape

Security Affairs

Researchers warn of a new ransomware family called CACTUS that exploits known vulnerabilities in VPN appliances to gain initial access to victims’ networks. Researchers from cybersecurity firm Kroll have analyzed on a new ransomware family called CACTUS that has been spotted exploiting known flaws in VPN appliances to achieve initial access to targeted networks.

article thumbnail

The Problem of Old Vulnerabilities — and What to Do About It

Dark Reading

The vulnerabilities most often exploited by ransomware attackers are already known to us.

IT 92