Fri.Jun 09, 2023

article thumbnail

New Entrants to Ransomware Unleash Frankenstein Malware

Data Breach Today

Opportunistic, Less Sophisticated Hackers Test Limits of the Concept of Code Reuse Ransomware hackers are stretching the concept of code reuse to the limit as they confront the specter of diminishing returns for extortionate malware. In their haste to make money, some new players are picking over the discarded remnants of previous ransomware groups.

article thumbnail

Court Dismisses IBM’s Breach of Contract Claim Against Micro Focus Finding the Claim to Lack Merit

OpenText Information Management

As I wrote earlier, IBM brought a lawsuit against Micro Focus alleging breach of contract and copyright infringement by Micro Focus Enterprise Suite products. Here is the blog I posted as to the technical aspects of the meritless claim. We confidently asserted then that IBM’s claims are legally and factually without merit. With respect to … The post Court Dismisses IBM’s Breach of Contract Claim Against Micro Focus Finding the Claim to Lack Merit appeared first on OpenText Blogs.

117
117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MOVEit Discloses More Vulnerabilities, Issues Patch

Data Breach Today

Progress Software Says New Vulnerabilities Are Unrelated to Zero Day Used by Clop The company behind the MOVEit managed file transfer application is urging customers into a new round of emergency patching after identifying additional vulnerabilities. "These newly discovered vulnerabilities are distinct from the previously reported vulnerability," said Progress Software.

263
263
article thumbnail

'Asylum Ambuscade' Cyberattackers Blend Financial Heists & Cyber Espionage

Dark Reading

In a rare mix of motivations, the cyberattack group has been linked to both financial cybercrime and political spying efforts on governments.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Threat Detection for 'DEED' Environments of Enterprises Today

Data Breach Today

Martin Roesch, CEO of Netography, discusses the company's platform, which is for dispersed, ephemeral, encrypted and diverse - what he refers to as "DEED" - environments. DEED works with the multi-cloud, hybrid and on-premises, IT and OT environments that modern large enterprises have today.

More Trending

article thumbnail

Cloud Security Trends, Best Practices Everyone Should Know

Data Breach Today

Experts to Host a Deep Dive into Cloud Security at ISMG Engage Chicago As cloud migration continues across regions and sectors, how are organizations choosing security tools, and how are those tools being operationalized? Which practices are producing the best security outcomes? Explore these cloud security tips from Palo Alto Networks' Ben Nicholson.

Cloud 154
article thumbnail

Russians charged with hacking Mt. Gox exchange and operating BTC-e

Security Affairs

Two Russian nationals have been charged with the hack of the cryptocurrency exchange Mt. Gox in 2011 and money laundering. Russian nationals Alexey Bilyuchenko (43) and Aleksandr Verner (29) have been charged with the hack of the cryptocurrency exchange Mt. Gox in 2011 and the operation of the illicit cryptocurrency exchange BTC-e. The duo has been charged with conspiring to launder approximately 647,000 bitcoins stolen from Mt.

Access 87
article thumbnail

Point32Health, Harvard Pilgrim Facing 4 Data Breach Lawsuits

Data Breach Today

Class Action Suits Hit While Insurer Still Recovering From April Ransomware Attack An April ransomware attack that compromised the personal information of more than 2.5 million individuals has triggered at least four proposed federal class action lawsuits against Massachusetts health insurer Harvard Pilgrim Health and its parent company, Point32Health.

article thumbnail

DOS Attacks Dominate, but System Intrusions Cause Most Pain

Dark Reading

In the latest Verizon "Data Breach Investigations Report," denial-of-service attacks are the most common type of security incident, but when it comes to breaches, nearly four-in-ten attackers compromise systems.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Shift5 Gets $33M to Help Safeguard Commercial Transportation

Data Breach Today

Series B Money from Moore Strategic Ventures Will Help Shift5 Move Beyond Military Moore Strategic Ventures led a $33 million investment into a military and transportation security startup founded by officers who stood up U.S. Army Cyber Command. The funds will help Shift5 expand from safeguarding military vehicles to protecting commercial modes of transportation.

Military 154
article thumbnail

Operation Triangulation: Zero-Click iPhone Malware

Schneier on Security

Kaspersky is reporting a zero-click iOS exploit in the wild: Mobile device backups contain a partial copy of the filesystem, including some of the user data and service databases. The timestamps of the files, folders and the database records allow to roughly reconstruct the events happening to the device. The mvt-ios utility produces a sorted timeline of events into a file called “timeline.csv,” similar to a super-timeline used by conventional digital forensic tools.

87
article thumbnail

US DOJ Charges Two Russian Nationals With Mt. Gox Hack

Data Breach Today

Mt. Gox Proceeds Used to Found BTC-e, Prosecutors Say U.S. federal prosecutors accused two Russian nationals of carrying out the heist that provoked the 2014 collapse cryptocurrency trading exchange Mt. Gox, then the world's largest crypto platform. One of them used the proceeds to co-found BTC-e, a now-shuttered crypto money laundering platform.

154
154
article thumbnail

Stealth Soldier backdoor used is targeted espionage attacks in Libya

Security Affairs

Researchers detected a cyberespionage campaign in Libya that employs a new custom, modular backdoor dubbed Stealth Soldier. Experts at the Check Point Research team uncovered a series of highly-targeted espionage attacks in Libya that employ a new custom modular backdoor dubbed Stealth Soldier. Stealth Soldier is surveillance software that allows operators to spy on the victims and exfiltrate collected data.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Why advanced API security is critical to outsmarting new threats

IBM Big Data Hub

As organizations continue to expand their digital footprint, new vulnerabilities are constantly emerging that can put them at risk. Among the most prominent new examples is attacks that exploit the growth of application programming interfaces (APIs) , which work to connect applications and systems to facilitate the exchange of data. Along with the ease of interaction that APIs provide, however, comes potential new entry points for bad actors to gain access to organizations’ resources and d

article thumbnail

Japanese Pharmaceutical giant Eisai hit by a ransomware attack

Security Affairs

This week, the Japanese pharmaceutical giant Eisai has taken its systems offline in response to a ransomware attack. Eisai is a Japanese pharmaceutical company with about 10,000 employees and more than $5 billion in revenue. The company this week was forced to take certain systems offline in response to a cyber attack In response to the ransomware attack, the company immediately established an internal task force and launched an investigation into the security incident.

article thumbnail

Brand-New Security Bugs Affect All MOVEit Transfer Versions

Dark Reading

Progress has issued a second patch for additional SQL flaws that are distinct from the zero-day that Cl0p ransomware gang is exploiting.

article thumbnail

Jamf Pro and Jamf Connect now part of the Microsoft Intelligent Security Association

Jamf

Learn how the integration of Jamf Pro and Jamf Connect with Azure AD enhances security and the user experience.

Security 105
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

UK and U.S. Announce Commitment to “Data Bridge”

Hunton Privacy

On June 8, 2023, the United Kingdom and the United States announced they reached a commitment in principle to establish the UK Extension to the Data Privacy Framework, which will create a “data bridge” between the two countries. U.S. companies approved to join the framework would be able to receive UK personal data under the new data bridge. According to the UK government, the data bridge would remove the “burden” of putting in place “costly contract clauses. to ensure protection and privacy sta

article thumbnail

Clop ransomware gang was testing MOVEit Transfer bug since 2021

Security Affairs

Researchers discovered that the Clop ransomware gang was looking for a zero-day exploit in the MOVEit Transfer since 2021. Kroll security experts discovered that the Clop ransomware gang was looking for a zero-day exploit in the MOVEit Transfer since 2021. Kroll investigated the exploitation attempts for the MOVEit Transfer vulnerability and discovered that Clop threat actors were likely experimenting with how to exploit this issue as far back as 2021.

article thumbnail

Verizon: Stolen Credentials Tops the List of Threat Actions in Breaches

KnowBe4

Verizon's DBIR always has a lot of information to unpack, so I’ll continue my review by covering how stolen credentials play a role in attacks.

88
article thumbnail

Passkeys See Fresh Momentum With New Pilot Programs

Dark Reading

Apple adds API that will enable sharing of passkeys across platforms, and Google offers passkey authentication in beta for Google Workspace and Google Cloud.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

EDPB Adopts Guidelines on the Calculation of Administrative Fines

Hunton Privacy

On June 7, 2023, the European Data Protection Board (“EDPB”) adopted the final version of its Guidelines on the calculation of administrative fines under the GDPR (the “Guidelines”). Through the Guidelines, the EDPB intends to harmonize the methodology used by supervisory authorities (“SA”) to calculate fines. The EDPB maintained the five-step methodology previously included in the public consultation version of the Guidelines, composed of the following steps: 1) identify the processing operatio

GDPR 69
article thumbnail

3 Elite Communication Skills to Help Security Pros Get Projects Funded

Dark Reading

It's not enough to know how to better protect the enterprise — you have to be able to convince decision-makers that your plans are necessary.

article thumbnail

Central and local must government to come together and safeguard the future of our libraries

CILIP

Central and local must government to come together and safeguard the future of our libraries The current regulation and oversight of library services in England means that the Government is failing in its duty of accountability to the taxpayer and in its specific duty of sector development and improvement. It’s time to move out of the era of fragmentation and into better stewardship of our vital library network, put in place new and progressive regulation, and bring an end to the ongoing battle

article thumbnail

5 Tips for Modernizing Your Security Operations Center Strategy

Dark Reading

A solid, dependable SOC strategy that is scalable in the face of various security threats is essential to reduce cybersecurity risks to your business.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

PRESS RELEASE: 2023 AIEF AWARDS EDUCATION SCHOLARSHIPS

IG Guru

Check out the Press Release here

article thumbnail

How Continuous Monitoring and Threat Intel Can Help Prevent Ransomware

Dark Reading

Security teams should be empowered with the right amount of intelligence to track new and emerging threats and connect that intel to historical data.

article thumbnail

5 Best Cloud Native Application Protection Platforms in 2023

eSecurity Planet

Cloud native application protection platforms (CNAPP) give enterprises the tools and functionality they need to protect their cloud applications and workloads from security threats. Securing cloud-native apps requires an extensive approach that goes well beyond basic security solutions. Cloud native application protection platforms (CNAPP) accomplish that by combining a range of cloud security tools and functions such as cloud workload protection platforms (CWPP) , cloud security posture managem

Cloud 92