Thu.May 11, 2023

article thumbnail

Data Breach Roundup: Attempted Extortion Attack on Dragos

Data Breach Today

Also: Twitter Hacker Pleads Guilty, Seoul National University Hospital and Sysco In this week's data breach, the spotlight was on Dragos, a guilty plea from a Twitter hacker and cryptocurrency thief and North Korean hackers. Also, Sysco, a Ukrainian border truck queuing system and an update on Western Digital. Plus, a new tool for decrypting partially encrypted files.

article thumbnail

RSAC Fireside Chat: Keeping persistent email threats at bay requires deeper, cloud-layer vigilance

The Last Watchdog

Email remains by far the no.1 business communications tool. Meanwhile, weaponized email continues to pose a clear and present threat to all businesses. Related: The need for timely training At RSA Conference 2023 , I learned all about a new category of email security — referred to as integrated cloud email security ( ICES ) – that is helping companies more effectively keep email threats in check.

Cloud 214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Parliament Rejects EU-US Data Framework

Data Breach Today

Non-Binding Vote Urges European Commission to Re-Open Negotations With US The European Parliament called on the European Commission to reject a draft legal framework facilitating trans-Atlantic commercial data flows in a non-binding vote. A majority said the EU-U.S. Data Privacy Framework fails to protect European citizens from American bulk online surveillance.

article thumbnail

European Parliament Adopts EU-U.S. Data Privacy Framework Resolution

Hunton Privacy

On May 11, 2023, at a plenary session, the European Parliament voted to adopt a resolution on the adequacy of the protection afforded by the EU-U.S. Data Privacy Framework (the “Framework”) which calls on the European Commission (the “Commission”) to continue negotiations with its U.S. counterparts with the aim of creating a mechanism that would ensure equivalence and provide the adequate level of protection required by EU data protection law.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Elementary Data Breach Questions Remain, My Dear Capita

Data Breach Today

Beyond $25M in Estimated Cleanup Costs, The Game Remains Afoot for Victim Details In the annals of attempting to downplay the impact of a data breach, here's a new one: British outsourcing giant Capita says the hackers who hit it - steling data pertaining to customers, suppliers and employees - accessed "less than 0.1% of its server estate.

More Trending

article thumbnail

Hacking with a Conscience: Exploring the World of Ethical Hacking

Data Breach Today

2 Experts Discuss Why Ethical Hackers Are Key Assets to Security Teams Two experts from HackerOne - Marten Mickos, CEO, and Alex Rice, CTO and co-founder - provide insights on the similarities and differences between ethical hackers and in-house red teams, as well as the misconceptions around engaging with ethical hackers.

Security 154
article thumbnail

Building Trustworthy AI

Schneier on Security

We will all soon get into the habit of using AI tools for help with everyday problems and tasks. We should get in the habit of questioning the motives, incentives, and capabilities behind them, too. Imagine you’re using an AI chatbot to plan a vacation. Did it suggest a particular resort because it knows your preferences, or because the company is getting a kickback from the hotel chain?

article thumbnail

Feds Warn of Rise in Attacks Involving Veeam Software Flaw

Data Breach Today

Alert Concerns Vendor's Veeam Backup & Replication Product Federal authorities are warning healthcare sector entities of a rise in cyberattacks against Veeam's Backup & Replication software. Some incidents appear tied to exploitation of a high-severity vulnerability in the vendor's software in that was disclosed in March.

143
143
article thumbnail

How to Tackle the Cybersecurity Careers Gap

Lenny Zeltser

Too many people are unsure how to enter or grow in the cybersecurity industry. It's a relatively young field, and we haven’t done a good job of defining what it means to have a career in it. Hiring managers who are worried about finding candidates because of the much-discussed cybersecurity skills gap should consider the underlying issue, which I'd like to call the cybersecurity careers gap.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Why Datadog and Rubrik Are In Talks to Buy Laminar for $200M

Data Breach Today

Laminar Has Landed Multiple M&A Suitors Just 18 Months After Emerging from Stealth The purchase of promising early-stage startup Laminar by a large tech vendor would match many M&A deals seen in 2023. The downturn has made it tough for small startups to raise additional funding at an increased valuation, while the push for profitability has left big firms open to only tuck-in M&A.

IT 143
article thumbnail

Multiple Ransomware Groups Adapt Babuk Code to Target ESXi VMs

Dark Reading

Two years ago, a popular ransomware-as-a-service group's source code got leaked. Now other ransomware groups are using it for their own purposes.

article thumbnail

Akamai Lays Off Nearly 300 Staff to Hit Profitability Goals

Data Breach Today

Digital Experience Vendor Pursues $40M in Cost Cuts by Eliminating 3% of Workforce Akamai will shrink its workforce by 3% as its shifts resources from its shrinking content delivery business to growth areas in cloud computing and security. The company will shrink its 9,960-person staff by 299 positions as it looks to sustain its profitability levels despite economic headwinds.

Cloud 143
article thumbnail

Dragos Employee Hacked, Revealing Ransomware, Extortion Scheme

Dark Reading

Attackers compromised the personal email of a new employee and, when the initial attack failed, attempted through socially engineered messages to get the company to pay them off.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cryptohack Roundup: $34M MEV Bot Attack, $1.2M BitFlyer Fine

Data Breach Today

Also: Insider Trading, the IRS Trains Up Ukraine and Proposed Cybersec Regulations A hacker made $34 million from MEV bot attacks, NYDFS penalized Bitflyer for lax cybersecurity, Ishan Wahi was sentenced in the Coinbase insider trading case, the IRS is training Ukraine in blockchain forensics and the New York AG proposed a crypto cybersecurity bill.

article thumbnail

A zero-click vulnerability in Windows allows stealing NTLM credentials

Security Affairs

Researchers shared technical details about a flaw in Windows MSHTML platform, tracked as CVE-2023-29324 , that could be abused to bypass security protections. Cybersecurity researchers have shared details about a now-patched security flaw, tracked as CVE-2023-29324 (CVSS score: 6.5), in Windows MSHTML platform. An attacker can exploit the vulnerability by crafting a malicious URL that would evade zone checks. “An attacker can craft a malicious URL that would evade zone checks, resultin

article thumbnail

Texas Senate Passes Texas Data Privacy and Security Act

Hunton Privacy

On May 10, 2023, the Texas Senate passed H.B. 4 , also known as the Texas Data Privacy and Security Act (“TDPSA”). The TDPSA now heads to a conference committee between the Texas Senate and House to rectify the differences between the Senate and House versions. If the TDPSA is signed into law, Texas could become the tenth state to enact comprehensive privacy legislation.

article thumbnail

Eurovision Organisers Concerned About the Threat of Cyber Attacks

IT Governance

The Eurovision Song Contest is set to take place in Liverpool this weekend, but amid the pageantry and political jostling, organisers are concerned about the threat of a cyber attack. Broadcasters at the BBC have said it’s their “biggest worry” ahead of the event, which is expected to be watched by more than 200 million people. Cyber attacks are becoming increasingly common with live broadcasts, but the political nature of the Eurovision Song Contest – and this year’s one in particular – h

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Experts share details of five flaws that can be chained to hack Netgear RAX30 Routers 

Security Affairs

Researchers disclosed the details of five vulnerabilities that can be chained to take over some Netgear router models. Industrial and IoT cybersecurity firm Claroty disclosed technical details of five vulnerabilities that be exploited to hack some Netgear router models. “Team82 disclosed five vulnerabilities in NETGEAR’s Nighthawk RAX30 routers as part of its research and participation in last December’s Pwn2Own Toronto hacking competition.” reads the advisory published by the sec

article thumbnail

Billy Corgan Paid Off Hacker Who Threatened to Leak New Smashing Pumpkins Songs

Dark Reading

Corgan got FBI involved to track down the cybercriminal, who had stolen from other artists as well, he said.

112
112
article thumbnail

Google will provide dark web monitoring to all US Gmail users and more

Security Affairs

Google announced the opening of the dark web monitoring report security feature to all Gmail users in the United States. Google is going to offer dark web monitoring to all U.S. Gmail users, the feature allows them to search for their email addresses on the dark web. Dark web scans for Gmail address was previously only available to Google One subscribers in the US.

article thumbnail

Microsoft Authenticator to Enforce Number Matching

Dark Reading

As a way to enhance the security of MFA, Microsoft will require users to authorize login attempts by entering a numeric code into the Microsoft Authenticator app.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A flaw in the Essential ‘Addons for Elementor’ WordPress plugin poses 1M sites at risk of hacking

Security Affairs

Experts warn of an unauthenticated privilege escalation flaw in the popular Essential ‘Addons for Elementor’ WordPress plugin. Essential ‘Addons for Elementor’ WordPress plugin is a collection of 90+ creative elements and extensions Enhance that allow admins to enhance Elementor page building experience. The plugin has more than one million active installations.

Risk 93
article thumbnail

U.K. Advance Fee Scams Increase by Over 600% in Less Than Two Years

KnowBe4

New data from the U.K.’s Office of National Statistics shows that this often overlooked scam has grown significantly in interest – likely because it pays off.

IT 88
article thumbnail

North Korea-linked APT breached the Seoul National University Hospital

Security Affairs

The Korean National Police Agency (KNPA) warns that a North Korea-linked APT group had breached the Seoul National University Hospital (SNUH). The Korean National Police Agency (KNPA) revealed that a North Korea-linked APT group has breached one of the largest hospitals in the country, the Seoul National University Hospital (SNUH). The security breach took place between May and June 2021 and was aimed at stealing sensitive medical information and personal details.

article thumbnail

Why Economic Downturns Put Innovation at Risk & Threaten Cyber Safety

Dark Reading

Supplementing staff by hiring hackers to seek holes in a company's defense makes economic sense in a downturn. Could they be cybersecurity's unlikely heroes in a recession?

Risk 81
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

We are in the final! Please vote for Security Affairs and Pierluigi Paganini

Security Affairs

Dear readers and friends, once again we are in the final of the European Cybersecurity Blogger Awards 2022 and I need your support. Please help me in reaching this new target. I work hard every day to provide updated news to students, passionate readers, and of course, cyber security professionals. I do it for passion and it is a pleasure for me to share with you my experience and lessons learned on the field.

article thumbnail

Juniper Research Study Reveals Staggering Cost of Vulnerable Software Supply Chains

Dark Reading

New data shows cyberattacks targeting software supply chains will cost the global economy $80.6 billion annually by 2026.

96
article thumbnail

EU Moving Closer to an AI Act – Key Areas of Impact for Life Sciences/MedTech Companies

Data Matters

The European Union is moving closer to adopting the first major legislation to horizontally regulate artificial intelligence. Today, the European Parliament ( Parliament ) reached a provisional agreement on its internal position on the draft Artificial Intelligence Regulation ( AI Act ). The text will be adopted by Parliament committees in the coming weeks and by the Parliament plenary in June.