Thu.Oct 12, 2023

article thumbnail

Zero-Day Attacks Exploit 'Rapid Reset' Weakness in HTTP/2

Data Breach Today

Web Servers Need Patching; Google, Amazon, Cloudflare See Massive DDoS Attacks Attackers have been actively exploiting vulnerabilities in the HTTP/2 protocol via so-called rapid request attacks, which Amazon Web Services, Cloudflare and Google report have led to record-breaking distributed-denial-of-service attacks. Experts recommend immediate patching or mitigation.

289
289
article thumbnail

News alert: Nerds On Site develops ‘SME Edge’ solution for small- and mid-sized enterprises

The Last Watchdog

Toronto, Ontario – October 12, 2023 – Nerds On Site Inc. (CSE: NERD), a cybersecurity and mobile IT solutions company servicing the small and medium enterprise (SME) marketplace in Canada and the U.S., has developed SME Edge , a complete cybersecurity package that provides small-to-medium businesses comprehensive protection from the threat of data breaches.

Phishing 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: Google Phases out Passwords

Data Breach Today

Also: Microsoft Will Bid VBSript Goodbye and A Novel Magecart Attack This week: Google began phasing out passwords, Microsoft will bid VBSript goodbye, payment card information exposed in Air Europa hack, Magecart attack uses sneaky 404 page tactic, U.S. voter registration data stolen from District of Columbia and Volex reports a cyberattack.

Passwords 270
article thumbnail

A PowerShell Script to Mitigate Active Directory Security Risks

eSecurity Planet

Cyber attackers frequently use legacy technology as part of their attack strategies, targeting organizations that have yet to implement mitigations or upgrade obsolete components. In an Active Directory environment, one such component is legacy protocols, which attackers can use to gain access to Active Directory. While patching (or even virtual patching ) might help address obsolete components, most legacy components have been thoroughly evaluated by adversaries to determine whether they should

Risk 137
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

US SEC Probes MOVEit Hack

Data Breach Today

Progress Software Says Investigation Is Fact-Finding Inquiry The zero day that fueled a mass attack on Progress Software's MOVEit file transfer software is now the vulnerability fueling a flotilla of attorneys, the company disclosed in a regulatory filing listing pending litigation and governmental investigations.

267
267

More Trending

article thumbnail

Bounty to Recover NIST’s Elliptic Curve Seeds

Schneier on Security

This is a fun challenge: The NIST elliptic curves that power much of modern cryptography were generated in the late ’90s by hashing seeds provided by the NSA. How were the seeds generated? Rumor has it that they are in turn hashes of English sentences, but the person who picked them, Dr. Jerry Solinas, passed away in early 2023 leaving behind a cryptographic mystery, some conspiracy theories, and an historical password cracking challenge.

Passwords 119
article thumbnail

More than 17,000 WordPress websites infected with the Balada Injector in September

Security Affairs

In September more than 17,000 WordPress websites have been compromised by the Balada Injector malware. Sucuri researchers reported that more than 17,000 WordPress websites have been compromised in September with the Balada Injector. The researchers noticed that the number of Balada Injector infections has doubled compared with August. The Balada injector is a malware family that has been active since 2017.

CMS 117
article thumbnail

Harvested Credentials Are Put Up for Sale Monthly on the Dark Web at a Rate of 10,000 a Month

KnowBe4

Credential harvesting has become a business in and of itself within the cybercrime economy. New insight from Microsoft details the types of attacks your organization should watch out for.

Sales 108
article thumbnail

Phishing, the campaigns that are targeting Italy

Security Affairs

This post analyzed the numerous phishing campaigns targeting users and organizations in Italy. Phishing is a ploy to trick users into revealing personal or financial information through an e-mail, Web site, and even through instant messaging. Particularly very popular is so-called brand phishing, which occurs when criminals impersonate the official website of a well-known brand of a public or private entity using a domain name, URL, logos and graphics similar to the original website: This is a r

Phishing 117
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Blackbaud to Pay $49.5 Million in Data Breach Settlement

Hunton Privacy

On October 5, 2023, Blackbaud Inc., a software provider for the philanthropy, healthcare, and education sectors, has resolved claims that the District of Columbia and 49 U.S. states raised. The claims stem from a ransomware attack that impacted Blackbaud in 2020. The company was affected by a ransomware attack that exposed user information to unauthorized third parties.

article thumbnail

A new Magecart campaign hides the malicious code in 404 error page

Security Affairs

Researchers observed a new Magecart web skimming campaign changing the websites’ default 404 error page to steal credit cards. Researchers from the Akamai Security Intelligence Group uncovered a Magecart web skimming campaign that is manipulating the website’s default 404 error page to hide malicious code. The attacks are targeting a large number of Magento and WooCommerce websites, including large organizations in the food and retail industries. “In this campaign, all the victim web

Retail 110
article thumbnail

New Cyber Attack Techniques Will Not Replace Old-School Social Engineering

KnowBe4

Even though there are new attack types for cybercriminals, they are still leveraging old-school attack vectors. Why? Because they still work.

article thumbnail

Apple releases iOS 16 update to fix CVE-2023-42824 on older devices

Security Affairs

Apple released versions iOS 16.7.1 and iPadOS 16.7.1 to address the CVE-2023-42824 vulnerability that has been actively exploited in attacks. Apple has released iOS 16.7.1 and iPadOS 16.7.1 to address the recently disclosed zero-day CVE-2023-42824. The vulnerability is a privilege escalation issue that resides in the Kernel, it was addressed with improved checks.

Security 108
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Backdoor Lurks Behind WordPress Caching Plugin to Hijack Websites

Dark Reading

Evasive malware disguised as a caching plugin allows attackers to create an admin account on a WordPress site, then take over and monetize sites at the expense of legitimate SEO and user privacy.

Privacy 99
article thumbnail

Business Email Compromise Attempts Skyrocket in the Last Year

KnowBe4

Threat actors launched 156,000 business email compromise (BEC) attempts per day between April 2022 and April 2023, according to Microsoft’s latest Digital Defense Report. While most of these attempts go unanswered, criminals can receive massive payouts when they succeed.

article thumbnail

Protect Critical Infrastructure With Same Rigor as Classified Networks

Dark Reading

Government security processes are often viewed as tedious and burdensome — but applying the lessons learned from them is imperative for private industry to counter a nation-state threat.

article thumbnail

Everything you need to know about NHS England’s biggest ever IT contract

The Guardian Data Protection

What is the contract for? Which firms are in the running? And why are there privacy concerns about the deal? The biggest IT contract in the history of NHS England could be awarded as soon as next week, with the frontrunner currently the controversial US tech firm Palantir. The £480m contract for the “federated data platform” has been under consideration for months, and was due to be announced in September.

IT 102
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Brands Beware: X's New Badge System Is a Ripe Cyber-Target

Dark Reading

Scammers have targeted the vaunted blue check marks on the platform formerly known as Twitter, smearing individuals and brands alike.

106
106
article thumbnail

“Human-Operated” Ransomware Attacks Double in the Last Year

KnowBe4

As attackers leave little-to-no traces of their attack patterns, more ransomware groups are shifting from automated attacks to manual attacks.

article thumbnail

Microsoft Set to Retire Grunge-Era VBScript, to Cybercrime's Chagrin

Dark Reading

Popular malware like QakBot and DarkGate rely on VBScript, which dates back to 1996 — but their days are numbered now that Microsoft is finally deprecating the Windows programming. language.

90
article thumbnail

Beware of Bogus Roborock Retailers: The Perils of Misleading URLs in E-Commerce

KnowBe4

Roborock's online storefronts have been used for cybercrime schemes in the past, and it seems attackers are continuing to create fake online shops. After all, the Chinese-originated robot vacuum cleaner brand only sells through resellers in Germany.

Retail 89
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How the FTX Thieves Have Tried to Launder Their $400 Million Haul

WIRED Threat Level

Whoever looted FTX on the day of its bankruptcy has now moved the stolen money through a long string of intermediaries—including a service owned by FTX itself.

IT 93
article thumbnail

Pan-African Financial Apps Leak Encryption, Authentication Keys

Dark Reading

Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.

article thumbnail

New Research: Phishing Remains the Most Popular Technique for Bad Actors

KnowBe4

A report from Trustwave notes that phishing remains one of the most popular and effective techniques for attackers to gain access to organizations.

article thumbnail

Uber's Ex-CISO Appeals Conviction Over 2016 Data Breach

Dark Reading

Joe Sullivan's lawyers have claimed his conviction on two felony charges is based on tenuous theories and criminalizes the use of bug bounty programs.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Top 10 reasons to use Jamf in your school

Jamf

Check out why Jamf solutions are best-in-class for managing and securing Apple devices, and learn how we support an optimal learning environment for your students.

article thumbnail

Making the Case for Cryptographic Agility and Orchestration

Dark Reading

Finding the right post-quantum cryptographic (PQC) algorithms is necessary, but not sufficient, to future-proof cybersecurity.

article thumbnail

CIPL Publishes White Paper & Recommendations on Data Sharing Between Public & Private Sectors

Hunton Privacy

On October 10, 2023, the Centre for Information Policy Leadership at Hunton Andrews Kurth (“CIPL”) announced the publication of its White Paper on business-to-government (B2G) data sharing. Following the publication of a discussion draft earlier this year, and after hosting two roundtables, CIPL incorporated valuable feedback into the draft and expanded its list of recommended practices.

Paper 64