Fri.Feb 02, 2024

article thumbnail

More Ransomware Victims Are Declining to Pay Extortionists

Data Breach Today

While Average Falls Below 30%, We're Still Far From Seeing Criminal Profits Dry Up The number of victims who opt to pay a ransom appears to have declined to a record low. During the last three months of 2023, an average of 29% of organizations hit by ransomware paid a ransom - a notable shift from what ransomware watchers saw in recent years.

article thumbnail

Iranian hackers breached Albania’s Institute of Statistics (INSTAT)

Security Affairs

Albania’s Institute of Statistics (INSTAT) announced that it was targeted by a sophisticated cyberattack that affected some of its systems. A sophisticated cyberattack on Wednesday hit Albania’s Institute of Statistics (INSTAT). The institute confirmed that the attack affected some of its systems. Albania’s Institute of Statistics (INSTAT) promptly activated emergency protocols to respond to the incident.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: Why Are Microsoft's Systems So Vulnerable?

Data Breach Today

Also: AI in Cloud Security, Integrating Zero Trust Principles into API Deployment In the latest weekly update, ISMG editors discussed the potential role of AI in cloud security, how the recent cyberattack on Microsoft by Russian state hackers highlighted the vulnerabilities associated with legacy systems, and how to secure APIs in the age of zero trust.

Cloud 260
article thumbnail

A Self-Enforcing Protocol to Solve Gerrymandering

Schneier on Security

In 2009, I wrote : There are several ways two people can divide a piece of cake in half. One way is to find someone impartial to do it for them. This works, but it requires another person. Another way is for one person to divide the piece, and the other person to complain (to the police, a judge, or his parents) if he doesn’t think it’s fair. This also works, but still requires another person—­at least to resolve disputes.

Paper 132
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Feds Face a Midnight Deadline for Resetting Ivanti Gateways

Data Breach Today

CISA Says Agencies Must Disconnect and Reset Ivanti VPN Devices by Midnight Friday U.S. federal agencies have until midnight Friday to disconnect Ivanti VPN devices and perform a factory reset before reconnecting them to the network. Fifteen agencies use the gateways, which were hit by likely Chinese hackers in an espionage campaign and are riddled with zero-day vulnerabilities.

265
265

More Trending

article thumbnail

FritzFrog Botnet Exploits Log4Shell

Data Breach Today

Botnet Looks for Vulnerable Internal Network Machines Delivering more proof that the Log4Shell vulnerability is endemic, Akamai researchers detected botnet malware updated to use the flaw as an infection vector. Log4Shell burst into public awareness in late 2021 when security researchers identified a flaw in the ubiquitous Apache Log4J 2 Java library.

Libraries 255
article thumbnail

Recent Tesla Hacks Highlight Importance of Protecting Connected Devices

eSecurity Planet

Within the last couple of months, smart device vulnerabilities have been piling up, prompting businesses to protect their Internet of Things (IoT) environments. But that doesn’t just include thermostats, printers, and other connected devices that you have to protect — it now means electric cars, too. Teslas have plenty of vulnerabilities, as cybersecurity researchers have recently discovered.

IoT 125
article thumbnail

Detecting First-Party Fraud: Strategies and Challenges

Data Breach Today

Credit Union Lender Discusses Expanding Role of Credit Repair Companies in Fraud Detecting first-party fraud poses unique challenges. Data plays a critical role in spotting fraud by pointing out patterns such as high charge-off balances that hint at premeditated fraud, said Matt Beardsley, senior manager of consumer lending at PenFed Credit Union.

249
249
article thumbnail

Cloudflare breached on Thanksgiving Day, but the attack was promptly contained

Security Affairs

Cloudflare revealed that a nation-state actor breached its internal Atlassian server, gaining access to the internal wiki and its bug database (Atlassian Jira). The incident took place on Thanksgiving Day, November 23, 2023, and Cloudflare immediately began an investigation with the help of CrowdStrike. The company pointed out that no customer data or systems were impacted by this security breach.

Access 136
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Cyber Fail: When Ransomware Gangs Get Careless

Data Breach Today

Also: Rampant App Vulnerabilities, Cloud Misconfiguration and Why CISOs Matter Welcome to "Cyber Fail," where our experts uncover fails so we can all strengthen our defenses. Today, we examine what happens when ransomware groups get careless, application developers' laissez-faire attitude toward vulnerabilities, and the security woes of a beleaguered crypto exchange.

article thumbnail

David Kahn

Schneier on Security

David Kahn has died. His groundbreaking book, The Codebreakers was the first serious book I read about codebreaking, and one of the primary reasons I entered this field. He will be missed.

121
121
article thumbnail

UK Lawmakers Push Ahead With Revised Snoopers' Charter

Data Breach Today

The Investigatory Powers Bill Will Allow Police to Collect More Data Proposed legislation called the "snoopers' charter," which would allow British intelligence agencies to collect data on a large scale, cleared further parliamentary scrutiny this week despite mounting criticism from privacy advocates, watchdog groups and technology companies.

Privacy 239
article thumbnail

PurpleFox malware infected at least 2,000 computers in Ukraine

Security Affairs

The Computer Emergency Response Team in Ukraine (CERT-UA) reported that a PurpleFox malware campaign had already infected at least 2,000 computers in the country. The Computer Emergency Response Team in Ukraine (CERT-UA) is warning about a malware campaign that has infected at least 2,000 computers in the country with the PurpleFox malware (aka ‘ DirtyMoe ‘). “The Government Computer Emergency Response Team of Ukraine CERT-UA, guided by Clause 1 of Article 9 of the Law of Ukrai

Mining 133
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Vendor Email Compromise Attacks Against Financial Services Surge 137% Last Year

KnowBe4

Analysis of 2023 attacks shows how the financial services industry had a very bad year, with increases in both vendor email compromise (VEC) and business email compromise (BEC) attacks, targeting millions of dollars using very specific methods.

article thumbnail

Ex CIA employee Joshua Adam Schulte sentenced to 40 years in prison

Security Affairs

A former software engineer with the U.S. CIA has been sentenced to 40 years in prison for leaking classified documents. Former CIA employee Joshua Adam Schulte has been sentenced to 40 years in prison for passing classified documents to WikiLeaks and for possessing child pornographic material. “Damian Williams, the United States Attorney for the Southern District of New York; Matthew G.

article thumbnail

4 questions to consider when you’re selecting an external DNS provider

IBM Big Data Hub

There are many reasons to move to a managed DNS platform, but they all revolve around a central theme. Once you reach a critical mass of traffic and start getting concerned about the performance and reliability of what you’re delivering, it’s time to consider a managed DNS solution. There are several well-known options out there, and to a newcomer they can appear relatively similar at first.

Cloud 87
article thumbnail

Operation Synergia led to the arrest of 31 individuals

Security Affairs

An international law enforcement operation, named Synergia, led to the arrest of 31 individuals involved in ransomware, banking malware, and phishing attacks. Operation Synergia was led by Interpol and ran from September to November 2023 involving law enforcement agencies from 50 countries. The international law enforcement operation was launched to curb the escalation and professionalisation of transnational cybercrime.

Phishing 128
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Is premium DNS worth it?

IBM Big Data Hub

There’s a moment in the life of most enterprises where the connection between Domain Name System (DNS) and revenue comes into greater focus. It’s the moment when businesses discover that delivering high-quality applications, services and content requires more attention to the quality of DNS connections. For most businesses, this is also the moment when they discover that the free DNS services offered by domain registrars or DIY systems they’ve been using are no longer fit for p

IT 87
article thumbnail

Luck, self-reflection, and learning on the path to success as a Health Librarian

CILIP

Luck, self-reflection, and learning on the path to success as a Health Librarian Emily Johnson Deputy Knowledge Manager at University Hospitals Birmingham NHS Foundation Trust. In 2023 she was lauded as a member of the CILIP 125. Emily’s career has not taken the straight path, but she has found her place as Deputy Knowledge Manager at University Hospitals Birmingham NHS Foundation Trust, where she uses a formidable range of skills and experience and leads a rewarding professional life.

article thumbnail

IBM Databand: Self-learning for anomaly detection

IBM Big Data Hub

Almost a year ago, IBM encountered a data validation issue during one of our time-sensitive mergers and acquisitions data flows. We faced several challenges as we worked to resolve the issue, including troubleshooting, identifying the problem, fixing the data flow, making changes to downstream data pipelines and performing an ad hoc run of an automated workflow.

article thumbnail

NYDFS issues significant guidance on insurers using AI or external data

Data Protection Report

On January 17, 2024 the New York Department of Financial Services (“NYDFS”) published a Proposed Insurance Circular Letter (“Proposed Circular”) regarding the use of artificial intelligence systems (“AIS”) and external consumer data and information sources (“ECDIS”) in insurance underwriting and pricing. This Proposed Circular does not create or change any legislation, but once finalized, will reflect how NYDFS interprets existing laws and regulations as they relate to AIS and ECDIS and to clari

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Examples of sustainability: How new efforts are shaping the environmental future

IBM Big Data Hub

As the world grapples with the realities of climate change , sustainability has evolved from a buzzword to a global imperative. Countries, communities and corporations are seeking ways to slow the pace of change and reduce the impact of human and business activities on the environment. Today, sustainability efforts are being shaped by new urgency and new technology.

article thumbnail

Expert Insight: Vanessa Horton on Anti-Forensics

IT Governance

How attackers try to remain undetected and/or mask their actions Vanessa Horton holds a degree in computer forensics, as well as a number of cyber security and forensics qualifications. She has worked for the police as a digital forensics officer, where she was involved in complex crime cases, and was awarded a Diamond Award and an Excellence in Service Delivery Award.

article thumbnail

How the Recording Academy uses IBM watsonx to enhance the fan experience at the GRAMMYs®

IBM Big Data Hub

Through the GRAMMYs®, the Recording Academy® seeks to recognize excellence in the recording arts and sciences and ensure that music remains an indelible part of our culture. When the world’s top recording stars cross the red carpet at the 66th Annual GRAMMY Awards, IBM will be there once again. This year, the business challenge facing the GRAMMYs paralleled those of other iconic cultural sports and entertainment events: in today’s highly fragmented media landscape, creating

article thumbnail

The Mac turns 40 — and keeps on moving via The Verge

IG Guru

Check out the article here. The post The Mac turns 40 — and keeps on moving via The Verge first appeared on IG GURU.

83
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

How Email Archiving Can Simplify Your Work Life

Docuware

Emails are more than a communication vehicle. They also contain critical business information. But emails tend to be informal and that tricks us into thinking that they don’t need to be archived and searchable. We also forget that some emails need to be retained for compliance.

article thumbnail

Friday Squid Blogging: Illex Squid in Argentina Waters

Schneier on Security

Argentina is reporting that there is a good population of illex squid in its waters ready for fishing, and is working to ensure that Chinese fishing boats don’t take it all. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.