Mon.Apr 22, 2024

article thumbnail

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Security Affairs

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler service flaw. Microsoft reported that the Russia-linked APT28 group (aka “ Forest Blizzard ”, “ Fancybear ” or “ Strontium ” used a previously unknown tool, dubbed GooseEgg, to exploit the Windows Print Spooler flaw CVE-2022-38028. Since at least June 2020, and possibly earlier, the cyberespionage group has used the tool GooseEgg to exploit the CVE-2022-38028 vulnerability.

Military 356
article thumbnail

Multifactor Authentication Bypass Attacks: Top Defenses

Data Breach Today

Joe Toomey of Cyber Insurer Coalition Details Rise in Attacks Targeting Weak MFA Adversaries seeking easy access to enterprise networks continue to probe for weak multifactor authentication deployments, oftentimes via nontargeted attacks that lead to phishing pages designed to steal one-time codes, said Joe Toomey, head of security engineering at cyber insurer Coalition.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Security Affairs

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve rootkit-like capabilities. SafeBreach researcher Or Yair devised a technique, exploiting vulnerabilities in the DOS-to-NT path conversion process, to achieve rootkit-like capabilities on Windows. When a user executes a function with a path argument in Windows, the DOS path of the file or folder is converted to an NT path.

Archiving 345
article thumbnail

Benefits of a Unified CNAPP and XDR Platform

Data Breach Today

In this episode of the "Cybersecurity Insights" podcast, Uptycs CEO Ganesh Pai discusses unifying XDR and CNAPP to improve visibility and explains the coming shift from behavioral detection to outlier or anomaly detection, which uses sophisticated ML and AI.

article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

Security Affairs

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check and threatens to publish it. World-Check is a global database utilized by various organizations, including financial institutions, regulatory bodies, and law enforcement agencies, for assessing potential risks associated with individuals and entities.

Risk 345

More Trending

article thumbnail

A cyber attack paralyzed operations at Synlab Italia

Security Affairs

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical diagnosis services, since April 18. Since April 18, Synlab Italia, a major provider of medical diagnosis services, has been experiencing disruptions due to a cyber attack. The company initially cited technical issues as the cause leading to “temporary interruption of access to computer and telephone systems and related services.” However, a concerning scenario has emerged a few hours later.

article thumbnail

Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak

WIRED Threat Level

The company belatedly conceded both that it had paid the cybercriminals extorting it and that patient data nonetheless ended up on the dark web.

IT 258
article thumbnail

The Environmental Impact of Information Management

AIIM

April 22nd marks the annual Earth Day, where earthday.org, jointly with many organizations, mobilize volunteers to drive education and elevate awareness, highlight governance efforts and conduct cleanup efforts.

Cleanup 223
article thumbnail

North Koreans Secretly Animated Amazon and Max Shows, Researchers Say

WIRED Threat Level

Thousands of exposed files on a misconfigured North Korean server hint at one way the reclusive country may evade international sanctions.

Security 227
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Report: Russian Hackers Targeting Ukrainian Soldiers on Apps

Data Breach Today

Russian Hackers Using Open-Source Malware on Popular Messaging Apps, Report Says Ukraine's Computer Emergency Response Team is warning in an April report that a Russian hacking group known as UAC-0184 is using open-source malware to target Ukrainian soldiers on popular messaging apps such as Signal, as concerns grow over the Kremlin’s advanced hacking capabilities.

204
204
article thumbnail

Want to Succeed with AI? Just Keep Doing You

Weissman's World

Hey information governance and records professionals! You are core to AI success in your organization. All you have to do is keep doing you. The post Want to Succeed with AI? Just Keep Doing You appeared first on Holly Group.

article thumbnail

Feds Issue Guide for Change Health Breach Reporting Duties

Data Breach Today

HHS OCR Says the Company Has Not Yet Filed HIPAA Breach Reports to the Agency The Department of Health and Human Services has not yet received HIPAA breach reports from Change Healthcare or parent company UnitedHealth Group about their massive cyberattack. HHS is telling HIPAA-covered firms and their vendors to do their duty if a breach affects protected health information.

173
173
article thumbnail

Using Legitimate GitHub URLs for Malware

Schneier on Security

Interesting social-engineering attack vector : McAfee released a report on a new LUA malware loader distributed through what appeared to be a legitimate Microsoft GitHub repository for the “C++ Library Manager for Windows, Linux, and MacOS,” known as vcpkg. The attacker is exploiting a property of GitHub: comments to a particular repo can contain files, and those files will be associated with the project in the URL.

Libraries 134
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Olympians Tout AI in Sports

Data Breach Today

International Olympics Committee Publishes AI Strategy Olympic Games organizers on Friday in London touted artificial intelligence for its potential to revolutionize sports and rolled out a framework the International Olympics Committee said will guide responsible use of AI. Paris is set to host the 33rd Summer Olympic Games in less than 100 days.

article thumbnail

4 out of 5 of Physicians Were Impacted by February’s Cyber Attack on Change Healthcare

KnowBe4

The results are in – based on a new survey of physicians about the aftermath of the attack on Change Healthcare– and devastating impact of the.

Phishing 126
article thumbnail

Study: GPT-4 Agent Can Exploit Unpatched Vulnerabilities

Data Breach Today

Researchers Keep Prompts Under Wraps Academics at a U.S. university found that if you feed a GPT-4 artificial intelligence agent public security advisories, it can exploit unpatched "real-world" vulnerabilities without precise technical information. Researchers said OpenAI asked them not to publish their prompts.

article thumbnail

[NEW GAME] The Inside Man: New Recruits Game

KnowBe4

We released a new game, now available on the KnowBe4 Modstore. I played it myself and this is recommended for all Inside Man fans! "Mark Shepherd, The Inside Man himself, is recruiting a crack security team to thwart the sinister ‘Handler’. Your mission is to accumulate points in a series of challenges that apply lessons learnt throughout The Inside Man series, to test your expertise in combating phishing, social engineering, password breaches, ransomware and document security. " This new Game i

Phishing 120
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

GUEST ESSAY: Here’s why securing smart cities’ critical infrastructure has become a top priority

The Last Watchdog

Critical infrastructure like electrical, emergency, water, transportation and security systems are vital for public safety but can be taken out with a single cyberattack. How can cybersecurity professionals protect their cities? In 2021, a lone hacker infiltrated a water treatment plant in Oldsmar, Florida. One of the plant operators noticed abnormal activity but assumed it was one of the technicians remotely troubleshooting an issue.

Security 113
article thumbnail

Kudos! CEO Reveals He Got Phished

KnowBe4

The other day I was participating in a company’s employee meeting when the CEO revealed he had been “caught” that morning by a real phishing attack email.

Phishing 116
article thumbnail

Weekly Update 396

Troy Hunt

"More Data Breaches Than You Can Shake a Stick At" That seems like a reasonable summary and I suggest there are two main reasons for this observation. Firstly, there are simply loads of breaches happening and you know this already because, well, you read my stuff! Secondly, There are a couple of Twitter accounts in particular that are taking incidents that appear across a combination of a popular clear web hacking forum and various dark web ransomware websites and "raising them to th

article thumbnail

For the planet and people: IBM’s focus on AI ethics in sustainability

IBM Big Data Hub

AI can be a force for good, but it might also lead to environmental and sustainability concerns. IBM is dedicated to the responsible development and deployment of this technology, which can enable our clients to meet their sustainability goals. “AI is an unbelievable opportunity to address some of the world’s most pressing challenges in health care, manufacturing, climate change and more,” said Christina Shim, IBM’s global head of Sustainability Software and an AI Ethics

article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

OpenText Committed to Climate Innovation

OpenText Information Management

As I return home from OpenText World Europe, I am feeling invigorated by the powerful conversations that occurred throughout the week. I am also feeling inspired by the incredible sights and experiences that come with traveling this beautiful world of ours and am once again reminded of the critical role we play in protecting it. I read Before It’s Gone by Jonathan Vigliotti while traveling, and it is a story for every small town facing climate change—from fire, water, air, food, and earth.

Cloud 80
article thumbnail

AI this Earth Day: Top opportunities to advance sustainability initiatives

IBM Big Data Hub

This Earth Day, we are calling for action to conserve our scarcest resource: the planet. To drive real change, it’s crucial for individuals, industries, organizations and governments to work together, using data and technology to uncover new opportunities that will help advance sustainability initiatives across the globe. The world is behind on addressing climate change.

article thumbnail

Gmail And YouTube Hackers Bypass Google’s 2FA Account Security via Forbes

IG Guru

Check out the story here. The post Gmail And YouTube Hackers Bypass Google’s 2FA Account Security via Forbes first appeared on IG GURU.

article thumbnail

The Rise of the Bad Bots

Thales Cloud Protection & Licensing

The Rise of the Bad Bots madhav Tue, 04/23/2024 - 05:13 Imperva's annual Bad Bot Report is always a fascinating – albeit alarming – insight into the nature of non-human internet traffic. The 2024 Imperva Bad Bot Report is no different, revealing that bots made up nearly half (49.6%) of all internet traffic last year. While this individual statistic is astounding, it is only the tip of the iceberg.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Vulnerability Recap 4/22/24 – Cisco, Ivanti, Oracle & More

eSecurity Planet

Cisco, Ivanti, Oracle, and several others issued patches for a variety of serious vulnerabilities this week, many of them accompanied by proof-of-concepts (PoC) released by researchers. Once released, the PoC starts the clock for active attacks, especially for security tools, as demonstrated in active attacks on Palo Alto’s PAN-OS vulnerability fixed the week before.

article thumbnail

How green is your application delivery software?

OpenText Information Management

Sustainability is a growing priority for businesses and customers alike. As companies focus on their sustainability and environmental social governance (ESG) impacts, the IT landscape is faced with increasing demand to have sustainable business practices. The environmental effects of software tend to be out of sight and out of mind: software does not directly emit greenhouse gas--but the hardware running it all does.and with real world impact.

article thumbnail

Deployable architecture on IBM Cloud: Simplifying system deployment

IBM Big Data Hub

Deployable architecture (DA) refers to a specific design pattern or approach that allows an application or system to be easily deployed and managed across various environments. A deployable architecture involves components, modules and dependencies in a way that allows for seamless deployment and makes it easy for developers and operations teams to quickly deploy new features and updates to the system, without requiring extensive manual intervention.

Cloud 61