Mon.Jun 24, 2024

article thumbnail

LockBit claims the hack of the US Federal Reserve

Security Affairs

The Lockbit ransomware group announced that it had breached the US Federal Reserve and exfiltrated 33 TB of sensitive data. The Lockbit ransomware group announced that it had breached the systems of Federal Reserve of the United States and exfiltrated 33 TB of sensitive data, including “Americans’ banking secrets.” The Lockbit ransomware group added the Federal Reserve to the list of victims on its Tor data leak site and threatened to leak the stolen data on 25 June, 2024 20:27

article thumbnail

CDK Begins Restoring Systems Amid Ransomware Payment Reports

Data Breach Today

Auto Dealership Software Firm Says Restoring Service Will Take 'Days and Not Weeks' CDK Global, the auto dealership software solutions firm that supplies services to an estimated 15,000 dealerships in the U.S. and Canada, said it has begun the restoration process for its customers after a debilitating cyber incident caused disruptions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA confirmed that its CSAT environment was breached in January.

Security Affairs

CISA warned chemical facilities that its Chemical Security Assessment Tool (CSAT) environment was compromised in January. CISA warns chemical facilities that its Chemical Security Assessment Tool (CSAT) environment was breached in January. In March, the Recorded Future News first reported that the US Cybersecurity and Infrastructure Security Agency (CISA) agency was hacked in February.

IT 322
article thumbnail

European Union Sanctions Russian State Hackers

Data Breach Today

Hackers Part of Callisto and Armageddon Groups The European Union sanctioned four Russian domestic intelligence agency hackers including two military officers who participated in what researchers have described as "hack and leak" operations. Also coming under sanctions are ransomware hackers who were part of the Wizard Spider criminal group.

Military 246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Experts observed approximately 120 malicious campaigns using the Rafel RAT

Security Affairs

Multiple threat actors are using an open-source Android remote administration tool called Rafel RAT to target Android Devices. Check Point Research identified multiple threat actors using Rafel, an open-source remote administration tool (RAT). The researchers spotted an espionage group using Rafel, highlighting the tool’s effectiveness across different threat profiles and goals.

More Trending

article thumbnail

Ransomware threat landscape Jan-Apr 2024: insights and challenges

Security Affairs

Between Jan and Apr 2024, the global ransomware landscape witnessed significant activity, with 1420 ransomware claims reported worldwide. In the first four months of 2024, the global ransomware landscape witnessed significant activity, with 1420 ransomware claims reported worldwide, including 55 in Italy. These findings, sourced from the Ransomfeed platform , shed light on the geographical distribution of attacks and the most impacted sectors.

article thumbnail

Red Tape Is Making Hospital Ransomware Attacks Worse

WIRED Threat Level

With cyberattacks increasingly targeting health care providers, an arduous bureaucratic process meant to address legal risk is keeping hospitals offline longer, potentially risking lives.

article thumbnail

ExCobalt Cybercrime group targets Russian organizations in multiple sectors

Security Affairs

The cybercrime group ExCobalt targeted Russian organizations in multiple sectors with a previously unknown backdoor known as GoRed. Positive Technologies researchers reported that a cybercrime gang called ExCobalt targeted Russian organizations in multiple sectors with a previously unknown Golang-based backdoor known as GoRed. Members of the ExCobalt group have been active since at least 2016, the researchers believe that the group is linked to the notorious Cobalt Gang.

article thumbnail

CISA Confirms Cyberattack on Critical Chemical Security Tool

Data Breach Today

US Cyber Defense Agency Says Major Cyberattack Result of Vulnerable Ivanti Products The Cybersecurity and Infrastructure Security Agency confirmed Monday that hackers attacked one of its critical tools housing private sector chemical security plans earlier this year after gaining access by exploiting vulnerabilities found in Ivanti products used by the cyber defense agency.

Security 173
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Threat actors compromised 1,590 CoinStats crypto wallets

Security Affairs

Threat actors breached 1,590 cryptocurrency wallets of the cryptocurrency portfolio management and tracking platform CoinStats. The cryptocurrency portfolio management and tracking platform CoinStats suffered a massive security breach. Alleged North Korea threat actors have compromised 1,590 cryptocurrency wallets. CoinStats allows users to monitor their cryptocurrency holdings across various exchanges and wallets in a single platform.

Security 290
article thumbnail

Information Blocking of Patient Records Could Cost Providers

Data Breach Today

Final HHS Rule Cuts Financial Payments to Healthcare Firms That Violate Cures Act Federal regulators have issued a final rule that sets financial disincentives for healthcare providers that commit information blocking - or practices that they know are unreasonable and likely to interfere with patient access to electronic health information.

Access 147
article thumbnail

Experts observed approximately 120 malicious campaigns using the Rafel RAT

Security Affairs

Multiple threat actors are using an open-source Android remote administration tool called Rafel RAT to target Android Devices. Check Point Research identified multiple threat actors using Rafel, an open-source remote administration tool (RAT). The researchers spotted an espionage group using Rafel, highlighting the tool’s effectiveness across different threat profiles and goals.

article thumbnail

Chinese Hackers Caught Spying on Taiwanese Firms

Data Breach Today

Espionage Group Used SoftEther VPN Client to Exploit Targeted Networks A Chinese state-sponsored group, tracked as RedJuliett, is using open-source VPN client SoftEther to target the infrastructure of about 75 organizations in government, academic and technology sectors in multiple countries. Most of the attacks appear to target Taiwan.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

RSAC 2024: The many flavors of ‘SASE’ now includes Aryaka’s ‘Unified SASE as a Service.”

The Last Watchdog

Secure Access Service Edge ( SASE ) has come a long way since Gartner christened this cloud-centric cybersecurity framework in 2019. Related: Can SASE stop tech sprawl? SASE blends networking architecture, namely SD-WAN, with cloud-delivered security services such as security web gateways, Zero Trust network access and more. Several distinct variants of SASE have come to be supplied by diverse sources.

Cloud 130
article thumbnail

CHERI Backers Form Alliance to Promote Memory Safety Chip

Data Breach Today

Chipmaker Arm Is Not an Alliance Member Developers of a computer hardware project for stopping memory-based cyberattacks will soon release standards in a bid to overcome commercial hurdles to its adoption. Backers of the Capability Hardware Enhanced RISC Instructions, or CHERI, architecture hope it becomes more widely adopted.

IT 130
article thumbnail

The State of Data Breaches

Troy Hunt

I've been harbouring some thoughts about the state of data breaches over recent months, and I feel they've finally manifested themselves into a cohesive enough story to write down. Parts of this story relate to very sensitive incidents and parts to criminal activity, not just on behalf of those executing data breaches but also very likely on behalf of some organisations handling them.

article thumbnail

Balancing Act: The European Union's AI Act and the Quest for Responsible Innovation

KnowBe4

The current landscape of artificial intelligence (AI) bears a striking resemblance to the early days of the internet. Just as the internet was once a wild, untamed frontier full of promise and potential, AI now stands at a similar crossroads.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Paul Nakasone Joins OpenAI’s Board of Directors

Schneier on Security

Former NSA Director Paul Nakasone has joined the board of OpenAI.

article thumbnail

My Hacker Story: A Cautionary Tale of Intern Antics and Cultural Learnings

KnowBe4

My hacker story does not paint me in the best light, and it is not intended to. I am a firm believer in sharing one's mistakes and being open to learning from them.

IT 111
article thumbnail

American Privacy Rights Act Advances with Significant Revisions via The National Law Review

IG Guru

Check out the article here The post American Privacy Rights Act Advances with Significant Revisions via The National Law Review first appeared on IG GURU.

Privacy 75
article thumbnail

BEC Attacks Accounted for More Than One in Ten Social Engineering Attacks in 2023

KnowBe4

A new report from Barracuda has found that email conversation hijacking attacks have risen by 70% since 2022. Additionally, business email compromise (BEC) attacks accounted for 10.6% of social engineering attacks in 2023, compared to 8% in 2022 and 9% in 2021.

Phishing 105
article thumbnail

5 Ways You Can Win Faster with Gen AI in Sales

Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.

article thumbnail

Library brings local history to life for London school children

CILIP

Library brings local history to life for London school children Guildhall Library in the City of London created an open and accessible space that got children out of the classroom and gave them hands-on experience of history. The Guildhall Library in the City of London launched a series of school workshops to encourage students to learn more about their local history and the Great Plague of 1066. 90 school children participated in interactive workshops that showcased original historical artefact

article thumbnail

Vulnerability Recap 6/24/24 – Patch Highlights Across Platforms

eSecurity Planet

In last week’s vulnerability news, major companies performed recent patches to resolve critical vulnerabilities across various software and hardware platforms. Microsoft addressed a remote code execution issue. ASUS fixed authentication bypass and buffer overflow issues in its routers. VMware patched heap-overflow and privilege escalation problems in vCenter Server, while Trellix tackled an insecure deserialization vulnerability in its IPS Manager.

article thumbnail

Essex Library bridges the Generation Gap with Memory Café

CILIP

Essex Library bridges the Generation Gap with Memory Café The Memory Café takes place at the same time as a toddler and family event and attendees come together to talk and take part in activities together. Essex Library Service’s Memory Café in Harwich is connecting people across age groups in their local community to support independent living, health and wellbeing for people with dementia.

article thumbnail

Securing the Journey to AI with Thales Sovereign Solutions for AWS

Thales Cloud Protection & Licensing

Securing the Journey to AI with Thales Sovereign Solutions for AWS josh.pearson@t… Mon, 06/24/2024 - 22:28 Encryption David Ortega | Principle Solution Architect More About This Author > Amazon Web Services (AWS) is the world's largest cloud service provider. Unsurprisingly, they are committed to providing tools, solutions, and best practices that allow their customers to leverage Generative Artificial Intelligence (GenAI) workloads on AWS securely.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How Open Architecture Ticket Validators Streamline Fare Collection and Enable Efficient Boarding

HID Global

Discover how HID VAL150 ticket validators streamline fare collection and boarding for public transit, improving efficiency and passenger flow.

59
article thumbnail

Business process automation – The secret weapon of successful businesses

OpenText Information Management

In today’s ever-changing, dynamic business landscape, there is an incessant quest for amplified organizational and cost efficiency, improved customer experience, and increased agility to remain relevant and competitive. Enterprises seeking to achieve these outcomes through technological harmony will find this whitepaper, " A Simple Guide to Successful Business Process Automation " by industry experts Alan Pelz-Sharpe and Matt Mullen, to be their essential roadmap to success.

article thumbnail

4 ways CFOs can navigate the incoming wave of digital finance transformation

CGI

Imagine a world in which digital technologies, like artificial intelligence, run most CFO functions. While this might seem futuristic, it’s here today. IT modernization is rapidly impacting an increasing number of CFO functions, generating a significant return on investment and freeing up the CFO to focus on more strategic and value-added functions.