Thu.Aug 10, 2023

article thumbnail

Check Point to Buy SSE, ZTNA Startup Perimeter 81 for $490M

Data Breach Today

Perimeter 81 Cuts Valuation By 51%, Becomes Second Cyber Firm to Lose Unicorn Horns Perimeter 81 will be sold to Check Point for $490 million but had to slash its valuation by more than half to seal the deal. Check Point said its proposed buy of New York-based Perimeter 81 will fuel the adoption of secure access across remote users, sites, cloud, data centers and the internet.

Cloud 242
article thumbnail

SEC Proposes Sweeping New Rules on Use of Data Analytics by Broker-Dealers and Investment Advisers

Data Matters

On July 26, 2023, the U.S. Securities and Exchange Commission (SEC or Commission) proposed new rules for broker-dealers (Proposed Rule 15(1)-2) and investment advisers (Proposed Rule 211(h)(2)-4) on the use of predictive data analytics (PDA) and PDA-like technologies in any interactions with investors. 1 However, as discussed below, the scope of a “covered technology” subject to the rules is much broader than what most observers would consider to constitute predictive data analytics.

Analytics 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attackers Use EvilProxy to target C-suite Excecutives

Data Breach Today

Phishing Kit Primarily Used in Attacks Against Employees of Fortune 500 Companies Threat actors are taking control of cloud-based Microsoft 365 accounts of C-suite executives using a multi-factor authentication phishing tool. Proofpoint researchers say attackers use automation to identify in real-time whether a phished user is a high-level profile company official.

Phishing 241
article thumbnail

Teens Hacked Boston Subway’s CharlieCard to Get Infinite Free Rides—and This Time Nobody Got Sued

WIRED Threat Level

In 2008, Boston’s transit authority sued to stop MIT hackers from presenting at the Defcon hacker conference on how to get free subway rides. Today, four teens picked up where they left off.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Secondary Market Medical Device Security Risks

Data Breach Today

Legacy infusion pumps commonly available for purchase on the secondary market often contain wireless authentication and other sensitive data that the original medical organization owners failed to purge, warned researcher Deral Heiland, citing a recent study conducted by security firm Rapid7.

Marketing 240

More Trending

article thumbnail

Law Enforcement Takes Down Phishing-as-a-Service Site

Data Breach Today

Authorities in Multiple Countries Arrest Operators of 16shop An international law enforcement operation took down a phishing-as-a-service website that security researchers say was responsible for more than 150,000 phishing domains. The site, 16shop, sold phishing kits that targeted more than 70,000 people in 43 countries.

Phishing 240
article thumbnail

US Govt launches Artificial Intelligence Cyber Challenge

Security Affairs

The US Government House this week launched an Artificial Intelligence Cyber Challenge competition for creating a new generation of AI systems. On Wednesday, the United States Government House introduced an Artificial Intelligence Cyber Challenge competition. The two-year competition aims to foster the development of innovative AI systems that can protect critical applications from cyber threats.

article thumbnail

Northern Ireland Police Disclose Another Serious Data Breach

Data Breach Today

Privacy Watchdog Probing Accidental Leak of Personal Information for Entire Force One day after personal information for all 10,000 police officers and staff in Northern Ireland was accidentally exposed online, putting their safety at risk, the nation's police service said it's probing a laptop theft last month that may have exposed 200 employees' details.

article thumbnail

Statc Stealer, a new sophisticated info-stealing malware

Security Affairs

Experts warn that a new info-stealer named Statc Stealer is infecting Windows devices to steal a broad range of sensitive information. Zscaler ThreatLabz researchers discovered a new information stealer malware, called Statc Stealer, that can steal a broad range of info from Windows devices. The malware can steal sensitive information from various web browsers, including login data, cookies, web data, and preferences.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Chinese RedHotel Spy Group Linked to Hacks in 17 Countries

Data Breach Today

Motives, Operations Closely Linked to China's Ministry of State Security A Chinese state-sponsored spy group called RedHotel has emerged as a dominant espionage agent against government entities of at least 17 countries worldwide. Researchers said the motives and operations of the group closely link it to China's Ministry of State Security.

article thumbnail

CISA discovered a new backdoor, named Whirlpool, used in Barracuda ESG attacks

Security Affairs

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) observed a new backdoor, named Whirlpool, in attacks on Barracuda ESG appliances. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has discovered a new backdoor, named Whirlpool , that was employed in attacks targeting Barracuda ESG devices. At the end of May, the network security solutions provider Barracuda warned customers that some of its Email Security Gateway (ESG) appliances were recently by threat actors

article thumbnail

Cryptohack Roundup: Zero-Day Bugs in 15 Crypto Wallets

Data Breach Today

Also: Curve Finance Recovers 73% of Stolen $73 Million In this week's roundup of digital assets-related cybersecurity incidents, Fireblocks found bugs in 15 crypto wallets, Curve Finance recouped most stolen funds, ethereum saw a high flow of illicit funds, the NFT faded more, the U.K. posted crypto crimes jobs and South Korea arrested Bitsonic's CEO.

article thumbnail

Cryptographic Flaw in Libbitcoin Explorer Cryptocurrency Wallet

Schneier on Security

Cryptographic flaws still matter. Here’s a flaw in the random-number generator used to create private keys. The seed has only 32 bits of entropy. Seems like this flaw is being exploited in the wild.

83
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Count of Organizations Affected by MOVEit Attacks Hits 621

Data Breach Today

Breach Notifications Say Over 40 Million Individuals' Personal Information Exposed At least 621organizations have now confirmed that they were affected by the zero-day attack on MOVEit file-sharing servers that began in late May, collectively affecting 40 million individuals, report cybersecurity researchers who've been tracking the impact of Clop's data-theft campaign.

article thumbnail

Black Hat: "Five cyber phases of Russia's hybrid war"

KnowBe4

The Cyberwire reported: "Victor Zhora, deputy chairman and chief digital transformation officer at Ukraine's State Service of Special Communication and Information Protection (SSSCIP) --effectively Kyiv's cybersecurity lead-- said at Black Hat that Russian cyber ops would continue long after the end of kinetic combat.

article thumbnail

Breach Roundup: SEC Fines 11 Orgs for Record-Keeping Failure

Data Breach Today

Also, North Korean Hackers Breached Russian Missile Maker This week, Wall Street fined firms for using WhatsApp, NK hackers breached a Russian missile maker, Ivanti backtracked, ransomware attacks cost manufacturers $46B, a cyberattack shut down Gemini North Observatory, ad fraud targeted Android users and healthcare workers' personal info was breached.

article thumbnail

Navigating Cybersecurity's Seas: Environmental Regulations, OT & the Maritime Industry's New Challenges

Dark Reading

Stringent efficiency measures in new environmental regulations create an unintended consequence for the shipping industry: increased cybersecurity risks in operational technology systems.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Researchers Uncover 'Inception' Flaw in AMD CPUs

Data Breach Today

Vulnerability Allows Manipulation of CPU to Leak Data Security researchers uncovered a vulnerability in AMD chips that could allow hackers to trick a computer system into leaking data from its kernel. They named the flaw after the 2010 movie "Inception," since both the hacking technique and the film's plot involve planting false ideas into memory.

Security 230
article thumbnail

NSA: Codebreaker Challenge Helps Drive Cybersecurity Education

Dark Reading

The US National Security Agency aims to attract students to cybersecurity in general and its own open positions in particular: 3,000 new jobs this year.

article thumbnail

Proof of Concept: Managing Software Supply Chain Woes

Data Breach Today

Also: Lessons Learned From the MOVEit Breaches; Tools for Managing SBOMs In the latest "Proof of Concept," Mike Baker, VP/IT CISO at DXC Technology and a CyberEdBoard member, and Chris Hughes, co-founder and CISO at Aquia, join ISMG editors to explore the state of the software supply chain, MOVEit breaches and the role of SBOMs and transparency in software development.

IT 221
article thumbnail

'MoustachedBouncer' APT Spies on Embassies, Likely via ISPs

Dark Reading

Diplomats who didn't use VPNs may have lost sensitive state information to a Belarusian government-aligned threat actor, which wields the "Disco" and "Nightclub" malware.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

6 Best Threat Intelligence Feeds to Use in 2023

eSecurity Planet

Threat intelligence feeds are continually updated streams of data that inform users of different cybersecurity threats, their sources, and any infrastructure impacted or at risk of being impacted by those threats. These feeds are often in a standard format like STIX/TAXII so they can be integrated with EDR , SIEM , firewalls , threat intelligence platforms , and other network security tools , offering an additional source of real-time or near-real-time threat information to monitor for indicator

article thumbnail

EvilProxy Cyberattack Flood Targets Execs via Microsoft 365

Dark Reading

A campaign sent 120,000 phishing emails in three months, circumventing MFA to compromise cloud accounts of high-level executives at global organizations

article thumbnail

AI's Role in Cybersecurity: Black Hat USA 2023 Reveals How Large Language Models Are Shaping the Future of Phishing Attacks and Defense

KnowBe4

At Black Hat USA 2023, a session led by a team of security researchers, including Fredrik Heiding, Bruce Schneier, Arun Vishwanath, and Jeremy Bernstein, unveiled an intriguing experiment. They tested large language models (LLMs) to see how they performed in both writing convincing phishing emails and detecting them. This is the PDF technical paper.

article thumbnail

The Hard Realities of Setting AI Risk Policy

Dark Reading

Time to get real about what it takes to set and enforce cybersecurity and resilience standards for AI risk management in the enterprise.

Risk 84
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Leaked Yandex Code Breaks Open the Creepy Black Box of Online Advertising

WIRED Threat Level

As the international tech giant moves toward Russian ownership, the leak raises concerns about the volume of data it has on its users.

IT 83
article thumbnail

Dell Credentials Bug Opens VMWare Environments to Takeover

Dark Reading

Decoding private keys from even one Dell customer could give attackers control over VMWare environments across all organizations running the same programs.

77
article thumbnail

Fintechs turn to AI and cloud as steadfast forces for innovation

IBM Big Data Hub

The rapidly evolving fintech landscape is witnessing a remarkable transformation, driven by advancements in leveraging both artificial intelligence (AI) and cloud computing technologies. With customers top of mind, we are seeing fintechs increasingly harness the power of choice and flexibility that comes with hybrid multicloud and lean into the power of data analytics to deliver enhanced experiences.

Cloud 70