Thu.Jun 20, 2024

article thumbnail

Cryptohack Roundup: Kraken, CertiK Feud Over Zero-Day, $3M

Data Breach Today

Also: UwU Lend's Hacks, Terraform Labs' Dissolution, Gemini's Settlement This week, CertiK researchers allegedly stole money from Kraken, UwU Lend was hacked, Terraform Labs shut down, Gemini will pay defrauded investors, three entities claimed seized FTX assets, a Chinese bank suffered embezzlement and money laundering, and the SEC's crypto head is leaving.

272
272
article thumbnail

RSAC Fireside Chat: Tightened budgets impose discipline on CISOs, resets security investments

The Last Watchdog

CISOs have been on something of a wild roller coaster ride the past few years. Related: Why breaches persist When Covid 19 hit in early 2020, the need to secure company networks in a new way led to panic spending on cybersecurity tools. Given carte blanche, many CISOs purchased a hodge podge of unproven point solutions, adding to complexity. By mid-2022, with interest rates climbing and the stock market cratering, CFOs began demanding proof of a reasonable return on investment.

Security 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European CSAM Scanning Proposal Runs Into Opposition

Data Breach Today

Council of the European Union Cancels Vote A proposal requiring online chat providers to scan images and links for child pornography failed to garner majority support Thursday from European Union trading bloc governments. The bill would require chat app users to consent to having images and URLs scanned for child sexual abuse material.

article thumbnail

An unpatched bug allows anyone to impersonate Microsoft corporate email accounts

Security Affairs

A researcher discovered a flaw that allows attackers to impersonate Microsoft corporate email accounts and launch phishing attacks. The security researcher Vsevolod Kokorin (@Slonser) discovered a bug that allows anyone to impersonate Microsoft corporate email accounts. An attacker can trigger the vulnerability to launch phishing attacks. I want to share my recent case: > I found a vulnerability that allows sending a message from any user@domain > We cannot reproduce it > I send a v

Phishing 145
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Victims of Snowflake Data Breach Receive Ransom Demands

Data Breach Today

Attackers Demanding Up to $5 Million to Delete Stolen Data, Investigators Report Attackers who stole terabytes of data from customers of Snowflake have been not only offering the data for sale on data leak marketplaces but also extorting some of the victims, demanding a ransom of $300,000 to $5 million each, security researchers report.

More Trending

article thumbnail

Critical UEFI Flaw in Phoenix Firmware Hits Major PC Brands

Data Breach Today

Buffer Overflow Vulnerability Lets Attackers Control Devices A vulnerability in a common implementation of the firmware booting up desktop computers powered by Intel chips could allow attackers to obtain ongoing persistence, warn security researchers. The flaw is a buffer overflow vulnerability in the Phoenix Technologies SecureCore UEFI implementation.

Security 274
article thumbnail

China-linked spies target Asian Telcos since at least 2021

Security Affairs

A China-linked cyber espionage group has compromised telecom operators in an Asian country since at least 2021. The Symantec Threat Hunter Team reported that an alleged China-linked APT group has infiltrated several telecom operators in a single, unnamed, Asian country at least since 2021. The threat actors used tools associated with Chinese espionage groups, they planted multiple backdoors on the networks of targeted companies to steal credentials. “The attacks have been underway since a

article thumbnail

DHS Unveils Critical Infrastructure Cybersecurity Guidance

Data Breach Today

DHS Calls for Public-Private Collaboration on Critical Infrastructure Security Critical infrastructure sectors face many potentially disruptive threats such as supply chain vulnerabilities and the growing dependency on space-based systems. But the top cyberthreats facing the U.S. are the People's Republic of China and emerging risks associated with AI and quantum computing.

article thumbnail

New Rust infostealer Fickle Stealer spreads through various attack methods

Security Affairs

New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration A new Rust malware called Fickle Stealer spreads through various attack methods and steals sensitive information. Fortinet FortiGuard Labs researchers detected a new Rust-based information stealer called Fickle Stealer which spread through multiple attack vectors. The malware has an intricate code and relies on multiple strategies for its distribution, including VBA dropper, VBA downloader, link downloader, and ex

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Recovering Public Keys from Signatures

Schneier on Security

Interesting summary of various ways to derive the public key from digitally signed files. Normally, with a signature scheme, you have the public key and want to know whether a given signature is valid. But what if we instead have a message and a signature, assume the signature is valid, and want to know which public key signed it? A rather delightful property if you want to attack anonymity in some proposed “everybody just uses cryptographic signatures for everything” scheme.

IT 113
article thumbnail

Keeper vs Bitwarden (2024): Benefits & Features Compared

eSecurity Planet

Keeper and Bitwarden are password manager products that help your business manage its application credentials across all platforms. Keeper is a strong solution for both small businesses and large enterprises. Bitwarden is great for mid-sized businesses and teams that want to self-host a password manager. I evaluated Keeper and Bitwarden’s features, business plans, and pros and cons so you can decide which solution is a better fit for your organization.

Passwords 107
article thumbnail

The Indispensable World of Red Teaming

KnowBe4

In this mad, mad world of breaches, organizations are scrambling to keep their heads above water. It's like trying to navigate a minefield while blindfolded and riding a unicycle — one wrong move, and everything goes up in flames.

IT 108
article thumbnail

Smishing Triad Is Targeting Pakistan To Defraud Banking Customers At Scale

Security Affairs

Resecurity researchers warn of a new activity of Smishing Triad , which has expanded its operations to Pakistan. Resecurity has identified a new activity of Smishing Triad , which has expanded its operations to Pakistan. The group’s latest tactic involves sending malicious messages on behalf of Pakistan Post to customers of mobile carriers via iMessage/SMS.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Vacation-Themed Scams Are Spiking

KnowBe4

Scammers are now impersonating legitimate services like Booking.com and Kayak to target people planning their summer vacations. One out of every 33 vacation-themed domains registered last month was malicious, researchers at Check Point warn.

Security 107
article thumbnail

Post Office accidentally leaks names and addresses of wrongfully convicted operators

The Guardian Data Protection

Company refers itself to data watchdog after publishing personal details of 555 people involved in Horizon IT lawsuit The Post Office has launched an “urgent” investigation and referred itself to the data watchdog after it accidentally published the names and addresses of hundreds of post office operators on its corporate website. The state-owned body published the personal details of 555 people who had been involved in suing the Post Office in a high court lawsuit in 2019.

IT 98
article thumbnail

What the BastionZero Acquisition means for Cloudflare

Adapture

Cloudflare Inc announced its acquisition of BastionZero , a Zero Trust infrastructure access platform, on Thursday, May 30. The acquisition was announced on the day of Cloudflare’s North American Partner Summit and follows the acquisitions of Baselime and PartyKit , both of which were acquired in April. BastionZero is a leader in Zero Trust, both in cloud and on-prem environments.

Access 59
article thumbnail

Gimmal Extends Microsoft Purview Information Protection Solution for Enhanced Sensitive Data Labeling and Governance

Gimmal

Thursday, June 20, 2024 – HOUSTON, TX – Gimmal, the market’s only end-to-end information governance platform, announced today the launch of their Microsoft Purview Sensitivity Labels solution to extend and enhance sensitive data classification for unstructured data sources, such as network file shares and endpoints. Modern remote and hybrid work environments have compounded security and compliance risks for organizations and public sector agencies.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Transition to a Fully Digital Government: Digital Signatures

National Archives Records Express

Still image from Video Recording of the Electronic Signatures in Global and National Commerce Act NAID 6850807 This blog post is the second in a series focusing on specific areas agencies should consider in their transition to fully digital government. Fully Digital Government and Digital Electronic Signatures Since the passage of the Government Paperwork Elimination Act (GPEA) in 1998 and the Electronic Signatures In Global And National Commerce Act in 2000, digital signatures have been the pr

article thumbnail

Defense-in-depth: Integrated security approach for enterprise

Jamf

Closing security gaps requires a holistic solution. Keeping enterprise resources compliant and safe from sophisticated threats takes an integrated, layered approach, that provides native support for device and OS types while prioritizing efficacy and efficiency to drive organization ROI.

article thumbnail

The 80th Anniversary of the G.I. Bill

Unwritten Record

This post was created in collaboration with Chris Byrd, Archives Technician in the Still Picture Branch. Original Caption: Pvt. Sidney Rosenfeld of 1001 42nd St., Des Moines, Iowa, known as one of the most ingenious and energetic men in his outfit waded ashore at Omaha Beach with the US Sixth Engineer Special Brigade and then volunteered for the paratroopers.

article thumbnail

Will Upcoming HHS Cyber Regs Move Needle in Health Sector?

Data Breach Today

New Minimum Cyber Mandates Expected for Hospitals, But Is That Enough? The Biden administration will soon issue regulations to bolster cybersecurity in the healthcare sector. Hospitals are expected to be the first group required to implement new "minimum" mandates based on "cybersecurity performance goals" released in January. Will this be enough to move the needle?

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

US Bans Kaspersky Software

WIRED Threat Level

Using a Trump-era authority, the US Commerce Department has banned the sale of Kaspersky’s antivirus tools to new customers in the US, citing alleged threats to national security.

Sales 136
article thumbnail

Biden Administration Bans Kaspersky Antivirus Software

Data Breach Today

New Updates for Customers Will Become Unavailable on September 29 The U.S. federal government is taking broad enforcement actions against the Russian cybersecurity giant Kaspersky Labs by banning the company from selling its antivirus software products in the United States after an investigation raised national security concerns.

article thumbnail

US bans sale of Kaspersky products due to risks to national security

Security Affairs

The US government announced the ban on selling Kaspersky software due to security risks from Russia and urged citizens to replace it. The Biden administration announced it will ban the sale of Kaspersky antivirus software due to the risks posed by Russia to U.S. national security. The U.S. government is implementing a new rule leveraging powers established during the Trump administration to ban the sale of Kaspersky software, citing national security risks posed by Russia.

Sales 127
article thumbnail

KrebsOnSecurity Threatened with Defamation Lawsuit Over Fake Radaris CEO

Krebs on Security

On March 8, 2024, KrebsOnSecurity published a deep dive on the consumer data broker Radaris , showing how the original owners are two men in Massachusetts who operated multiple Russian language dating services and affiliate programs, in addition to a dizzying array of people-search websites. The subjects of that piece are threatening to sue KrebsOnSecurity for defamation unless the story is retracted.

Marketing 297
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.