Fri.May 17, 2024

article thumbnail

Turla APT used two new backdoors to infiltrate a European ministry of foreign affairs

Security Affairs

Russia-linked Turla APT allegedly used two new backdoors, named Lunar malware and LunarMail, to target European government agencies. ESET researchers discovered two previously unknown backdoors named LunarWeb and LunarMail that were exploited to breach European ministry of foreign affairs. The two backdoors are designed to carry out a long-term compromise in the target network, data exfiltration, and maintaining control over compromised systems.

article thumbnail

US SEC Approves Wall Street Data Breach Reporting Regs

Data Breach Today

Covered Financial Institutions Have 30 Days to Notify Customers of Data Breaches The Securities and Exchange Commission unanimously approved updated regulations for covered financial institutions requiring entities such as fund companies and investment advisers to notify customers within 30 days of a cyber incident that compromised their data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds Google Chrome zero-days to its Known Exploited Vulnerabilities catalog

Security Affairs

CISA adds two Chrome zero-day vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added [ 1 , 2 ] the following vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2024-4761 Google Chromium V8 Engine contains an unspecified out-of-bounds memory write vulnerability via a crafted HTML page.

IT 324
article thumbnail

Health Plan Services Firm Notifying 2.4 Million of PHI Theft

Data Breach Today

Data Stolen Over a Year Ago, But WebTPA Didn’t Discover Hack Until December A Texas-based firm that provides health plan administration services is notifying more than 2.4 million individuals of a hacking incident and data theft that happened more than a year ago. Why did it take WebTPA so long to report that a breach occurred?

IT 189
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

North Korea-linked Kimsuky APT attack targets victims via Messenger

Security Affairs

North Korea-linked Kimsuky APT group employs rogue Facebook accounts to target victims via Messenger and deliver malware. Researchers at Genius Security Center (GSC) identified a new attack strategy by the North Korea-linked Kimsuky APT group and collaborated with the Korea Internet & Security Agency (KISA) for analysis and response. The nation-state actor attack used a fake account posing as a South Korean public official in the North Korean human rights sector.

More Trending

article thumbnail

CISA adds D-Link DIR router flaws to its Known Exploited Vulnerabilities catalog

Security Affairs

CISA adds two D-Link DIR-600 and DIR-605 router vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the following D-Link router vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog : CVE-2014-100005 Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev.

IT 317
article thumbnail

Hackers Target US AI Experts With Customized RAT

Data Breach Today

Hackers Sought Specific Generative AI Software at Leading US Firm: Proofpoint A possible Chinese threat actor is using a variant of the Gh0st RAT malware to steal information from artificial intelligence experts in U.S. companies, federal agencies and academia. On the criminal group's target list was a "leading U.S.-based AI organization.

article thumbnail

City of Wichita disclosed a data breach after the recent ransomware attack

Security Affairs

The City of Wichita disclosed a data breach after the ransomware attack that hit the Kansas’s city earlier this month. On May 5th, 2024, the City of Wichita, Kansas, was the victim of a ransomware attack and shut down its network to contain the threat. The city immediately started its incident response procedure to prevent the threat from spreading and announced an investigation into the attack.

article thumbnail

Wingardium Trivia-osa! On-Device Sorting Hatbot Powered by Gemma, Ollama, USearch, and RETSim

Elie

Exploring the societal impact of the GenAI workforce entering the market.

Marketing 149
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

FBI Seizes BreachForums Website

Schneier on Security

The FBI has seized the BreachForums website, used by ransomware criminals to leak stolen corporate data. If law enforcement has gained access to the hacking forum’s backend data, as they claim, they would have email addresses, IP addresses, and private messages that could expose members and be used in law enforcement investigations. […] The FBI is requesting victims and individuals contact them with information about the hacking forum and its members to aid in their investigation.

article thumbnail

8 out of 10 Organizations Experience a Cyber Attack and Attribute Users as the Problem

KnowBe4

Regardless of whether your environment is on-premises, in the cloud or hybrid, new data makes it clear that users are the top cybersecurity concern, and we cover what you can do about it.

Cloud 119
article thumbnail

Achieving cloud excellence and efficiency with cloud maturity models

IBM Big Data Hub

Business leaders worldwide are asking their teams the same question: “Are we using the cloud effectively?” This quandary often comes with an accompanying worry: “Are we spending too much money on cloud computing?” Given the statistics—82% of surveyed respondents in a 2023 Statista study cited managing cloud spend as a significant challenge—it’s a legitimate concern.

Cloud 96
article thumbnail

Verizon: The Human Element is Behind Two-Thirds of Data Breaches

KnowBe4

Despite growing security investments in prevention, detection and response to threats, users are still making uninformed mistakes and causing breaches.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Elevate your potential

OpenText Information Management

Technology innovation moves at a breakneck pace. Professionals who stay up to date with the latest developments have the opportunity to boost their job skills and become invaluable to their organizations. That’s why we’re making training and certification a central focus of OpenText World 2024. Join us this November at The Venetian Resort Las Vegas to quickly get up to speed with the latest skills that are in high demand, then demonstrate your proficiency with certification.

article thumbnail

96% of hospitals share website data: Study via Becker’s Health IT

IG Guru

Check out the article here. The post 96% of hospitals share website data: Study via Becker’s Health IT first appeared on IG GURU.

IT 74
article thumbnail

AI in commerce: Essential use cases for B2B and B2C

IBM Big Data Hub

Key takeaways By implementing effective solutions for AI in commerce, brands can create seamless, personalized buying experiences that increase customer loyalty, customer engagement, retention and share of wallet across B2B and B2C channels. Poorly run implementations of traditional or generative AI in commerce—such as models trained on inadequate or inappropriate data—lead to bad experiences that alienate consumers and businesses.

B2C 64
article thumbnail

Zero Trust Network Security Explained

Adapture

As cyberattacks have become more complex, new strategies and philosophies around cybersecurity have developed to counter these threats. IT leaders have come to accept a harsh reality—stopping every cyberattack might not be possible. Instead, strategies have developed around mitigating attacks, limiting the damage a bad actor can cause. One such strategy that has become increasingly popular is the Zero Trust model.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Friday Squid Blogging: Emotional Support Squid

Schneier on Security

When asked what makes this an “emotional support squid” and not just another stuffed animal, its creator says: They’re emotional support squid because they’re large, and cuddly, but also cheerfully bright and derpy. They make great neck pillows (and you can fidget with the arms and tentacles) for travelling, and, on a more personal note, when my mum was sick in the hospital I gave her one and she said it brought her “great comfort” to have her squid tucked up

Security 102
article thumbnail

Top US Cyber Defense Official Eric Goldstein to Step Down

Data Breach Today

Eric Goldstein Stepping Down in June After 3 Years at US Cyber Defense Agency Eric Goldstein, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency, is stepping down from the top post at the nation’s cyber defense agency after serving more than three years in the Biden administration.

article thumbnail

A new era in BI: Overcoming low adoption to make smart decisions accessible for all

IBM Big Data Hub

Organizations today are both empowered and overwhelmed by data. This paradox lies at the heart of modern business strategy: while there’s an unprecedented amount of data available, unlocking actionable insights requires more than access to numbers. The push to enhance productivity, use resources wisely, and boost sustainability through data-driven decision-making is stronger than ever.

Access 77