Thu.Apr 18, 2024

article thumbnail

Ransomware Victims Who Pay a Ransom Drops to Record Low

Data Breach Today

Experts See Groups Shoot Themselves in the Foot by Yet Again Swindling Affiliates Here's ransomware news to celebrate: The number of victims who opt to pay a ransom has dropped to a record low. Also, the operators of two major groups hit by law enforcement disruptions have each chosen to swindle their affiliates, sowing disaffection and driving away burned business partners.

article thumbnail

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Security Affairs

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly available exploit code exists. Cisco has addressed a high-severity Integrated Management Controller (IMC) vulnerability and is aware of a public exploit code for this issue. The PoC exploit code allows a local attacker to escalate privileges to root.

IT 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Roundup: LabHost Goes Down

Data Breach Today

Also: Omni Hack Exposed Customer Data and More Ivanti Vulnerabilities This week, police took down the LabHost phishing-as-a-service site, customer data compromised in Omni Hotels hack, more Ivanti vulnerabilities, a Moldovan botnet operators faces U.S. charges, Cisco warned of data breach in Duo and a Spanish Guardia Civil contractor suffered a ransomware attack.

article thumbnail

Other Attempts to Take Over Open Source Projects

Schneier on Security

After the XZ Utils discovery, people have been examining other open-source projects. Surprising no one, the incident is not unique: The OpenJS Foundation Cross Project Council received a suspicious series of emails with similar messages, bearing different names and overlapping GitHub-associated emails. These emails implored OpenJS to take action to update one of its popular JavaScript projects to “address any critical vulnerabilities,” yet cited no specifics.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Hacking the Floodgates: U.S. Dams Face Growing Cyber Threats

Data Breach Today

Hacks on Unregulated Dams Can Result in Mass Casualties, Experts and Lawmakers Warn Cybersecurity experts and top lawmakers are warning that a successful cyberattack targeting federally-regulated dams across the United States - the majority of which have not received a cyber audit - could result in a severe impact on public health and even mass casualties.

More Trending

article thumbnail

Dark Web Sales Driving Major Rise in Credential Attacks

Data Breach Today

Cybercriminals Netting Over 50 Credentials Per Infected Device, Kaspersky Says The value of corporate credentials in the cybercrime market contributed to a 643% increase in data theft attacks over the past three years, cybersecurity company Kaspersky says. Malicious access brokers stole close to 400 million logins and passwords for numerous websites in the past year.

Sales 173
article thumbnail

LastPass Warns of Deepfake Phishing Attempt

KnowBe4

LastPass has warned that one of its employees was targeted by a social engineering attack that used an audio deepfake that impersonated the company’s CEO. Fortunately, the employee grew suspicious and avoided falling for the attack.

Phishing 123
article thumbnail

Why Health Firms Struggle with Cybersecurity Frameworks

Data Breach Today

Healthcare sector organizations often still struggle to implement security frameworks effectively, often not fully understanding the requirements or failing to integrate them into their overall cybersecurity strategy, said Keith Forrester of security firm Optiv, who offers tips to help.

article thumbnail

United Nations Development Programme (UNDP) investigates data breach

Security Affairs

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack and the subsequent theft of data. The United Nations Development Programme (UNDP) is investigating an alleged ransomware attack that resulted in data theft. The United Nations Development Programme (UNDP) is a United Nations agency tasked with helping countries eliminate poverty and achieve sustainable economic growth and human development.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Cryptohack Roundup: First Conviction in Smart Contract Hack

Data Breach Today

Also: Nebraska Man Steals $3.5 Million of Cloud Services to Mine $1M of Crypto Every week, ISMG rounds up cybersecurity incidents in digital assets. This week, sentencing in the first-ever conviction for hacking a smart contract, indictment in a million-dollar illicit mining, FTX executive's sentencing, Railgun's money-laundering defense and Uniswap's Wells Notice.

Mining 173
article thumbnail

Law enforcement operation dismantled phishing-as-a-service platform LabHost

Security Affairs

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost. An international law enforcement operation, codenamed Nebulae and coordinated by Europol, led to the disruption of LabHost, which is one of the world’s largest phishing-as-a-service platforms. Law enforcement from 19 countries participated in the operation which resulted in the arrest of 37 individuals.

Phishing 129
article thumbnail

Company Says Change Healthcare Hackers Stole Sensitive Data

Data Breach Today

UnitedHealth Group Makes Low Key Admission in Online FAQ UnitedHealthGroup said for the first time that hackers behind a February ransomware attack against Change Healthcare breached sensitive health information, an admission that triggers a regulatory countdown clock for public disclosures and individual notification.

article thumbnail

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Security Affairs

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since 2022. WithSecure researchers identified a new backdoor named Kapeka that has been used in attacks targeting victims in Eastern Europe since at least mid-2022. The backdoor is very sophisticated, it serves as both an initial toolkit and as a backdoor for maintaining long-term access to compromised systems.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Novel Android Malware Targets Korean Banking Users

Data Breach Today

New Malware SoumniBot Exploiting Legitimate Android Process A new banking Trojan is targeting Korean users using obfuscation techniques that target the Android manifest, exploit vulnerabilities and take advantage of weaknesses in how Android apps interpret this file. SoumniBot stands out for its approach to camouflaging its malicious intent.

IT 162
article thumbnail

The Real-Time Deepfake Romance Scams Have Arrived

WIRED Threat Level

Watch how smooth-talking scammers known as “Yahoo Boys” use widely available face-swapping tech to carry out elaborate romance scams.

article thumbnail

From $8.3B to $200M: Why Lacework Is Examining a Sale to Wiz

Data Breach Today

Lacework Got the Largest Funding Round in Cyber History. Now, It's Eyeing the Exits Wiz is in advanced negotiations to buy Lacework for between $150 million and $200 million. The companies recently signed a letter of intent and are now in the midst of a comprehensive due diligence process, after which a decision will be made on whether the acquisition will go through.

Sales 162
article thumbnail

AI Voice Cloning and Bank Voice Authentication: A Recipe for Disaster?

KnowBe4

New advancements in generative AI voice cloning come at a time when banks are looking for additional ways to authenticate their customers – and they’re choosing your voice.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Jury Dishes Out Guilty Verdict in Mango Markets Fraud Case

Data Breach Today

Hacker Masterminded, Executed $110 Million Crypto Fraud Scheme A New York federal jury has found a hacker guilty of charges that he masterminded and carried out a scheme to fraudulently obtain $110 million in cryptocurrency from crypto currency exchange Mango Markets and investors.

Marketing 162
article thumbnail

Getting ready for artificial general intelligence with examples

IBM Big Data Hub

Imagine a world where machines aren’t confined to pre-programmed tasks but operate with human-like autonomy and competence. A world where computer minds pilot self-driving cars, delve into complex scientific research, provide personalized customer service and even explore the unknown. This is the potential of artificial general intelligence (AGI), a hypothetical technology that may be poised to revolutionize nearly every aspect of human life and work.

article thumbnail

Lowest-Rung Attackers Challenging Ransomware-as-a-Service

Data Breach Today

Christopher Budd on the Rise of Junk Gun Ransomware Variants Since June 2023, 19 junk gun ransomware variants have been discovered on the dark web. These cheap, independently produced and crudely constructed variants offer an attractive way for newer cybercriminals to get started in the ransomware world and are mostly effective against SMBs.

article thumbnail

Microsoft employees exposed internal passwords in security lapse via Tech Crunch

IG Guru

Check out the article here. The post Microsoft employees exposed internal passwords in security lapse via Tech Crunch first appeared on IG GURU.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Code to Cloud Roadshow - Minneapolis In-Person Event hosted by Palo Alto Networks

Data Breach Today

Code to Cloud Roadshow, Minneapolis In-Person Event.

Cloud 162
article thumbnail

Do We Even Have The Spine To Sacrifice, Just A Little Bit?

John Battelle's Searchblog

Thanks President Bush. Old people are always complaining about how things were harder when they were young. Walking to school in the snow, uphill both ways, that whole thing. So forgive me as I embark on what initially might feel like that old man trope, but stay with me. I’m trying to make a larger point, and I have to start with a few stories of how things were in the Before Times.

IT 59
article thumbnail

Probable Root Cause: Accelerating incident remediation with causal AI 

IBM Big Data Hub

It has been proven time and time again that a business application’s outages are very costly. The estimated cost of an average downtime can run USD 50,000 to 500,000 per hour , and more as businesses are actively moving to digitization. The complexity of applications is growing as well, so Site Reliability Engineers (SREs) require hours—and sometimes days—to identify and resolve problems.

IT 58
article thumbnail

HID Creates New Workforce Identity Ecosystem Program

HID Global

HID, a worldwide leader in trusted identity solutions, has created a new program that allows application developers to build both secure and dynamic workplace experiences. Get the full scoop here.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

The Power of Partnerships: Unlocking the Full Potential of Enterprise Data with Reltio

Reltio

Data sources and complexity are growing exponentially, creating a challenging landscape for enterprise IT and data leaders. While most enterprises are awash in data, extracting value from the information has never been more challenging. With the growing array of solutions and approaches, there is a lot of confusion in the market over the best approaches to becoming data-driven.

article thumbnail

How declarative device management transforms Apple MDM

Jamf

Apple's declarative device management (DDM) is a relative newcomer to MDM. But in only three years, it has become a cornerstone of modern Apple management. You can expect DDM's impact to grow ever more transformative.

MDM 40
article thumbnail

Slack AI is now available to all paid users. Here's what these features can do for your team

Collaboration 2.0

As an add-on for Slack Pro and Business+ plans, these generative AI features tackle many of your biggest Slack headaches.

40