Sat.Aug 12, 2023 - Fri.Aug 18, 2023

article thumbnail

Karma Catches Up to Global Phishing Service 16Shop

Krebs on Security

You’ve probably never heard of “ 16Shop ,” but there’s a good chance someone using it has tried to phish you. A 16Shop phishing page spoofing Apple and targeting Japanese users. Image: Akamai.com. The international police organization INTERPOL said last week it had shuttered the notorious 16Shop, a popular phishing-as-a-service platform launched in 2017 that made it simple for even complete novices to conduct complex and convincing phishing scams.

Phishing 229
article thumbnail

Fake Out: Disinformation Campaigns Get Generative AI Boost

Data Breach Today

Nation-States Running Information Operations Embrace AI-Generated Images and Video Hackers wielding generative artificial intelligence tools have yet to pose a serious cybersecurity risk, say researchers at Google's threat intelligence group Mandiant, as they sound the alarm instead about a rise in information operations featuring AI-generated fake images and video.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Black Hat insights: Generative AI begins seeping into the security platforms that will carry us forward

The Last Watchdog

LAS VEGAS – Just when we appeared to be on the verge of materially shrinking the attack surface, along comes an unpredictable, potentially explosive wild card: generative AI. Related: Can ‘CNAPP’ do it all? Unsurprisingly, generative AI was in the spotlight at Black Hat USA 2023 , which returned to its full pre-Covid grandeur here last week.

Security 246
article thumbnail

WinRAR flaw enables remote code execution of arbitrary code

Security Affairs

A flaw impacting the file archiver utility for Windows WinRAR can allow the execution of commands on a computer by opening an archive. WinRAR is a popular file compression and archival utility for Windows operating systems. The utility is affected by a now-fixed high-severity vulnerability, tracked as CVE-2023-40477 (CVSS score 7.8), that can allow remote execution of arbitrary code on a computer by opening a crafted RAR archive.

Archiving 246
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Diligere, Equity-Invest Are New Firms of U.K. Con Man

Krebs on Security

John Clifton Davies , a convicted fraudster estimated to have bilked dozens of technology startups out of more than $30 million through phony investment schemes, has a brand new pair of scam companies that are busy dashing startup dreams: A fake investment firm called Equity-Invest[.]ch , and Diligere[.]co.uk , a scam due diligence company that Equity-Invest insists all investment partners use.

Cloud 199

More Trending

article thumbnail

GUEST ESSAY: A call to decentralize social identities — to curtail social media privacy abuses

The Last Watchdog

Social media giants have long held too much power over our digital identities. Related: Google, Facebook promote third-party snooping Today, no one is immune to these giants’ vicious cycle of collecting personal data, selling it to advertisers, and manipulating users with data metrics. By making people feel like mere products- this exploitative digital environment further encourages a bubble of distrust amongst social media users.

Privacy 188
article thumbnail

Bronze Starlight targets the Southeast Asian gambling sector

Security Affairs

Experts warn of an ongoing campaign attributed to China-linked Bronze Starlight that is targeting the Southeast Asian gambling sector. SentinelOne observed China-linked APT group Bronze Starlight (aka APT10 , Emperor Dragonfly or Storm-0401) targeting the gambling sector within Southeast Asia. The malware and infrastructure employed in the campaign are linked to the ones observed in Operation ChattyGoblin attributed by the security firm ESET to China-linked threat actors.

Archiving 246
article thumbnail

A Huge Scam Targeting Kids With Roblox and Fortnite 'Offers' Has Been Hiding in Plain Sight

WIRED Threat Level

The wide-ranging scams, often disguised as game promotions, can all be linked back to one network.

Privacy 173
article thumbnail

CrowdStrike, Google, Recorded Future Lead Threat Intel Wave

Data Breach Today

Kaspersky Falls From Leaderboard as Deliberate Decision Made to Nix Russian Firms Recorded Future has joined CrowdStrike and Google atop Forrester's external threat intelligence services rankings, while Kaspersky tumbled from the leaders category. Leading threat intelligence providers have expanded into adjacent use cases such as brand protection and vulnerability management.

246
246
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

IG Needs a Makeover (or, It’s Just Mayonnaise)

Weissman's World

Q: “Aioli? What’s aioli?” A: “It’s just mayonnaise.” Q: “What’s information governance?” A: That’s the topic of today’s edition of Speaking Of! Join me and Elizabeth Weeks of the Alberta School Employee Benefit Plan as we discuss the need to know our audiences and communicate in their terms. Just as restaurateurs do when telling uninitiated… Read More » IG Needs a Makeover (or, It’s Just Mayonnaise) The post IG Needs a Makeover (or, It’s Just Mayonnaise) appeared first on

article thumbnail

#OpFukushima: Anonymous group protests against the plan to dump Fukushima RADIOACTIVE wastewater into Pacific

Security Affairs

#OpFukushima: The famous collective Anonymous has launched cyberattacks against Japan nuclear websites over Fukushima water plan. The hacker collective Anonymous has launched cyberattacks against nuclear power-linked groups in Japan as part of an operation called #OpFukushima. The campaign was launched to protest against the Government’s plan to release the treated radioactive water from the Fukushima nuclear plant into the sea.

article thumbnail

HHS Launches 'Digiheals' Project to Better Protect US Hospitals From Ransomware

WIRED Threat Level

An innovation agency within the US Department of Health and Human Services will fund research into better defenses for the US health care system’s digital infrastructure.

article thumbnail

More UK Police Suffer Freedom of Information Data Breach

Data Breach Today

Constabularies of Norfolk and Suffolk Alert Follows FOIA Breach in Northern Ireland England's Norfolk and Suffolk constabularies report that they accidentally exposed information on victims and witnesses in response to freedom of information requests just one week after police in Northern Ireland accidentally exposed information on all police officers and staff via an FOI request.

FOIA 246
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

News Alert: Cynomi study shows MSPs offering virtual CISO services to rise fivefold next year

The Last Watchdog

Tel Aviv, Israel, Aug. 17, 2023 — Cynomi , the leading AI-powered virtual Chief Information Security Officer (vCISO) platform vendor for Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs) and consulting firms, has published the results of its first annual report, “ The State of the Virtual CISO 2023 ”. The report, conducted by Global Surveys on behalf of Cynomi, reveals critical insights into MSPs and MSSPs’ recent shift towards vCISO services.

article thumbnail

Massive phishing campaign targets users of the Zimbra Collaboration email server

Security Affairs

A massive social engineering campaign is targeting users of the Zimbra Collaboration email server to steal their login credentials. ESET researchers uncovered a mass-spreading phishing campaign targeting users of the Zimbra Collaboration email server since April 2023. Zimbra Collaboration is an open-core collaborative software platform. The campaign is still ongoing and is targeting a wide range of small and medium businesses and governmental entities.

Phishing 246
article thumbnail

An Apple Malware-Flagging Tool Is ‘Trivially’ Easy to Bypass

WIRED Threat Level

The macOS Background Task Manager tool is supposed to spot potentially malicious software on your machine. But a researcher says it has troubling flaws.

IT 164
article thumbnail

Ransomware Hit Disrupts Real Estate Property Listings in US

Data Breach Today

Rapattoni-Hosted Multiple Listing Services Can't Add or Update Property Information Property listings nationwide are being disrupted due to an apparent ransomware attack against California-based Rapattoni, which hosts Multiple Listing Services used by real estate brokers to list, market and sell properties. Rapattoni said it's not clear when its systems might be back online.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Eliminate Bias for Ethical and Responsible Artificial Intelligence

AIIM

"With great power comes great responsibility" is an adage that Stan Lee’s Spider-Man popularized in popular comics, films, and other media. In Information Management today, there is great power in systems that leverage Artificial Intelligence for quickly making decisions and processing massive volumes of information. As information managers, we have a responsibility to understand that these systems have a potential for bias and how to identify and mitigate risks associated with producing reliabl

article thumbnail

Africa Cyber Surge II law enforcement operation has led to the arrest of 14 suspects

Security Affairs

An international law enforcement operation across 25 African countries has led to the arrest of 14 cybercriminals. A coordinated law enforcement operation conducted by INTERPOL and AFRIPOL across 25 African countries has led to the arrest of 14 suspected cybercriminals and the identification of 20,674 suspicious cyber networks. The operation demonstrates the surge in cybercriminal activities in the region.

Sales 246
article thumbnail

A New Attack Reveals Everything You Type With 95 Percent Accuracy

WIRED Threat Level

A pair of major data breaches rock the UK, North Korea hacks a Russian missile maker, and Microsoft’s Chinese Outlook breach sparks new problems.

article thumbnail

ISMG Editors: Lessons Learned From the Lapsus$ Crime Group

Data Breach Today

Also: Highlights from BlackHat 2023; Latest Cybersecurity M&A Activity In the latest weekly update, ISMG editors discuss important cybersecurity and privacy issues including highlights of interviews at Black Hat 2023, lessons learned from the success of the Lapsus$ cybercrime group's attacks and why Check Point is buying startup Perimeter 81 for $490 million.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Bloomberg Reports: Stealth QR Code Phishing Attack On Major US Energy Company

KnowBe4

During my two years as the CEO of a Public Company , Bloomberg became one of my go-to sources for financial news. I am still subscribed and today found an interesting story from Drake Bennett in New York.

article thumbnail

A massive campaign delivered a proxy server application to 400,000 Windows systems

Security Affairs

Researchers discovered a massive campaign that delivered a proxy server application to at least 400,000 Windows systems. AT&T Alien Labs researchers uncovered a massive campaign that delivered a proxy server application to at least 400,000 Windows systems. The experts identified a company that is charging for proxy service on traffic that goes through infected machines.

IT 246
article thumbnail

How X Is Suing Its Way Out of Accountability

WIRED Threat Level

The social media giant filed a lawsuit against a nonprofit that researches hate speech online. It’s the latest effort to cut off the data needed to expose online platforms’ failings.

IT 157
article thumbnail

Law Firm Facing Lawsuit in Aftermath of Its Own Big Breach

Data Breach Today

153,000 Individuals Affected in Hack, Including Client Linked to an Earlier Breach A global law firm that handles data breach litigation is faced with defending itself against a proposed class action lawsuit filed in the aftermath of its own data breach. The lawsuit stems from a March hacking incident at San Francisco-based Orrick, Herrington & Sutcliffe.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Security in small business with Jamf Now

Jamf

Is your Small or Medium-sized Business (SMB) protected against cyber threats? Safeguard your organization's sensitive data and assets with Jamf Now. Read now and enhance your SMB's cybersecurity posture.

article thumbnail

APT29 is targeting Ministries of Foreign Affairs of NATO-aligned countries

Security Affairs

Russia-linked APT29 used the Zulip Chat App in attacks aimed at ministries of foreign affairs of NATO-aligned countries EclecticIQ researchers uncovered an ongoing spear-phishing campaign conducted by Russia-linked threat actors targeting Ministries of Foreign Affairs of NATO-aligned countries. The experts detected two PDF files masqueraded as coming from the German embassy and that contained two diplomatic invitation lures.

Phishing 246
article thumbnail

LinkedIn Suffers 'Significant' Wave of Account Hacks

Dark Reading

Users report losing access to their accounts, with some being pressured into paying a ransom to get back in or else face permanent account deletion.

Access 98