Sat.Nov 04, 2023 - Fri.Nov 10, 2023

article thumbnail

Who’s Behind the SWAT USA Reshipping Service?

Krebs on Security

Last week, KrebsOnSecurity broke the news that one of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal operations, finances and organizational structure. In today’s Part II, we’ll examine clues about the real-life identity of “ Fearlless ,” the nickname chosen by the proprietor of the SWAT USA Drops service.

Passwords 276
article thumbnail

GUEST ESSAY: How to mitigate the latest, greatest phishing variant — spoofed QR codes

The Last Watchdog

QR code phishing attacks started landing in inboxes around the world about six months ago. Related: ‘BEC’ bilking on the rise These attacks prompt the target to scan a QR code and trick them into downloading malware or sharing sensitive information. In June, we started seeing these types of attacks amongst our customer base. Since June, there has been a fourfold increase in the search volume around keywords associated with these types of attacks.

Phishing 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Alleges Data Broker Sells Vast Amounts of Sensitive Data

Data Breach Today

Agency Details Accusations Against Idaho Firm in Unsealed Amended Complaint The Federal Trade Commission in an amended lawsuit complaint unsealed Friday details how Idaho-based data broker Kochava allegedly violated federal law by collecting and disclosing to third parties "enormous" amounts of geolocation and other sensitive information about consumers.

278
278
article thumbnail

Beyond AI: Advice and Takeaways from AIIM Solutions Showcase & Strategy Summit

AIIM

In early October 2023, AIIM partnered with the AIIM Florida Chapter to host the AIIM Solutions Showcase & Strategy Summit in Tampa, Florida. This new event concept highlighted a local chapter and community while creating greater accessibility to AIIM's leadership and strategy. This terrific event was well attended and featured some great education.

Education 164
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

BlueNoroff strikes again with new macOS malware

Jamf

Jamf Threat Labs discovered a new later-stage malware variant from BlueNoroff that shares characteristics with their RustBucket campaign. Read this blog to learn more about this malware and view the indicators of compromise.

145
145

More Trending

article thumbnail

Okta Breach Tied to Worker's Personal Google Account

Data Breach Today

Threat Actor Used Session Hijacking Technique to Access Files of 134 Okta Customers Days after announcing a security compromise, cloud-based Identity and authentication management provider Okta said that an unknown threat actor accessed files of 134 customers by after an employee signed in to a personal Google profile on the Chrome browser of an Okta-managed laptop.

article thumbnail

Government Surveillance Reform Act of 2023 Seeks to End Warrantless Police and FBI Spying

WIRED Threat Level

The Government Surveillance Reform Act of 2023 pulls from past privacy bills to overhaul how police and the feds access Americans’ data and communications.

article thumbnail

Attackers use Google Calendar RAT to abuse Calendar service as C2 infrastructure

Security Affairs

Google warns of multiple threat actors that are leveraging its Calendar service as a command-and-control (C2) infrastructure. Google warns of multiple threat actors sharing a public proof-of-concept (PoC) exploit, named Google Calendar RAT, that relies on Calendar service to host command-and-control (C2) infrastructure. Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, it was developed red teaming activities. “To use GRC, only a Gmail account is require

article thumbnail

Hackers, Scrapers & Fakers: What's Really Inside the Latest LinkedIn Dataset

Troy Hunt

I like to think of investigating data breaches as a sort of scientific search for truth. You start out with a theory (a set of data coming from an alleged source), but you don't have a vested interested in whether the claim is true or not, rather you follow the evidence and see where it leads. Verification that supports the alleged source is usually quite straightforward , but disproving a claim can be a rather time consuming exercise, especially when a dataset contains fragments of truth m

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

State of Maine Confirms Impact in Global MOVEit Cyberattack

Data Breach Today

Approximately 1.3 Million Maine Residents Affected in Sweeping Cyberattack Nearly the entire population of Maine has been affected in a global cyberattack the Russian ransomware gang Clop launched earlier this year that targeted Progress Software's popular MOVEit file transfer service. The state is just one of thousands of high-profile victims swept up in the attack.

article thumbnail

The NSA Seems Pretty Stressed About the Threat of Chinese Hackers in US Critical Infrastructure

WIRED Threat Level

US government officials continue to warn that the public and private sectors need to identify and root out China-backed attackers lurking in industrial control systems.

article thumbnail

After ChatGPT, Anonymous Sudan took down the Cloudflare website

Security Affairs

After ChatGPT, Anonymous Sudan took down the Cloudflare website with a distributed denial-of-service (DDoS) attack. The hacktivist group Anonymous Sudan claimed responsibility for the massive distributed denial-of-service (DDoS) attack that took down the website of Cloudflare. Cloudflare confirmed that a DDoS attack took down its website for a few minutes and ponited out that it did not impact other products or services. “ To be clear, there was no Cloudflare breach.

Mining 144
article thumbnail

“Skillful Social Engineering of the IT Support Desk” One of the Most Common Tactics in Ransomware Attacks

KnowBe4

As ransom payments reach an all-time high, it’s time to look at attacks from a data perspective and find the greatest opportunities to stop these attacks.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

CISA's New SBOM Guidance Faces Implementation Challenges

Data Breach Today

Many Organizations Lack Resources to Develop Adequate SBOM Consumption Processes The U.S. Cybersecurity and Infrastructure Security Agency published guidance that offers best practices in developing consumption processes for software bills of materials, but experts told ISMG the document lacks technical specifics and warned that most organizations face SBOM resourcing issues.

article thumbnail

YouTube's Ad Blocker Detection Believed to Break EU Privacy Law

WIRED Threat Level

A complaint filed with the EU’s independent data regulator accuses YouTube of failing to get explicit user permission for its ad blocker detection system, potentially violating the ePrivacy Directive.

Privacy 144
article thumbnail

Dolly.com pays ransom, attackers release data anyway

Security Affairs

On-demand moving and delivery platform Dolly.com allegedly paid a ransom but crooks found an excuse not to hold their end of the bargain. Cybercriminals are hardly a trustworthy bunch. Case in point: Dolly.com. The Cybernews research team believes that the platform suffered a ransomware attack and at least partially paid the ransom – but was duped. The attackers complained that the payment wasn’t generous enough and published the stolen data.

article thumbnail

[HEADS UP] FBI Warns About Callback Phishing

KnowBe4

In a recent official advisory , the FBI warned about the threat of callback phishing (among other threats). Below is the relevant excerpt.

Phishing 126
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cyberattack Forces San Diego Hospital to Divert Patients

Data Breach Today

Tri-City Medical Center Is Latest Regional Entity Facing Disruption to Patient Care A San Diego public hospital is diverting ambulances and patients to other facilities as it is dealing with a cyberattack this week. The medical center is the latest on a growing list of regional hospitals forced to suddenly shift patients to neighboring entities due to a cybersecurity crisis.

article thumbnail

Omegle Was Forced to Shut Down by a Lawsuit From a Sexual Abuse Survivor

WIRED Threat Level

Omegle connected strangers to one another and had a long-standing problem of pairing minors with sexual predators. A legal settlement took it down.

IT 142
article thumbnail

Serbian pleads guilty to running ‘Monopoly’ dark web drug market

Security Affairs

The Serbian citizen Milomir Desnica (33) has pleaded guilty to running the dark web Monopoly drug marketplace. Milomir Desnica , a 33-year-old Serbian citizen, admited to being responsible for operating the illicit Monopoly drug marketplace on the dark web. The man pleaded guilty today in U.S. District Court in the District of Columbia to charges of conspiracy to distribute and possession with intent to distribute 50 grams or more of methamphetamine.

Marketing 142
article thumbnail

[INFOGRAPHIC] Original Research: Cybersecurity Challenges Faced by European Infosec Leaders

KnowBe4

Cybersecurity threats continue to put European organisations of all sizes at risk. Infosec leaders face multi-pronged challenges, from mitigating the threats themselves to managing the budget for vital cybersecurity training. To investigate this issue further, KnowBe4 commissioned a study of 101 cybersecurity leaders across Belgium, Denmark, France, Italy, Luxembourg, Netherlands and Sweden to determine key challenges.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Medical Transcription Hack Affects 1.2 Million Chicagoans

Data Breach Today

Cook County Health Says It Is Among the Vendor's 'Many' Clients Affected by Hack A major healthcare provider in Chicago that targets underserved populations is notifying 1.2 million patients that their information was compromised in a data theft incident at a medical transcription vendor. The county said it is among "many" entities affected.

IT 304
article thumbnail

Here’s How Violent Extremists Are Exploiting Generative AI Tools

WIRED Threat Level

Experts are finding thousands of examples of AI-created content every week that could allow terrorist groups and other violent extremists to bypass automated detection systems.

Security 142
article thumbnail

Russian Sandworm disrupts power in Ukraine with a new OT attack

Security Affairs

Mandiant reported that Russia-linked Sandworm APT used a novel OT attack to cause power outages during mass missile strikes on Ukraine. Mandiant researchers reported that Russia-linked APT group Sandworm employed new operational technology (OT) attacks that caused power outages while the Russian army was conducting mass missile strikes on critical infrastructure in Ukraine in October.

article thumbnail

Spaf on the Morris Worm

Schneier on Security

Gene Spafford wrote an essay reflecting on the Morris Worm of 1988—35 years ago. His lessons from then are still applicable today.

Security 127
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Experts Urge Congress to Combat Deepfake Technology Threats

Data Breach Today

Digitally Manipulated Media Already Poses National Security and Privacy Concerns A panel of legal experts and technologists warned lawmakers that deepfake technologies were already causing security and privacy concerns across the country, particularly for women and minority communities, as research shows that current detection systems contain biases and high error rates.

Privacy 298
article thumbnail

This Is the Ops Manual for the Most Tech-Savvy Animal Liberation Group in the US

WIRED Threat Level

For the first time, guerrilla animal rights group Direct Action Everywhere reveals a guide to its investigative tactics and toolkit, from spy cams to night vision and drones.

IT 141
article thumbnail

FBI: Ransomware actors abuse third parties and legitimate system tools for initial access

Security Affairs

The FBI published a PIN alert warning of ransomware operators compromising third-party vendors and services for initial access to target environments. The Federal Bureau of Investigation (FBI) published a Private Industry Notification (PIN) to warn of ransomware initial access trends and provide recommendations to reduce the attack surface to ransomware attacks.