Sat.Mar 19, 2022 - Fri.Mar 25, 2022

article thumbnail

Reports: Russian IPs Scanning US Energy Firms, Others

Data Breach Today

Bulletin Reportedly Issued Just Days Before Biden Warned of Cyber Activity Just days before U.S. President Joe Biden warned that intelligence is pointing toward potential Russian cyberattacks against the U.S., the FBI reportedly issued an urgent bulletin contending that Russian IP addresses have conducted network scanning activity on at least five U.S. energy firms.

358
358
article thumbnail

A Closer Look at the LAPSUS$ Data Extortion Group

Krebs on Security

Microsoft and identity management platform Okta both this week disclosed breaches involving LAPSUS$ , a relatively new cybercrime group that specializes in stealing data from big companies and threatening to publish it unless a ransom demand is paid. Here’s a closer look at LAPSUS$, and some of the low-tech but high-impact methods the group uses to gain access to targeted organizations.

Passwords 312
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

It’s an irony often noted about wealth: The more money you have, the more you have to worry about money – managing it, protecting it, nurturing it for further growth. Related: Using employees as human sensors. For businesses, the same is now true about information. Data has become critical to your organization’s success. At the same time – in fact, as a direct result of data’s central importance – more adversaries are working harder and finding more nefarious ways to steal or otherwise compromis

article thumbnail

Defensible Disposition Program: Article One—Let’s get down to Basics

ARMA International

For as long as there has been communication and work, there has been a means of documenting and tracking it. Sales receipts, pay stubs, tax documents, letters, memoranda, and beyond all have value at one time or another. Sometimes, those records need to be revisited or referenced later down the road in connection with, for example, taxes, audits, or other reviews.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

US Indicts Russian Behind Popular Carding Marketplace

Data Breach Today

FBI Puts Russian Carder on the Most Wanted List of Cybercriminals The U.S. Department of Justice has indicted a 23-year-old Russian national for operating a cybercriminal marketplace that sold thousands of stolen login credentials, PII and authentication tools, according to U.S. Attorney Brit Featherston of the Eastern District of Texas.

More Trending

article thumbnail

SHARED INTEL: A foolproof consumer’s guide to creating and managing bulletproof passwords

The Last Watchdog

It can be a real hassle to keep track of the passwords you use. So many people use the same combination of username and password for every account. However, this isn’t a good idea. In fact, it’s terrible. Related: Kaseya hack exacerbates supply chain exposures. You see, these days, many data breaches could be traced back to people using the same password across multiple accounts.

Passwords 133
article thumbnail

Anonymous leaked 28GB of data stolen from the Central Bank of Russia

Security Affairs

Anonymous announced that the affiliate group Black Rabbit World has leaked 28 GB of data stolen from the Central Bank of Russia. This week the Anonymous hacker collective claims to have hacked the Central Bank of Russia and stole accessed 35,000 documents. The group of hacktivists announced that will leak the stolen documents in 48 hours. Anonymous hacks Russia's Central Bank and more than 35,000 files will be exposed in 48 hours. pic.twitter.com/0VUhqVmo89 — Anonymous (@LatestAnonPres

article thumbnail

Okta Says It 'Should Have Moved More Swiftly' Over Breach

Data Breach Today

Lapsus$ Gained Access to a Sitel Support Engineer's Computer Via Remote Hosting Okta says it should have notified customers of a breach earlier and that Lapsus$ compromised a laptop belonging to Sitel, a third-party customer support firm, via remote desktop protocol, enabling it to infiltrate Okta's network. Cybersecurity experts discuss the impact of the breach and offer mitigation advice.

IT 276
article thumbnail

Integration matters to the world around us

OpenText Information Management

In the energy industry, up to 80% of employees' time is spent searching through unstructured information to get work done. The post Integration matters to the world around us appeared first on OpenText Blogs.

135
135
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

McAfee Cloud Launches as Skyhigh Security

eSecurity Planet

The final piece of the complicated Mandiant-FireEye split and subsequent FireEye-McAfee merger fell into place today, as McAfee’s cloud security business was officially spun off under the new name of Skyhigh Security. McAfee Enterprise and FireEye were acquired by Symphony Technology Group last year as Mandiant became a standalone company. STG also owns RSA Security, which remains a separate company.

Cloud 135
article thumbnail

Linux Improves Its Random Number Generator

Schneier on Security

In kernel version 5.17, both /dev/random and /dev/urandom have been replaced with a new — identical — algorithm based on the BLAKE2 hash function, which is an excellent security improvement.

IT 134
article thumbnail

UK Police Arrest 7 Allegedly Tied to Lapsus$ Hacking Group

Data Breach Today

Lapsus$ Claimed Responsibility for Numerous Hacks, Including of Okta and Microsoft Police in London say they've arrested seven people that the BBC reports are tied to the Lapsus$ hacking group, which has claimed responsibility for data breaches involving Okta, Microsoft, Nvidia, Ubisoft and more. The names of the suspects, who are mostly teenagers, have not been released.

article thumbnail

Shifting Risk and Business Environment Demand creates a Shift in Security Strategies

Thales Cloud Protection & Licensing

Shifting Risk and Business Environment Demand creates a Shift in Security Strategies. divya. Thu, 03/24/2022 - 05:00. As the world is slowly returning to pre-pandemic conditions, the underlying trends that have always driven information security, such as new technologies, greater compliance mandates and more severe security incidents, continue to be significant change agents.

Risk 126
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Anonymous claims to have hacked the Central Bank of Russia

Security Affairs

The Anonymous hacker collective claims to have hacked the Central Bank of Russia and stole accessed 35,000 documents. Anonymous continues to target Russian government organizations and private businesses, now it is claiming to have hacked the Central Bank of Russia. The popular hacker collective claims to have compromised the systems of the Central Bank of Russia and stole 35,000 files, it announced that will leak it it in 48 hours.

article thumbnail

Biden Approves Cybersecurity Reporting, Issues Rare Warning

eSecurity Planet

President Joe Biden has faced a number of crises since taking office in January 2021, but his Administration has nonetheless managed to be at the forefront of the U.S. response to cyber attacks by crime groups and hackers aligned with nation-states. Even before Biden took office, the U.S. faced threats like the SolarWinds attack and malicious actors with ties to Russia and China.

article thumbnail

UK Police Arrest Seven Allegedly Tied to Lapsus$ Hackers

Data Breach Today

Lapsus$ Claimed Responsibility for Many Hacks, Including Okta and Microsoft Police in London say they've arrested seven people tied to the Lapsus$ hacking group, which has claimed responsibility for data breaches involving Okta, Microsoft, Nvidia, Ubisoft and more. The names of those arrested have not been released.

article thumbnail

Top 10 security threats from 2021 to learn from

Jamf

With 2021 in the rearview, we revisit the biggest threats businesses faced during the year. In looking back, we summarize both macOS and mobile endpoint security threats along with their impact. We also turn an eye toward the future by focusing on the upcoming threats the enterprise will be facing, such as ransomware as a service, and on how Jamf can help you prevent security threats.

Security 125
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Chrome emergency update fixes actively exploited a zero-day bug

Security Affairs

Google addresses an actively exploited zero-day flaw with the release of Chrome 99.0.4844.84 for Windows, Mac, and Linux. Google fixed an actively exploited high-severity zero-day vulnerability with the release of Chrome 99.0.4844.84 for Windows, Mac, and Linux. Google has released Chrome 99.0.4844.84 for Windows, Mac, and Linux users to address a high-severity zero-day bug, tracked as CVE-2022-1096, exploited in the wild.

Libraries 131
article thumbnail

Addressing Remote Desktop Attacks and Security

eSecurity Planet

The Remote Desktop Protocol (RDP) has long been essential for IT service management and remote access. Still, in the wrong hands, RDP attacks and vulnerabilities related to remote desktop software are a severe threat. Recent years presented a torrent of research showing how vulnerable RDP systems are for organizations not taking additional cybersecurity precautions.

Security 120
article thumbnail

Illicit Crypto Activity Detected By US Treasury Department

Data Breach Today

US Cyber Official Warns of Potential Russian Cyberattacks Prospects of Russia reviving its economy via cryptocurrency remain limited, officials have said, but the U.S. Treasury Department is reportedly warning that it has detected a rise in the use of digital assets for illicit transactions, including after Feb. 24, when the war began.

IT 245
article thumbnail

Published Zelenskyy Deepfake Video Demonstrates the Modern War is Online

KnowBe4

The video uploaded to a hacked Ukrainian news website shows how far the technology has come, how it can be used in social engineering , as well as how the tech still needs to improve.

IT 123
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Jamf School of Thought Ep. 1: Digital Storytelling

Jamf

Apple Distinguished Educator Michael Hernandez is the first guest on the Jamf School of Thought blogcast, sharing reflections about digital storytelling and media literacy.

Education 120
article thumbnail

Defending Against Misconfigured MFA & PrintNightmare Vulnerabilities

eSecurity Planet

Using misconfigured multi-factor authentication (MFA) and an unpatched Windows vulnerability, Russian state-sponsored hackers were able to breach a non-governmental organization (NGO) and escalate privileges, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI revealed last week. By using a misconfigured Cisco Duo MFA implementation to force enrollment of a new device, the hackers were then able to use the “PrintNightmare” Windows Print Spooler vulnerability ( CVE

article thumbnail

Ransomware Attack Disrupts Greek Postal Services

Data Breach Today

Organization's Data Center Isolated to Contain Targeted Ransomware Attack Greek postal service Hellenic Post says a ransomware incident has forced it to pull a majority of its operations offline. It is working with IT security experts to probe the attack and restore services. Its subsidiary ELTA Courier has taken over nearly all operations to maintain business continuity.

article thumbnail

Try the New Compliance Audit Readiness Assessment Today for the SSAE18 Framework

KnowBe4

When it's time to complete a compliance audit, are you thinking, "Ugh, is it that time again?". And, as more organizations demand proof that their data is protected in the cloud, keeping up with risk assessments and audits to prove compliance is a continuous problem.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Utah Becomes Fourth U.S. State to Enact Consumer Privacy Law

Hunton Privacy

On March 24, 2022, Utah became the fourth state in the U.S., following California, Virginia and Colorado, to enact a consumer data privacy law, the Utah Consumer Privacy Act (the “UCPA”). The UCPA resembles Virginia’s Consumer Data Protection Act (“VCDPA”) and Colorado’s Consumer Privacy Act (“CPA”), and, to a lesser extent, the California Consumer Privacy Act (as amended by the California Privacy Rights Act) (“CCPA/CPRA”).

Privacy 113
article thumbnail

UK police arrested 7 alleged members of Lapsus$ extortion gang

Security Affairs

UK police suspect that a 16-year-old from Oxford is one of the leaders of the popular Lapsus$ extortion group. The City of London Police announced to have arrested seven teenagers suspected of being members of the notorious Lapsus$ extortion gang , which is believed to be based in South America. “Four researchers investigating the hacking group Lapsus$, on behalf of companies that were attacked, said they believe the teenager is the mastermind.” states Bloomberg that first reported t

Education 120
article thumbnail

Okta, Microsoft Confirm Breaches Connected to Lapsus$ Hackers

Data Breach Today

Okta Is Facing Increasing Pressure to Release More Details Identity management company Okta and Microsoft have confirmed breaches by the Lapsus$ group, which has been on a high-profile hacking spree. Okta is facing increasing pressure to more fully describe the impact of its incident, as Okta's identity systems are widely used across enterprises.

IT 243