Sat.Mar 21, 2020 - Fri.Mar 27, 2020

article thumbnail

COVID-19: The Digital Exposure Crisis

Data Breach Today

Cybersecurity Specialist John Walker on Lack of Preparedness, Bad Cyber Practices in UK The COVID-19 pandemic has exposed more than policy and social gaps, says U.K.-based cybersecurity expert John Walker. It's also manifested in digital exposures born out of lack of preparedness and bad practices. Walker offers insights on improving the cyber response.

article thumbnail

COVID-19 Phishing Schemes Escalate; FBI Issues Warning

Data Breach Today

Latest Schemes Target At-Home Employees; Some Spoof Health Agencies As the global COVID-19 pandemic worsens, security firms and law enforcement, including the FBI, are warning of increasing phishing and other the cybercriminal scams targeting a largely at-home workforce.

Phishing 362
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RIM implications of teleworking

The Schedule

Over the past weeks, more and more businesses, government agencies, educational facilities, and cultural heritage organizations have shuttered their physical locations — either in a proactive attempt to prevent community spread of the coronavirus or in response to local shelter in place/stay at home orders — and have stood up teleworking and online options.

article thumbnail

How to Avoid the Worst Online Scams

WIRED Threat Level

Phishing, malware, and more only escalate in times of uncertainty. Here's how to protect yourself.

Phishing 214
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

COVID-19 and the Need for 'Digital Distancing'

Data Breach Today

Tom Kellermann of VMware Carbon Black on Threats to Remote Workforce With the declaration of COVID-19 as a pandemic, and the global shift to work from home, Tom Kellermann of VMware Carbon Black sees a corresponding increase in hacking and espionage attempts against U.S. agencies, businesses and citizens. He says add "digital distancing" to your precautions.

205
205

More Trending

article thumbnail

Russia's Cybercrime Rule Reminder: Never Hack Russians

Data Breach Today

BuyBest Bust: Russia Charges 25 Individuals With Trafficking in Stolen Bank Card Data Russian authorities typically turn a blind eye to cybercrime committed by citizens, provided they target foreigners. But as the recent "BuyBest" arrests of 25 individuals demonstrate, authorities do not tolerate criminals that target Russians, and especially not anyone who targets Russian banks.

227
227
article thumbnail

The Wild, Wild West(world) of Cybersecurity

Dark Reading

Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.

article thumbnail

Tupperware Website Hit by Card Skimmer

Data Breach Today

Researchers Say Magecart-Style Attack Targeted Payment Card Data Tupperware, known for its colorful array of food storage containers, is the latest company to have its website hit with a credit card skimmer that siphons off payment card details at checkout, according to the security firm Malwarebytes. Here, malicious JavaScript hid in the online checkout payment form.

Security 267
article thumbnail

How to Evict Attackers Living Off Your Land

Dark Reading

As cyber defenses improve, adversaries are shifting to stealthy "living-off-the-land" attacks that use targets' own tools against them. Here are some tips to defend your turf.

97
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Ryuk Ransomware operators continue to target hospitals during COVID19 outbreak

Security Affairs

Operators behind the Ryuk Ransomware continue to target hospitals even as these organizations are involved in the fight against the Coronavirus pandemic. The threat actors behind the infamous Ryuk Ransomware continue to target hospitals, even as they are involved in containing the Coronavirus outbreak. The decision of the operators is not aligned with principal ransomware gangs that have announced they will no longer target health and medical organizations during the Coronavirus (COVID-19) pande

article thumbnail

A Twitch Streamer Is Exposing Coronavirus Scams Live

WIRED Threat Level

Kitboga has built a following by trolling telemarketers. Covid-19 opportunists have given him a whole new crop of targets.

Security 355
article thumbnail

US Government Sites Give Bad Security Advice

Krebs on Security

Many U.S. government Web sites now carry a message prominently at the top of their home pages meant to help visitors better distinguish between official U.S. government properties and phishing pages. Unfortunately, part of that message is misleading and may help perpetuate a popular misunderstanding about Web site security and trust that phishers have been exploiting for years now.

article thumbnail

Insurer Chubb Investigating 'Security Incident'

Data Breach Today

Maze Gang Claims Insurer Is a Victim, Emsisoft Reports Switzerland-based global insurance firm Chubb acknowledges that it's investigating a "security incident." Meanwhile, the Maze ransomware gang is claiming Chubb is its latest victim, according to researchers at the security firm Emsisoft.

Insurance 319
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Google issued 40,000 alerts of State-Sponsored attacks in 2019

Security Affairs

Google announced to have warned users of almost 40,000 alerts of state-sponsored phishing or malware attacks during 2019. Google shared data on alerts related to state-sponsored attacks, the tech giant revealed that it issued almost 40,000 alerts of state-sponsored phishing or malware attacks to its users during 2019. The number of alerts decreased by 25% when compared to 2018, possible reasons for this drop could be the increased efficiency of defense measures implemented by Google, but we cann

Phishing 363
article thumbnail

Ransomware Groups Promise Not to Hit Hospitals Amid Pandemic

WIRED Threat Level

Plus: iPhone cracking, credit card skimming, and more of the week's top security news.

article thumbnail

Russians Shut Down Huge Card Fraud Ring

Krebs on Security

Federal investigators in Russia have charged at least 25 people accused of operating a sprawling international credit card theft ring. Cybersecurity experts say the raid included the charging of a major carding kingpin thought to be tied to dozens of carding shops and to some of the bigger data breaches targeting western retailers over the past decade.

Retail 318
article thumbnail

Hijacked Routers Steering Users to Malicious COVID-19 Sites

Data Breach Today

Researchers: Cybercriminals Use DNS Hijacking to Spread New Type of Infostealer Cybercriminals are waging brute-force attacks that enable them to change DNS settings on home and small business routers to redirect victims to fake COVID-19-themed websites that push infostealer malware, according to the security firm Bitdefender.

Security 314
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

FBI shuts down the Russian-based hacker platform DEER.IO

Security Affairs

The FBI shuts down Deer.io, a Russian-based online platform that has been hosting hundreds of online shops where illegal products and services were being sold, The Department of Justice announced on Tuesday, that the Federal Bureau of Investigation has recently taken down the Russian-based online platform DEER.IO that is hosting various cybercrime products and services were being sold. “A Russian-based cyber platform known as DEER.IO was shut down by the FBI today, and its suspected admini

Sales 361
article thumbnail

Google Bans Infowars Android App Over Coronavirus Claims

WIRED Threat Level

Apple kicked Alex Jones out of the App Store in 2018. The Google Play Store has finally followed suit.

Security 251
article thumbnail

New to Remote Working? Tapping Into 6+ Years of Tips for Working from Home

AIIM

For many across the globe, limiting their human contact, the home has become…well, home base for just about everything. Folks are taking advantage of virtual meeting software like GoToMeeting and Zoom to video chat with friends, host virtual dinner parties, and even play board games! And that’s just in our personal lives. In our work lives, companies are piecing together Digital Workplace strategies to allow their employees to work from home.

article thumbnail

Chinese Cyber Espionage Continues Despite COVID-19

Data Breach Today

FireEye Finds APT41 Conducting a Global Campaign Despite the global COVID-19 pandemic, which started in China, Chinese cyber espionage campaigns are continuing, with a new campaign from one APT group targeting at least 75 enterprises in 20 countries, according to the security firm FireEye.

Security 296
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

UK Fintech company Finastra hit by a cyber attack

Security Affairs

The financial technology firm Finastra announced it has suffered a ransomware attack that took down its some of its systems. Finastra , the UK leading financial technology provider, announced that some of its servers were shut down in response to a ransomware attack that the company detected. Finastra provides financial software and services to more than 9,000 customers worldwide, it has over 10,000 employees and $1.9 billion in revenues.

article thumbnail

The Postal Service's Surprising Role in Surviving Doomsday

WIRED Threat Level

The little-known Postal Plan, which dates back to the Clinton era, charges mail carriers with delivering critical supplies—like vaccines—as a last resort.

Security 224
article thumbnail

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

The Last Watchdog

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day. I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR technologies have arisen in just the past few years to help companies try to make sense of it all, even as catastrophic breaches persist.

Security 138
article thumbnail

Hackers Targeted World Health Organization

Data Breach Today

Researcher Says Spear-Phishing Incident Has Hallmarks of Nation-State Attack A hacking group targeted the World Health Organization earlier this month with an apparently unsuccessful spear-phishing campaign designed to harvest credentials as the United Nations organization was grappling with the global COVID-19 pandemic.

Phishing 269
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

538 Million Weibo users’ records being sold on Dark Web

Security Affairs

Hackers are offering for sale on the dark web data belonging to 538 million Weibo users, including 172 million phone numbers. Data of 538 million Weibo users are available for sale on the dark web the news was reported by several Chinese media and users on social networks. 107 million records include personal data and basic account information such as the user ID, number of Weibo tweets, number of followers and accounts users are following, account gender, geographic location and more.

article thumbnail

An Elite Spy Group Used 5 Zero-Days to Hack North Koreans

WIRED Threat Level

South Korea is a prime suspect for exploiting the secret software vulnerabilities in a sophisticated espionage campaign.

Security 207
article thumbnail

Coding With Ari, for Kids at Home

Troy Hunt

Strange times, these. But equally, a time to focus on new things and indeed a time to pursue experiences we might not have done otherwise. As Ari now spends his days learning from home, I wanted to really start focusing more on his coding not just for his own benefit, but for all the other kids out there who are in the same home-bound predicament he now finds himself in.

IT 126