Sat.Jul 27, 2024 - Fri.Aug 02, 2024

article thumbnail

Study: Average Cost of a Data Breach Rises to $4.9 Million

Data Breach Today

Involving Law Enforcement After Ransomware Attacks Drives Down Costs, Study Finds Data breaches continue to grow more costly, with the average cost of a breach hitting an all-time high of $4.9 million, driven by greater business disruption and post-breach customer support and remediation expenses, according to the latest annual Cost of a Data Breach Report from IBM.

article thumbnail

Don’t Let Your Domain Name Become a “Sitting Duck”

Krebs on Security

More than a million domain names — including many registered by Fortune 100 firms and brand protection companies — are vulnerable to takeover by cybercriminals thanks to authentication weaknesses at a number of large web hosting providers and domain registrars, new research finds. Image: Shutterstock. Your Web browser knows how to find a site like example.com thanks to the global Domain Name System (DNS), which serves as a kind of phone book for the Internet by translating human-frie

Phishing 288
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat hunters – A day in the life

OpenText Information Management

Threat hunting is not just a job; it's a commitment to staying one step ahead of cyber adversaries. In this post, we'll dive into the daily life of a threat hunter, highlighting the myriad challenges they face. From technical hurdles to human and communication challenges, the life of a threat hunter is as demanding as it is rewarding. This is the third post in our ongoing “The Rise of the Threat Hunter” blog series.

article thumbnail

Celebrating 80 Years of AIIM: A Journey Through Information Management

AIIM

Today (July 28, 2024), we at AIIM (Association for Intelligent Information Management) are thrilled to celebrate our 80th anniversary. With celebrations kicking off earlier this year at the AIIM Conference, today offers us a moment to reflect on our rich history, celebrate our achievements, and look forward to an exciting future in the ever-evolving world of information management.

197
197
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Ransomware Gangs Exploit VMware ESXi Flaw

Data Breach Today

Bug Allows Attackers to Add New Users to a Group With Full Admin Privileges Ransomware hackers discovered a way to gain full administrative privileges on VMware ESXi hypervisors connected to Microsoft's Active Directory, a finding that resulted in extortion demands from cybercriminals, including Storm-0506, Storm-1175, Octo Tempest and Manatee Tempest.

More Trending

article thumbnail

News alert: Security Risk Advisors launchs VECTR Enterprise Edition for ‘purple team’ benchmarking

The Last Watchdog

Philadelphia, PA, Aug. 1, 2024, CyberNewsWire — Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition , a premium version of its widely-used VECTR platform for purple teams and adversary management program reporting and benchmarking. VECTR Enterprise is designed to support organizations that want to mature and communicate the success of their purple team exercises with benchmarking and executive reporting features.

Risk 147
article thumbnail

A $500 Open-Source Tool Lets Anyone Hack Computer Chips With Lasers

WIRED Threat Level

The RayV Lite will make it hundreds of times cheaper for anyone to carry out physics-bending feats of hardware hacking.

IT 144
article thumbnail

Judge Allows Lawsuit Against EHR Vendor in Hack to Proceed

Data Breach Today

Several Claims Dismissed, But Other Allegations in Breach Case Get a Green Light A federal judge has dismissed several claims but has given the green light for plaintiffs to move forward with other allegations in a proposed class action filed against electronic health records vendor NextGen in the aftermath of a 2023 ransomware attack that affected about 1 million people.

article thumbnail

A crafty phishing campaign targets Microsoft OneDrive users

Security Affairs

Researchers detected a sophisticated phishing campaign targeting Microsoft OneDrive users to trick them into executing a PowerShell script. Over the past few weeks, the Trellix Advanced Research Center observed a sophisticated phishing campaign targeting Microsoft OneDrive users. Threat actors rely on social engineering tactics to trick users into executing a PowerShell script, which leads to their systems being compromised.

Phishing 144
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Black Hat Fireside Chat: Consumers demand secure mobile apps; it’s high time for brands to deliver

The Last Watchdog

Two-plus decades of enduring wave after wave of mobile app malware and fraud has finally taken its toll on users. Now comes a global survey from Appdome and OWASP that reveals the vast majority of consumers are fed up. I recently visited with Appdome CEO Tom Tovar to discuss clear signals that consumers are now insisting upon mobile apps that are private and secure, as well as convenient.

Security 147
article thumbnail

He Was an FBI Informant—and Inspired a Generation of Violent Extremists

WIRED Threat Level

Joshua Caleb Sutter infiltrated far-right extremist organizations as a confidential FBI informant, all while promoting hateful ideologies that influenced some of the internet's most violent groups.

Security 142
article thumbnail

Trellix's Dual AI Strategy: Combating and Using AI in Cyber

Data Breach Today

CEO Bryan Palma on Cobalt Strike Takedown and Generative AI's Role in Cyber Defense Bryan Palma, CEO of Trellix, shares insights into the company's involvement in cybercrime takedowns and the integration of generative AI into the company's XDR platform. He discusses how Trellix Wise streamlines SOC processes and the company's focus on ransomware detection and data security.

article thumbnail

Ukraine’s cyber operation shut down the ATM services of major Russian banks

Security Affairs

Ukraine launched a massive cyber operation that shut down the ATM services of the biggest Russian banks on July 27, reported the Kyiv Post. Ukraine has launched a massive cyberattack against ATMs of Russian banks, the cyber operation began on July 23. “This is an opportune moment to fully implement the Kremlin’s long-desired ‘import substitution’ in the form of wooden abacuses, paper savings books, and cave paintings for accounting.” reported the KyivPost. “In Russia, it has al

Paper 145
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Begging for Bounties and More Info Stealer Logs

Troy Hunt

TL;DR — Tens of millions of credentials obtained from info stealer logs populated by malware were posted to Telegram channels last month and used to shake down companies for bug bounties under the misrepresentation the data originated from their service. How many attempted scams do you get each day? I woke up to yet another "redeem your points" SMS this morning, I'll probably receive a phone call from "my bank" today (edit: I was close, it was "Amazon Prime" &

Passwords 130
article thumbnail

Sensitive Illinois Voter Data Exposed by Contractor’s Unsecured Databases

WIRED Threat Level

Social Security numbers, death certificates, voter applications, and other personal data were accessible on the open internet, highlighting the ongoing challenges in election security.

article thumbnail

CrowdStrike Outage Could Cost Cyber Insurers $1.5 Billion

Data Breach Today

Most Claims Will Be Made Under 'Systems Failure' Coverage, Says Moody's Ratings The global IT outage triggered by a faulty CrowdStrike software update could lead to $400 million to $1.5 billion in payouts to cyber insurance policyholders, although the nonstandardized language used for such policies will make determining final losses a "lengthy process," analysts say.

Insurance 227
article thumbnail

Over 20,000 internet-exposed VMware ESXi instances vulnerable to CVE-2024-37085

Security Affairs

Shadowserver researchers reported that over 20,000 internet-exposed VMware ESXi instances are affected by the actively exploited flaw CVE-2024-37085. Researchers at the Shadowserver Foundation reported that approximately 20,000 VMware ESXi servers exposed online appear impacted by the exploited vulnerability CVE-2024-37085. We have started sharing exposed VMware ESXi vulnerable to CVE-2024-37085 (authentication bypass).

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Black Hat Fireside Chat: How ‘enterprise browsers’ help to shrink exposures, boost efficiencies

The Last Watchdog

Web browser security certainly hasn’t been lacking over the past 25 years. Related: Island valued at $3.5 billion Advancements have included everything from sandboxing and web applications firewalls (WAFs,) early on, to secure web gateways (SWGs) and Virtual Desktop Infrastructure (VDIs,) more recently. Yet profound browser exposures persist — and this has led to the arrival of enterprise browsers , which will be in the spotlight as Black Hat USA 2024 gets underway next week in Las Vegas.

article thumbnail

A Senate Bill Would Radically Improve Voting Machine Security

WIRED Threat Level

This year’s Intelligence Authorization Act would mandate penetration testing for federally certified voting machines and allow independent researchers to work on exposing vulnerabilities.

Security 138
article thumbnail

UK ICO Reprimands Electoral Commission for 2021 Hack Attack

Data Breach Today

Hackers Exploited ProxyShell Vulnerability to Compromise Commission Systems The British data regulator reprimanded the U.K.'s Electoral Commission for its failure to prevent a 2021 hack attack that resulted in the exposure of millions of voter records. Hackers breached the Electoral Commission's networks after exploiting the ProxyShell vulnerability.

IT 223
article thumbnail

BingoMod Android RAT steals money from victims’ bank accounts and wipes data

Security Affairs

BingoMod is a new Android malware that can wipe devices after stealing money from the victims’ bank accounts. Researchers at Cleafy discovered a new Android malware, called ‘BingoMod,’ that can wipe devices after successfully stealing money from the victims’ bank accounts. The Cleafy TIR team discovered the previously undetected malware at the end of May 2024.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Phishing Attacks Continue to Leverage URL Shorteners to Obfuscate Malicious Links

KnowBe4

Analysis of current phishing attacks by security researchers have uncovered an increase in the use of trusted shortlink services, concealing a links.

Phishing 126
article thumbnail

Saboteurs Cut Internet Cables in Latest Disruption During Paris Olympics

WIRED Threat Level

Long-distance cables were severed across France in a move that disrupted internet connectivity.

Security 138
article thumbnail

Zeroing in on Zero Trust

Data Breach Today

How close are you to achieving Zero Trust? If you’re a CISO or other security leader, recent and forthcoming government mandates mean you urgently need an answer to this question.

article thumbnail

Fake Falcon crash reporter installer used to target German Crowdstrike users

Security Affairs

CrowdStrike warns about a new threat actor targeting German customers by exploiting a recent issue with Falcon Sensor updates. On July 24, 2024, CrowdStrike experts identified a spear-phishing campaign targeting German customers by exploiting the recent issue with Falcon Sensor updates. A previously unknown threat actor set up a fake website, resembling a German entity, to distribute a bogus CrowdStrike Crash Reporter installer.

Passwords 144
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Dark Angels Ransomware Group Scores Record-Breaking $75 Million Payday

KnowBe4

In the ever-evolving world of cybercrime, ransomware attacks continue to be a lucrative business for cybercriminals.

article thumbnail

Can ChatGPT-4o Be Trusted With Your Private Data?

WIRED Threat Level

OpenAI’s newest model is “a data hoover on steroids,” says one expert—but there are still ways to use it while minimizing risk to your private data.

Risk 135
article thumbnail

CrowdStrike Faces Class Action Lawsuit Over Global IT Outage

Data Breach Today

Investors Say Cybersecurity Company Made False and Misleading Statements About Tech CrowdStrike faces a putative class action lawsuit over the widespread global IT outage in late July that caused major disruptions at airports and hospitals after the company pushed through a faulty update to its Falcon platform, causing its stock prices to plummet.

IT 189