Sat.Oct 22, 2022 - Fri.Oct 28, 2022

article thumbnail

Security Alert: Daixin Ransomware Targets Healthcare

Data Breach Today

Cybercrime Gang Wields Phishing Emails and Proficiency for VMware Environments Beware ransomware and data extortion shakedowns that trace to a cybercrime gang called Daixin Team, which is especially targeting the healthcare sector, as well as wielding phishing emails and a proficiency with VMware server environments, warns a new U.S. government cybersecurity advisory.

article thumbnail

GUEST ESSAY: Sure steps to achieve a robust employee cybersecurity awareness training regimen

The Last Watchdog

Employee security awareness is the most important defense against data breaches. Related: Leveraging security standards to protect your company. It involves regularly changing passwords and inventorying sensitive data. Cybercriminals view employees as a path of least resistance. As such, you should limit the amount of information that employees have access to.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stress Is Driving Cybersecurity Professionals to Rethink Roles

Dark Reading

Burnout has led one-third of cybersecurity staffers to consider changing jobs over the next two years, potentially further deepening the talent shortage, research shows.

article thumbnail

The Anticipant Organization

OpenText Information Management

Imagine if the world went dark and there were no internet. Even for a day. For a week. Consider the massive fallout for organizations everywhere. Digitalization has morphed from a useful function to a bedrock of society. It is at the center of all future growth. But as our technology advances beyond human limits, carrying … The post The Anticipant Organization appeared first on OpenText Blogs.

IT 104
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Major UK Outsourcer Hit With Multi-Million Dollar Fine Due to a Phishing Attack

KnowBe4

Britain's data watchdog has fined major construction group Interserve with a £4.4m fine. This was due to a cyber attack stole personal and financial details for over 113,000 employees and the company failed to stop the attack.

Phishing 116

More Trending

article thumbnail

AIIM Names Tori Miller Liu Chief Executive Officer

AIIM

The Association for Intelligent Information Management (AIIM), the world’s leading association dedicated to the information management industry and its practice, announced today that it has appointed Tori Miller Liu as its next Chief Executive Officer, effective December 1, 2022. She replaces Peggy Winton who, earlier this year, announced her decision to step down after serving in this position for seven years.

article thumbnail

Federal Tally Reaches 5,000 Health Data Breaches Since 2009

Data Breach Today

More People Affected by Breaches Than Total US Population The federal tally of health data breaches reached a new milestone this week: Since its inception in September 2009, more than 5,000 major incidents have been posted to the Department of Health and Human Services' HIPAA breach "wall of shame.

article thumbnail

If Musk Starts Firing Twitter's Security Team, Run

WIRED Threat Level

What's next for the social network is anyone's guess—but here's what to watch as you wade through the privacy and security morass.

Security 237
article thumbnail

Google fixes a new actively exploited Chrome zero-day, it is the seventh one this year

Security Affairs

Google Thursday released an emergency patch for Chrome 107 to address the actively exploited zero-day vulnerability CVE-2022-3723. Google released an emergency update for the Chrome 107 to address an actively exploited zero-day vulnerability tracked as CVE-2022-3723. The CVE-2022-3723 flaw is a type confusion issue that resides in the Chrome V8 Javascript engine.

Libraries 348
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

FIRESIDE CHAT: Timely employee training, targeted testing needed to quell non-stop phishing

The Last Watchdog

Humans are rather easily duped. And this is the fundamental reason phishing persists as a predominant cybercriminal activity. Related: How MSSPs help secure business networks. Tricking someone into clicking to a faked landing page and typing in their personal information has become an ingrained pitfall of digital commerce. The deleterious impact on large enterprises and small businesses alike has been – and continues to be — profound.

Phishing 234
article thumbnail

Cyber Events Disrupt Polish, Slovakian Parliament IT Systems

Data Breach Today

Poland Senate Alleges Russian Connection to DDoS Attack Parliament IT systems in two East European capitals were disrupted Thursday. The Poland Senate said a distributed denial-of-service attack partially originated from inside Russia. In Slovakia, a Parliament speaker postponed voting after telling lawmakers that vote-counting systems were not working.

IT 242
article thumbnail

The Hunt for the Dark Web’s Biggest Kingpin, Part 1: The Shadow

WIRED Threat Level

AlphaBay was the largest online drug bazaar in history, run by a technological mastermind who seemed untouchable—until his tech was turned against him.

Security 213
article thumbnail

Apple backports fixes for CVE-2022-42827 zero-day to older iPhones, iPads

Security Affairs

Apple released updates to backport the recently released security patches for CVE-2022-42827 zero-day to older iPhones and iPads. Apple has released new security updates to backport security patches released this week to address actively exploited CVE-2022-42827 in older iPhones and iPads, addressing an actively exploited zero-day bug. Early this week, Apple addressed the ninth zero-day vulnerability exploited in attacks in the wild since the start of the year.

Security 333
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

KnowBe4 Top-Clicked Phishing Email Subjects for Q3 2022 [INFOGRAPHIC]

KnowBe4

KnowBe4's latest quarterly report on top-clicked phishing email subjects is here. We analyze 'in the wild' attacks reported via our Phish Alert Button , top subjects globally clicked on in phishing tests , and top attack vector types.

Phishing 143
article thumbnail

Medlab Pathology Breach Affects 223,000 Australians

Data Breach Today

Medical Records and Credit Card Details of Patients Compromised One of Australia's largest private testing laboratories announced a data breach affecting 223,000 Australians. Ransomware-as-a-service group Quantum took credit for the incident, posting an 86-gigabyte file in June. "There is no evidence of misuse of any of the information," says Medlab Pathology.

article thumbnail

Apple MacOS Ventura Bug Breaks Third-Party Security Tools

WIRED Threat Level

Your anti-malware software may not work if you upgraded to the new operating system. But Apple says a fix is on the way.

Security 191
article thumbnail

OpenSSL to fix the second critical flaw ever

Security Affairs

The OpenSSL Project announced an upcoming update to address a critical vulnerability in the open-source toolkit. The OpenSSL Project announced that it is going to release updates to address a critical vulnerability in the open-source toolkit. Experts pointed out that it is the first critical vulnerability patched in toolkit since September 2016. “The OpenSSL project team would like to announce the forthcoming release of OpenSSL version 3.0.7.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cybercriminals Use Fake Public PoCs to Spread Malware and Steal Data

eSecurity Planet

GitHub proofs of concept (PoCs) for known vulnerabilities could themselves contain malware as often as 10% of the time, security researchers have found. Researchers at the Leiden Institute of Advanced Computer Science have alerted security professionals about risks associated with GitHub and other platforms like pastebin that host public PoCs of exploits for known vulnerabilities.

article thumbnail

UK Firm Fined for Poor Security Prior to Ransomware Attack

Data Breach Today

Interserve Ran Obsolete Servers and Didn't Verify Malware Deletion The U.K. Information Commissioner levied a nearly $5 million fine against Interserve Group Limited for its lack of security protections in the run-up to a 2020 ransomware attack. The firm kept employee data on servers running obsolete versions of Windows and used outdated antivirus software.

article thumbnail

The Quiet Insurrection the January 6 Committee Missed

WIRED Threat Level

A former congressman who helped the House select committee investigate the Capitol attack says the US is losing sight of the big picture.

Security 171
article thumbnail

Thomson Reuters collected and leaked at least 3TB of sensitive data

Security Affairs

The multinational media conglomerate Thomson Reuters left a database with sensitive customer and corporate data exposed online. Original post at [link]. Thomson Reuters, a multinational media conglomerate, left an open database with sensitive customer and corporate data, including third-party server passwords in plaintext format. Attackers could use the details for a supply-chain attack.

IoT 317
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

The Future of Human Intelligence: A Conversation with Ray Kurzweil

OpenText Information Management

Information is at the core of being human, the universe and evolution itself. Information creation is accelerating, and its use is transformative in nature. Machines generate more information than humans today. Machines share their knowledge instantly and understand the nuances of language. One day, machines will directly enhance the human mind, and allow each human … The post The Future of Human Intelligence: A Conversation with Ray Kurzweil appeared first on OpenText Blogs.

IT 140
article thumbnail

Fallout From Medibank Hack Grows

Data Breach Today

About 4M Australians Affected by Extortion Demand Made Against the Health Insurer Fallout from the hack of Australian health insurer Medibank continues to worsen as the company twice this week acknowledged a wider set of affected individuals. Hackers had access to the personal data of 4 million individuals and significant amounts of health claims data.

Insurance 239
article thumbnail

A Pro-China Disinfo Campaign Is Targeting US Elections—Badly

WIRED Threat Level

The suspected Chinese influence operation had limited success. But it signals a growing threat from a new disinformation adversary.

IT 168
article thumbnail

Cuba ransomware affiliate targets Ukraine, CERT-UA warns

Security Affairs

The Ukraine Computer Emergency Response Team (CERT-UA) warns of Cuba Ransomware attacks against critical networks in the country. The Ukraine Computer Emergency Response Team (CERT-UA) warns of potential Cuba Ransomware attacks against local critical infrastructure. On October 21, 2022, the Ukraine CERT-UA uncovered a phishing campaign impersonating the Press Service of the General Staff of the Armed Forces of Ukraine.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Heartbleed 2.0? OpenSSL Warns of Second-Ever Critical Security Flaw

eSecurity Planet

The OpenSSL project this week announced plans to release version 3.0.7 on November 1 to patch a critical security flaw affecting versions 3.0 and later. Co-founder Mark J. Cox noted it’s only the second critical patch “since we started rating flaws back in 2014.” OpenSSL identifies critical issues as those affecting common configurations and likely to be exploitable, with examples including “significant disclosure of the contents of server memory (potentially revealing us

Security 133
article thumbnail

Apple Issues Emergency iOS Fix as Kernel Zero-Day Exploited

Data Breach Today

Immediate Updating Recommended as Any App in iOS and iPad Exploitable Apple has issued a slew of security updates amidst reports that its iOS devices are being actively exploited via a zero-day vulnerability in the kernel. While Apple hasn't attributed the exploits to any specific group, experts say surveillance malware developers are a likely culprit.

Security 233
article thumbnail

Hot on the Trail of a Mass-School-Shooting Hoaxer

WIRED Threat Level

For months, an anonymous caller has terrorized communities around the US by reporting false shooting threats. We know how they did it. The question is, why?

IT 141