Sat.Aug 01, 2020 - Fri.Aug 07, 2020

article thumbnail

UberEats data leaked on the dark web

Security Affairs

Security researchers from threat intelligence firm Cyble have discovered user records of American online food ordering and delivery platform UberEats on DarkWeb. Another day, another data breach made the headlines, this time the alleged victim is UberEATS. UberEats is an American online food ordering and delivery platform launched by Uber in 2014. During the process of darkweb and deep web monitoring, the Cyble Research Team came across a threat actor who leaked user records of UberEATS.

article thumbnail

Hacked Data Broker Accounts Fueled Phony COVID Loans, Unemployment Claims

Krebs on Security

A group of thieves thought to be responsible for collecting millions in fraudulent small business loans and unemployment insurance benefits from COVID-19 economic relief efforts gathered personal data on people and businesses they were impersonating by leveraging several compromised accounts at a little-known U.S. consumer data broker, KrebsOnSecurity has learned.

Insurance 362
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese Hackers Have Pillaged Taiwan's Semiconductor Industry

WIRED Threat Level

A campaign called Operation Skeleton Key has stolen source code, software development kits, chip designs, and more.

Security 342
article thumbnail

Twitter Rushes to Fix Flaw in Android Version

Data Breach Today

Vulnerability Could Enable Hackers to Access User Data, Including Direct Messages Twitter rushed out a fix for a flaw in the Android version of its social media platform that could have allowed hackers to access user data, including within the direct message feature. The news comes as more details have emerged about a recent Twitter hacking incident.

Access 340
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Garmin allegedly paid for a decryptor for WastedLocker ransomware

Security Affairs

BleepingComputer researchers confirmed that Garmin has received the decryption key to recover their files encrypted with the WastedLocker Ransomware. BleepingComputer first revealed that Garmin has received the decryption key to recover the files encrypted with the WastedLocker Ransomware in the recent attack. On July 23, smartwatch and wearables maker Garmin has shut down several of its services due to a ransomware attack that targeted its internal network and some production systems.

More Trending

article thumbnail

Dutch Hackers Found a Simple Way to Mess With Traffic Lights

WIRED Threat Level

By reverse-engineering apps intended for cyclists, security researchers found they could cause delays in at least 10 cities from anywhere in the world.

Security 299
article thumbnail

Global Cybercrime Surging During Pandemic

Data Breach Today

Interpol: Fraudsters Shifting Focus to Governments, Health Infrastructure, Corporations Cybercriminals have shifted their focus from individuals and smaller businesses to target governments, critical health infrastructure and major corporations to maximize their profits and disruption during the COVID-19 pandemic, a new Interpol report warns.

article thumbnail

FBI issued a flash alert about Netwalker ransomware attacks

Security Affairs

The FBI has issued a security alert about Netwalker ransomware attacks targeting U.S. and foreign government organizations. The FBI has issued a new security flash alert to warn of Netwalker ransomware attacks targeting U.S. and foreign government organizations. The feds are recommending victims, not to pay the ransom and reporting incidents to their local FBI field offices.

article thumbnail

How to Talk Technology When You’re Not Technical

AIIM

Some people are hyper-technical, and they can be intimidating if you don’t feel technically minded. It can feel like you’re not even speaking the same language as they seem to bury you in TLAs and FLAs (Three-Letter Acronyms and Four-Letter Acronyms). Information professionals can communicate with their technical colleagues – even when they’re not that technical.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

The Quest to Liberate $300,000 of Bitcoin From an Old Zip File

WIRED Threat Level

The story of a guy who wouldn't let a few quintillion possible decryption keys stand between him and his cryptocurrency.

Security 274
article thumbnail

How WastedLocker Evades Anti-Ransomware Tools

Data Breach Today

Sophos Says Malware Designed to Avoid Security Measures WastedLocker, a ransomware strain that reportedly shut down Garmin's operations for several days in July, is designed to avoid security tools within infected devices, according to a technical analysis from Sophos.

article thumbnail

A critical flaw in wpDiscuz WordPress plugin lets hackers take over hosting account

Security Affairs

A critical flaw in the wpDiscuz WordPress plugin could be exploited by remote attackers to execute arbitrary code and take over the hosting account. Security experts from Wordfence discovered a critical vulnerability impacting the wpDiscuz WordPress plugin that is installed on over 80,000 sites. The vulnerability could be exploited by attackers to execute arbitrary code remotely after uploading arbitrary files on servers hosting the vulnerable WordPress sites. wpDiscuz provides an Ajax real-time

Access 363
article thumbnail

Change in the Middle of a COVID-19 Crisis

AIIM

You still must get things done. The organization needs to make changes to adapt to a more turbulent world. However, how do you accomplish change when the organization’s change capacity is used coping with COVID-19 ? Learn why change management skills are more critical now than ever. Capacity for Change. Every person and every organization has a capacity for change.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

The Garmin Hack Was a Warning

WIRED Threat Level

As ransomware groups turn their attention to bigger game, expect more high-profile targets to fall.

article thumbnail

Twitter Hack: Suspects Left Easy Trail for Investigators

Data Breach Today

Bitcoin Accounts Linked to Driver's Licenses, Leading to Arrests Suspects in the epic attack against Twitter were uncovered in part by the use of their real photo identification for cryptocurrency accounts they used to broker the sale of stolen usernames. The mistakes proved crucial to their identification, according to court documents.

Sales 296
article thumbnail

Belarussian authorities arrested GandCrab ransomware distributor

Security Affairs

Last week, the Minister of Internal Affairs of Belarus announced the arrest of a 31-year-old man that is accused of distributing the infamous GandCrab ransomware. Last week, the Minister of Internal Affairs of Belarus announced the arrest of a man on charges of distributing the infamous GandCrab ransomware. The arrest is the result of an investigation conducted with help from law enforcement from the UK and Romania.

article thumbnail

I'm Open Sourcing the Have I Been Pwned Code Base

Troy Hunt

Let me just cut straight to it: I'm going to open source the Have I Been Pwned code base. The decision has been a while coming and it took a failed M&A process to get here, but the code will be turned over to the public for the betterment of the project and frankly, for the betterment of everyone who uses it. Let me explain why and how. HIBP is a Community Project I've been giving a great deal of thought to how I want this project to evolve lately, especially in the wake of the M&A proce

Passwords 145
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Incognito Mode May Not Work the Way You Think It Does

WIRED Threat Level

Every browser has a private mode—but the privacy it offers has a limit.

IT 262
article thumbnail

Alert: Chinese Malware Targeting IT Service Providers

Data Breach Today

CISA, DOD, FBI Issue Warning About Campaign Using Taidoor RAT A trio of U.S. government agencies is warning organizations about a hacking campaign using a malware strain that has previously been tied to Chinese hackers. The Taidoor RAT, which has been around for over 10 years, has recently been spotted in several campaigns against IT service providers.

IT 294
article thumbnail

Hackers can abuse Microsoft Teams updater to deliver malicious payloads

Security Affairs

Threat actors can abuse Microsoft Teams updater to retrieve and execute malicious code from a remote location. Security experts from Trustwave detailed the Living Off the Land technique that could allow a threat actor to abuse the MS Teams Updater to download any binary or malicious payload from a remote server. The bad news is that the issue could not be easily addressed because it is a design flaw.

Metadata 362
article thumbnail

Why Data Ethics Is a Growing CISO Priority

Dark Reading

With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Rite Aid Used Facial Recognition in Stores for Nearly a Decade

WIRED Threat Level

A SubStack email mess, a Nintendo leak, and more of the week's top security news.

Security 259
article thumbnail

FastPOS Malware Creator Pleads Guilty to Federal Charges

Data Breach Today

DOJ: Valerian Chiochiu Provided Cybercriminals Help Through Infraud Site A member of the infamous Infraud Organization and the creator of a malware strain called FastPOS has pleaded guilty to federal conspiracy charges, according to the Justice Department. Valerian Chiochiu assisted other cybercriminals through the Infraud site before authorities shuttered it in 2018.

IT 289
article thumbnail

FBI is warning of cyber attacks against Windows 7 systems that reached end-of-life

Security Affairs

The FBI warned private industry partners of risks impacting companies running Windows 7 after the Microsoft OS reached the end of life on January 14. The Federal Bureau of Investigation is warning companies running Windows 7 systems of the greater risk of getting hacked because the Microsoft OS has reached the end of life on January 14. Early this week, the FBI has sent a private industry notification (PIN Number 20200803-002) to partners in the US private sector. “The FBI has observed cyb

Risk 361
article thumbnail

Garmin Pays Up to Evil Corp After Ransomware Attack — Reports

Threatpost

The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The Feds Want These Teams to Hack a Satellite—From Home

WIRED Threat Level

Meet the hackers who, this weekend, will try to commandeer an actual orbiter as part of a Defcon contest hosted by the Air Force and the Defense Digital Service.

Security 248
article thumbnail

FBI Warns of Serious Risks Posed by Using Windows 7

Data Breach Today

Bureau Says Attackers Can Use Vulnerable RDP Connections to Access Networks The FBI is warning organizations that are still using Microsoft Windows 7 they are in danger of attackers exploiting vulnerabilities in the unsupported operating system to gain network access. The agency points to an uptick in such attack attempts.

Risk 288
article thumbnail

Hacker leaks passwords for 900+ Pulse Secure VPN enterprise servers

Security Affairs

ZDNet reported in exclusive that a list of passwords for 900+ enterprise VPN servers has been shared on a Russian-speaking hacker forum. ZDNet has reported in exclusive that a list of plaintext usernames and passwords for 900 Pulse Secure VPN enterprise servers, along with IP addresses, has been shared on a Russian-speaking hacker forum. ZDNet has obtained a copy of the list with the help of threat intelligence firm KELA and verified confirmed the authenticity of the data.

Passwords 360