Mon.Oct 02, 2023

article thumbnail

Alert: Attackers Actively Exploiting WS_FTP Vulnerabilities

Data Breach Today

Cybersecurity Officials Recommend Immediate Patching to Fix Serious Flaws Large enterprises, including government and educational organizations, are being warned to immediately update their WS_FTP Server, built by Progress Software, to fix serious flaws being actively exploited by attackers. Secure file-transfer software remains a top target, especially by extortionists.

Education 292
article thumbnail

Don’t Let Zombie Zoom Links Drag You Down

Krebs on Security

Many organizations — including quite a few Fortune 500 firms — have exposed web links that allow anyone to initiate a Zoom video conference meeting as a valid employee. These company-specific Zoom links, which include a permanent user ID number and an embedded passcode, can work indefinitely and expose an organization’s employees, customers or partners to phishing and other social engineering attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chertoff Group Arm to Buy Trustwave from Singtel for $205M

Data Breach Today

MSSP, MDR Provider Lost Nearly 75% of Value During 8+ Years of Singtel Ownership The private equity arm of ex-Homeland Security Secretary Michael Chertoff's advisory firm agreed to purchase managed detection and response vendor Trustwave for $205 million. The deal will allow Singtel to refocus its business in APAC and boost shareholder value by optimizing resource allocation.

Security 284
article thumbnail

GUEST ESSAY: Has shielding and blocking electromagnetic energy become the new normal?

The Last Watchdog

Surrounded by the invisible hum of electromagnetic energy, we’ve harnessed its power to fuel our technological marvels for decades. Related: MSFT CEO calls for regulating facial recognition tech Tesla’s visionary insights from 1900 hinted at the potential, and today, we bask in the glow of interconnected networks supporting our digital lives.

Privacy 200
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Some Prospect Medical Hospitals in Dire State, Post-Attack

Data Breach Today

Continued Operation of 3 Connecticut Hospitals Now in Question An August cyberattack on a national hospital chain may make medical care in underserved areas of Connecticut even harder to obtain now that a would-be buyer said it's having second thoughts about going through with the deal. The Rhysida group claimed responsibility for an attack on Prospect Medical.

IT 278

More Trending

article thumbnail

EU Lawmaker Questions CSAM Proposal 'Conflicts of Interest'

Data Breach Today

LIBE Committee Chair Seeks Clarifications from EU Home Affairs Minister The head of a key European Parliament committee said he's concerned about media reports suggesting that a proposal mandating that instant messenger apps scan for CSAM was crafted under the influence of an American tech foundation and a non-profit with ties the British and U.S. government.

article thumbnail

FBI: Crippling 'Dual Ransomware Attacks' on the Rise

Dark Reading

Once they compromise an victim with an initial ransomware attack, threat actors are ready to deploy a secondary attack with a different strain, which could leave even more damage.

article thumbnail

Bugs Found in Another Progress Software File Transfer App

Data Breach Today

Expert: Maximum Severity Vulnerability Demands Immediate Patching Progress Software is again sending customers on a scramble to install emergency patches, this time for its secure FTP server software. The advisory comes months after hackers took advantage of a zero day in the company's MOVEit file transfer software in a hacking campaign affecting tens of millions.

Security 266
article thumbnail

European Telecommunications Standards Institute (ETSI) suffered a data breach

Security Affairs

The European Telecommunications Standards Institute (ETSI) disclosed a data breach, threat actors had access to a database of its users. Threat actors stole a database containing the list of users of the portal of the European Telecommunications Standards Institute ( ETSI ). The European Telecommunications Standards Institute is an independent, not-for-profit organization based in Europe.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

North Korea Poses as Meta to Deploy Complex Backdoor at Aerospace Org

Dark Reading

The Lazarus Group's "LightlessCan" malware executes multiple native Windows commands within the RAT itself, making detection significantly harder, security vendor says.

Security 119
article thumbnail

WS_FTP flaw CVE-2023-40044 actively exploited in the wild

Security Affairs

Experts warn of threat actors actively exploiting CVE-2023-40044 flaw in recently disclosed flaw in Progress Software’s WS_FTP products. Progress Software recently warned customers to address a critical severity vulnerability, tracked as CVE-2023-40044 (CVSS score 10), in its WS_FTP Server software which is used by thousands of IT teams worldwide.

article thumbnail

Making Sense of Today's Payment Cybersecurity Landscape

Dark Reading

PCI DSS v4.0 is the future of the payment card industry's information security standard, but businesses must continue to look beyond this guidance and engage in proactive strategies of their own.

article thumbnail

Lazarus Attack on Spanish Aerospace Company Started with Messages from Phony Meta Recruiters

KnowBe4

A recent attack on an undisclosed Spanish aerospace company all started with messages to the company's employees that appeared to be coming from Meta recruiters, via LinkedIn Messaging. ESET researchers uncovered the attack and attributed it to the Lazarus group, particularly a campaign dubbed Operation DreamJob. This campaign by the Lazarus group was aimed at defense and aerospace companies with the goal of carrying out cyberespionage.

IT 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

An overview of the European digital strategy

Data Protection Report

We have published an article, EU: An overview of the European digital strategy, explaining the aims and key components of the EU digital strategy, outlining at a high-level key legislation that has been published in this space in the past three years and highlighting the way in which the various legislative instruments interact with each other and with European data privacy rules.

article thumbnail

National Logistics Portal (NLP) data leak: seaports in India were left vulnerable to takeover by hackers

Security Affairs

The National Logistics Portal (NLP), a newly launched platform to manage all port operations in India, left public access to sensitive data, posing the risk of a potential takeover by threat actors. On September 24th, researchers discovered that the NLP platform was exposing sensitive credentials, secrets, and encryption keys via publicly available JS files.

article thumbnail

New SMS Phishing Campaign Impersonating The US Postal Service

KnowBe4

DomainTools is tracking an increase in SMS phishing (or “smishing”) campaigns impersonating the US Postal Service (USPS). The text messages inform recipients that there’s a problem with their delivery address and they need to click on a link to resolve the issue.

Phishing 102
article thumbnail

Norway Urges Europe-Wide Ban on Meta's Targeted Ad Data Collection

Dark Reading

Norway wants to permanently ban the owner of Facebook and Instagram from collecting sensitive user data across Europe, saying its current policies violate GDPR rules.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

NSA AI Security Center

Schneier on Security

The NSA is starting a new artificial intelligence security center: The AI security center’s establishment follows an NSA study that identified securing AI models from theft and sabotage as a major national security challenge, especially as generative AI technologies emerge with immense transformative potential for both good and evil. Nakasone said it would become “NSA’s focal point for leveraging foreign intelligence insights, contributing to the development of best practices g

article thumbnail

Predictive Policing Software Terrible at Predicting Crimes

WIRED Threat Level

A software company sold a New Jersey police department an algorithm that was right less than 1 percent of the time.

Privacy 117
article thumbnail

Know your rights in the rising tide of budget cuts

CILIP

Know your rights in the rising tide of budget cuts CILIP is offering public librarians a free step-by-step guide to challenging cuts and service reductions in your public libraries. Libraries are at the frontline of providing vital services to communities, and as a result, are often in the first line of fire when it comes to cuts. Shortly after announcing special measures on Birmingham Council, last month, libraries along with other essential council services were put under review.

article thumbnail

Fertility care provider Ovum Health gives patients information using chat and scheduling tools with IBM watsonx Assistant

IBM Big Data Hub

As a healthcare activist, a mom to a fertility preservation miracle, a business owner and a cancer survivor, Alice Crisci has dedicated her life to ending the spread of health misinformation. She founded MedAnswers and its telemedicine spinout, Ovum Health , with the hopes of providing increased access to family-building solutions like pre-pregnancy, prenatal and postnatal healthcare.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

KillNet Claims DDoS Attack Against Royal Family Website

Dark Reading

The royal takedown was a brief but effective PR stunt for Russia's most notorious hacktivist group.

112
112
article thumbnail

The U.S. Chamber of Commerce Foundation and IBM explore generative AI’s applications for skills-based hiring

IBM Big Data Hub

The recent rise of generative artificial intelligence (AI) including large language models (LLMs) has inspired organizations in every industry to consider how AI can drive innovation. Leaders are increasingly recognizing the power of AI as well as its potential limitations and risks. It’s critical that leaders think carefully about how AI is created and applied and take a human-centric, principled approach to each use case.

article thumbnail

The Silent Threat of APIs: What the New Data Reveals About Unknown Risk

Dark Reading

The rapid growth of APIs creates a widening attack surface and increasing unknown cybersecurity risks.

Risk 98
article thumbnail

The Biggest Hack of 2023 Keeps Getting Bigger

WIRED Threat Level

Victims of the MOVEit breach continue to come forward. But the full scale of the attack is still unknown.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Iran-Linked APT34 Spy Campaign Targets Saudis

Dark Reading

The Menorah malware can upload and download files, as well as execute shell commands.

103
103
article thumbnail

Greater visibility key to managing the modern retail supply chain

OpenText Information Management

Supply chain visibility is crucial for retailers dealing with the twin challenges of volatile demand and spiraling costs. Disruption is the new watchword as retailers have seen customer demand increase (46%). At the same time, demand has become less predictable (31%). At the other end of the retail supply chain, suppliers are more expensive (53%) … The post Greater visibility key to managing the modern retail supply chain appeared first on OpenText Blogs.

Retail 57
article thumbnail

Which DFIR Challenges Does the Middle East Face?

Dark Reading

Demand for digital forensics and incident response (DFIR) surges in the Middle East, a new IDC report finds. Is automation the answer?

79