Wed.Aug 02, 2023

article thumbnail

Ivanti Norway Hacks Began in April, Says US CISA

Data Breach Today

Mobile Device Management Are 'Attractive Targets,' Warns Joint Advisory With Norway A hacking campaign that exploited Ivanti mobile device manager to target the Norwegian government began in April and possible earlier, say cybersecurity agencies from the U.S. and Norway. Mobile device management systems are "attractive targets for threat actors," the alert warns.

article thumbnail

Burger King forgets to put a password on their systems, again

Security Affairs

The fast food giant Burger King put their systems and data at risk by exposing sensitive credentials to the public for a second time. Original post @ [link] Burger King is a renowned US-based international fast food giant with a global presence of over 19 thousand restaurants and revenue of $1.8 billion. Recently, the Cybernews research team uncovered that Burger King in France exposed sensitive credentials to the public due to a misconfiguration on their website.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What You Should Know About Open Source License Compliance for M&A Activity

Data Breach Today

Companies are increasingly concerned about the security of applications built on open source components, especially when they’re involved in mergers and acquisitions. Just like copyright for works of art, each piece of open source software has a license that states legally binding conditions for its use. Licenses allow developers to use the software as components, providing they keep to the specific terms and conditions that define what they are permitted and prohibited to do with the software.

article thumbnail

Spotlight Podcast: Are you ready for Threat Reconnaissance?

The Security Ledger

In this Spotlight podcast interview, David Monnier of Team Cymru talks about the evolution of the threat intelligence into actionable and target specific “threat reconnaissance.” The post Spotlight Podcast: Are you ready for Threat Reconnaissance? first appeared on The Security Ledger with Paul F. Roberts. The post Spotlight Podcast: Are you. Read the whole entry. » Click the icon below to listen.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Malware Campaign Targets Eastern European Air-Gapped Systems

Data Breach Today

Kaspersky Identifies Campign From Beijing-aligned APT31 Threat Actor A multi-stage malware campaign is targeting industrial organizations in Eastern Europe with the objective of pilfering valuable intellectual property, including data from air-gapped systems. Researchers at Kaspersky identified two attributed to Beijing-aligned APT31 group.

245
245

More Trending

article thumbnail

Tenable CEO Slams Microsoft for Failing to Quickly Patch Bug

Data Breach Today

Amit Yoran Says Microsoft Left Critical Azure Vulnerability Unpatched for 4 Months Tenable CEO Amit Yoran once again accused Microsoft of irresponsible security practices, this time for letting a critical Azure vulnerability stay unpatched for four months. Tenable told Microsoft about a flaw in an Azure service that would allow an unauthenticated attacker to access sensitive data.

Access 242
article thumbnail

Zero-day in Salesforce email services exploited in targeted Facebook phishing campaign

Security Affairs

Experts spotted a spear-phishing Facebook campaign exploiting a zero-day vulnerability in Salesforce email services. Researchers from Guardio Labs uncovered a sophisticated phishing campaign exploiting a zero-day vulnerability in Salesforce email services and SMTP servers. The phishing campaigns are able to evade conventional detection methods by chaining the Salesforce vulnerability and legacy quirks in Facebook’s web games platform.

article thumbnail

Why Open Source License Management Matters

Data Breach Today

The ongoing rise in open source vulnerabilities and software supply chain attacks poses a growing threat to businesses, which heavily rely on applications for success. Between 70 and 90 percent of organizations’ code base is open source, while vulnerabilities such as Log4j have significantly exposed organizations to cyberattacks.

238
238
article thumbnail

Iran's APT34 Hits UAE With Supply Chain Attack

Dark Reading

The prolific APT, also known as OilRig and MuddyWater, was caught targeting an IT company's government clients in the region, with the aim of carrying out cyber espionage.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Class Action Attorneys Circling Major Healthcare Breaches

Data Breach Today

Despite Scant Details on Hacks, Law Firms Poised to Pounce on Norton, Fairfax Oral Public details have been scant so far from two medical care providers about recent major hacks that compromised the personal information of an unconfirmed number of patients. But that hasn't stopped the push by class action attorneys, who are already filing lawsuits.

237
237
article thumbnail

Tesla Jailbreak Unlocks Theft of In-Car Paid Features

Dark Reading

Want heated seats for free? Self-driving in Europe despite a regulatory ban? Researchers have discovered the road to free car-modding on the popular Tesla EVs.

94
article thumbnail

Privacy Watchdog Slams Sharing of Patient Data Via WhatsApp

Data Breach Today

Shadow IT Incident: Health Staff Shared Images and Video Using Unauthorized Tool Shadow IT strikes again: Britain's privacy watchdog has reprimanded the NHS Lanarkshire health board in Scotland after finding its staff used WhatsApp for the unauthorized sharing of patient data and images as a workaround for in-person clinical discussions during the coronavirus pandemic.

Privacy 233
article thumbnail

New SEC Rules around Cybersecurity Incident Disclosures

Schneier on Security

The US Securities and Exchange Commission adopted final rules around the disclosure of cybersecurity incidents. There are two basic rules: Public companies must “disclose any cybersecurity incident they determine to be material” within four days, with potential delays if there is a national security risk. Public companies must “describe their processes, if any, for assessing, identifying, and managing material risks from cybersecurity threats” in their annual filings.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Instagram Flags AI-Generated Content

Dark Reading

Amid the national discussion about AI safety and non-human-originated content in the US, an app researcher spotted an effort by the social media app to flag AI posts for its 2+ billion users.

IT 80
article thumbnail

The Urgent Need For Cyber Resilience in Healthcare

KnowBe4

A US hospital closed two years after a ransomware incident , highlighting that the health sector continues to be under threat.

article thumbnail

Cyber-Insurance Underwriting Is Still Stuck in the Dark Ages

Dark Reading

Innovations in continuous controls monitoring may be the only way underwriters can offer cyber-insurance policies that make sense in the market.

article thumbnail

Bad Actor Uses Fake Android Chat to Install Malware

KnowBe4

Researchers at CYFIRMA warn that the Bahamut threat actor is using a malicious Android app to deliver malware.

91
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CISOs Need Backing to Take Charge of Security

Dark Reading

Unless the CEO and other C-suite executives defer to the CISO's decisions on cybersecurity, is that CISO really running things?

article thumbnail

How conversational AI can transform IT support

IBM Big Data Hub

My name is Michael, and I am a senior at New York University (NYU). Throughout my time in college, I’ve worked numerous part-time jobs to help cover the ever-rising costs of living and studying in New York City. These spanned from being a video editor, interning at startups, assisting in artificial intelligence research, and numerous other stints in between.

IT 70
article thumbnail

Unified XDR and SIEM Alleviate Security Alert Fatigue

Dark Reading

By integrating detection response with information and event management, organizations can move beyond protective controls and harden their defenses.

article thumbnail

KnowBe4 Chooses Drata as Their Exclusive GRC Partner

KnowBe4

Drata is KnowBe4’s preferred compliance automation platform for KnowBe4 customers.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Russian APT 'BlueCharlie' Swaps Infrastructure to Evade Detection

Dark Reading

Despite being outed earlier this year, the advanced persistent threat group is trying to sneak past researchers again.

82
article thumbnail

How chatbots improve human resource operations

IBM Big Data Hub

Today’s HR departments struggle to efficiently manage human resource operations and routine tasks, wasting time daily answering employees’ FAQs in the absence of a self-service system. When HR professionals are forced to allocate their time on these routine questions and repetitive tasks, they can’t focus on valuable work such as recruitment, retention and motivation, leadership development, and corporate culture.

article thumbnail

Utilities Face Security Challenges as They Embrace Data in New Ways

Dark Reading

A culture of cybersecurity and implementing industry best practices can go a long way toward protecting a utility.

article thumbnail

How IBM HR and the Chief Data Office partnered to drive data quality, increased productivity and a move to higher value work

IBM Big Data Hub

People analytics is at the center of Human Resources (HR) strategy. Companies rely heavily on data and analytics to find and retain talent, drive engagement, and improve productivity. However, analytics are only as good as the quality of the data, which aims to be error-free, trustworthy, and transparent. According to a Gartner report , poor data quality costs organizations an average of USD $12.9 million each year.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Hot Topic Apparel Brand Faces Credential-Stuffing Attack

Dark Reading

Due to the nature of the attack, Hot Topic says that it was unable to tell which accounts were accessed by legitimate users and which were accessed by threat actors, making the situation all the more difficult.

Access 62
article thumbnail

Debunking observability myths – Part 2: Why observability is important for everyone, not just SREs

IBM Big Data Hub

In our first blog post in this series on debunking observability myths, we focused on the myth that “ You can skip monitoring and rely solely on logs.” In this post, we’ll tackle another fallacy that limits the potential of observability—that it’s exclusively built for site reliability engineers (SREs). Why is this a myth?

Cloud 58
article thumbnail

Iranian Company Plays Host to Reams of Ransomware, APT Groups

Dark Reading

Cloudzy is a command-and-control provider (C2P) to APT groups in Iran, North Korea, and Russia, according to Halcyon.