Fri.Sep 22, 2023

article thumbnail

Apple Fixes Bugs That Infected Egyptian Politician's iPhone

Data Breach Today

Cytrox's Predator Found on Device of Ahmed Eltantawy Apple released patches Thursday to close three actively exploited vulnerabilities that researchers say commercial spyware maker Cytrox used to infect the iPhone of Egyptian politician Ahmed Eltantawy with Predator malware. The Citizen Lab attributes the attacks to the Egyptian government.

article thumbnail

MGM, Caesars Cyberattack Responses Required Brutal Choices

Dark Reading

Tens of millions in losses later, the MGM and Caesars systems are back online following dual cyberattacks by the same threat actor — here's what experts say about their incident responses.

130
130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google CISO Phil Venables on Building Strong CIO-CISO Bonds

Data Breach Today

CIO, CISO Must Join Forces to Upgrade Organization to More Defendable Architecture Increased engagement from boards on digital transformation initiatives around cloud and AI adoption has spurred greater investment in cybersecurity, said Google Cloud CISO Phil Venables. Systems built and designed decades ago have become increasingly difficult to secure, he said.

article thumbnail

News alert: SSH announces another US financial institution selects PrivX as its PAM solution

The Last Watchdog

Helsinki, Finland, Sept. 22, 2023 – A leading global financial institution has selected PrivX as its privileged access management (PAM) solution. The customer is one of the largest and most important financial institutions in the world. This is third major new significant lighthouse customer for PrivX in the USA. The initial contract value is approximately USD 0.25 million of annual recurring subscription revenue (ARR), including professional services.

IT 100
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

MGM Resorts Says Hotels 'Operating Normally' After Attack

Data Breach Today

But Digital Room Keys Still Unavailable; Slot Machines Have 'Intermittent Issues' MGM Resorts International says its hotels and casinos are now operating "normally" after the company was hit by ransomware-wielding attackers. Even so, numerous systems remain offline - including digital room key cards - as the company seeks to rebuild its IT infrastructure.

More Trending

article thumbnail

Cato Networks Raises $238M on $3B Valuation to Move Upmarket

Data Breach Today

Equity Investment Will Allow Cato Networks to Tightly Integrate CASB, DLP With SASE A late-stage SASE startup led by a serial entrepreneur hauled in a massive equity investment to address the feature and capability needs of large enterprises. The $238 million in funding will allow Cato Networks to more tightly align CASB and DLP with SASE to safeguard cloud apps and sensitive data.

Cloud 292
article thumbnail

CISA adds Trend Micro Apex One and Worry-Free Business Security flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

US CISA added the flaw CVE-2023-41179 in Trend Micro Apex and other security products to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security Agency (CISA) added the high-severity flaw CVE-2023-41179 (CVSS score 7.2) affecting Trend Micro Apex One and Worry-Free Business Security to its Known Exploited Vulnerabilities Catalog.

IT 114
article thumbnail

Chinese, North Korean Nation-State Groups Target Health Data

Data Breach Today

HHS Report Lists APT41, APT43 and Lazarus Among Top Threat Groups Chinese and North Korean nation-state groups continue to pose significant "unique threats" to the U.S. healthcare and public health sector, including data exfiltration attacks involving espionage and intellectual property theft, federal authorities warned Thursday in a brief naming the top groups.

287
287
article thumbnail

Recently patched Apple and Chrome zero-days exploited to infect devices in Egypt with Predator spyware

Security Affairs

Citizen Lab and Google’s TAG revealed that the three recently patched Apple zero-days were used to install Cytrox Predator spyware. Researchers from the Citizen Lab and Google’s Threat Analysis Group (TAG) revealed that the three Apple zero-days addressed this week were used as part of an exploit to install Cytrox Predator spyware. Apple this week released emergency security updates to address three new zero-day vulnerabilities (CVE-2023-41993, CVE-2023-41991, CVE-2023-41992) that ha

Security 112
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers Let Loose on Voting Gear Ahead of US Election Season

Dark Reading

Ethical hackers were given voluntary access to digital scanners, ballot markers, and electronic pollbooks, all in the name of making the voting process more resilient to cyber threats.

Access 111
article thumbnail

Experts warn of a 600X increase in P2Pinfect traffic

Security Affairs

The experts warn of a surge in P2PInfect botnet activity since late August 2023, they are witnessing a 600x jump between September 12 and 19, 2023. In July 2023, Palo Alto Networks Unit 42 researchers discovered a new peer-to-peer (P2P) worm called P2PInfect that targets Redis servers running on both Linux and Windows systems. The capability to target Redis servers running on both Linux and Windows operating systems makes P2PInfect more scalable and potent than other worms.

Passwords 111
article thumbnail

Guardians of the Cyberverse: Building a Resilient Security Culture

Dark Reading

Whether achieved through AI-enabled automation, proactive identification and resolution of issues, or the equitable distribution of risk management responsibilities, the goal must be resilience.

Security 103
article thumbnail

Sandman APT targets telcos with LuaDream backdoor

Security Affairs

A previously undocumented APT dubbed Sandman targets telecommunication service providers in the Middle East, Western Europe, and South Asia. A joint research conducted by SentinelLabs and QGroup GmbH revealed that a previously undetected APT group, dubbed Sandman, is targeting telecommunication service providers in the Middle East, Western Europe, and South Asia.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to keep your CISO happy with data and alerts

Jamf

In this session, Get Well’s Todd Clark, Senior IT Support Specialist, and Jeremy Lynch, CISO, return to JNUC to explain how they use data and alerts to simplify their workflows — and keep their CISO happy.

IT 98
article thumbnail

Do CISOs Have to Report Security Flaws to the SEC?

Dark Reading

The new SEC rules make it seem that there is no need to report the presence of security vulnerabilities, but that doesn't quite tell the full story.

Security 101
article thumbnail

Weekly Update 366

Troy Hunt

Well that's it, Europe is done! I've spent the week in Prague with highlights including catching up with Josef Prusa, keynoting at Experts Live EU and taking a "beer spa" complete with our own endless supply of tap beer. Life is good 🍻 That’s it - we’ve peaked - life is all downhill from here 🤣 🍻 #BeerSpa pic.twitter.com/ezCpUC6XEK — Troy Hunt (@troyhunt) September 21, 2023 All that and more in this week's video, next week I&apo

article thumbnail

NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII

Dark Reading

The league is working with more than 100 partners to workshop responses to a host of hypothetical cyberattacks on the upcoming Big Game in Las Vegas.

102
102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hypothesis: Generative AI at Jamf

Jamf

Learn how Jamf views Artificial Intelligence (AI), its use cases and the proof of concepts we’ve already tackled in this JNUC 2023 session.

article thumbnail

TikTok API Rules Stymie Analysis of US User Data, Academics Say

Dark Reading

Terms of service for API access give TikTok publication review over findings and limit access to critical data on the platform's impact on US users, researchers say.

Access 89
article thumbnail

One’s service is another’s product: enhance performance through the user’s voice

Jamf

Learn how taking proper care of your feedback can amplify user satisfation and benefit your products and services in this JNUC session.

98
article thumbnail

ASPM Is Good, But It's Not a Cure-All for App Security

Dark Reading

What application security posture management does, it does well. But you'll still need to fill in some holes, especially concerning API security.

IT 92
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Friday Squid Blogging: New Squid Species

Schneier on Security

An ancient squid : New research on fossils has revealed that a vampire-like ancient squid haunted Earth’s oceans 165 million years ago. The study, published in June edition of the journal Papers in Palaeontology , says the creature had a bullet-shaped body with luminous organs, eight arms and sucker attachments. The discovery was made by scientists in France, who used modern imaging technique to analyse the previously discovered fossils.

Paper 79
article thumbnail

Akira Ransomware Mutates to Target Linux Systems, Adds TTPs

Dark Reading

The newly emerged ransomware actively targets both Windows and Linux systems with a double-extortion approach.

article thumbnail

Irish Regulator Fines TikTok 345 Million Euros

Hunton Privacy

On September 15, 2023, the Irish Data Protection Commission (the “DPC”) announced a fine of 345 million Euros against TikTok Technology Limited (“TikTok”) for non-compliance with GDPR rules regarding the processing of personal data of child users. This decision by the DPC reflects the binding decision of the European Data Protection Board (the “EDPB”) pursuant to Article 65 of the GDPR.

GDPR 72
article thumbnail

Apple Fixes 3 More Zero-Day Vulnerabilities

Dark Reading

All of the security bugs are under active attacks, but the extent of their exploitation is unknown.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Streamlining Data Collection for Investigations and eDiscovery

OpenText Information Management

Organizations are practically drowning in data today, which makes using that data effectively more challenging than ever. Additionally, the risks associated with protecting that data have never been higher, due to strengthened data privacy laws worldwide and increasing cyberattacks on businesses everywhere. Businesses are faced with the challenge of needing discrete comprehensive data collection capabilities … The post Streamlining Data Collection for Investigations and eDiscovery appeared

article thumbnail

Microsoft accidentally exposed 38 terabytes of data from employee workstations via The Record

IG Guru

Check out the article here. The post Microsoft accidentally exposed 38 terabytes of data from employee workstations via The Record first appeared on IG GURU.

Access 85
article thumbnail

Be a supplier of choice for your large partners with EDI integration

OpenText Information Management

Electronic Data Interchange (EDI) has provided smaller businesses with an effective way to cut costs and improve the service they delivered to large customers for many years. However, now EDI integration is crucial to companies of any size looking to increase their network of suppliers and customers. Large businesses increasingly want the speed and accuracy … The post Be a supplier of choice for your large partners with EDI integration appeared first on OpenText Blogs.

B2B 62