Tue.Mar 24, 2020

article thumbnail

Hackers Targeted World Health Organization

Data Breach Today

Researcher Says Spear-Phishing Incident Has Hallmarks of Nation-State Attack A hacking group targeted the World Health Organization earlier this month with an apparently unsuccessful spear-phishing campaign designed to harvest credentials as the United Nations organization was grappling with the global COVID-19 pandemic.

Phishing 269
article thumbnail

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

The Last Watchdog

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day. I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR technologies have arisen in just the past few years to help companies try to make sense of it all, even as catastrophic breaches persist.

Security 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Modifies Consumer Privacy Regulations - Again

Data Breach Today

Attorney Sadia Mirza Reviews 'Spring Cleaning' of Landmark CCPA Privacy Law Amidst the COVID-19 pandemic, California's attorney general on March 11 released a second modification of the proposed regulations to implement the California Consumer Protection Act. Attorney Sadia Mirza explains what's included in this "spring cleaning.

Privacy 180
article thumbnail

Uncovering OpenWRT remote code execution (CVE-2020-7982)

ForAllSecure

Introduction. For ForAllSecure, I’ve been focusing on finding bugs in OpenWRT using their Mayhem software. My research on OpenWRT has been a combination of writing custom harnesses, running binaries of the box without recompilation, and manual inspection of code.

112
112
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

New Mirai Variant Exploits NAS Device Vulnerability

Data Breach Today

Researchers: Mukashi Botnet Can Use Infected Devices to Launch DDoS Attacks Security researchers are tracking a variant of the prolific Mirai botnet called Mukashi, that's taking advantage of vulnerabilities in network-area storage devices made by Zyxel and giving its operators the ability to launch DDoS attacks. Zyxel has issued a patch for the vulnerability.

Security 163

More Trending

article thumbnail

Election Integrity in COVID-19 Era

Data Breach Today

Matt Barrett and Joe Drissell of U.S. Cyberdome discuss the new initiative to foster cross-campaign cybersecurity collaboration and the ramifications of potentially holding an election during social distancing as a result of the COVID-19 pandemic.

article thumbnail

Business Process Modeling Use Case: Disaster Recovery

erwin

In these challenging times, many of our customers are focused on disaster recovery and business contingency planning. Disaster recovery is not just an event but an entire process defined as identifying, preventing and restoring a loss of technology involving a high-availability, high-value asset in which services and data are in serious jeopardy. Technical teams charged with maintaining and executing these processes require detailed tasks, and business process modeling is integral to their docum

Risk 97
article thumbnail

Microsoft Warns of New Zero-Day Vulnerabilities in Windows

Data Breach Today

Company Has Detected 'Limited Targeted Attacks' So Far Microsoft is warning that attackers are exploiting a pair of critical, zero-day flaws in Windows that allow for remote code execution, which could enable a threat actor to take over an infected device. Although a patch for the flaws is not expected until April, the company described workarounds.

140
140
article thumbnail

3 Tips to Secure Your Home Network

PerezBox

Whether we like it or not, we have all become the network administrators of our own home networks. As such, our responsibilities extend beyond protecting our families to helping to. Read More. The post 3 Tips to Secure Your Home Network appeared first on PerezBox.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Demystifying FBI Notes on Cyber Attacks Involving Multi-Factor Authentication

Data Breach Today

Hackers are Looking for Every Opportunity to Bypass Security Measures, and MFA is no Exception. Hackers are looking for every opportunity to bypass security measures, and MFA is no exception.

article thumbnail

Internet Voting in Puerto Rico

Schneier on Security

Puerto Rico is considered allowing for Internet voting. I have joined a group of security experts in a letter opposing the bill. Cybersecurity experts agree that under current technology, no practically proven method exists to securely, verifiably, or privately return voted materials over the internet. That means that votes could be manipulated or deleted on the voter's computer without the voter's knowledge, local elections officials cannot verify that the voter's ballot reflects the voter's in

article thumbnail

MFA Trials Can Be a Burden or a Breeze

Data Breach Today

Use These Five Tips to Quickly Spot Differences When Evaluating MFA Solutions Use these five tips to quickly spot differences when evaluating MFA solutions.

126
126
article thumbnail

COVID-19: Key EU And U.S. Cybersecurity Issues and Risk-Remediation Steps

Data Matters

The COVID-19 crisis has created significant cybersecurity risks for organizations across the world, particularly arising from remote working, scams and phishing attacks, and weakened information governance controls. These risks warrant attention by legal counsel and information security officers in light of potentially significant adverse legal, financial and reputational consequences that could arise – all while the organization is dealing with effects of a global pandemic.

Risk 79
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

What's the Return on Investment of a Vendor Management Platform?

Data Breach Today

Improve Vendor Remote Access Security, Reduce 3rd Party Risk AND Reduce Costs An emerging technology, Vendor Privileged Access Management (VPAM) can provide both operational efficiencies and increased security in your projected ROI analysis. And that is a rare combination in InfoSec these days.

Risk 105
article thumbnail

How to facilitate remote learning: Part 4 — Active learning

Jamf

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience. In part four of our five-part blog series, we show you ways to offer active learning through projects and breakout groups.

article thumbnail

Nurturing relationships while working remotely

OpenText Information Management

In the midst of media reports of job cuts and business closures, the Bank of America has just announced the hiring of 1700 new employees into critical support roles. As more and more people are instructed to stay at home, it’s impossible to overestimate the importance of seamless and continuous engagements with financial services customers. … The post Nurturing relationships while working remotely appeared first on OpenText Blogs.

article thumbnail

New York SHIELD Act Requires Safeguards to Protect Private Information

Hunton Privacy

On March 21, 2020, the data security provisions of New York’s Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”) went into effect. The SHIELD Act requires any person or business owning or licensing computerized data that includes the private information of a resident of New York (“covered business”) to implement and maintain reasonable safeguards to protect the security, confidentiality and integrity of the private information.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

WildPressure, a new APT group targets the Middle East’s industrial sector

Security Affairs

Security experts from Kaspersky Lab have uncovered the activity of a new threat actor, tracked as WildPressure, targeting the industrial sector in th e Middle East. The WildPressure was spotted for the first time in August 2019 when researchers detected a never-before-seen malware that has no similarities with other samples analyzed by the experts. “In August 2019, Kaspersky discovered a malicious campaign distributing a fully fledged C++ Trojan that we call Milum.

article thumbnail

Cybercriminals' Promises to Pause During Pandemic Amount to Little

Dark Reading

As pandemic worsens, online profiteering -- from fraudsters to ransomware operators to cybercriminal hacking -- continues unabated, despite some promises from the underground.

article thumbnail

UNCOVERING OPENWRT REMOTE CODE EXECUTION (CVE-2020-7982)

ForAllSecure

Introduction. For ForAllSecure, I’ve been focusing on finding bugs in OpenWRT using their Mayhem software. My research on OpenWRT has been a combination of writing custom harnesses, running binaries of the box without recompilation, and manual inspection of code. I found this vulnerability initially by chance when I was preparing a Mayhem task for opkg.

IT 59
article thumbnail

Fortune 500 tech giant General Electric (GE) discloses data breach after Canon hack

Security Affairs

General Electric (GE) s a data breach that exposed personally identifiable information of current and former employees, as well as beneficiaries. The technology giant General Electric (GE) disclosed a data breach that exposed personally identifiable information of current and former employees, as well as beneficiaries. The data breach was caused by a security breach suffered by one of GE’s service providers, Canon Business Process Services.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

OCR Issues Bulletin on the Sharing and Security of PHI During Coronavirus Pandemic

Hunton Privacy

The Office for Civil Rights (“OCR”) at the U.S. Department of Health and Human Services (“HHS”) issued a Bulletin on sharing and protecting patients’ protected health information (“PHI”) in compliance with the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) during the COVID-19 national emergency. The Bulletin emphasizes that the HIPAA Privacy Rule is still in effect during this national emergency, but that HIPAA-covered entities may use or disclose patients’ PHI when necess

article thumbnail

How Web Data Can Benefit the Food Delivery Industry

Import.IO

The online food delivery industry has emerged and grown tremendously over the past decade. Users have increasingly come to realize the convenience that online food delivery can provide them, making the food delivery market seemingly limitless. As of January 2020, 60 percent of U.S. consumers order delivery or takeout once. The post How Web Data Can Benefit the Food Delivery Industry appeared first on Import.io.

article thumbnail

Uncovering OpenWRT Remote Code Execution (CVE-2020-7982)

ForAllSecure

Introduction. For ForAllSecure, I’ve been focusing on finding bugs in OpenWRT using their Mayhem software. My research on OpenWRT has been a combination of writing custom harnesses, running binaries of the box without recompilation, and manual inspection of code. I found this vulnerability initially by chance when I was preparing a Mayhem task for opkg.

IT 52
article thumbnail

Automated Tools Make Cyberattacks Easier to Pull Off

Dark Reading

Gone are the days when threat actors had to actually spend time and effort planning and developing an attack on their own, Recorded Future says.

65
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The US Army Corps of Engineers Deploys Against Coronavirus

WIRED Threat Level

The US is desperate for hospital beds. The USACE can build thousands of them in a matter of days.

article thumbnail

How to Secure Your Kubernetes Deployments

Dark Reading

As more companies shift their software to a microservices-based architecture and orchestrate their containerized applications in Kubernetes, distributed security controls become a must.

article thumbnail

MalwareBazaar – welcome to the abuse-ch malware repository

Security Affairs

Abuse. ch launched the MalwareBazaar service, a malware repository to allow experts to share known malware samples and related info. Abuse. ch launched a malware repository, called MalwareBazaar , to allow experts to share known malware samples and related analysis. MalwareBazaar is available for free and only collects known malware samples, the repository will not include adware or potentially unwanted applications (PUA/PUP). “ MalwareBazaar is a project operated by abuse. ch.

IT 53