Fri.Jun 23, 2023

article thumbnail

SEC Alleges SolarWinds CFO, CISO Violated US Securities Laws

Data Breach Today

Bart Kalsu, Tim Brown Could Face Monetary Penalties, Public Company Officer Ban The Securities and Exchange Commission accused SolarWinds CFO Bart Kalsu and CISO Tim Brown of violating securities laws in their response to the 2020 cyberattack. Kalsu and Brown are among "certain current and former executive officers and employees" targeted by the SEC for alleged violations.

Security 297
article thumbnail

News Alert: Dasera unveils new data security and governance platform for ‘Snowflake’ users

The Last Watchdog

Mountain View, Calif. June 22, 2023 — Dasera , the premier automated data security and governance platform for top-tier finance, healthcare, and technology enterprises, is thrilled to unveil “Ski Lift,” a complimentary platform exclusively designed for Snowflake users. With “Ski Lift,” Snowflake customers can gain a panoramic view of their Snowflake environment while scaling their data security and governance controls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEO Poisoning Attacks on Healthcare Sector Rising, HHS Warns

Data Breach Today

Search Scams Luring Users to Malware-Infected Sites Are Often Tricky to Detect Search engine optimization poisoning attacks, which involve intentionally manipulating search results to lead users onto malware-laced websites, are on the rise in the healthcare sector, U.S. federal regulators warn. Users should watch for typosquatting, keyword stuffing, meta tagging and cloaking.

279
279
article thumbnail

Suspicious Smartwatches Mailed to US Army Personnel

Dark Reading

Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise.

118
118
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

NSA Issues Remediation Guidance for BlackLotus Malware

Data Breach Today

Citing 'Significant Confusion,' Agency Says Patching Microsoft Windows Not Enough The National Security Agency has released mitigation advice for locking down Windows and Linux environments against powerful BlackLotus malware, warning organizations against having "a false sense of security" since patching alone will not stop the bootkit.

Security 254

More Trending

article thumbnail

MDM: Balancing the Need for User Privacy, Corporate Control

Data Breach Today

In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Weldon Dodd of Kandji discusses the evolution of Apple's security and privacy practices and how mobile device management can help achieve a balance between user privacy and corporate control.

MDM 144
article thumbnail

Microsoft Teams Attack Skips the Phish to Deliver Malware Directly

Dark Reading

Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization's employees, but no patch is imminent.

Phishing 107
article thumbnail

EU to Push Ahead With Data Act Despite Criticism

Data Breach Today

EU's Industry Chief Says Europe's 'Assertion Is Not Protectionism' Europe's continued efforts to control its data will not stifle competition and are not an act of "protectionism," a top European Union official said amid growing criticism of the EU's legislative proposal to introduce stringent data-sharing requirements for businesses.

IT 144
article thumbnail

WWDC 2023 Takeaways: The impact on health and wellness

Jamf

While WWDC brings a number of exciting announcements for developers and users alike, impactful innovations in Apple’s longstanding mission to improve health and wellness were also visibly on display.

99
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers Targeting Linux and IoT Devices for Crytomining

Data Breach Today

Attackers Deploy Trojanized OpenSSH Version for Device Takeover, Microsoft Says Microsoft discovered hackers targeting internet-facing Linux systems and IoT devices to steal IT resources for cryptocurrency mining operations. The campaign begins by brute-forcing target systems and devices and then uses a backdoor to deploy open-source tools such as rootkits and an IRC bot.

IoT 144
article thumbnail

Privacy in an open-data world: Why government agencies need to be proactive

Collibra

Government agencies — from DC to Duluth, NYC to LA — are struggling. The ever-growing digitalization of our world has raised significant concerns about data privacy and security, particularly for agencies that manage and process sensitive and confidential information. And the pandemic only increased the cost and complexity of these challenges. There’s no going back.

Privacy 99
article thumbnail

Appeals Court Upholds Synopsys Victory in Trade Secrets Suit

Data Breach Today

Info Synopsys Took From Risk Based Security Doesn't Meet 'Trade Secret' Definition A federal appeals court affirmed that Synopsys didn't steal trade secrets from Risk Based Security by creating its own database of open-source code vulnerabilities. The data was not ruled a trade secret because Risk Based Security doesn't derive "independent economic value" from keeping it secret.

Risk 144
article thumbnail

NSA: BlackLotus BootKit Patching Won't Prevent Compromise

Dark Reading

It's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.

IT 108
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Release of Universal Electronic Records Management Requirements, Version 3

National Archives Records Express

We are pleased to announce the release of Version 3 of the Universal Electronic Records Management (ERM) Requirements as part of our Federal Electronic Records Modernization Initiative (FERMI). Through this initiative, we have been working to improve the way agencies acquire ERM services and solutions. We first released the Universal ERM Requirements in August 2017.

article thumbnail

Fortinet fixes critical FortiNAC RCE, install updates asap

Security Affairs

Fortinet addressed a critical remote command execution vulnerability, tracked as CVE-2023-33299, affecting FortiNAC solution. FortiNAC is a network access control (NAC) solution designed by Fortinet that is used by organizations to secure and control access to networks by enforcing security policies, monitoring devices, and managing their access privileges.

IoT 97
article thumbnail

Why Legacy System Users Prioritize Uptime Over Security

Dark Reading

For line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this?

article thumbnail

CISA orders govt agencies to fix recently disclosed flaws in Apple devices

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) added six new vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added six new security flaws to its Known Exploited Vulnerabilities Catalog. Below is the list of the issues added to the catalog: CVE-2023-32434 : Apple Multiple Products Integer Overflow Vulnerability – Apple iOS. iPadOS, macOS, and watchOS contain an integer overflow vulnerability tha

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to Maximize the Value of Penetration Tests

eSecurity Planet

All organizations should perform penetration tests, yet many worry about not receiving the full value of their investment. Organizations have two choices: perform penetration tests with their internal teams, or hire an external vendor and find ways to lower costs. Either case presents challenges, but to maximize the value of a penetration test, the organization must balance cost savings with quality.

article thumbnail

VMware fixed five memory corruption issues in vCenter Server

Security Affairs

VMware addressed multiple memory corruption vulnerabilities in vCenter Server that can be exploited to achieve remote code execution. VMware released security updates to five memory corruption vulnerabilities (CVE-2023-20892, CVE-2023-20893, CVE-2023-20894, CVE-2023-20895, CVE-2023-20896) in vCenter Server that could lead to remote code execution. The memory corruption vulnerabilities reside in the software’s implementation of the DCERPC protocol.

Cloud 91
article thumbnail

Banking and Retail Top the List of Industries Targeted by Social Media Phishing Attacks

KnowBe4

Using an external platform trusted by potential victims is proving to be a vital tool in the cybercriminal’s arsenal. New data shows the state of the threat and who’s at risk.

Retail 80
article thumbnail

UPS Data Harvested for SMS Phishing Attacks

Schneier on Security

I get UPS phishing spam on my phone all the time. I never click on it, because it’s so obviously spam. Turns out that hackers have been harvesting actual UPS delivery data from a Canadian tracking tool for its phishing SMSs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Want To Stop All Scams? Here Is How!

KnowBe4

There are many ways to be socially engineered and phished , including email, websites, social media, SMS texts, chat services, phone calls and in-person. These days, it is hard to sell something online, date or rent a vacation home without being scammed. Scams are everywhere! If there is a way to communicate between two parties, some scammer will try to take advantage of it.

article thumbnail

Deception Technologies Have a Maturity Problem

Dark Reading

While there's plenty of upside to rolling out deception technologies, it's not clear if cybersecurity leaders — or their organizations — are ready for them.

article thumbnail

“Picture in Picture” Phishing Attack Technique Is So Simple, It Works

KnowBe4

Using credibility-building imagery and creating a need for the user to click what may or may not be perceived as an image is apparently all it takes to engage potential phishing victims.

article thumbnail

ITDR Combines and Refines Familiar Cybersecurity Approaches

Dark Reading

Identity threat detection and response adds user entity behavioral analytics to fraud detection, creating a powerful tool for real-time protection.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

11 Key Steps of the Patch Management Process

eSecurity Planet

Patch management is the continuous process of releasing and deploying software updates, most commonly done to solve security and functionality issues. But to do patch management right, you need a detailed, repeatable process. Establishing an efficient patch management process is critical for keeping your systems secure and stable. Patches address vulnerabilities that could be exploited by hackers; bug fixes that correct faults or defects in the software, and feature upgrades that offer enhanceme

Risk 74
article thumbnail

How Government Contractors & Agencies Should Navigate New Cyber Rules

Dark Reading

The impending regulations highlight the increasing importance of enhanced network security and regulatory compliance across the government sector.

article thumbnail

Half of Business Leaders Believe Users Aren’t Security Aware, Despite Most Having a Program in Place

KnowBe4

New data shows that even with the majority of organizations experiencing cyber attacks, three hours of security awareness training simply isn’t enough.