Thu.May 28, 2020

article thumbnail

'Hack-for-Hire' Groups Spoof WHO Emails to Steal Data

Data Breach Today

Google: Hackers Using COVID-19 Phishing Themes to Target Businesses "Hack-for-hire" groups operating in India are spoofing World Health Organization emails to steal credentials from financial services and healthcare firms around the world, according to Google's Threat Analysis Group.

article thumbnail

UK Ad Campaign Seeks to Deter Cybercrime

Krebs on Security

The United Kingdom’s anti-cybercrime agency is running online ads aimed at young people who search the Web for services that enable computer crimes, specifically trojan horse programs and DDoS-for-hire services. The ad campaign follows a similar initiative launched in late 2017 that academics say measurably dampened demand for such services by explaining that their use to harm others is illegal and can land potential customers in jail.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Gangs' Ruthlessness Leads to Bigger Profits

Data Breach Today

Both the Volume of Successful Attacks and Victims' Payoffs Have Been Rising Ransomware-wielding criminals are growing increasingly ruthless, based on the size of their extortion demands, their increasing propensity to leak data in an attempt to force victims to pay and their greater focus on taking down big targets. These tactics, unfortunately, appear to be working.

article thumbnail

Why Workplace Automation is for Everyone

AIIM

Workplace automation is starting to become the norm for modern corporations. With automation enabling massive improvements in talent acquisition, employee recruitment, and customer service, it's no surprise that more and more enterprises are jumping on the automation bandwagon. Let's take a deeper look into how workplace automation leads to increased efficiency and profitability.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How Smaller Companies Can Set Cybersecurity Priorities

Data Breach Today

Consultant Nic Miller Highlights Critical Factors to Consider Small and midsize companies don't need to spend money on expensive security products, says cybersecurity consultant Nic Miller, but they must consider several critical factors as they devise their strategies.

More Trending

article thumbnail

LiveJournal Blog Platform Credential Leak: What Happened?

Data Breach Today

Millions of Older Credentials Apparently Used in Credential-Stuffing Attacks The Russian blogging platform LiveJournal confirmed this week that it suffered several brute-force attacks in 2011 and 2012. But it insists that the 26 million usernames and passwords that are now available for sale on darknet forums came from other sources.

Sales 191
article thumbnail

The pros and cons of vulnerability scanning

IT Governance

Scanning your networks and software for security vulnerabilities is essential for keeping your organisation secure, but it’s not a perfect solution. It will help you identify weaknesses in your system – with new ones being discovered all the time or introduced as a result of system changes – but it only works when combined with other practices and when you have a solid understanding of the information security landscape.

Insurance 114
article thumbnail

Safeguarding COVID-19 Research, Other Intellectual Property

Data Breach Today

As cyberthreats to medical research on COVID-19 - and other intellectual property - grow, organzations must take critical steps to prevent the theft of their "innovation capital," says Russell Koste, chief security officer of Alexion Pharmaceuticals.

article thumbnail

EDPB Signals Efforts on International Data Transfers as CJEU Review of Current Tools Draws Near

HL Chronicle of Data Protection

The European Court of Justice (CJEU) recently published plans to issue its much awaited decision in CJEU case C-311/18 (also referred to as “Schrems II”) on July 16. The ruling will impact how organizations lawfully transfer personal data from the EEA to jurisdictions not providing an “adequate” level of data protection in accordance with the GDPR.

GDPR 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bipartisan Bill Would Boost Cybersecurity Research

Data Breach Today

Proposal Would Also Increase Research Investments for AI, Quantum Computing A bipartisan group of lawmakers has introduced a bill that calls for investing $100 billion in research on science and emerging technologies, including cybersecurity, quantum computing and artificial intelligence.

article thumbnail

NSA warns Russia-linked APT group is exploiting Exim flaw since 2019

Security Affairs

The U.S. NSA warns that Russia-linked APT group known as Sandworm Team have been exploiting a critical flaw in the Exim mail transfer agent (MTA). The U.S. National Security Agency (NSA) is warning that Russia-linked APT group tracked Sandworm Team has been exploiting a critical vulnerability (CVE-2019-10149) in the Exim mail transfer agent (MTA) software since at least August 2019.

article thumbnail

Researcher Contends Trend Micro's RootkitBuster Busted

Data Breach Today

Trend Micro Says It's Working With Microsoft to Revamp Driver Last week, security researcher Bill Demirkapi said that Trend Micro used a trick to get one of its drivers to pass Microsoft's approval process. Trend Micro has withdrawn the driver and says it's working with Microsoft on incompatibility issues that are unrelated to the researcher's findings.

Security 165
article thumbnail

Hackers Compromise Cisco Servers Via SaltStack Flaws

Threatpost

Attackers compromised six Cisco VIRL-PE servers that are affected by critical SaltStack vulnerabilities.

116
116
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Thermal Imaging as Security Theater

Schneier on Security

Seems like thermal imaging is the security theater technology of today. These features are so tempting that thermal cameras are being installed at an increasing pace. They're used in airports and other public transportation centers to screen travelers, increasingly used by companies to screen employees and by businesses to screen customers, and even used in health care facilities to screen patients.

Security 112
article thumbnail

What happened to Netezza?

IBM Big Data Hub

There are some people, like me, who like to know how the story ends and thus may occasionally read the last chapter before going back and reading the rest of the book. So, I guess this is a spoiler alert. The answer to the question is, “Netezza is still alive, well and evolving and IBM has now come out with the next generation of Netezza as part of Cloud Pak for Data System.

Cloud 79
article thumbnail

Valak a sophisticated malware that completely changed in 6 months

Security Affairs

Valak malware has rapidly changed over the past six months, it was initially designed as a loader, but now it implemented infostealer capabilities. The Valak malware completely changed over the past six months, it was first developed to act as a loader, but now it implements also infostealer capabilities. . The malicious code fist appeared in the threat landscape in late 2019, over the past six months experts observed more than 20 versions that finally changing the malware from a loader to an in

article thumbnail

A Rogues' Gallery of MacOS Malware

Dark Reading

MacOS isn't immune from malware. Being prepared means understanding the nature of the worst threats a security team is likely to see attacking Macs in the enterprise.

Security 108
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Location Tracking Lambasted in Arizona Lawsuit

Threatpost

The lawsuit, filed against Google by Arizona's Attorney General, alleges that the tech giant uses “deceptive and unfair conduct” to obtain users’ location data.

article thumbnail

Security breach impacted Cisco VIRL-PE infrastructure

Security Affairs

Cisco discloses security breach that impacted VIRL-PE infrastructure, threat actors exploited SaltStack vulnerabilities to hack six company servers. Cisco has disclosed a security incident that impacted part of its VIRL-PE infrastructure, threat actors exploited vulnerabilities in the SaltStack software package to breach six company servers. These issues affect the following Cisco products running a vulnerable software release: Cisco Modeling Labs Corporate Edition (CML) Cisco Virtual Internet R

article thumbnail

How Elite Protectors Operationalize Security Protection

Dark Reading

There is no silver bullet for cybersecurity. It takes the right people, with the right mindset, applying the right elements of good security from the data center to the SOC.

article thumbnail

Ke3chang hacking group adds new Ketrum malware to its arsenal

Security Affairs

The Ke3chang hacking group added a new malware dubbed Ketrum to its arsenal, it borrows portions of code and features from older backdoors. The Ke3chang hacking group ( aka APT15 , Vixen Panda , Playful Dragon , and Royal APT ) has developed new malware dubbed Ketrum by borrowing parts of the source code and features from their older Ketrican and Okrum backdoors. “In mid May, we identified three recently uploaded samples from VirusTotal that share code with older APT15 implants.

IT 65
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Vulnerability Disclosures Drop in Q1 for First Time in a Decade

Dark Reading

Even with more security issues published on Patch Tuesdays, the total number of software flaws dropped for the first three months of 2020, according to one tally.

article thumbnail

What’s new in OpenText TeamSite Cloud Edition (CE) 20.2

OpenText Information Management

Providing relevant, optimized experiences to all customers at each interaction with your brand is a must in 2020. Fortunately, with the latest release of OpenText™ TeamSite™, users can make customized pages that perform easier than ever with enhanced testing and targeting tools. Along with new personalization capabilities, improved usability for all users is key to … The post What’s new in OpenText TeamSite Cloud Edition (CE) 20.2 appeared first on OpenText Blogs.

Cloud 63
article thumbnail

Data Loss Spikes Under COVID-19 Lockdowns

Dark Reading

Two new reports suggest a massive gap between how organizations have prepared their cybersecurity defenses and the reality of their efficacy.

article thumbnail

Inside the Hoaxcalls Botnet: Both Success and Failure

Threatpost

The DDoS group sets itself apart by using exploits -- but it doesn't always pan out.

IT 93
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Valak Malware Retasked to Steal Data from US, German Firms

Dark Reading

Once considered a loader for other malware, Valak regularly conducts reconnaissance and steals information and credentials, new analysis shows.

74
article thumbnail

PonyFinal Ransomware Targets Enterprise Servers Then Bides Its Time

Threatpost

Microsoft has warned on a new breed of patient ransomware attacks that lurk in networks for weeks before striking.

article thumbnail

GitHub Supply Chain Attack Uses Octopus Scanner Malware

Dark Reading

Octopus Scanner is a new malware used to compromise 26 open source projects in a massive GitHub supply chain attack.

82
article thumbnail

Israel ’s national cyber chief warns of rising of cyber-warfare

Security Affairs

Israel ’s national cyber chief acknowledged the country had thwarted a major cyber attack in April against its water systems. Israel’s national cyber chief Yigal Unna officially confirmed that the country in April had thwarted a major cyber attack against its water systems. The media, citing officials that spoke under condition of anonymity, attributed the “synchronized and organized attack” to the Government of Teheran.