Thu.Jun 17, 2021

article thumbnail

Biden Promises Retaliation Unless Putin Stops Cyberattacks

Data Breach Today

16 Critical Infrastructure Sectors Especially Off Limits - Or Else, President Warns U.S. President Joe Biden issued a clear warning to Russian President Vladimir Putin at their Geneva summit this week, saying that should Russia continue to launch cyberattacks against U.S. critical infrastructure sectors, or hack software supply chains, then Moscow should expect to see retaliation.

321
321
article thumbnail

[Podcast] The Future of AI is Today

AIIM

The notion of Artificial Intelligence has pervaded both the business world and popular culture. And, while Hollywood often portrays AI in a future world of smart robots with super-human characteristics, the truth is that AI technologies are already at work fueling important changes in the way business is conducted every day. Artificial Intelligence provides the potential to reengineer and improve core business processes that drive the success of any enterprise organization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyberium Domain Targets Tenda Routers in Botnet Campaign

Data Breach Today

AT&T Alien Labs: Hackers Used Mirai Variant MooBot Malware hosting domain Cyberium has spread multiple Mirai variants, including one that targeted vulnerable Tenda routers as part of a botnet campaign, AT&T Alien Labs reports.

303
303
article thumbnail

Intentional Flaw in GPRS Encryption Algorithm GEA-1

Schneier on Security

General Packet Radio Service (GPRS) is a mobile data standard that was widely used in the early 2000s. The first encryption algorithm for that standard was GEA-1, a stream cipher built on three linear-feedback shift registers and a non-linear combining function. Although the algorithm has a 64-bit key, the effective key length is only 40 bits, due to “an exceptional interaction of the deployed LFSRs and the key initialization, which is highly unlikely to occur by chance.” GEA-1 was d

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Over a billion records belonging to CVS Health exposed online

Security Affairs

Researchers discovered an unprotected database belonging to CVS Health that was exposed online containing over a billion records. This week WebsitePlanet along with the researcher Jeremiah Fowler discovered an unsecured database, belonging to the US healthcare and pharmaceutical giant CVS Health, that was exposed online. The database was accessible to everyone without any type of authentication. “On March 21st, 2021 the WebsitePlanet research team in cooperation with Security Researcher

More Trending

article thumbnail

Ferocious Kitten APT targets Telegram and Psiphon VPN users in Iran

Security Affairs

Iran-linked Ferocious Kitten APT group used instant messaging apps and VPN software like Telegram and Psiphon to deliver Windows RAT and spy on targets’ devices. Researchers from Kaspersky reported that Iran-linked threat actors, tracked as Ferocious Kitten, used instant messaging apps and VPN software like Telegram and Psiphon to deliver Windows RAT and spy on targets.

article thumbnail

EU: Second wave of noyb complaints targets cookie banners

DLA Piper Privacy Matters

Authors: Heidi Waem and Simon Verschaeve. Recently, the European Center for Digital Rights (better known as noyb), founded by privacy activist Max Schrems, announced a new initiative that focuses on compliance of cookie banners in Europe. Alongside the launch of the campaign, noyb reported that it issued more than 500 draft complaints to the owners of websites that use – according to noyb – “unlawful” cookie banners.

GDPR 93
article thumbnail

UNC2465 cybercrime group launched a supply chain attack on CCTV vendor

Security Affairs

UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV camera vendor. An affiliate of the Darkside ransomware gang , tracked as UNC2465, has conducted a supply chain attack against a CCTV vendor, Mandiant researchers discovered. UNC2465 is considered one of the main affiliated of the DARKSIDE group, along with other affiliates gangs tracked by FireEye/Mandiant as UNC2628 and UNC2659.

article thumbnail

Geek Squad Vishing Attack Bypasses Email Security to Hit 25K Mailboxes

Threatpost

An email campaign asking victims to call a bogus number to suspend supposedly fraudulent subscriptions got right past Microsoft's native email controls.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cosmolog Kozmetik Data Breach: Hundreds of Thousands of Customers impacted

Security Affairs

The securWizCase experts found a major breach that affected the popular online retailer Cosmolog Kozmetik. WizCase’s security team, led by Ata Hakç?l, has found a major breach in popular online retailer Cosmolog Kozmetik’s database. This breach exposed users’ names, email addresses, physical addresses, phone numbers, order details, and more. Hundreds of thousands of users were compromised in the breach.

article thumbnail

CVS Health Records for 1.1 Billion Customers Exposed

Threatpost

A vendor exposed the records, which were accessible with no password or other authentication, likely because of a cloud-storage misconfiguration.

article thumbnail

Oleg Koshkin was convicted for operating a crypting service also used by Kelihos botnet

Security Affairs

Russian national Oleg Koshkin was convicted for operating a “crypting” service used to obfuscate the Kelihos bot from antivirus software. Russian national Oleg Koshkin was convicted for charges related to the operation of a malware crypting service used by the Kelihos botnet to obfuscate malware and evade detection. “According to court documents and evidence introduced at trial, Oleg Koshkin, 41, formerly of Estonia, operated the websites “Crypt4U.com,” “fud.bz” and others.” reads th

article thumbnail

Threat Actors Use Google Docs to Host Phishing Attacks

Threatpost

Exploit in the widely used document service leveraged to send malicious links that appear legitimate but actually steal victims credentials.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

We’ve moved to the cloud. Now, where on earth did I put those keys?

Thales Cloud Protection & Licensing

We’ve moved to the cloud. Now, where on earth did I put those keys? madhav. Thu, 06/17/2021 - 12:51. Real-life scenario: Me: I can’t find my keys. Everyone: Where did you last have them? Key management in a cloud scenario: Me: I’m not sure where my keys are actually…. Nobody: I’m sure they’re just fine where they are…. The move to the cloud or the transition to multiple clouds is likely the case for the vast majority of enterprise IT infrastructures.

Cloud 71
article thumbnail

Data Breaches Surge in Food & Beverage, Other Industries

Dark Reading

Six previously "under-attacked" vertical industries saw a surge in data breaches last year due to COVID-19 related disruptions and other factors, new data shows.

article thumbnail

Hiccup in Akamai’s DDoS Mitigation Service Triggers Massive String of Outages

Threatpost

An hour-long outage hit airlines, banks and the Hong Kong Stock exchange. It's thought to have been caused by a DDoS mitigation service.

IT 87
article thumbnail

Paul van Oorschot’s Computer Security and the Internet

Schneier on Security

Paul van Oorschot’s webpage contains a complete copy of his book: Computer Security and the Internet: Tools and Jewels. It’s worth reading.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Cl0p Bust Shows Exactly Why Ransomware Isn’t Going Away

WIRED Threat Level

Ukrainian authorities managed to make some high-profile arrests. But nothing’s going to change until Russia does the same.

article thumbnail

Cyberattacks Are Tailored to Employees. Why Isn't Security Training?

Dark Reading

Consider four factors and behaviors that impact a particular employee's risk, and how security training should take them into account.

article thumbnail

Cisco Smart Switches Riddled with Severe Security Holes

Threatpost

The intro-level networking gear for SMBs could allow remote attacks designed to steal information, drop malware and disrupt operations.

article thumbnail

NARA calls in DoD to help resolve its backlog of veteran records requests

IG Guru

Check out the article here. The post NARA calls in DoD to help resolve its backlog of veteran records requests appeared first on IG GURU.

IT 70
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ICYMI: Day 2 of Data Citizens recap

Collibra

Today was all about the power of data. We kicked off with a keynote from Jim Cushman, our Chief Product Officer, on his product vision at Collibra. He discussed how the Collibra Data Intelligence Cloud can unlock the power of data and help organizations uplevel their impact. But Jim’s keynote was only the tip of the iceberg. Here are some of my favorite sessions from day 2 of Data Citizens ‘21: Collibra product showcases: We dove deeper into our product with four product showcases hosted by our

article thumbnail

Burdine of ADAPTURE Recognized as CRN’s 2021 Women of the Channel

Adapture

ATLANTA, June 17, 2021 – ADAPTURE is please to announce that CRN, a brand of The Channel Company, has named Laura Burdine, Sales Operations Manager, to its renowned 2021 Women of the Channel list. CRN Honors these women for their channel knowledge. CRN has recognized over 1,000 women for being champions of the channel. These women are employees at vendors, distributors, solution providers, and other organizations, who all provide an intracule part in the channel.

Sales 52
article thumbnail

What Pride Means To Me

Hanzo Learning Center

It’s been a little over a half of a century since The Stonewall Riots—a series of demonstrations by members of the gay community in response to a police raid that began on June 28, 1969—at the Stonewall Inn in New York City. The Stonewall Riots became a symbol of resistance to the social and political discrimination of the time and it inspired solidarity among homosexual groups.

IT 52
article thumbnail

Top Five Things To Know From Cisco’s Future of Secure Remote Work Report

Adapture

COVID-19 completely turned the world upside down. Organizations around the world had to rapidly adapt to stay-at-home orders and equip employees with the ability to work remotely and securely. This sudden switch to remote work is going to affect all aspects of how an organization is run for decades to come. Cisco recently surveyed more than 3,000 IT decision makers across the globe to better understand remote work in the post-COVID-19 world.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

One in Five Manufacturing Firms Targeted by Cyberattacks

Dark Reading

Information-stealing malware makes up about a third of attacks, a study finds, but companies worry most about ransomware shutting down production.

article thumbnail

Clop Raid: A Big Win in the War on Ransomware?

Threatpost

Cops arrest six, seize cars and cash in splashy raid, and experts are applauding.

article thumbnail

Mission Critical: What Really Matters in a Cybersecurity Incident

Dark Reading

The things you do before and during a cybersecurity incident can make or break the success of your response.