Thu.Dec 17, 2020

article thumbnail

Microsoft Finds Backdoor, CISA Warns of New Attack Vectors

Data Breach Today

Devastating Scope of Hacking Campaign Expands Microsoft says on Thursday it has removed malware related to an expansive hacking campaign that has ensnared thousands of organizations and U.S. government agencies. Meanwhile, CISA warns the SolarWinds Orion supply chain compromise may not be the only infection vector.

article thumbnail

How to Automate Business Processes On a Budget

AIIM

Why Business Automation Matters. Business process management is an essential part of a growing business. Without it, organizations could face low customer satisfaction, lack of communication, and a higher chance of error. By letting computers take care of menial, repetitive day-to-day tasks, automation can save businesses money and time. Without the human component in handling data, there is a lower chance of error.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Use Mobile Emulators to Steal Millions

Data Breach Today

IBM: Attackers Target Mobile Banking Customers in US, Europe IBM Trusteer reports that a hacking group is using mobile emulators to spoof banking customers' mobile devices and steal millions of dollars from banks in the U.S. and Europe.

312
312
article thumbnail

More on the SolarWinds Breach

Schneier on Security

The New York Times has more details. About 18,000 private and government users downloaded a Russian tainted software update –­ a Trojan horse of sorts ­– that gave its hackers a foothold into victims’ systems, according to SolarWinds, the company whose software was compromised. Among those who use SolarWinds software are the Centers for Disease Control and Prevention, the State Department, the Justice Department, parts of the Pentagon and a number of utility companies.

Passwords 139
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

SolarWinds Supply Chain Hit: Victims Include Cisco, Intel

Data Breach Today

'Kill Switch' Effort Disrupts Some Malware, But Espionage Teams' Access May Persist Intel and Cisco are among the thousands of SolarWinds Orion customers that were running a Trojanized version of the security software. FireEye, together with Microsoft and GoDaddy, have devised a "kill switch" to disrupt attackers' ability to access the malware on at least some infected systems.

Access 312

More Trending

article thumbnail

CISA: SolarWinds Hack Not the Only Attack Vector in Breaches

Data Breach Today

Agency Says Nation-State Hackers Used Other Methods as Well An advanced persistent threat actor used other attack vectors besides the compromised SolarWinds' Orion nework monitoring software to gain a foothold into the networks of government agencies and others, according to a Thursday alert from the U.S. Cybersecurity and Infrastructure Security Agency.

article thumbnail

5 million WordPress sites potentially impacted by a Contact Form 7 flaw

Security Affairs

The development team behind the Contact Form 7 WordPress plugin discloses an unrestricted file upload vulnerability. Jinson Varghese Behanan from Astra Security discovered an unrestricted file upload vulnerability in the popular Contact Form 7 WordPress vulnerability. The WordPress plugin allows users to add multiple contact forms on their site. . “By exploiting this vulnerability, attackers could simply upload files of any type, bypassing all restrictions placed regarding the allowed upl

Security 132
article thumbnail

Implementing 'Zero Trust' in a Hybrid Cloud Environment

Data Breach Today

Gartner's Rajpreet Kaur on Using Multiple Technologies Implementing the "zero trust" model in a hybrid cloud environment presents challenges, says Rajpreet Kaur, senior principal analyst at Gartner, who recommends a phased approach.

Cloud 264
article thumbnail

XDR 101: What's the Big Deal About Extended Detection & Response?

Dark Reading

Extended Detection and Response (XDR) could be the security management technology of your dreams.or not. What makes this technical 'evolution' so interesting to so many companies?

Security 127
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

After Data Leak, FTC Orders Firm to Fix Security

Data Breach Today

Proposed Settlement Spells Out Action Items for Medical Emergency Travel Services Firm Following its exposure of personal information on 130,000 individuals in an unsecured cloud database, SkyMed International, a company that provides medical emergency travel services, must revamp its security practices, according to a proposed Federal Trade Commission settlement.

Security 214
article thumbnail

Mexican Drug Cartels with High-Tech Spyware

Schneier on Security

Sophisticated spyware, sold by surveillance tech companies to Mexican government agencies, are ending up in the hands of drug cartels : As many as 25 private companies — including the Israeli company NSO Group and the Italian firm Hacking Team — have sold surveillance software to Mexican federal and state police forces, but there is little or no regulation of the sector — and no way to control where the spyware ends up, said the officials.

article thumbnail

Cryptomining Worm Now Targets Web Apps, IoT Devices

Data Breach Today

Researchers: Malware Uses New GitHub Repository, Mines for Monero A previously documented cryptomining worm dubbed Gitpaste-12 has returned with a wide-ranging series of attacks targeting web applications and IoT devices that exploit at least 31 vulnerabilities, according to Juniper Threat Labs.

IoT 165
article thumbnail

Nuclear Weapons Agency Hacked in Widening Cyberattack – Report

Threatpost

Sources said the DoE suffered "damage" in the attack, which also likely extends beyond the initially known SolarWinds Orion attack vector.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Experts spotted browser malicious extensions for Instagram, Facebook and others

Security Affairs

Avast researchers reported that three million users installed 28 malicious Chrome or Edge extensions that could perform several malicious operations. Avast Threat Intelligence researchers spotted malicious Chrome and Edge browser extensions that were installed by over 3 million users. The extensions were designed to steal user’s data (i.e. birth dates, email addresses, and active devices) and redirect the victims to ads and phishing sites.

Phishing 116
article thumbnail

Banking must improve digital experiences across the customer journey

OpenText Information Management

COVID-19 accelerated digital transformation across every industry sector. New research shows that digital transformation and providing positive customer experiences are the top two priorities for banking in a pandemic-impacted world. The ‘Banking Transformed’ white paper from Jim Marous and OpenText™ looks at the opportunities and challenges of meeting consumer expectations as most engagement has moved from physical to digital channels.

article thumbnail

XDR 101: What's the Big Deal About Extended Detection & Response?

Dark Reading

Extended Detection and Response (XDR) could be the security management technology of your dreams.or not. What makes this technical 'evolution' so interesting to so many companies?

Security 106
article thumbnail

Empathetic technology and the sustainability revolution

OpenText Information Management

This is a guest blog by Professor Sally Eaves. It was my pleasure to listen to fantastic keynote sessions by leading neurologist and technologist Dr. Poppy Crum, and climate leader and former US Vice President Al Gore at Open Text World 2020. ‘The Great ReThink’ really encapsulates the ethos – both talks were united in … The post Empathetic technology and the sustainability revolution appeared first on OpenText Blogs.

IT 105
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hackney cyber attack causes property buyers’ deals to fall through

IT Governance

You may remember hearing several months ago that the London Borough of Hackney had been targeted by a cyber attack. The council provided few details at the time, but the evidence suggested that it was a ransomware infection. That became even more likely after Hackney Council released a statement explaining myriad issues that it was having as a result of the attack.

Sales 105
article thumbnail

The evolution of law firms during COVID-19

OpenText Information Management

How can law firms navigate the challenges posed by the global pandemic? Legal tech experts Pierre-Antoine Rizk and Madaline Zannes, and OpenText’s Andy Teichholz joined us for a virtual Q&A on the current state of law firms and where the legal industry is headed in a world dealing with COVID-19. Pierre-Antoine is a lawyer, legal … The post The evolution of law firms during COVID-19 appeared first on OpenText Blogs.

105
105
article thumbnail

How to Increase Your Security Posture with Fewer Resources

Threatpost

Plixer's Justin Jett, Compliance & Audit director, discusses how to do more with less when your security resources are thin.

Security 126
article thumbnail

Rising to the Challenge: Perspectives from Security Leaders on 2020 and Beyond

Dark Reading

For those who work in the security industry 2020 has been a particularly challenging year. Chris Price talks to five industry leaders from different perspectives in the sector about how they coped with COVID and asks them to look forward to 2021.

Security 101
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

5M WordPress Sites Running ‘Contact Form 7’ Plugin Open to Attack

Threatpost

A critical unrestricted file upload bug in Contact Form 7 allows an unauthenticated visitor to take over a site running the plugin.

Security 120
article thumbnail

API integration in Financial Services

OpenText Information Management

This blog has been co-authored by Pratik Parikh and Ruchi Bhardwaj, Lead Product Manager at OpenText. Open banking is happening now, and it is quickly becoming the most optimal path to digitization. As customer and partner expectations shift towards seamless digital flows, financial services organizations are stepping up and taking a keen look at the business value that APIs can create for them and their customers.

article thumbnail

2020 VITAL RECORDS CONTROL (VRC) SPONSORSHIP ANNOUNCEMENT via the ARMA International Educational Foundation

IG Guru

Robert McLauchlinDec 10, 2020 Palmyra, NJ (December 10, 2020) – The Foundation (ARMA International Educational Foundation, AIEF) is pleased to announce Vital Records Control’s sponsorship of $3,500. Vital Records Control’s (VRC) support of the Foundation will assist the AIEF in its work as a leading organization that embraces the practical and scholarly knowledge of information […].

article thumbnail

Launched OSSISNa, the Observatory for the Protection of the National Strategic Industrial System

Security Affairs

On 11 th December 2020, the Observatory for the Protection of the National Strategic Industrial System (OSSISNa) was officially announced. On 11 th December 2020, during the international scientific conference on CBRNe events “SICC 2020”, the Observatory for the Protection of the National Strategic Industrial System (OSSISNa) was officially presented.

IT 97
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Malicious Browser Extensions for Social Media Infect Millions of Systems

Dark Reading

At least 28 third-party add-ons for top social media sites, including Facebook and Vimeo, redirect users to phishing sites and steal data.

Phishing 143
article thumbnail

Air-Gap Attack Turns Memory Modules into Wi-Fi Radios

Threatpost

Attack turns SDRAM buses into a Wi-Fi radio to leak data from air-gapped computers.

IoT 129
article thumbnail

Navigating business recovery with AI

OpenText Information Management

With the dramatic changes brought on by COVID-19, businesses are having to adapt to remote working, reduced budgets, and remaining agile as they undertake massive digital transformation. Business resiliency has become the key priority for C-Suite executives as they respond to this new, and still changing, environment. And despite challenging global trading conditions, 55% of organizations still expect to maintain or increase spending on AI technologies.