Thu.Feb 25, 2021

article thumbnail

Lazarus Hits Defense Firms with ThreatNeedle Malware

Data Breach Today

Kaspersky Ties Latest Hacking Campaign and Backdoor to Lazarus Group Lazarus, the North Korean-backed advanced persistent threat group, has been conducting a campaign striking defense industry targets in more than a dozen countries using a backdoor called ThreatNeedle that moves laterally through networks and can overcome network segmentation, according to researchers at Kaspersky.

341
341
article thumbnail

What Does a Modern Information Infrastructure Look Like?

AIIM

Information has transformed in a big way over the past few decades, with some of the most significant changes coming in just the last five years. Year over year, information has seen a dramatic increase in both value and volume. The advancement of new technology has transitioned much of this from paper to digital – which presents its own set of new challenges regarding compliance, access, and protection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers Show How Digitally Signed PDFs Can Be Manipulated

Data Breach Today

Attackers Could Use Tactic to Insert Malicious Content Hackers could manipulate certain digitally signed PDF documents to add malicious content, according to a study by researchers at Germany's Ruhr University of Bochum.

269
269
article thumbnail

Google discloses technical details of Windows CVE-2021-24093 RCE flaw

Security Affairs

Google Project Zero team disclosed the details of a recently patched remote code execution vulnerability (CVE-2021-24093) in Windows Operating system. White hat hacker at Google Project Zero disclosed the details of a recently patched Windows vulnerability, tracked as CVE-2021-24093 , that can be exploited for remote code execution in the context of the DirectWrite client.

Security 120
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Not 'Above the Law' - Feds Target ICO Cryptocurrency Scams

Data Breach Today

$70 Million Allegedly Lost to Schemes Such as Bitcoiin2gen, Touted by Steven Seagal Authorities have accused Serbia-based scammers of capitalizing on the "initial coin offering" bubble that began in 2017 to their advantage, bilking global cryptocurrency investors out of $70 million via Bitcoiin2gen and other supposed coins, and hiring the likes of actor Steven Seagal to endorse them.

295
295

More Trending

article thumbnail

6,000 VMware vCenter Devices Vulnerable to Remote Attacks

Data Breach Today

Flaw Allows Unauthorized Users to Send Specially Crafted Requests Security firm Positive Technologies says more than 6,000 VMware vCenter devices worldwide that are accessible via the internet contain a critical remote code execution vulnerability. VMware has issued recommendations for patching the flaw.

Access 200
article thumbnail

On Chinese-Owned Technology Platforms

Schneier on Security

I am a co-author on a report published by the Hoover Institution: “ Chinese Technology Platforms Operating in the United States.” From a blog post : The report suggests a comprehensive framework for understanding and assessing the risks posed by Chinese technology platforms in the United States and developing tailored responses. It starts from the common view of the signatories — one reflected in numerous publicly available threat assessments — that China’s power is

Paper 115
article thumbnail

Executive Order Focuses on Supply Chain Risk Management

Data Breach Today

Biden Administration Effort Comes During Shortage of Semiconductors In light of the global shortage of semiconductors, President Joe Biden signed an executive order Wednesday requiring a federal review of supply chain risks for these chips. Also to be reviewed: supply chain risks for information and communications technology and the pharmaceutical industry.

Risk 210
article thumbnail

Regulatory Sandboxes are Gaining Traction with European Data Protection Authorities

Hunton Privacy

The concept of regulatory sandboxes has gained traction in the data protection community. Since the UK Information Commissioner’s Office (the “ICO”) completed its pilot program of regulatory sandboxes in September 2020, two European Data Protection Authorities (“DPAs”) have created their own sandbox initiatives following the ICO’s framework. The Datatilsynet Sandbox Initiative for Responsible Artificial Intelligence.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cisco Warns of Critical Auth-Bypass Security Flaw

Threatpost

Cisco also stomped out a critical security flaw affecting its Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches.

Security 134
article thumbnail

Optimizing Performance for Your EIM Platform

OpenText Information Management

Slow and inconsistent performance can be a barrier to user adoption and achieving the desired outcomes for a solution. Even small inefficiencies can add up, leading to reduced productivity across the user base. To get the most out of your enterprise information management (EIM) deployment, you’ll want to ensure that performance is optimal.

100
100
article thumbnail

Health Website Leaks 8 Million COVID-19 Test Results

Threatpost

A teenaged ethical hacker discovered a flawed endpoint associated with a health-department website in the state of Bengal, which exposed personally identifiable information related to test results.

Security 105
article thumbnail

After SolarWinds, worldwide governments can trust no one

OpenText Information Management

The effects of the SolarWinds attack will be felt for a long time, and will ripple far beyond the government alone. Even though investigations and analysis of the discovered hack remain ongoing, it has become clear that the scope is extensive, and the full impacts will likely prove to be devastating. To recap, at the … The post After SolarWinds, worldwide governments can trust no one appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

North Korea-linked Lazarus APT targets defense industry with ThreatNeedle backdoor

Security Affairs

North Korea-linked Lazarus APT group has targeted the defense industry with the custom-backdoor dubbed ThreatNeedle since 2020. North Korea-linked Lazarus APT group has targeted the defense industry with the backdoor dubbed ThreatNeedle since early 2020. The state-sponsored hackers targeted organizations from more than a dozen countries. The experts discovered the custom backdoor while investigating an incident, it was used by attackers for lateral movements and data exfiltration.

article thumbnail

Malicious Mozilla Firefox Extension Allows Gmail Takeover

Threatpost

The malicious extension, FriarFox, snoops in on both Firefox and Gmail-related data.

Security 124
article thumbnail

Ransomware, Phishing Will Remain Primary Risks in 2021

Dark Reading

Attackers have doubled down on ransomware and phishing -- with some tweaks -- while deepfakes and disinformation will become more major threats in the future, according to a trio of threat reports.

Phishing 117
article thumbnail

UK FCA Consults on Changes to Strong Consumer Authentication, Dedicated Interfaces, and Guidance on Payment Services

Data Matters

On January 28, 2021, the UK Financial Conduct Authority (FCA) published Consultation Paper CP21/3 , “Changes to the SCA-RTS and to the guidance in ‘Payment Services and Electronic Money – Our Approach’ and the Perimeter Guidance Manual” (Consultation Paper). This follows the FCA’s announcement in its 2020-21 business plan that payment services were one of its main supervisory priorities 1 and its temporary guidance of July 9, 2020, on prudential risk management and safeguarding in light of the

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microsoft Releases Free Tool for Hunting SolarWinds Malware

Dark Reading

Meanwhile, researchers at SecurityScorecard say the "fileless" malware loader in the attack - Teardrop - actually dates back to 2017.

99
article thumbnail

China-linked TA413 group target Tibetan organizations

Security Affairs

The Chinese hacking group, tracked as TA413, used a malicious Firefox add-on in a cyberespionage campaign aimed at Tibetans. China-linked cyberespionage group TA413 targeted Tibetan organizations across the world using a malicious Firefox add-on, dubbed FriarFox, that allowed them to steal Gmail and Firefox browser data and deliver malware on infected systems. “We attribute this activity to TA413, who in addition to the FriarFox browser extension, was also observed delivering both Scanbox

Access 69
article thumbnail

How to Avoid Falling Victim to a SolarWinds-Style Attack

Dark Reading

A multilayered, zero-trust security posture provides a better chance of fending off sophisticated supply chain attackers before it's too late.

Security 105
article thumbnail

New York Regulators Call on Insurers to Strengthen the Cyber Underwriting Process

Hunton Privacy

As reported on the Hunton Insurance Recovery blog , on February 4, 2021, the New York Department of Financial Services (“NYDFS”), which regulates the business of insurance in New York, has issued guidelines, in the Insurance Circular Letter No. 2 (2021) regarding “Cyber Insurance Risk Framework” (the “Guidelines”), calling on insurers to take more stringent measures in underwriting cyber risks.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cyberattacks Launch Against Vietnamese Human-Rights Activists

Threatpost

Vietnam joins the ranks of governments using spyware to crack down on human-rights defenders.

article thumbnail

Cisco fixes three critical bugs in ACI Multi-Site Orchestrator, Application Services Engine, and NX-OS

Security Affairs

Cisco addressed over a dozen vulnerabilities in its products, including three critical bugs in ACI Multi-Site Orchestrator, Application Services Engine, and NX-OS software. Cisco released security updates to address over a dozen vulnerabilities affecting multiple products, including three critical flaws impacting its ACI Multi-Site Orchestrator, Application Services Engine, and NX-OS software.

article thumbnail

North Korea's Lazarus Group Expands to Stealing Defense Secrets

Dark Reading

Several gigabytes of sensitive data stolen from one restricted network, with organizations in more than 12 countries impacted, Kaspersky says.

69
article thumbnail

An Update on Hanzo’s Innovate UK Grant: Identifying HR Risks and Patterns of Inappropriate Behaviour on Slack

Hanzo Learning Center

I wrote a blog post last fall about the grant that Hanzo received from Innovate UK’s Sustainable Innovation Fund and how we were planning to use the funds. These grants seek to support and rebuild businesses in the UK that have been affected by the COVID-19 pandemic. For our part, we’re looking for ways that we can extend Hanzo Hold, our purpose-built Slack ediscovery tool, to address the new workplace risks that accompany the abrupt transition to remote work.

Risk 52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Thousands of VMware Servers Exposed to Critical RCE Bug

Dark Reading

Security experts report scanning activity targeting vulnerable vCenter servers after a researcher published proof-of-concept code.

article thumbnail

Public Libraries as part of the HM Government ?roadmap? for COVID-19 Recovery

CILIP

Public Libraries as part of the HM Government ?roadmap? for COVID-19 Recovery. CILIP welcomes the recognition of libraries as essential services and library staff as ?key workers? in the Government?s pandemic response, demonstrating the vital role public libraries have to play in our national recovery. Although many library services have been ?open?

article thumbnail

5 Key Steps Schools Can Take to Defend Against Cyber Threats

Dark Reading

Educational institutions have become prime targets, but there are things they can do to stay safer.