Wed.Apr 20, 2022

article thumbnail

The Top 5 Security Orchestration Myths

Data Breach Today

Claudio Benavente Discusses the Misconceptions Around SOAR Security orchestration, or SOAR - Security Orchestration, Automation and Response, as it is known to some - is still an area in development, so there are misconceptions about its scope of use and effectiveness for a SOC team. Claudio Benavente discusses the top five security orchestration myths.

Security 245
article thumbnail

Clever Cryptocurrency Theft

Schneier on Security

Beanstalk Farms is a decentralized finance project that has a majority stake governance system: basically people have proportiona votes based on the amount of currency they own. A clever hacker used a “flash loan” feature of another decentralized finance project to borrow enough of the currency to give himself a controlling stake, and then approved a $182 million transfer to his own wallet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AWS Log4Shell Patch Has 'Severe Security Issues:' Unit 42

Data Breach Today

Containers Could Exploit the AWS Hot Patch to Take Over Its Underlying Host AWS has fixed "severe security issues" in hot patches it released in December to address the Log4Shell vulnerability in Java applications and containers. Palo Alto Networks' Unit 42 researchers said containers in server or cluster environments can exploit the patch to take over its underlying host.

Security 328
article thumbnail

Anonymous hacked other Russian organizations, some of the breaches could be severe

Security Affairs

The Anonymous collective and affiliate groups intensify their attacks and claimed to have breached multiple organizations. Anonymous and groups linked to the famous collective continues to target Russian organizations, the hacktivist are breaching their systems and leak stolen data online. Below the organizations breached in the last three days, since my previous update: Tendertech is a firm specializing in processing financial and banking documents on behalf of businesses and entrepreneurs.

Archiving 123
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Pair of 2021 Health Data Hacks Affect 670,000 Individuals

Data Breach Today

Software and Billing Firm, Urgent Care Provider Report Incidents More than 670,000 individuals have been affected by two 2021 hacking incidents that were only recently reported to federal regulators. The breaches involve healthcare software and billing services firm Adaptive Health Integrations and urgent care provider Urgent Team Holdings.

245
245

More Trending

article thumbnail

Lenovo Fixes 3 Bugs That Target Employees Working From Home

Data Breach Today

Vulnerabilities May Allow Attackers to Gain Admin Privileges Researchers at security firm ESET have found three vulnerabilities affecting Lenovo laptops worldwide and targeting users who work from home. Two of the flaws affect UEFI firmware drivers meant for use only during the manufacturing process of Lenovo notebooks, and one is a memory corruption bug.

article thumbnail

Most Email Security Approaches Fail to Block Common Threats

Threatpost

A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs.

Security 117
article thumbnail

Modern Bank Heists 5.0: 'The Escalation'

Data Breach Today

VMware's Tom Kellermann on Ransomware and Other Destructive Attacks Targeting Banks VMware's Tom Kellermann is out with Modern Bank Heists 5.0, his latest look at the attackers and attacks targeting financial services. Subtitled "The Escalation," this report looks at the increase in destructive attacks, ransomware and hits on cryptocurrency exchanges.

article thumbnail

Russian Gamaredon APT continues to target Ukraine

Security Affairs

Russia-linked threat actor Gamaredon targets Ukraine with new variants of the custom Pterodo backdoor. Russia-linked Gamaredon APT group (a.k.a. Armageddon , Primitive Bear, and ACTINIUM) continues to target Ukraine and it is using new variants of the custom Pterodo backdoor (aka Pteranodon ). The cyberespionage group is behind a recent series of spear-phishing attacks targeting Ukrainian entities and organizations related to Ukrainian affairs, since October 2021, Microsoft said.

Archiving 103
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Crypto Firm Currency.com Mitigates DDoS Attack

Data Breach Today

Exchange Says It Was Attacked Hours After Announcing Its Exit From Russia Hours after global cryptocurrency exchange Currency.com announced it was halting operations in Russia, it faced - and thwarted - a distributed denial-of-service attack. The company's founder, Viktor Prokopenya, says the firm's "servers, systems and client data remained intact and uncompromised.

IT 236
article thumbnail

Chambers 2022 Global Practice Guides for Data Protection & Privacy and Cybersecurity Available

Data Matters

The updated 2022 Chambers Global Practice Guides for Data Protection & Privacy and Cybersecurity, edited by Alan Charles Raul , are available now, covering important developments across the globe and offering insightful legal commentary for businesses. . Read the introduction to each Guide here and here. The post Chambers 2022 Global Practice Guides for Data Protection & Privacy and Cybersecurity Available appeared first on Data Matters Privacy Blog.

Privacy 88
article thumbnail

TraderTraitor: When States do Social Engineering

KnowBe4

North Korea’s Lazarus Group is using social engineering attacks to target users of cryptocurrency, according to a joint advisory from the US FBI, the Cybersecurity and Infrastructure Security Agency (CISA) , and the US Treasury Department.

article thumbnail

FDA Issues Draft Cybersecurity Guidance for Medical Devices

Hunton Privacy

On April 8, 2022, the Food and Drug Administration (“FDA”) issued Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions , a draft guidance document for industry and FDA staff. Industry stakeholders will have until July 7, 2022 to comment on the proposed guidance. The FDA developed the draft guidance in response to increasing cybersecurity threats to the healthcare sector and growing use of wireless, Internet- and network-connected medical devices.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

MDM for schools: Questions and answers

Jamf

Different stakeholders in education tend to ask different questions about implementing an MDM solution. Here are some questions we've heard from IT admins, parents and teachers, along with answers about how Jamf School and our related products can help.

MDM 98
article thumbnail

CISA, Australia, Canada, New Zealand, & UK Issue Joint Advisory on Russian Cyber Threats

Dark Reading

The Russian government is ratcheting up malicious cyberattacks against critical infrastructure in countries supporting Ukraine.

article thumbnail

Another fine for over-retention of data via DataProtectionReport.com

IG Guru

Check out the post here. The post Another fine for over-retention of data via DataProtectionReport.com appeared first on IG GURU.

article thumbnail

Denonia Malware Shows Evolving Cloud Threats

Dark Reading

Cloud security is constantly evolving and consistently different than defending on-premises assets. Denonia, a recently discovered serverless cryptominer drives home the point.

Cloud 89
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CISA adds Windows Print Spooler to its Known Exploited Vulnerabilities Catalog

Security Affairs

US Critical Infrastructure Security Agency (CISA) adds a Windows Print Spooler vulnerability to its Known Exploited Vulnerabilities Catalog. The Cybersecurity and Infrastructure Security Agency (CISA) added the Windows Print Spooler, tracked as CVE-2022-22718 , to its Known Exploited Vulnerabilities Catalog. According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities , FCEB agencies have to address the identified vulnerabilities by th

IT 86
article thumbnail

6 Malware Tools Designed to Disrupt Industrial Control Systems (ICS)

Dark Reading

Stuxnet was the first known malware built to attack operational technology environment. Since then, there have been several others.

100
100
article thumbnail

Netflix Can Cut Off Moochers Without a Password-Sharing Crackdown

WIRED Threat Level

There's a simple way to limit Netflix freeloaders—give users the ability to easily boot unknown devices linked to their accounts.

article thumbnail

How to Master Customer Retention and Achieve Sustainable Growth

Thales Cloud Protection & Licensing

How to Master Customer Retention and Achieve Sustainable Growth. divya. Wed, 04/20/2022 - 07:01. Sustain long term growth by thinking beyond customer acquisition. Start by mastering retention and turning average customers into great customers. When considering revenue growth, most people think about customer acquisition. But a powerful key to sustained growth lies with the customer you already have.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Modern Software Supply Chain: How It's Evolved and What to Prepare For

Dark Reading

Supply chain security attacks have been becoming increasingly common and more sophisticated. Find out how to remain secure throughout the software supply chain.

IT 78
article thumbnail

Rethinking content is key to operational excellence

OpenText Information Management

The traditional benefits of content management are well known – from managing content sprawl to minimizing risk through better information governance. But how many organizations actually have a handle on how content touches their operational processes? At this year’s AIIM conference, I’ll be outlining a new approach to content services that will help drive operational … The post Rethinking content is key to operational excellence appeared first on OpenText Blogs.

article thumbnail

Anti-Fraud Partnership Brings Confidential Computing to Financial Services

Dark Reading

Intel, FiVerity, and Fortanix team up to launch an AI-driven fraud detection platform into a confidential computing environment.

article thumbnail

April 2022: E-Invoicing & VAT compliance updates

OpenText Information Management

Introduction Welcome to our regular e-Invoicing newsletter. Please refer to our “Hot topics” section for items which may require imminent consideration on your behalf, this month just a confirmation of Poland’s authorization to proceed with their e-Invoicing mandate. For more general information see the “Compliance news and updates” section which includes the merger of the … The post April 2022: E-Invoicing & VAT compliance updates appeared first on OpenText Blogs.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Okta Wraps Up Lapsus$ Investigation, Pledges More Third-Party Controls

Dark Reading

Companies must enforce more security on their own third-party providers and retain the ability to conduct independent investigations, experts say.

article thumbnail

It Was a Good Month for Fighting Cybercrime—Don't Get Comfortable

WIRED Threat Level

Even as police and tech companies get better at shutting down illegal operations, cybercrime is worse than ever.

IT 77
article thumbnail

Google: 2021 was a Banner Year for Exploited 0-Day Bugs

Threatpost

Last year, Google Project Zero tracked a record 58 exploited-in-the-wild zero-day security holes.