Thu.Apr 16, 2020

article thumbnail

Stolen Zoom Credentials: Hackers Sell Cheap Access

Data Breach Today

Meanwhile, Zoom Continues Security Overhaul With Bug-Bounty Reboot, Geo-Fencing One measure of the popularity of the Zoom teleconferencing software: Cybercrime forums are listing an increasing number of stolen accounts for sale, which attackers could use to "Zoom bomb" calls and push malicious files to meeting participants. Security experts describe essential defenses.

Access 322
article thumbnail

Work from Home: 7 Best Security Practices for Remote Teams

AIIM

Thanks to the internet and the connected world we live in, working remotely is increasing in popularity for a good reason ! The benefits of working from home have been good for both organization and their employees. On the one hand, organizations can hire talent despite the geographical issue and provide a flexible work schedule, minimized exposure to germs, and so on!

Security 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Offers $5 Million Reward for N. Korea Hacker Information

Data Breach Today

Government-Sponsored Groups Have Attempted to Steal Nearly $2 Billion, US Officials Say The State Department is offering a $5 million reward for information about North Korean-sponsored hacking campaigns, according to an advisory released this week by several U.S. agencies about the ongoing threat these campaigns pose to financial institutions and others.

article thumbnail

Welcoming the Icelandic Government to Have I Been Pwned

Troy Hunt

Hot on the heels of onboarding the USA government to Have I Been Pwned last month , I'm very happy to welcome another national government - Iceland! As of today, Iceland's National Computer Security Incident Response Team ( CERT-IS ), now has access to the full gamut of their gov domains for both on-demand querying and ongoing monitoring. As with the USA and Iceland, I expect to continue onboarding additional governments over the course of 2020 and expanding their access to meaningful data about

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Third-Party Risk Considerations During COVID-19 Crisis

Data Breach Today

As healthcare organizations navigate the COVID-19 crisis, they should take critical steps to improve their security posture and third-party security risk governance, says consultant Brenda Ferraro, the former CISO at Meritain Health, an Aetna subsidiary.

Risk 219

More Trending

article thumbnail

Australia's Contact Tracing App May Be a Hard Sell

Data Breach Today

Australia Doesn't Have a Great Record Running Big Technology Projects Can you "big tech" a way out of a pandemic? Many governments around the world are trying, and Australia is joining the herd with a contact tracing app. But Australia has a splotchy record of large government tech projects, including in health, that may result in low voluntary adoption of an app.

article thumbnail

Linksys force password reset to prevent Router hijacking

Security Affairs

Linksys has reset passwords for all its customers’ after learning on ongoing DNS hijacking attacks aimed at delivering malware. Crooks continue to launch Coronavirus-themed attacks , in the last weeks, experts observed hackers hijacking D-Link and Linksys routers to redirect users to COVID19-themed sites spreading malware. Hackers compromise D-Link and Linksys routers and change DNS settings to redirect users to bogus sites proposing a fake COVID-19 information app from the World Health O

Passwords 113
article thumbnail

How to Set Up a SpiderFoot Server for OSINT Research

Lenny Zeltser

SpiderFoot is a tool for gathering Open Source Intelligence (OSINT) and threat intelligence about IPs, domains, e-mail addresses, and other research targets from many data sources, including services such as Shodan and Have I Been Pwned. Steve Micallef, the tool’s author, offers a free, open source version of SpiderFoot. His team also provides an affordable commercial SaaS version, SpiderFoot HX , which you don’t need to host and which offers additional functionality.

Cloud 112
article thumbnail

U.S. offers up to $5 Million rewards for info on North Korea-linked operations

Security Affairs

The United States agencies released a joint advisory warning of ‘significant cyber threat’ posed by North Korea-linked hackers to the global financial sector. The U.S. Departments of State, the Treasury, and Homeland Security, and the Federal Bureau of Investigation released a joint advisory that is warning organizations worldwide about the ‘significant cyber threat’ posed by the North Korean nation-state actors to the global banking and financial institutions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

‘Double Extortion’ Ransomware Attacks Spike

Threatpost

More ransomware operators are setting up pages where they threaten to publish compromised data from victims - an added pressure for victims to pay the ransom.

article thumbnail

Shipping giant MSC discloses a malware-based attack

Security Affairs

The shipping giant Mediterranean Shipping Company (MSC) was victim of a malware-based attack that caused an outage recently. The shipping giant Mediterranean Shipping Company (MSC) discloses a malware-based attack that took place on April 10. The incident affected the company’s data center and took down its website, msc.com , and its myMSC customer and vendor portal. “ The incident was confined to MSC’s headquarters in Geneva only and affected the availability of some of MSC’s digit

article thumbnail

Cisco IP Phone Harbors Critical RCE Flaw

Threatpost

Cisco stomped out a critical vulnerability in its IP Phone web server that could enable remote code execution by an unauthenticated attacker.

IT 107
article thumbnail

Planning with agility in today’s volatile market while simultaneously saving cost

IBM Big Data Hub

In these uncertain times, organizations need the ability to adjust their plans and forecasts in real time to address changing demands and maintain business continuity. Lengthy, labor-intensive, siloed planning processes, often the result of using spreadsheets or sub-par planning software, are too costly for today’s businesses. As the situation becomes more complex, organizations need to adopt solutions that create more intelligent workflows (increasing efficiencies and accuracy) and produce reli

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Endless Learning Possibilities Inside and Outside the Modern Digital Classroom

Jamf

We show how Jamf School can assist in providing the best learning experience for all students using Apple technology in the classroom or remote.

102
102
article thumbnail

Irish data protection authority launches new cookie guidance and indicates cookie investigations are on the horizon

Data Protection Report

Last week, the Irish Data Protection Commission (“ DPC ”) published its much anticipated guidance note on cookies and similar tracking technologies (the “ Guidance ”). It also published a report following a “cookie sweep” that took place between August 2019 and December 2019 of 38 data controllers (the “ Report ”). The cookie sweep requested information from the data controllers and examined the deployment of cookies on their websites to understand how and whether they were complying with the

article thumbnail

Navigating the New Normal: Data Security is Squarely in the Hands of the C-Suite

Thales Cloud Protection & Licensing

The drastic changes we’re experiencing in our personal and professional lives would have been impossible to imagine just a year ago when we shared this blog about CEOs becoming more actively involved in data security conversations in the boardroom. Now, our new reality demands these questions are asked and answered by C-suite executives who must be certain about data security in uncertain times.

article thumbnail

Hackers Made the Snoo Smart Bassinet Shake and Play Loud Sounds

WIRED Threat Level

The now-patched flaws found in the popular internet-connected baby bed underscore the importance of getting security right.

Security 101
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Critical insights at your fingertips: how self-service analytics can help keep your business on track

IBM Big Data Hub

The current environment provides an unprecedented challenge for businesses across the globe. More than ever, there is a need to quickly analyze insights and make fast decisions as the market changes. As demands for real-time data increase, businesses with strapped resources need to make advanced analytics capabilities more available and accessible to anyone.

article thumbnail

Alleged Zoom Zero-Days for Windows, MacOS for Sale, Report

Threatpost

Alleged Windows flaw allows for remote code execution and is being flogged for $500,000.

Sales 115
article thumbnail

5 Things Ransomware Taught Me About Responding in a Crisis

Dark Reading

What happened in Atlanta is worth studying because it was one of the earliest cases of a major city ransomware attacks and because it came out the other side stronger and more resilient.

article thumbnail

Poorly Secured Docker Image Comes Under Rapid Attack

Threatpost

A honeypot experiment shows just how quickly cybercriminals will move to compromise vulnerable cloud infrastructure.

Honeypots 102
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Weekly Update 187

Troy Hunt

Spiders! Ok, not your normal start to a weekly update but yeah, we had a bit of an infestation this week which did take the mind of other current events for a while. Much of what's happened beyond that this week has resulted in various tweet storms; the Zoom credential stuffing situation, the Coronavirus tracking app (holy cow that has some "robust" debate around it) and the (seemingly endless) thread of progress as I build up my Ubiquiti network.

article thumbnail

California Needlessly Reduces Privacy During COVID-19 Pandemic

Schneier on Security

This one isn't even related to contact tracing: On March 17, 2020, the federal government relaxed a number of telehealth-related regulatory requirements due to COVID-19. On April 3, 2020, California Governor Gavin Newsom issued Executive Order N-43-20 (the Order), which relaxes various telehealth reporting requirements, penalties, and enforcements otherwise imposed under state laws, including those associated with unauthorized access and disclosure of personal information through telehealth medi

Privacy 107
article thumbnail

4 Cybersecurity Lessons from the Pandemic

Dark Reading

An epidemiologist-turned-CTO describes the parallels between the spread of a computer virus and the real-world coronavirus.

article thumbnail

A Responsive Data Strategy is Critical Now More Than Ever

Reltio

A Responsive Data Strategy is Critical Now More Than Ever. As the market conditions evolve, Global 2000 companies need to pivot quickly to respond to changing business needs. Political, Environmental, Social, and Technological (PEST) trends frequently put companies in situations where they have to evolve their business models to address customer, competitive, or regulatory requirements.

Sales 75
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

5 Global Systems Integrator partnering trends for 2020 that will benefit enterprise customers

DXC Technology

Businesses have been doing some form of partnering for decades, but as companies seek to modernize and turn their organizations into digital enterprises, partnering has become more important than ever. With all the different technologies and systems that have to integrate, digital transformation can’t happen unless all parties are in sync and cooperating with one […].

article thumbnail

Brazil to Postpone National Data Protection Law Amid COVID-19

Hunton Privacy

On April 3, 2020, the Brazilian Senate approved Bill of Law (“PL 1179/2020”), which includes a number of emergency measures intended to address the COVID-19 pandemic. Importantly, one provision delays the effective date of the Brazilian Data Protection Law ( Lei Geral de Proteção de Dados Pessoais , “LGPD”) until January 2021. Fines and sanctions for companies that fail to comply with the LGPD are now scheduled to become effective August 2021.

article thumbnail

New PoetRAT Hits Energy Sector With Data-Stealing Tools

Threatpost

A never-before-seen RAT is targeting Azerbaijan energy companies with various tools aimed at stealing credentials and exfiltrating valuable data.

Access 80