Tue.Feb 09, 2021

article thumbnail

5 Critical Questions Raised by Water Treatment Facility Hack

Data Breach Today

Incident Highlights the Need to Enhance OT Security As the investigation into the hacking of a water treatment facility in Florida continues, cybersecurity experts say the incident points to the urgent need to enhance operational technology security. Here are five key questions the incident raises.

article thumbnail

Microsoft Patch Tuesday, February 2021 Edition

Krebs on Security

Microsoft today rolled out updates to plug at least 56 security holes in its Windows operating systems and other software. One of the bugs is already being actively exploited, and six of them were publicized prior to today, potentially giving attackers a head start in figuring out how to exploit the flaws. Nine of the 56 vulnerabilities earned Microsoft’s most urgent “critical” rating, meaning malware or miscreants could use them to seize remote control over unpatched systems w

Access 288
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NHS Reports COVID-19 App Success, Backed by Strong Privacy

Data Breach Today

Researchers: 'App is Having a Positive Effect on Reducing the Impact of the Virus' Good news in the fight to contain new COVID-19 infections: Researchers report that a digital contact-tracing app rolled out in England and Wales, and designed to keep users' data private and secure, is helping to blunt the spread of the pandemic. They urge continuing uptake of such apps globally.

Privacy 307
article thumbnail

Change Management - Still the Top Problem Facing End Users in 2021?

AIIM

The new year always brings with it a handful of important questions around the AIIM Community. What are the key trends in information management? What are the top challenges to overcome? More importantly, what are the best practices and strategies to overcome them? Each year, AIIM conducts extensive user-research throughout the community to address these questions and more.

Education 133
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Case Studies: CISOs Take on the 'Zero Trust' Challenge

Data Breach Today

Three Examples of How to Overcome Hurdles Three CISOs offer real-world insights on addressing the challenges involved in implementing a "zero trust" framework to enhance security in an era when so many remote employees are accessing applications and data in the cloud as well as within internal networks.

Cloud 261

More Trending

article thumbnail

Data Exfiltration Enabled by Google Chrome Sync Extension

Data Breach Today

Fake Forcepoint Extension Exfiltrated Data Using Legitimate Tools Hackers used a fake Forcepoint extension, leveraging the Google Chrome Sync feature, to exfiltrate data and send commands to infected browsers, according to a report by a Croation security researcher writing for the SANS Institute.

Security 251
article thumbnail

Web Credit Card Skimmer Steals Data from Another Credit Card Skimmer

Schneier on Security

MalwareBytes is reporting a weird software credit card skimmer. It harvests credit card data stolen by another, different skimmer: Even though spotting multiple card skimmer scripts on the same online shop is not unheard of, this one stood out due to its highly specialized nature. “The threat actors devised a version of their script that is aware of sites already injected with a Magento 1 skimmer,” Malwarebytes’ Head of Threat Intelligence Jérôme Segura explains in a report sha

IT 142
article thumbnail

After SolarWinds Attack, Courts Revert to Paper for Secrets

Data Breach Today

Big Step Back: Move Carries Steep Bureaucratic and Usability Costs After being hit by SolarWinds hackers, the Administrative Office of the U.S. Courts instructed the nation's district courts to restrict the filing of sensitive information to hard copy or "secure electronic devices." But will this defense create an even bigger bureaucratic fallout than the attack itself?

Paper 196
article thumbnail

A guide to cyber security for marketing agencies

IT Governance

If your marketing agency is under the impression that cyber security is strictly an IT issue, you should think again. Effective security is a company-wide commitment, and marketers play one of the most crucial roles. Consider how much personal data you collect; if that information is lost or stolen, it will severely damage your customer relationships.

Marketing 123
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hacker Tries to Poison Water Supply of Florida Town

Threatpost

A threat actor remotely accessed the IT system of the water treatment facility of Oldsmar and raised the levels of sodium hydroxide in the water, an action that was quickly noticed and remediated.

Access 119
article thumbnail

Critical flaws in NextGen Gallery WordPress plugin still impact over 500K installs

Security Affairs

The development team behind the NextGen Gallery plugin has addressed two severe CSRF vulnerabilities that could have allowed site takeover. The developers behind the NextGen Gallery plugin have fixed two critical Cross-site request forgery (CSRF) vulnerabilities, their exploitation could lead to a site takeover, malicious redirects, spam injection, phishing, and other malicious activities.

Phishing 116
article thumbnail

Actively Exploited Windows Kernel EoP Bug Allows Takeover

Threatpost

Microsoft addressed 56 security vulnerabilities for February Patch Tuesday -- including 11 critical and six publicly known. And, it continued to address the Zerologon bug.

Security 120
article thumbnail

Microsoft February 2021 Patch Tuesday fixes 56 bugs, including an actively exploited Windows zero-day

Security Affairs

Microsoft February 2021 Patch Tuesday addresses 56 vulnerabilities, including a flaw that is known to be actively exploited in the wild. Microsoft February 2021 Patch Tuesday security updates address 56 CVEs in multiple products, including Windows components,NET Framework, Azure IoT, Azure Kubernetes Service, Microsoft Edge for Android, Exchange Server, Office and Office Services and Web Apps, Skype for Business and Lync, and Windows Defender.

IoT 99
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cyberpunk 2077 Publisher Hit with Hack, Threats and Ransomware

Threatpost

CD Projekt Red was hit with a cyberattack (possibly the work of the "Hello Kitty" gang), and the attackers are threatening to release source code for Witcher 3, corporate documents and more.

article thumbnail

Don't Forget About Physical Records Management

Gimmal

The Myth Behind Physical Records. Many believe that with the ongoing efforts to modernize how businesses operate and a continued push for digitization, eventually physical records and the need to manage these records will become extinct. However, this is not the case. In an AIIM survey, 66% of people reported that paper use in their organization wasn't declining - in fact, 42% said that paper use was increasing.

article thumbnail

Android Devices Hunted by LodaRAT Windows Malware

Threatpost

The LodaRAT - known for targeting Windows devices - has been discovered also targeting Android devices in a new espionage campaign.

119
119
article thumbnail

Ukraine’s police arrested the author of the U-Admin phishing kit

Security Affairs

An international operation conducted by Ukraine’s police, along with the US and Australia peers, shut down the world’s largest phishing Service U-Admin. Last week, an international operation conducted by Ukraine’s police, along with the US and Australian authorities, lead to the shut down of the world’s phishing framework U-Admin.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Webinar: Change Management for Information Governance on February 18, 2021 at 2:30 pm Eastern via ARMA Greater Columbus

IG Guru

ARMA Greater Columbus has gone virtual!Due to the pandemic, and the various guidelines surrounding it and the restrictions in travel, ARMA Greater Columbus has gone virtual! We will return to in person meetings when circumstances permit, and we will keep you informed. We will hold the Thursday, February 18, 2021, meeting from 2:30 PM – 3:30 […].

article thumbnail

Microsoft Fixes Windows Zero-Day in Patch Tuesday Rollout

Dark Reading

Microsoft's monthly security fixes addressed a Win32k zero-day, six publicly known flaws, and three bugs in the Windows TCP/IP stack.

Security 110
article thumbnail

FINRA Issues 2021 Report on its Examination and Risk Monitoring Program

Data Matters

Released on February 1, the Financial Industry Regulatory Authority (FINRA) 2021 Report on its Examination and Risk Monitoring Program (Report) provides a roadmap for member firms to use to prepare for examinations and to review and assess compliance and supervisory procedures related to business practices, compliance, and operations. The Report replaces two of FINRA’s prior annual publications: (1) the Report on Examination Findings and Observations, which provided an analysis of prior examinat

Risk 84
article thumbnail

Attackers Exploit Critical Adobe Flaw to Target Windows Users

Threatpost

A critical vulnerability in Adobe Reader has been exploited in "limited attacks.".

Security 122
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cyberpunk 2077 Maker Was Hit With Ransomware—and Won't Pay Up

WIRED Threat Level

CD Projekt Red's list of woes gets longer, as hackers claim to have stolen the source code for their most popular games.

article thumbnail

Iranian Cyber Groups Spying on Dissidents & Others of Interest to Government

Dark Reading

A new investigation of two known threat groups show cyber actors are spying on mobile devices and PCs belonging to targeted users around the world.

article thumbnail

Celebrating Safer Internet Day: Surviving Lockdowns Edition

Thales Cloud Protection & Licensing

Celebrating Safer Internet Day: Surviving Lockdowns Edition. madhav. Tue, 02/09/2021 - 10:06. This year’s celebration of the Safer Internet Day comes at a time when people are exercizing social distancing measures to help contain the pandemic. At the same time, families were obliged to change their daily routines – fathers and mothers switched to remote working schemes, while their offspring participate to online classrooms.

Risk 71
article thumbnail

Fears over DNA privacy as 23andMe goes public in deal with Richard Branson

The Guardian Data Protection

Genetic testing company with 10 million customers’ data has ‘huge cybersecurity implications’ The genetic testing company 23andMe will go public through a partnership with a firm backed by the billionaire Richard Branson, in a deal that has raised fresh privacy questions about the information of millions of customers. Launched in 2006, 23andMe sells tests to determine consumers’ genetic ancestry and risk of developing certain illnesses, using saliva samples sent in by mail.

Privacy 80
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft & Facebook Were Phishers' Favorite Brands in 2020

Dark Reading

Cloud services was the most impersonated industry, followed by financial services, e-commerce, and social media, researchers report.

article thumbnail

2034, Part III: One Left to Tell the Tale

WIRED Threat Level

“When the planes didn't attack, a silence fell over the crew. Why didn't they finish the job?”.

article thumbnail

How Neurodiversity Can Strengthen Cybersecurity Defense

Dark Reading

Team members from different backgrounds, genders, ethnicities, and neurological abilities are best equipped to tackle today's security challenges.