Wed.Sep 22, 2021

article thumbnail

Zero-Day Vulnerability Found in UK Virgin Media Routers

Data Breach Today

Researchers: Vulnerability Unmasks Users' VPNs; Virgin Media: Risk Is 'Very Low' Researchers have found a zero-day vulnerability in U.K. broadband and cable TV provider Virgin Media’s Super Hub 3 routers that enables an attacker to unmask IP addresses of VPN users. But a Virgin Media spokesperson says the risk of that happening is "very low.

Risk 230
article thumbnail

CVE-2021-40847 flaw in Netgear SOHO routers could allow remote code execution

Security Affairs

CVE-2021-40847 flaw in Netgear SOHO routers could be exploited by a remote attacker to execute arbitrary code as root. Security experts from consulting firm GRIMM have discovered a vulnerability in Small Offices/Home Offices (SOHO) Netgear routers that could be exploited by a remote attacker to execute arbitrary code as root. The flaw, tracked as CVE-2021-40847, resides in the source of a third-party component included in the firmware of many Netgear devices.

Risk 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian-Linked Group Using Secondary Backdoor Against Targets

Data Breach Today

Cisco Talos: Turla Deploying Malware Against US, German and Afghan Victims A Russian-linked group known as Turla has been deploying a secondary backdoor against numerous targets to maintain persistence within compromised devices even after the primary malware has been discovered and removed, Cisco Talos report. Victims include U.S., German and Afghan organizations.

243
243
article thumbnail

FBI Had the REvil Decryption Key

Schneier on Security

The Washington Post reports that the FBI had a decryption key for the REvil ransomware, but didn’t pass it along to victims because it would have disrupted an ongoing operation. The key was obtained through access to the servers of the Russia-based criminal gang behind the July attack. Deploying it immediately could have helped the victims, including schools and hospitals, avoid what analysts estimate was millions of dollars in recovery costs.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US DHS, FBI Face Ransomware Questions from Congress

Data Breach Today

DHS' Alejandro Mayorkas, FBI's Christopher Wray Discuss Ransomware Surge U.S. FBI and Department of Homeland Security leaders fielded several cybersecurity questions from House lawmakers Wednesday, particularly around the surge in ransomware attacks, diplomatic efforts to curb ransomware's financial model, and the nation-states that harbor cybercriminals.

More Trending

article thumbnail

US Treasury Blacklists Russia-Based Crypto Exchange

Data Breach Today

'Suex' Accused of Laundering Tens of Millions of Dollars for Cybercriminals The U.S. Department of the Treasury has blacklisted Russia-based cryptocurrency exchange Suex for allegedly laundering tens of millions of dollars for ransomware operators, scammers and darknet markets. It is the first such designation for a virtual currency exchange.

article thumbnail

Hikvision cameras could be remotely hacked due to critical flaw

Security Affairs

A critical issue, tracked as CVE-2021-36260, affects more than 70 Hikvision device models and can allow attackers to take over them. A critical vulnerability, tracked as CVE-2021-36260, affects more than 70 Hikvision camera and NVR models and can allow attackers to take over the devices. The vulnerability is an unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware, it was discovered by a security researcher that goes online with the moniker “Watchful IP.”.

IoT 112
article thumbnail

Microsoft Analyzes Phishing-as-a-Service Operation

Data Breach Today

Researchers Say BulletProofLink Subscription Offers Many Services Microsoft Security on Tuesday issued a detailed report on a massive phishing-as-a-service operation named BulletProofLink that offered as a subscription all the tools needed to conduct a campaign. The gang remains operational.

Phishing 143
article thumbnail

VMware Warns of Ransomware-Friendly Bug in vCenter Server

Threatpost

VMware urged immediate patching of the max-severity, arbitrary file upload flaw in Analytics service, which affects all appliances running default 6.5, 6.7 and 7.0 installs.

Analytics 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Russians Prevent M?ris Botnet From Hijacking 45,000 Devices

Data Breach Today

Russia’s Remote Electronic Voting System Fends Off 19 DDoS Attacks Russian cybersecurity firm Rostelecom-Solar reports that it prevented what it believes is the M?ris botnet from an attempted takeover of 45,000 new devices. The company's president says it also stopped 19 distributed denial-of-service attacks targeting Russia’s remote electronic voting system.

article thumbnail

Digital Health in the UK: MHRA Bold New (Regulatory) World?

Data Matters

In his statement to the House of Lords on September 16, Lord Frost announced that “we will use the provisions of the Medicines and Medical Devices Act 2021 to overhaul our clinical trial frameworks, based on outdated EU legislation, giving a major boost to the UK’s world-class R&D sector and getting patients access to new lifesaving medicines more quickly.

article thumbnail

Facilitating the Secure Exchange of Health Data

Data Breach Today

The acquisition of the SAFE Identity consortium and its trust framework by DirectTrust, best known for creating and maintaining trust frameworks for secure email messaging in healthcare, will help facilitate new secure health information exchange use cases, says DirectTrust CEO Scott Stuewe.

Security 143
article thumbnail

FTC Authorizes New Compulsory Process Resolutions in Eight Key Enforcement Areas

Hunton Privacy

On September 14, 2021, the Federal Trade Commission authorized new compulsory process resolutions in eight key enforcement areas: (1) Acts or Practices Affecting United States Armed Forces Members and Veterans; (2) Acts or Practices Affecting Children; (3) Bias in Algorithms and Biometrics; (4) Deceptive and Manipulative Conduct on the Internet; (5) Repair Restrictions; (6) Abuse of Intellectual Property; (7) Common Directors and Officers and Common Ownership; and (8) Monopolization Offenses.

Marketing 101
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Researcher Finds Exposed Data of 106 Million Thai Visitors

Data Breach Today

Researcher: Decade-Old Exposure Is a Privacy Concern Researcher Bob Diachenko has discovered an unsecured database containing personal information of 106 million foreign nationals who have visited Thailand in the past decade. The 200GB database, which has now been secured, has not been accessed by unauthorized personnel, Thai authorities say.

Privacy 143
article thumbnail

OFAC Again Says Beware of Sanctions When Making Ransomware Payments and Designates Virtual Currency Exchange as Malicious Cyber Actor

Hunton Privacy

On September 21, 2021, the U.S. Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) issued an Updated Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments (the “Updated Advisory”) on the sanctions risks associated with facilitating ransomware payments. The Updated Advisory explains that OFAC has designated malicious cyber actors under its cyber-related sanctions programs.

article thumbnail

BlackMatter Knocks Marketron Off the Air

Data Breach Today

Ransomware Gang's Second Attack in 3 Days Affects 6,000 Broadcasters Marketron Broadcast Solutions was hit over the weekend by a ransomware attack launched by the BlackMatter gang, and the attack has taken down a number of the marketing firm's products. Marketron is currently in talks with its attacker.

article thumbnail

Flaws in Nagios Network Management systems pose risk to companies

Security Affairs

Researchers found multiple flaws in widely used network management products from Nagios that pose serious risk to organizations. Researchers from industrial cybersecurity firm Claroty have discovered eleven vulnerabilities in widely used network management products from Nagios. Nagios XI provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure.

Risk 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Spotlight: Is There A Cure For InfoSec’s Headcount Headache?

The Security Ledger

In this Spotlight Podcast, Lyndon Brown, the Chief Strategy Officer at Pondurance joins host Paul Roberts to talk about how changes in both the threat landscape and the workplace are driving demand for managed detection and response (MDR) services, in which companies hire outside security talent to help keep sophisticated cyber adversaries at bay. Read the whole entry. » Related Stories Episode 221: Biden Unmasked APT 40.

article thumbnail

Build your Microsoft Security career

IT Governance

Microsoft 365 and Azure are used by 258 million people and more than a million companies worldwide. There is a huge demand for qualified admin and cyber security professionals, opportunities for career progression and the possibility of generous salaries. . Indeed, the (ISC) 2 ?Cybersecurity Workforce Study 2020 ?found?that 49% of employers require their?

article thumbnail

US CISA, FBI, and NSA warn an escalation of Conti ransomware attacks

Security Affairs

CISA, FBI, and the NSA warned today of an escalation of the attacks of the Conti ransomware gang targeting US organizations. CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) are warning of an increased number of Conti ransomware attacks against US organizations. @CISAgov and @FBI observed over 400 ransomware attacks using #Conti to steal sensitive data.

article thumbnail

[Survey] Second Annual Hanzo + ACEDS Collaboration Data Benchmark

Hanzo Learning Center

After over a year and a half of dealing with a global pandemic, remote work is here to stay and so are the collaboration and messaging tools that make remote work actually work. Moreover, collaboration applications are changing the way organizations create, share and retain vital business data; and as a consequence, require those organizations to re-think how they approach compliance and ediscovery response.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How REvil May Have Ripped Off Its Own Affiliates

Threatpost

A newly discovered backdoor and double chats could have enabled REvil ransomware-as-a-service operators to hijack victim cases and snatch affiliates’ cuts of ransom payments.

IT 91
article thumbnail

Password Reuse Problems Persist Despite Known Risks

Dark Reading

The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a variation, a survey finds.

Passwords 129
article thumbnail

Crystal Valley Farm Coop Hit with Ransomware

Threatpost

It's the second agricultural business to be seized this week and portends a bitter harvest with yet another nasty jab at critical infrastructure.

article thumbnail

6 Lessons From Major Data Breaches This Year

Dark Reading

Though many incidents stemmed from familiar security failures, they served up — or resurfaced — some important takeaways.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

TikTok, GitHub, Facebook Join Open-Source Bug Bounty

Threatpost

The initiative, run by HackerOne, aims to uncover dangerous code repository bugs that end up going viral across the application supply-chain.

79
article thumbnail

UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data

Dark Reading

The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.

article thumbnail

Netgear SOHO Security Bug Allows RCE, Corporate Attacks

Threatpost

The issue lies in a parental-control function that's always enabled by default, even if users don't configure for child security.