Wed.Sep 22, 2021

article thumbnail

Zero-Day Vulnerability Found in UK Virgin Media Routers

Data Breach Today

Researchers: Vulnerability Unmasks Users' VPNs; Virgin Media: Risk Is 'Very Low' Researchers have found a zero-day vulnerability in U.K. broadband and cable TV provider Virgin Media’s Super Hub 3 routers that enables an attacker to unmask IP addresses of VPN users. But a Virgin Media spokesperson says the risk of that happening is "very low.

Risk 230
article thumbnail

CVE-2021-40847 flaw in Netgear SOHO routers could allow remote code execution

Security Affairs

CVE-2021-40847 flaw in Netgear SOHO routers could be exploited by a remote attacker to execute arbitrary code as root. Security experts from consulting firm GRIMM have discovered a vulnerability in Small Offices/Home Offices (SOHO) Netgear routers that could be exploited by a remote attacker to execute arbitrary code as root. The flaw, tracked as CVE-2021-40847, resides in the source of a third-party component included in the firmware of many Netgear devices.

Risk 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russian-Linked Group Using Secondary Backdoor Against Targets

Data Breach Today

Cisco Talos: Turla Deploying Malware Against US, German and Afghan Victims A Russian-linked group known as Turla has been deploying a secondary backdoor against numerous targets to maintain persistence within compromised devices even after the primary malware has been discovered and removed, Cisco Talos report. Victims include U.S., German and Afghan organizations.

243
243
article thumbnail

FBI Had the REvil Decryption Key

Schneier on Security

The Washington Post reports that the FBI had a decryption key for the REvil ransomware, but didn’t pass it along to victims because it would have disrupted an ongoing operation. The key was obtained through access to the servers of the Russia-based criminal gang behind the July attack. Deploying it immediately could have helped the victims, including schools and hospitals, avoid what analysts estimate was millions of dollars in recovery costs.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

US DHS, FBI Face Ransomware Questions from Congress

Data Breach Today

DHS' Alejandro Mayorkas, FBI's Christopher Wray Discuss Ransomware Surge U.S. FBI and Department of Homeland Security leaders fielded several cybersecurity questions from House lawmakers Wednesday, particularly around the surge in ransomware attacks, diplomatic efforts to curb ransomware's financial model, and the nation-states that harbor cybercriminals.

More Trending

article thumbnail

US Treasury Blacklists Russia-Based Crypto Exchange

Data Breach Today

'Suex' Accused of Laundering Tens of Millions of Dollars for Cybercriminals The U.S. Department of the Treasury has blacklisted Russia-based cryptocurrency exchange Suex for allegedly laundering tens of millions of dollars for ransomware operators, scammers and darknet markets. It is the first such designation for a virtual currency exchange.

article thumbnail

Hikvision cameras could be remotely hacked due to critical flaw

Security Affairs

A critical issue, tracked as CVE-2021-36260, affects more than 70 Hikvision device models and can allow attackers to take over them. A critical vulnerability, tracked as CVE-2021-36260, affects more than 70 Hikvision camera and NVR models and can allow attackers to take over the devices. The vulnerability is an unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware, it was discovered by a security researcher that goes online with the moniker “Watchful IP.”.

IoT 118
article thumbnail

Microsoft Analyzes Phishing-as-a-Service Operation

Data Breach Today

Researchers Say BulletProofLink Subscription Offers Many Services Microsoft Security on Tuesday issued a detailed report on a massive phishing-as-a-service operation named BulletProofLink that offered as a subscription all the tools needed to conduct a campaign. The gang remains operational.

Phishing 143
article thumbnail

Flaws in Nagios Network Management systems pose risk to companies

Security Affairs

Researchers found multiple flaws in widely used network management products from Nagios that pose serious risk to organizations. Researchers from industrial cybersecurity firm Claroty have discovered eleven vulnerabilities in widely used network management products from Nagios. Nagios XI provides monitoring of all mission-critical infrastructure components including applications, services, operating systems, network protocols, systems metrics, and network infrastructure.

Risk 109
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Russians Prevent M?ris Botnet From Hijacking 45,000 Devices

Data Breach Today

Russia’s Remote Electronic Voting System Fends Off 19 DDoS Attacks Russian cybersecurity firm Rostelecom-Solar reports that it prevented what it believes is the M?ris botnet from an attempted takeover of 45,000 new devices. The company's president says it also stopped 19 distributed denial-of-service attacks targeting Russia’s remote electronic voting system.

article thumbnail

VMware Warns of Ransomware-Friendly Bug in vCenter Server

Threatpost

VMware urged immediate patching of the max-severity, arbitrary file upload flaw in Analytics service, which affects all appliances running default 6.5, 6.7 and 7.0 installs.

Analytics 106
article thumbnail

Facilitating the Secure Exchange of Health Data

Data Breach Today

The acquisition of the SAFE Identity consortium and its trust framework by DirectTrust, best known for creating and maintaining trust frameworks for secure email messaging in healthcare, will help facilitate new secure health information exchange use cases, says DirectTrust CEO Scott Stuewe.

Security 143
article thumbnail

US CISA, FBI, and NSA warn an escalation of Conti ransomware attacks

Security Affairs

CISA, FBI, and the NSA warned today of an escalation of the attacks of the Conti ransomware gang targeting US organizations. CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) are warning of an increased number of Conti ransomware attacks against US organizations. @CISAgov and @FBI observed over 400 ransomware attacks using #Conti to steal sensitive data.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Researcher Finds Exposed Data of 106 Million Thai Visitors

Data Breach Today

Researcher: Decade-Old Exposure Is a Privacy Concern Researcher Bob Diachenko has discovered an unsecured database containing personal information of 106 million foreign nationals who have visited Thailand in the past decade. The 200GB database, which has now been secured, has not been accessed by unauthorized personnel, Thai authorities say.

Privacy 143
article thumbnail

Digital Health in the UK: MHRA Bold New (Regulatory) World?

Data Matters

In his statement to the House of Lords on September 16, Lord Frost announced that “we will use the provisions of the Medicines and Medical Devices Act 2021 to overhaul our clinical trial frameworks, based on outdated EU legislation, giving a major boost to the UK’s world-class R&D sector and getting patients access to new lifesaving medicines more quickly.

article thumbnail

BlackMatter Knocks Marketron Off the Air

Data Breach Today

Ransomware Gang's Second Attack in 3 Days Affects 6,000 Broadcasters Marketron Broadcast Solutions was hit over the weekend by a ransomware attack launched by the BlackMatter gang, and the attack has taken down a number of the marketing firm's products. Marketron is currently in talks with its attacker.

article thumbnail

FTC Authorizes New Compulsory Process Resolutions in Eight Key Enforcement Areas

Hunton Privacy

On September 14, 2021, the Federal Trade Commission authorized new compulsory process resolutions in eight key enforcement areas: (1) Acts or Practices Affecting United States Armed Forces Members and Veterans; (2) Acts or Practices Affecting Children; (3) Bias in Algorithms and Biometrics; (4) Deceptive and Manipulative Conduct on the Internet; (5) Repair Restrictions; (6) Abuse of Intellectual Property; (7) Common Directors and Officers and Common Ownership; and (8) Monopolization Offenses.

Marketing 101
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Build your Microsoft Security career

IT Governance

Microsoft 365 and Azure are used by 258 million people and more than a million companies worldwide. There is a huge demand for qualified admin and cyber security professionals, opportunities for career progression and the possibility of generous salaries. . Indeed, the (ISC) 2 ?Cybersecurity Workforce Study 2020 ?found?that 49% of employers require their?

article thumbnail

OFAC Again Says Beware of Sanctions When Making Ransomware Payments and Designates Virtual Currency Exchange as Malicious Cyber Actor

Hunton Privacy

On September 21, 2021, the U.S. Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) issued an Updated Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments (the “Updated Advisory”) on the sanctions risks associated with facilitating ransomware payments. The Updated Advisory explains that OFAC has designated malicious cyber actors under its cyber-related sanctions programs.

article thumbnail

[Survey] Second Annual Hanzo + ACEDS Collaboration Data Benchmark

Hanzo Learning Center

After over a year and a half of dealing with a global pandemic, remote work is here to stay and so are the collaboration and messaging tools that make remote work actually work. Moreover, collaboration applications are changing the way organizations create, share and retain vital business data; and as a consequence, require those organizations to re-think how they approach compliance and ediscovery response.

article thumbnail

How REvil May Have Ripped Off Its Own Affiliates

Threatpost

A newly discovered backdoor and double chats could have enabled REvil ransomware-as-a-service operators to hijack victim cases and snatch affiliates’ cuts of ransom payments.

IT 91
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Password Reuse Problems Persist Despite Known Risks

Dark Reading

The vast majority of users worry about compromised passwords, but two-thirds continue to use the same password or a variation, a survey finds.

Passwords 129
article thumbnail

Crystal Valley Farm Coop Hit with Ransomware

Threatpost

It's the second agricultural business to be seized this week and portends a bitter harvest with yet another nasty jab at critical infrastructure.

article thumbnail

6 Lessons From Major Data Breaches This Year

Dark Reading

Though many incidents stemmed from familiar security failures, they served up — or resurfaced — some important takeaways.

article thumbnail

TikTok, GitHub, Facebook Join Open-Source Bug Bounty

Threatpost

The initiative, run by HackerOne, aims to uncover dangerous code repository bugs that end up going viral across the application supply-chain.

79
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UK MoD Data Breach Shows Cybersecurity Must Protect Both People and Data

Dark Reading

The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.

article thumbnail

Netgear SOHO Security Bug Allows RCE, Corporate Attacks

Threatpost

The issue lies in a parental-control function that's always enabled by default, even if users don't configure for child security.

article thumbnail

The Crowley Company Adds, Promotes Personnel to Support Growth

IG Guru

Frederick, Md. – Despite the challenges brought about by a worldwide pandemic, The Crowley Company (Crowley), a commercial digitization products and digitization services firm headquartered in Frederick, Maryland, has hired and promoted staff to accommodate growth in all divisions. CORPORATE Wanda Brickey has joined Crowley’s corporate offices in the role of director of administrative services.

65