Wed.Feb 03, 2021

article thumbnail

New DHS Secretary Pledges to Investigate SolarWinds Hack

Data Breach Today

Alejandro Mayorkas: ‘Cybersecurity of Our Nation Will Be One of My Highest Priorities’ Alejandro Mayorkas, the newly confirmed secretary of the Department of Homeland Security, says his initial priorities include reviewing all available intelligence on the SolarWinds supply chain hack and scrutinizing the government's cybersecurity programs.

article thumbnail

ROUNDTABLE: Targeting the supply-chain: SolarWinds, then Mimecast and now UScellular

The Last Watchdog

It’s only February, and 2021 already is rapidly shaping up to be the year of supply-chain hacks. Related: The quickening of cyber warfare. The latest twist: mobile network operator UScellular on Jan. 21 disclosed how cybercriminals broke into its Customer Relationship Management (CRM) platform as a gateway to compromise the cell phones of an undisclosed number of the telecom giant’s customers.

Phishing 239
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NCSC Warns of China’s Efforts to Collect US DNA Data

Data Breach Today

Stolen Data Could Support Surveillance, Extortion Efforts The National Counterintelligence and Security Center is calling attention to China's ongoing efforts to collect DNA data sets and other sensitive health data of Americans through hacking and other methods. It warns the data could be used to support surveillance or extortion efforts.

Security 299
article thumbnail

Foxtons estate agency leaked thousands of customers’ financial records

IT Governance

Foxtons Group is under scrutiny for downplaying the severity of a cyber attack that has compromised the financial details of 16,000 customers. The organisation was hit by malware in October, with criminal hackers forcing its web portal offline. At the time, it reported that the incident affected its mortgage broking business, Alexander Hall, and that no sensitive information had been stolen.

Access 138
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

China Tied to Separate SolarWinds Espionage Campaign

Data Breach Today

US Government Payroll Provider Hit, Apparently by Chinese Hackers, Reuters Reports While many details about the SolarWinds Orion hack and full victim list remain unknown, experts have ascribed the apparent espionage campaign to Russia. Now, however, Reuters reports that a separate group of Chinese hackers was also exploiting SolarWinds vulnerabilities to hack targets.

More Trending

article thumbnail

Hackers Use Android Emulator to Spread Malware

Data Breach Today

Researchers: Supply Chain Attack Active Across Asia A cyberespionage campaign is targeting game developers in Asia using an infected Android emulator app as part of a supply chain attack, a report by security firm ESET finds.

Security 243
article thumbnail

Recently discovered CVE-2021-3156 SUDO bug also affects macOS Big Sur

Security Affairs

Experts warn that the recently discovered heap-based buffer overflow bug in Linux SUDO also impacts the latest version of Apple macOS Big Sur. Recently Qualys researchers found a Sudo vulnerability, tracked as CVE-2021-3156 , that has allowed any local user to gain root privileges on Unix-like operating systems without authentication. Sudo is one of the most important, powerful, and commonly used utilities that comes as a core command pre-installed on macOS and almost every UNIX or Linux-based o

article thumbnail

Wind River Systems Investigating Possible Data Breach

Data Breach Today

Company: Social Security Numbers and Other Data May Have Been Exposed Embedded software vendor Wind River Systems is investigating a security incident within its internal network, according to a notification filed with California authorities. The data that may have been exposed includes Social Security numbers and passport details.

article thumbnail

Spotlight on Black History Month

Micro Focus

At Micro Focus, our theme for Black History Month in 2021 is “Embracing the Past While Building for the Future”. We caught up with Eric Beulah, Global Business Operations Lead for Professional Services, and leader of our enABLE ERG, to learn why ERGs are an important resource and network in Micro Focus, and how we can. View Article.

120
120
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Accellion Mess: What Went Wrong?

Data Breach Today

Company Should Have Retired Legacy File Sharing App Sooner Several data breaches stemming from unpatched vulnerabilities in Accellion's File Transfer Appliance have been revealed. What went wrong? Where does the fault lie? And what can organizations do about it?

article thumbnail

Alleged China-linked hackers used SolarWinds bug to breach National Finance Center

Security Affairs

Alleged China-linked hackers have exploited a flaw in the SolarWinds Orion software to hack systems at the U.S. National Finance Center. FBI investigators discovered that allegedly China-linked hackers have exploited a flaw in the SolarWinds Orion software to break into the systems of the U.S. National Finance Center. The National Finance Center is a federal payroll agency in the U.S.

article thumbnail

Malicious Skimmer Code Piggybacks on Other Hackers' Code

Data Breach Today

Researchers Uncover the Tale of 2 Skimmers Malwarebytes researchers have uncovered unusual payment card skimming code designed to harvest data that is already being stolen by other hackers on a website.

194
194
article thumbnail

Dynamic case management

OpenText Information Management

Case management is not a new practice. Over a century ago, the healthcare industry was the first to adopt case management methodologies. In fact, it was used in the 1918–19 pandemic by US Public Health Services to track Spanish Flu immunization efforts nationwide. More recently, the technique evolved to include a wide variety of sectors: … The post Dynamic case management appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

'Kobalos' Linux Malware Targets Supercomputers Worldwide

Data Breach Today

Report: Malware Steals SSH Credentials From High-Performance Computers A newly identified Linux malware variant dubbed "Kobalos" is targeting high-performance computing clusters and supercomputers running multiple operating systems, a report by security firm ESET finds. The malicious code can also steal SSH credentials.

Security 191
article thumbnail

New Malware Hijacks Kubernetes Clusters to Mine Monero

Threatpost

Researchers warn that the Hildegard malware is part of 'one of the most complicated attacks targeting Kubernetes.'.

Mining 128
article thumbnail

Mastercard Brings Cyber Education to Small Businesses

Data Breach Today

Paul Trueman Shares Details of ‘Trust Center’ Initiative Small businesses have been disproportionately affected by hackers in recent months. To aid in countering the threat, Mastercard has launched a cybersecurity education effort targeting this market segment. Paul Trueman, a senior vice president Mastercard, explains the “Trust Center” initiative.

Education 147
article thumbnail

Singapore: Amendments to the Personal Data Protection Act 2012 (PDPA) now in force

DLA Piper Privacy Matters

The following sections of the Amendment Bill are now in force (as of 1 February 2021): a. Mandatory data breach notification. Organisations must now notify the Personal Data Protection Commission (PDPC) and affected individuals if a data breach results in, or is likely to result in, significant harm to affected individuals, or affects 500 or more individuals. b.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

TIM’s Red Team Research (RTR) discovered 2 new zero-day vulnerabilities in WordPress Plugin Limit Login Attempts Reloaded

Security Affairs

Researchers from TIM’s Red Team Research (RTR) discovered 2 new zero-day vulnerabilities in WordPress Plugin Limit Login Attempts Reloaded. Italy also joins the security bug research, with the Red Team Research laboratory of TIM, an important Italian telecommunications company. Among the team’s objectives is to detect the vulnerabilities that a potential attacker could exploit to carry out cyber-attacks on TIM’s infrastructures and highlight the real impacts detected.

article thumbnail

What I Wish I Knew at the Start of My InfoSec Career

Dark Reading

Security pros identify lessons learned that impact how they view infosec today.

Security 139
article thumbnail

Why Insider Job ‘Zoom Bombs’ Are So Hard to Stop

WIRED Threat Level

Researchers have found that most calls to disrupt videoconferences originate with the participants, especially in high schools and colleges.

Security 106
article thumbnail

Five Critical Android Bugs Patched, Part of Feb. Security Bulletin

Threatpost

February’s security update for the mobile OS includes a Qualcomm flaw rated critical, with a CVSS score of 9.8.

Security 117
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Time for the crystal ball – What to expect in 2021

Thales Cloud Protection & Licensing

Time for the crystal ball – What to expect in 2021. madhav. Wed, 02/03/2021 - 11:56. In the ancient times, it was the Oracle who predicted the future and advised the Greek kings, like Odysseus, on what to do (although sometimes her advice was vague!). I don’t claim to be an Oracle, neither do I have a magical crystal ball to foresee the future, but based on experience and data, businesses can plan ahead.

article thumbnail

SolarWinds Attackers Spent Months in Corporate Email System: Report

Dark Reading

SolarWinds' CEO says evidence indicates attackers lurked in the company's Office 365 email system for months ahead of the attack.

110
110
article thumbnail

Emotet’s Takedown: Have We Seen the Last of the Malware?

Threatpost

A week after law enforcement agencies said they took down Emotet, there has been no sign of the prolific malware.

107
107
article thumbnail

The Chrome Update Is Bad for Advertisers, but Good for Google

WIRED Threat Level

The world’s most popular browser is about to make it a lot harder for advertisers to track your online activity.

IT 100
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Second SolarWinds Attack Group Breaks into USDA Payroll — Report

Threatpost

A second APT, potentially linked to the Chinese government, could be behind the Supernova malware.

article thumbnail

An Observability Pipeline Could Save Your SecOps Team

Dark Reading

Traditional monitoring approaches are proving brittle as security operations teams need better visibility into dynamic environments.

Security 125
article thumbnail

New independent report prepares organizations for implementing digital experience in 2021

OpenText Information Management

What’s been set in motion by the events of 2020 isn’t temporary. Its effects will continue to be felt far into the future. In particular, it’s proven to be an incredibly powerful inciting incident that is driving organizations who had previously put off digital transformation plans. According to Forrester, technological acceleration will be a major … The post New independent report prepares organizations for implementing digital experience in 2021 appeared first on OpenText Blogs.