Wed.Mar 18, 2020

article thumbnail

9 Cybersecurity Takeaways as COVID-19 Outbreak Grows

Data Breach Today

Attackers Already Targeting Remote Workers With Phishing Campaigns As a result of the COVID-19 outbreak, cybercriminals increasingly are targeting organizations that now have more remote workers and fewer IT and security staff at the ready to mitigate hacker attacks and intrusions, security experts say.

article thumbnail

SHARED INTEL: FireMon survey shows security lags behind fast pace of hybrid cloud deployments

The Last Watchdog

Corporate America’s love affair with cloud computing has hit a feverish pitch. Yet ignorance persists when it comes to a momentous challenge at hand: how to go about tapping the benefits of digital transformation while also keeping cyber exposures to a minimum level. Related: Why some CEOs have quit tweeting That’s the upshot of FireMon’s second annual State of Hybrid Cloud Security Report of 522 IT and security professionals, some 14 percent of whom occupy C-suite positions.

Cloud 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unsecured Database Exposes Financial Records: Report

Data Breach Today

Researcher Says S3 Bucket Linked to Advantage Capital Funding, Argus Capital Funding An unsecured Amazon Web Services S3 bucket left 425 GB of financial data, including credit reports, bank statements and more, exposed to the internet, according to a VPN Mentor researcher.

306
306
article thumbnail

Thousands of Coronavirus-related malicious domains are being created every day

Security Affairs

The Coronavirus-themed attacks continue to increase, experts warn of thousands of COVID-19 scam and malware sites are being created every day. Crooks and nation-state actors continue to exploit the interest of potential victims in the Coronavirus outbreak. In recent weeks, we observed that threat actors are creating thousands of coronavirus-themed websites on a daily basis.

Phishing 124
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Fighting Coronavirus-Themed Ransomware and Malware

Data Breach Today

Cybercriminals and Nation-States Aim to Subvert Systems and Devices Attackers are continuing to use concerns over COVID-19 to distribute ransomware and malware, including for smartphones. The healthcare sector is perhaps at the greatest risk from these attacks because it's serving as the front-line defense against the disease.

More Trending

article thumbnail

Data Governance: How to Tackle Three Key Issues

Data Breach Today

The Importance of Accountability, Data Inventory and Automation As organizations plot their 2020 cybersecurity strategies, especially in light of privacy regulations, key data governance challenges are emerging. What are the critical issues, and how are they being addressed?

article thumbnail

Trend Micro addresses two issues exploited by hackers in the wild

Security Affairs

Trend Micro has addressed several serious vulnerabilities in its products, including two flaws that have been exploited in the wild. Trend Micro has released security updates to address several serious flaws in its Worry-Free Business Security, Apex One and OfficeScan products, including a couple of vulnerabilities that have been exploited by threat actors in the wild.

article thumbnail

Protecting Election Integrity One Email at a Time

Data Breach Today

Armen Najarian of Agari on Phishing Attack Scenarios for the 2020 Elections Because election manipulation is a serious concern in 2020, Armen Najarian of Agari describes steps to prevent election fraud via email.

Phishing 241
article thumbnail

TrueFire Guitar tutoring website was hacked, financial data might have been exposed

Security Affairs

The online guitar tutoring website TrueFire was compromised by hackers in a classic Magecart style attack that exposed customers’ payment card data. The popular online guitar tutoring website TrueFire has suffered a ‘ Magecart ‘ style security breach that might have exposed customers’ personal information and payment card data.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Evolution of a Nigerian Scammer

Data Breach Today

Report Illustrates Increasingly Sophisticated Tactics A research study by security firm Check Point illustrates how Nigerian scammers are becoming far more sophisticated, thanks, in large part, to cybercrime-as-a-service offerings.

Security 229
article thumbnail

Telehealth Hazard? HHS Loosens HIPAA Standards for Telemedicine

Adam Levin

The worldwide Covid-19 pandemic has created a massive strain on hospitals and medical facilities. In response to this, many medical professionals are taking elective and non-life-threatening appointments online. “We’re really ramping up telehealth, especially for elderly patients to limit their exposure, while still taking care of their medical needs,” says Dr.

article thumbnail

Finding Ways to Entertain and Educate Your Kids

PerezBox

If you’re like me, you have kids that have been sent home and you are now charged with ensuring they get educated. You are also, probably, petrified at the idea. Read More. The post Finding Ways to Entertain and Educate Your Kids appeared first on PerezBox.

article thumbnail

The Value and Ethics of Using Phone Data to Monitor Covid-19

WIRED Threat Level

Google and Facebook are discussing plans with the White House to share collective data on people's movements during the coronavirus pandemic.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

VMware fixes high severity privilege escalation and DoS in its products

Security Affairs

VMware released security updates to address high severity privilege escalation and DoS in the Workstation, Fusion, VMware Remote Console and Horizon Client. VMware has released security updates to address high severity privilege escalation and denial-of-service ( DoS ) flaws in the Workstation, Fusion, Remote Console and Horizon Client. The two security vulnerabilities have been tracked as CVE-2020-3950 and CVE-2020-3951 respectively.

IT 86
article thumbnail

TSLAC Plan for Services During COVID-19 Health Situation

The Texas Record

The Texas State Library and Archives Commission (TSLAC) is taking several actions to promote public safety, mitigate the spread of the COVID-19 (corona virus), and maintain our high standards for public service. In accordance with the guidance of the Office of the Governor and the Texas Health and Human Services Commission, TSLAC has implemented a combination of social distancing practices along with continuing public service via online and other distributed work models.

article thumbnail

Cisco addresses multiple issues in its SD-WAN product

Security Affairs

Cisco has addressed a total of five vulnerabilities in its SD-WAN solution, including three high severity flaws. Cisco has addressed five vulnerabilities in its SD-WAN solution, including three high severity flaws. The vulnerabilities could be exploited by attackers to make unauthorized changes to the system, inject arbitrary commands that are executed with root permissions, and escalate privileges to root.

IT 86
article thumbnail

The Insecurity of WordPress and Apache Struts

Schneier on Security

Interesting data : A study that analyzed all the vulnerability disclosures between 2010 and 2019 found that around 55% of all the security bugs that have been weaponized and exploited in the wild were for two major application frameworks, namely WordPress and Apache Struts. The Drupal content management system ranked third, followed by Ruby on Rails and Laravel, according to a report published this week by risk analysis firm RiskSense.

Risk 110
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Microsoft Dismantled the Infamous Necurs Botnet

WIRED Threat Level

A years-long investigation and global cooperation disrupted one of the biggest botnets ever.

article thumbnail

What the Battle of Britain Can Teach Us About Cybersecurity's Human Element

Dark Reading

During WWII, the British leveraged both technology and human intelligence to help win the war. Security leaders must learn the lessons of history and consider how the human element can make their machine-based systems more effective.

article thumbnail

WordPress, Apache Struts Attract the Most Bug Exploits

Threatpost

An analysis found these web frameworks to be the most-targeted by cybercriminals in 2019.

article thumbnail

COVID-19 Webinar Invitation — Global Employment & Data Privacy Considerations

HL Chronicle of Data Protection

The safety and security of your workforce is paramount, as is maintaining strong legal and regulatory compliance. During this one-hour webinar , Partners from our Employment and Privacy and Cybersecurity practices will be making some global observations on employment issues our clients are facing and highlighting the specific impact coronavirus is having for employers in Germany, Italy, the United Kingdom, the United States, and the Netherlands.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Adobe releases out-of-band patches for critical issues in Acrobat Reader, Photoshop, Bridge, ColdFusion

Security Affairs

Adobe has released a collection of out-of-band software updates that address a total of 41 vulnerabilities in six of its products. Adobe has released a set of out-of-band software updates that address a total of 41 vulnerabilities in six of its products. “Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS.” reads the advisory published by Adobe. “These updates address critical and important vulnerabilities.

article thumbnail

Process Injection Tops Attacker Techniques for 2019

Dark Reading

Attackers commonly use remote administration and network management tools for lateral movement, a new pool of threat data shows.

74
article thumbnail

Magecart Cyberattack Targets NutriBullet Website

Threatpost

Researchers warn that a Magecart group has set up skimmers on the blender manufacturer's website, in hopes of stealing customer payment-card data.

article thumbnail

University of Oregon to start new Records Management Program

IG Guru

Check out the link below for their blog post as well as link to project website. [link]. The post University of Oregon to start new Records Management Program appeared first on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Azure Red Flag: Microsoft Accidentally Fixes Cloud Config ‘Bug’

Threatpost

Researchers detail a misconfiguration in Microsoft’s Azure cloud platform that could have given hackers carte blanche access to a targeted company's cloud services.

Cloud 57
article thumbnail

Meeting Remotely? 5 Things To Look for In a Videoconferencing App

Adam Levin

With companies telling their employees to stay home to slow the spread of Covid-19, many are holding meetings remotely. Here’s what to look for when choosing a videoconferencing platform: End-to-end encryption: This makes it harder to intercept any potentially sensitive information being discussed. Attendance via PIN: The only attendees allowed into a meeting should be issued a personal identification number that changes each meeting.

article thumbnail

Episode 178: Killing Encryption Softly with the EARN IT Act. Also: SMBs Struggle with Identity

The Security Ledger

In this episode of the Security Ledger Podcast sponsored by LogMeIn and LastPass: the EARN IT Act is slouching its way to passage on Capitol Hill, alarming privacy and civil liberties experts. Andrea Little Limbago of the firm Virtu joins us to talk about why EARN IT is so dangerous. Also: small and medium sized businesses are the majority of. Read the whole entry. » Related Stories Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk Spotlight Podcast: The Demise of the Pa