Fri.Sep 18, 2020

article thumbnail

3 Iranian Hackers Charged With Targeting US Satellite Firms

Data Breach Today

DOJ: Hackers Used Social Engineering Techniques, Spear Phishing Three Iranian hackers have been charged in connection with using social engineering and phishing techniques to steal data and intellectual property from U.S. satellite and aerospace companies, according to the Justice Department. The suspects were allegedly working on behalf of Iran's Islamic Revolutionary Guard Corps.

Phishing 363
article thumbnail

BREAKING: Brazilian Data Protection Law in Effect

Hunton Privacy

On September 18, 2020, as confirmed by Brazilian firm Mattos Filho, Veiga Filho, Marrey Jr. e Quiroga Advogados , Brazil’s President signed a bill from Brazil’s Congress bringing the new Brazilian data protection law ( Lei Geral de Proteção de Dados Pessoais , “LGPD”) into effect with a retroactive applicability date of August 16, 2020. The LGPD’s sanctions provisions will apply beginning August 1, 2021, based on a previous delay passed by Brazil’s legislature.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attacks Using Cerberus Banking Trojan Surge

Data Breach Today

Release of Code on Russian Darknet Forums Leads to Broader Use, Enhancements The posting on Russian underground forums of source code for the Android mobile banking Trojan Cerberus has led to an increase in attacks as well as updates to the malware, the security firm Kaspersky reports.

Security 359
article thumbnail

Chinese hackers stole info from Spanish centers working on Covid19 vaccine

Security Affairs

Chinese hackers have stolen information from Spanish laboratories working on a vaccine for COVID19, El Pais newspaper revealed. The El Pais newspaper reported that Chinese hackers have stolen information from Spanish laboratories working on a vaccine for COVID19. While pharmaceutical companies worldwide are working on the research of a vaccine for the ongoing COVID19 pandemic, threat actors are conducting cyber espionage campaigns in the attempt of stealing information on the work.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

US Banning TikTok, WeChat Downloads

Data Breach Today

Commerce Department Says Social Media Apps Pose National Security Threat The U.S. Commerce Department is banning the downloading and hosting of China-based social media apps TikTok and WeChat effective on Sunday, citing national security concerns. The announcement comes as Oracle continues to negotiate a deal for partnering on TikTok's U.S. operations.

Security 346

More Trending

article thumbnail

A CISO's Tips on Implementing the 'Zero Trust' Model

Data Breach Today

Siva Sivasubramanian of SingTel Optus on Measuring Success An organization has successfully implemented a "zero trust" framework when it can achieve context-aware resolution of a risk, says Dr. Siva Sivasubramanian, CISO of SingTel Optus, an Australian telecommunications firm.

Risk 337
article thumbnail

CISA Named Top-Level Root CVE Numbering Authority (CNA)

Security Affairs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been named a Top-Level Root CVE Numbering Authority (CNA). The US Cybersecurity and Infrastructure Security Agency (CISA) has been named a Top-Level Root CVE Numbering Authority (CNA), it will be overseeing CNAs in assigning CVE identifiers for vulnerabilities in industrial control systems (ICS) and medical devices.

IoT 118
article thumbnail

Researchers Find Mozi Botnet Continues to Grow

Data Breach Today

IBM: P2P Botnet Now Accounts for 90% of IoT Network Traffic Mozi, a relatively new peer-to-peer botnet, is now dominating global IoT network traffic, according to a new report from IBM's X-Force unit. The malware is being used to launch DDoS attacks as well as mine for cryptocurrency.

IoT 322
article thumbnail

Ransomware en masse on the wane: top threats inside web-phishing in H1 2020

Security Affairs

Web-phishing targeting various online services almost doubled during the COVID-19 pandemic , it accounted for 46 percent of the total number of fake web pages. Singapore, 09/18/2020 — Group-IB , a global threat hunting and intelligence company headquartered in Singapore, evidenced the transformation of the threat portfolio over the first half of 2020.

Phishing 107
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why Darknet Markets Persist

Data Breach Today

Ease of Use and Few Alternatives Keep Bringing Users Back Empire is the latest darknet market to "exit scam," meaning administrators ran away with users' cryptocurrency, leaving the market to fail. Given the ongoing risk of exit scams, as well as police often targeting such markets, why do they persist?

Marketing 298
article thumbnail

Rampant Kitten ‘s arsenal includes Android malware that bypasses 2FA

Security Affairs

Security researchers discovered Android malware capable of bypassing 2FA that was developed by an Iran-linked group dubbed Rampant Kitten. Security researchers from Check Point discovered an Android malware, developed by an Iran-linked group dubbed Rampant Kitten, that is able to bypass 2FA. Rampant Kitten has been active at least since 2014 and was involved in ongoing surveillance operations against Iranian minorities, anti-regime organizations, and resistance movements.

Phishing 103
article thumbnail

Analysis: Cyberthreats in the Educational Sector Worldwide

Data Breach Today

Check Point Researchers Identify Increases in DDoS Attacks, Other Threats Check Point Research analysts have observed a significant rise in cyberthreats on the educational sector worldwide since July. DDoS attacks have surged in the U.S., while European institutions have been hit by ransomware.

Education 283
article thumbnail

Weekly Update 209

Troy Hunt

More IoT, more cyber and more Q&A so yeah, business as usual this week. More specifically, a lot of this week's update talks about VPNs and where they still make sense with so much HTTPS all over the place these days. As I say in the vid, blog posts like the VPN one I did this week are often done to help me get my thoughts on a topic straight and a lot of things became a lot clearer for me in doing that.

IoT 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Analysis: Is Chinese Database Exposure a Cause for Concern?

Data Breach Today

The latest edition of the ISMG Security Report analyzes whether a leaked database compiled by a Chinese company should be a cause for serious concern. Also featured are discussions on vulnerability disclosure challenges and risks posed by using social media apps for payments.

Risk 219
article thumbnail

EDPB Publishes Draft Guidelines on the Concepts of Controller and Processor under the GDPR

Data Matters

On 2 September 2020, the European Data Protection Board ( EDPB ) published draft guidelines on the concepts of controller and processor under the GDPR ( Draft Guidelines ). The Draft Guidelines are intended to expand on and ultimately replace the guidance issued by the former Article 29 Working Party in 2010 ( WP29 Guidance ). The Draft Guidelines should be reviewed carefully to assess whether: (i) the understanding of an organisation’s role as a controller, joint controller or processor should

GDPR 97
article thumbnail

New Windows exploit lets you instantly become admin. Have you patched? via ARS Technica

IG Guru

Zerologon lets anyone with a network toehold obtain domain-controller password. The post New Windows exploit lets you instantly become admin. Have you patched? via ARS Technica appeared first on IG GURU.

article thumbnail

Matt Blaze on OTP Radio Stations

Schneier on Security

Matt Blaze discusses an interesting mystery about a Cuban one-time-pad radio station, and a random number generator error that probably helped arrest a pair of Russian spies in the US.

90
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gen Z Has a Plan to Save the Election—Starting With the Polls

WIRED Threat Level

Poll workers, who skew elderly, are in short supply during the pandemic. Meet some of the young people trying to make up the gap.

Security 107
article thumbnail

Security Takeaways from the Great Work-from-Home Experiment

Threatpost

As the pandemic drags on and remote workforces stay remote, zero-trust and other lessons learned should come to the fore.

Security 107
article thumbnail

Nihilistic Password Security Questions

Schneier on Security

Posted three years ago, but definitely appropriate for the times.

Passwords 136
article thumbnail

Stubborn WooCommerce Plugin Bugs Get Third Patch

Threatpost

Users of the Discount Rules for WooCommerce WordPress plugin are urged to apply a third and (hopefully) final patch.

Security 108
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Companies Can Track Your Phone’s Movements to Target Ads

WIRED Threat Level

Brands are seeking new ways to customize messages. A startup that gathers data on when you pick up your phone, or when you go out on a run, can help.

article thumbnail

Tips for your school to successfully upgrade to iPadOS 14 and iOS 14

Jamf

Upgrade season isn't always the most timely for schools, but Jamf is here to help for iOS 14 and iPadOS 14

105
105
article thumbnail

Mitigating Cyber-Risk While We're (Still) Working from Home

Dark Reading

One click is all it takes for confidential information to land in the wrong hands. The good news is that there are plenty of ways to teach preventative cybersecurity to remote workers.

Risk 82
article thumbnail

Maze Ransomware Adopts Ragnar Locker Virtual-Machine Approach

Threatpost

Maze continues to adopt tactics from rival cybercrime gangs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A Hacker's Playlist

Dark Reading

Nine security researchers share their favorite songs and genres.

Security 117
article thumbnail

Simplifying customer outreach leads to big savings

OpenText Information Management

Maintaining open lines of communication with your customers and partners is essential, but with all the different methods in use today, doing so can get complicated fast. Many organizations use four or more vendors – one solution for phone outreach, one for SMS text messages, one for email, and yet another for fax. That’s four … The post Simplifying customer outreach leads to big savings appeared first on OpenText Blogs.

article thumbnail

Deadly Ransomware Story Continues to Unfold

Dark Reading

A ransomware attack with fatal consequences is attracting notice and comment from around the world.