Thu.Jul 08, 2021

article thumbnail

Biden Faces Russian Ransomware Curtailment Challenge

Data Breach Today

White House Tells Moscow: Take Action, or We 'Reserve the Right' to Do So The Biden administration has a message for Russia: Rein in the criminal hackers operating from inside your borders who hit Western targets, or we'll do it for you. But experts say disrupting ransomware will take more than diplomacy or even using offensive cyber operations to target criminal infrastructure.

article thumbnail

Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Krebs on Security

Last week cybercriminals deployed ransomware to 1,500 organizations that provide IT security and technical support to many other companies. The attackers exploited a vulnerability in software from Kaseya , a Miami-based company whose products help system administrators manage large networks remotely. Now it appears Kaseya’s customer service portal was left vulnerable until last week to a data-leaking security flaw that was first identified in the same software six years ago.

IT 272
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers: Microsoft 'PrintNightmare' Patch Is Incomplete

Data Breach Today

CERT Expert Says Company's Fix Fails to Address Local Privilege Escalation Microsoft's emergency, out-of-band patch for a critical remote code vulnerability dubbed "PrintNightmare" falls short in addressing the local privilege escalation part of the flaw, according to security researchers.

Security 313
article thumbnail

Proactively Protecting Your Sensitive Information for Remote Workers

AIIM

The unprecedented COVID-19 pandemic has, almost overnight, forced many organizations to modify their business practices and transition to a remote workforce. Of course, the first focus during this transition is deploying the connectivity and infrastructure necessary to support your remote workers. Don’t, however, lose sight of the fact that information scattered across a dispersed workforce can significantly raise the risk of a data breach or other security concerns.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

List of Victims of Kaseya Ransomware Attack Grows

Data Breach Today

2 Maryland Towns Report Malware on Their Networks Two small Maryland towns are among the latest victims to come to light almost a week after the REvil ransomware supply chain attack that targeted Kaseya's VSA remote IT management software. The company says the attack on on-premises VSA installations affected about 60 of its managed service provider customers and up to 1,500 of their clients.

More Trending

article thumbnail

Delayed Data Breach Detection: Facing the Consequences

Data Breach Today

Yearslong Breach at Health Plan Administrator Leads to Lawsuit Settlement Two health data breaches that each took about a decade to discover illustrate just how tough it can be to detect a security incident. One of those breaches has led to a recent lawsuit settlement.

article thumbnail

Hacker deposited $1M in a popular cybercrime marketplace to buy zero-day exploits

Security Affairs

A threat actor has deposited 26.99 Bitcoins on one of the cybercrime forums, he aims at purchasing zero-day exploits from other forum members. A threat actor that goes online with the name “integra” has deposited 26.99 Bitcoins on one of the cybercrime forums with the intent to purchase zero-day Exploits from other forum members, researchers from threat intelligence firm Cyble.

Security 111
article thumbnail

Kaseya Announces New Service Restoration Date

Data Breach Today

CEO Fred Voccola: 'Company Let Customers Down' Thousands of organizations that rely on Miami-based Kaseya's VSA software to remotely manage systems are going to have to wait longer to regain the ability to use it, company CEO Fred Voccola explains in a Thursday video.

IT 261
article thumbnail

Multiple Sage X3 vulnerabilities expose systems to hack

Security Affairs

Rapid7 researchers discovered security vulnerabilities in the Sage X3 ERP product that could allow to take control of vulnerable systems. Researchers from Rapid7 discovered a total of four security vulnerabilities in the Sage X3 enterprise resource planning (ERP) solution. Chaining two of the vulnerabilities discovered by the expert, an attacker could execute malicious commands and take control of vulnerable systems.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The NSA's 'New' Mission: Get More Public With the Private Sector

Dark Reading

The National Security Agency's gradual emergence from the shadows was "inevitable" in cybersecurity, says Vinnie Liu, co-founder and CEO of offensive security firm Bishop Fox and a former NSA analyst. Now the agency has to figure out how to best work with the private sector, especially organizations outside the well-resourced and seasoned Fortune 100.

article thumbnail

Oil & Gas Targeted in Year-Long Cyber-Espionage Campaign

Threatpost

A global effort to steal information from energy companies is using sophisticated social engineering to deliver Agent Tesla and other RATs.

Security 117
article thumbnail

Tor Browser 10.5 is out, it includes a new anti-censorship feature

Security Affairs

The Tor Project has released Tor Browser 10.5 which enhances an anti-censorship feature and warns of V2 onion URL deprecation. The Tor Project has released Tor Browser 10.5 which implements an improved anti-censorship feature and warns users of V2 onion URL deprecation in favor of the newer V3 URLs. The first version supporting V3 URLs is Tor version 0.3.2.9, which was released on January 9 2018.

IT 98
article thumbnail

Demystifying cloud migration

OpenText Information Management

The business world is repeatedly proving that cloud is fast, reliable, scalable and­ cost-effective. When it comes to greenfield cloud deployments, the business case for deploying in the cloud is strong and compelling. However, the case is often not as clear for migrating an existing on-premises solution to the cloud. Many businesses wrestle with deciding … The post Demystifying cloud migration appeared first on OpenText Blogs.

Cloud 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Experts bypassed Microsoft’s emergency patch for the PrintNightmare

Security Affairs

The emergency patch for the PrintNightmare vulnerability released by Microsoft is incomplete and still allows RCE. Yesterday, Microsoft has released an out-of-band KB5004945 security update to address the PrintNightmare vulnerability, unfortunately, the patch is incomplete and still allows remote code execution. Researchers have demonstrated that it is possible to bypass the emergency patch to achieve remote code execution and local privilege escalation on systems that have installed it.

article thumbnail

Microsoft Keeps Failing to Patch a Critical Windows Bug

WIRED Threat Level

For the second time in a month, the company issued an update that doesn't fully address a severe security vulnerability in Windows.

article thumbnail

Cisco fixes High Severity issue in BPA and WSA

Security Affairs

Cisco addresses high severity privilege escalation vulnerabilities in Business Process Automation (BPA) and Web Security Appliance (WSA) that expose users to privilege escalation attacks. Cisco released security patches for high severity vulnerabilities in Business Process Automation (BPA) and Web Security Appliance (WSA) that expose users to privilege escalation attacks.

article thumbnail

The Unfixed Flaw at the Heart of REvil’s Ransomware Spree

WIRED Threat Level

Security researchers warned Kaseya about its IT management software in April, but the patches didn't come fast enough to avert last week's disaster.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Coursera Flunks API Security Test in Researchers’ Exam

Threatpost

The problem APIs included numero uno on the OWASP API Security Top 10: a Broken Object Level Authorization (BOLA) issue that could have exposed personal data.

article thumbnail

Hardware-based PKI provides strong passwordless authentication

Thales Cloud Protection & Licensing

Hardware-based PKI provides strong passwordless authentication. madhav. Thu, 07/08/2021 - 08:40. PKI and Credential Management. Controlling access is at the heart of any enterprise security environment—making sure only those who have the appropriate permissions can access the data, enter the facilities, print a secure document, etc. Public Key Infrastructure (PKI) uses key pairs and certificates to verify the identity of users and systems.

article thumbnail

Morgan Stanley Discloses Data Breach

Dark Reading

Attackers were able to compromise customers' personal data by targeting the Accellion FTA server of a third-party vendor.

article thumbnail

How Fake Accounts and Sneaker-Bots Took Over the Internet

Threatpost

Jason Kent, hacker-in-residence at Cequence Security, discusses fake online accounts, and the fraud they carry out on a daily basis.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Kaseya Hacked via Authentication Bypass

Dark Reading

The Kaseya ransomware attack is believed to have been down to an authentication bypass. Yes, ransomware needs to be on your radar -- but good authentication practices are also imperative.

article thumbnail

PRESS RELEASE: FOUNDATION PUBLISHES NEW RESEARCH REPORT – Retention of Accounting Records

IG Guru

Palmyra, NJ (July 1, 2021) – “Global Requirements for Personnel Records: A Survey of Laws and Regulations” by William Saffady, Ph.D, FAI This report is a companion to a previously published Research Report completed in 2019 (Retention of Accounting Records: A Global Survey of Laws and Regulation). This newly published report identifies and summarizes legal […].

article thumbnail

Six steps for pivoting to a digital culture

CGI

Six steps for pivoting to a digital culture. By Bob Barr In a recent blog on driving digital adoption, I wrote that the Golden Rule of Digital Transformation is, “While the technology is not necessarily easy, delivering the right experience is even harder, and managing the organizational impact is the hardest of all.” This reality is borne out in our 2021 CGI Voice of Our Clients interviews, where cultural change and change management rose significantly as a trend facing both corporate and gover

article thumbnail

How to use EDI to promote fair play, sustainability and ethics

OpenText Information Management

The electronic data interchange value-added network (EDI VAN) is primarily a service provider network that connects all supply chain participants—such as buyers, sellers, logistic providers, banks and suppliers—so they can exchange digital data and documents. This allows them to automate many of their key business processes, streamline supply chain operations, reduce overall spend and improve … The post How to use EDI to promote fair play, sustainability and ethics appeared first on OpenTe

IoT 58
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What Colonial Pipeline Means for Commercial Building Cybersecurity

Dark Reading

Banks and hospitals may be common targets, but now commercial real estate must learn to protect itself against stealthy hackers.

article thumbnail

Why effective asset visibility starts at the digital twin

OpenText Information Management

The cost of poor asset visibility is potentially enormous. Estimates suggest companies are losing almost $25 billion each year in the UK alone. Yet many manufacturers still rely on manual, spreadsheet-based processes to track their inventory of assets. Asset tracking based on the Internet of Things (IoT) can lower costs and risk while boosting performance … The post Why effective asset visibility starts at the digital twin appeared first on OpenText Blogs.

article thumbnail

New WildPressure Malware Capable of Targeting Windows and MacOS

Dark Reading

The Trojan sends information back to the attackers' servers about the programming language of a target device.

100
100