Fri.Jul 23, 2021

article thumbnail

Alert for Ransomware Attack Victims: Here's How to Respond

Data Breach Today

As ransomware continues to pummel organizations, if they do get hit, then from an incident response standpoint, what are the essential steps they should take to smooth their recovery? Veteran ransomware-battler Fabian Wosar, CTO of Emsisoft, shares essential steps and guidance for recovery.

article thumbnail

Holes in Linux Kernel Could Pose Problems for Red Hat, Ubuntu, Other Distros

eSecurity Planet

A pair of vulnerabilities in the Linux kernel disclosed this week expose major Linux operating systems that could let a hacker either gain root privileges on a compromised host or shut down the entire OS altogether. The two flaws – CVE-2021-33909 and CVE-2021-33910, respectively – were disclosed by vulnerability management vendor Qualys in a pair of blogs that outlined the threat to Linux OSes from such companies Red Hat, Ubuntu, Debian and Fedora.

Metadata 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Congress Focuses on Industrial Control System Security

Data Breach Today

Senate Bill Would Require CISA to Identify and Respond to ICS Threats A bipartisan group of senators is pushing a bill that would require CISA to identify and respond to vulnerabilities and threats that target industrial control systems. The House has already passed a similar measure.

Security 361
article thumbnail

Commercial Location Data Used to Out Priest

Schneier on Security

A Catholic priest was outed through commercially available surveillance data. Vice has a good analysis : The news starkly demonstrates not only the inherent power of location data, but how the chance to wield that power has trickled down from corporations and intelligence agencies to essentially any sort of disgruntled, unscrupulous, or dangerous individual.

Marketing 138
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

South African Port Operations Disrupted by Cyberattack

Data Breach Today

Transnet, Which Operates the Ports, Is Investigating Incident A massive cyberattack has disrupted container operations at a port in Cape Town, South Africa, and a port in Durban also was affected, Reuters reports.

353
353

More Trending

article thumbnail

Saudi Aramco Traces Data Leak to Attack on Supplier

Data Breach Today

Extortionists Demand $50 Million - Payable in Monero Cryptocurrency - From Oil Giant Saudi Aramco, one of the world's largest oil and natural gas firms, has confirmed that company data was leaked after one of its suppliers was breached. Extortionists are reportedly demanding a $50 million ransom - payable in monero cryptocurrency - for a promise to delete the stolen data.

IT 349
article thumbnail

Weekly Update 253

Troy Hunt

This week, by popular demand, it's Charlotte! Oh - and Scott. People had been asking for Charlotte for a while, so we finally decided to do a weekly update together on how she's been transitioning from Mac to PC. Plus, she has to put up with all my IoT shenanigans so that made for some fun conversation, along with how our respective homelands are dealing with the current pandemic (less fun, but very important).

IoT 130
article thumbnail

US Customs Apps Put Travelers' PII at Risk

Data Breach Today

OIG Audit Shows Consumer Applications Inadequately Protected U.S. Customs and Border Protection has not always protected its Mobile Passport Control applications, making travelers' personally identifiable information vulnerable to exploitation, according to a new report from the Department of Homeland Security's Office of the Inspector General.

Risk 329
article thumbnail

Obtaining password hashes of Windows systems with PetitPotam attack

Security Affairs

A researcher found a flaw in Windows OS, tracked as PetitPotam, that can be exploited to force remote Windows machines to share their password hashes. Security researcher Gilles Lionel (aka Topotam ) has discovered a vulnerability in the Windows operating system that allows an attacker to force remote Windows machines to authenticate and share their password hashes with him.

Passwords 121
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Analysis: Implications of the Pegasus Spyware Investigation

Data Breach Today

This edition of the ISMG Security Report features an analysis of ongoing investigations into the use of NSO Group's Pegasus spyware to spy on dissidents, journalists, political rivals, business leaders and even heads of state - and discussion of whether the commercial spyware business model should be banned.

Security 301
article thumbnail

Estonian hacker Pavel Tsurkan pleads guilty for operating a proxy botnet.

Security Affairs

Estonian hacker Pavel Tsurkan has pleaded guilty in a United States court to the counts of computer fraud and of creating and operating a proxy botnet. The Estonian national Pavel Tsurkan has pleaded guilty in a United States court to two counts of computer fraud and abuse. According to court documents, Pavel Tsurkan (33) operated a criminal proxy botnet composed of more than 1,000 devices.

article thumbnail

Kaseya Obtains Decryption Tool After REvil Ransomware Hit

Data Breach Today

Software Vendor Said Approximately 60 MSPs and 1,500 Clients Affected by Attack Remote management software vendor Kaseya has obtained a decryption tool for all organizations affected by the massive ransomware attack launched via its software. The tool should especially help the many small businesses still struggling to recover. Kaseya declined to comment on how it obtained the decryptor.

article thumbnail

5 Steps to Improving Ransomware Resiliency

Threatpost

Alex Restrepo, cybersecurity researcher at Veritas, lays out the key concepts that organizations should be paying attention to now and implementing today.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ISMG Editors’ Panel: Examining the Pegasus Project

Data Breach Today

Discussion Also Addresses Telecom Security Issues In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the use of commercially available spyware and security risk management in the telecom sector.

article thumbnail

President Biden Signs Executive Order to Promote Fair Competition and Further Regulate Data Privacy

Hunton Privacy

On July 9, 2021, President Biden signed the Executive Order on Promoting Competition in the American Economy (the “Executive Order”). The stated goal of the Executive Order is to increase competition in the United States and resolve issues related to monopolistic behaviors, including with respect to privacy and data protection. The Executive Order highlights the role of administrative agencies and executive departments in promoting fair competition, and further expands agency responsibilities

article thumbnail

Microsoft Security Under Scrutiny After Recent Incidents

eSecurity Planet

Microsoft is struggling through a rough July for security issues even as the company continues to add more cybersecurity capabilities through acquisitions. The software giant earlier this month issued an emergency update in Windows after researchers at cybersecurity vendor Sangfor published a blog about a security flaw dubbed “PrintNightmare.” Sangfor had published the exploit code, which could help bad actors understand how to use it to break into systems running all versions of the operating s

Security 102
article thumbnail

Over 80 US Municipalities’ Sensitive Information, Including Resident’s Personal Data, Left Vulnerable in Massive Data Breach

Security Affairs

WizCase’s team of ethical hackers, led by Ata Hakç?l, has found a major breach exposing a number of US cities, all of them using the same web service provider aimed at municipalities. Original post at [link]. This breach compromised citizens’ physical addresses, phone numbers, IDs, tax documents, and more. Due to the large number and various types of unique documents, it is difficult to estimate the number of people exposed in this breach.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

e-Records 2021: Call for Presentations Extended

The Texas Record

Update: The deadline for submitting a presentation proposal for the 2021 e-Records Conference has been extended to Wednesday, August 4, 2021. Check out our previous blog post for details about submitting your proposal. Keep up-to-date on all event information at the conference web page: [link]. Thanks! And we’ll see you online in November! 1.

98
article thumbnail

St. John’s University Collaborates with the Institute of Certified Records Managers (ICRM) to Accelerate Graduates’ RIM Certification

IG Guru

Congratulations to St. John’s University for joining the list of universities to partner with the ICRM. Check out the article here. The post St. John’s University Collaborates with the Institute of Certified Records Managers (ICRM) to Accelerate Graduates’ RIM Certification appeared first on IG GURU.

article thumbnail

FIN7’s Liquor Lure Compromises Law Firm with Backdoor

Threatpost

Using a lure relating to a lawsuit against the owner of Jack Daniels whiskey, the cybergang launched a campaign that may be bent on ransomware deployment.

article thumbnail

Email in PDF – Pushing the (email) envelope.

National Archives Records Express

[link]. When NARA released its revised Format Guidance for the Transfer of Permanent Electronic Records in 2014, we identified the file formats acceptable for use by Federal agencies when transferring permanent email messages to NARA. These formats include EML, MBOX, MSG, and PST. Notable for its omission is PDF. This might seem surprising since regardless of the application you use to send and receive email, it almost certainly provides the ability to save a message as a PDF.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Kaseya Obtains Universal Decryptor for REvil Ransomware

Threatpost

The vendor will work with customers affected by the early July spate of ransomware attacks to unlock files; it's unclear if the ransom was paid.

article thumbnail

Biden Administration Responds to Geopolitical Cyber Threats

Dark Reading

In response to growing concerns regarding the recent uptick in large-scale, nation-state-backed ransomware attacks on critical infrastructure, the Biden administration is taking new action to tackle the evolving challenges posed by ransomware attacks.

article thumbnail

Discord CDN and API Abuses Drive Wave of Malware Detections

Threatpost

Targets of Discord malware expand far beyond gamers.

Security 138
article thumbnail

California Attorney General Issues Summary of CCPA Enforcement Actions and Launches Consumer Privacy Interactive Tool

Hunton Privacy

The California Attorney General (“AG”) recently released a summary of enforcement actions the agency brought against companies in violation of the CCPA since enforcement of the Act began on July 1, 2020. The summary provides 27 illustrative examples of instances in which the AG sent notices of alleged noncompliance with the CCPA and how each company cured the alleged noncompliance.

Privacy 78
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Modern viewing and collaboration for the secure remote workforce

OpenText Information Management

Supporting your workforce requires visibility, collaboration, and adaptability. Bringing solutions to the cloud provides the flexibility your organization needs to enable your workforce to work from anywhere. It sounds perfect, but there’s a real challenge to reaching this goal—security. Organizational leaders must stay on top of fast-moving technologies with cloud deployment options that are secured. … The post Modern viewing and collaboration for the secure remote workforce appeared firs

article thumbnail

Forrester names Collibra a leader among data governance solutions

Collibra

Collibra provides a data governance foundation that ensures trust and access of data for every use, every user, and across every source. We believe this is why Collibra was named a leader in The Forrester Wave : Data Governance Solutions. Q3 2021. Collibra received the highest score among all vendors in the policy management criterion, tied for the highest score in the stewardship management criterion, and the highest score possible in the data governance management criterion.

article thumbnail

Death, taxes and redaction blunders

OpenText Information Management

Nothing in this world is certain except for death, taxes and redaction failures. Recently, The Register discovered a court document related to an age discrimination suit filed against IBM in Texas last year in which the plaintiffs replied to IBM’s partial motion to dismiss the case because some plaintiffs don’t reside in Texas. The plaintiffs … The post Death, taxes and redaction blunders appeared first on OpenText Blogs.