Fri.Jul 30, 2021

article thumbnail

Researchers Find More Servers Tied to Russian-Linked Attacks

Data Breach Today

RiskIQ: APT29 Using Infrastructure to Deliver Malware to Targets Researchers at the security firm RiskIQ have uncovered about 35 active command-and-control servers connected with an ongoing malware campaign that has been linked to a Russian-speaking attack group known as APT29 or Cozy Bear.

Security 347
article thumbnail

Black Hat insights: Will Axis Security’s ZTNA solution hasten the sunsetting of VPNs, RDP?

The Last Watchdog

Company-supplied virtual private networks (VPNs) leave much to be desired, from a security standpoint. Related: How ‘SASE’ is disrupting cloud security. This has long been the case. Then a global pandemic came along and laid bare just how brittle company VPNs truly are. Criminal hackers recognized the golden opportunity presented by hundreds of millions employees suddenly using a company VPN to work from home and remotely connect to an array of business apps.

Access 200
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patch Issued for Flaw in Sunhillo SureLine Surveillance App

Data Breach Today

Researchers at NCC Group Describe the Risks Researchers discovered an unauthenticated operating system command injection vulnerability in the Sunhillo SureLine surveillance application that allows an attacker to execute arbitrary commands with root privileges. The flaw has since been patched.

Risk 343
article thumbnail

I Am Parting With My Crypto Library

Schneier on Security

The time has come for me to find a new home for my (paper) cryptography library. It’s about 150 linear feet of books, conference proceedings, journals, and monographs — mostly from the 1980s, 1990s, and 2000s. My preference is that it goes to an educational institution, but will consider a corporate or personal home if that’s the only option available.

Libraries 143
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Changes: DoppelPaymer Rebrands; Babuk Evolves

Data Breach Today

New 'Pay or Grief' CryptoLocking Malware Is DoppelPaymer in Disguise, Experts Say The ransomware landscape changes constantly as groups disappear, change approaches or rebrand. The DoppelPaymer operation, for example, appears to have reinvented itself as Grief, while the administrator of Babuk has launched a ransomware-friendly cybercrime forum called RAMP.

More Trending

article thumbnail

Wiper Malware Used in Attack Against Iran's Train System

Data Breach Today

Operational Security Mistakes Left Clues About Developer's Skills, But Not Identity Nearly three weeks ago, Iran's state railway company was hit a cyberattack that was disruptive and - somewhat unusually - also playful. Security firm SentinelOne says analyzing the wiper malware involved offers tantalizing clues about the attackers' skills, but no clear attribution.

Security 293
article thumbnail

Novel Meteor Wiper Used in Attack that Crippled Iranian Train System

Threatpost

A July 9th attack disrupted service and taunted Iran’s leadership with hacked screens directing customers to call the phone of Iranian Supreme Leader Khamenei with complaints.

IoT 122
article thumbnail

Patching Woes: Most Frequently Exploited CVEs Listed

Data Breach Today

Experts Say Advisory Highlights Vulnerability Management Challenges A joint cybersecurity advisory issued by several agencies this week highlighting the ongoing exploits of longstanding software vulnerabilities illustrates the woeful state of patch management, security experts say.

article thumbnail

Estonia ‘s police arrested a Tallin resident who stole 286K ID scans from a government DB

Security Affairs

Estonia ‘s police arrested a man from Tallinn that is suspected to be the hacker who stole 286K ID scans from the government systems. Estonian police arrested a man from Tallinn that is suspected to have stolen 286,438 belonging to Estonians citizens from the government systems. The hacker exploited a vulnerability in a photo transfer service vulnerability to download ID scans from the Identity Documents Database (KMAIS).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Amazon Hit With $885 Million GDPR Fine

Data Breach Today

Online Retailer Plans to Appeal the Decision Handed Down by EU Regulators Amazon reports that it's been fined 746 million euros ($885 million) under the European Union's General Data Protection Regulation for violating privacy rights in its advertising program. The company says it plans to appeal.

GDPR 274
article thumbnail

Luxembourg DPA Fines Amazon 746 Million Euros for GDPR Violations

Hunton Privacy

On July 16, 2021, the Luxembourg data protection authority ( Commission nationale pour la protection des donées , “CNPD”) imposed a record-breaking €746 million fine on Amazon Europe Core S.à.r.l. for alleged violations of the EU General Data Protection Regulation (“GDPR”). The CNPD also ordered Amazon to revise certain of its practices. As Amazon has its EU headquarters in Luxembourg, the CNPD acts as Amazon’s lead supervisory authority in the EU.

GDPR 111
article thumbnail

ISMG Editors’ Panel: Ransomware Update

Data Breach Today

Also: Update on NIST 'Zero Trust' Initiative In the latest weekly update, three editors at Information Security Media Group discuss important cybersecurity issues, including the latest ransomware trends, plus an update on NIST's "zero trust" initiative.

article thumbnail

Free Ransomware Decryption Site Celebrates Milestone as New Threats Emerge

eSecurity Planet

As Europol celebrated the fifth anniversary of its anti-ransomware initiative this week, menacing new ransomware threats made it clear that the fight against cyber threats is never-ending. The EU law enforcement cooperation agency said its No More Ransom website has saved ransomware victims almost a billion Euros with free ransomware decryption tools.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Analysis: Keeping Track of Ransomware Gangs

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the disappearance of ransomware-as-a-service groups, such as REvil and Darkside, and how that impacts the wider cybercrime ecosystem. Also featured: ransomware recovery tips; regulating cyber surveillance tools.

article thumbnail

Spanish DPA Fines Supermarket Chain 2,520,000 EUR for Unlawful Use of Facial Recognition System

Hunton Privacy

On July 27, 2021, the Spanish Data Protection Authority (the “AEPD”) imposed a €2,520,000 fine on Spanish supermarket chain Mercadona, S.A. for unlawful use of a facial recognition system. Following its investigation, the AEPD found that Mercadona was using a facial recognition system in 48 of its shops for several months across Spain to detect individuals with criminal convictions or restraining orders (particularly, individuals who had received a restraining order after assaulting an employee

Privacy 108
article thumbnail

Cybersecurity's Impact on the Global Economy

Data Breach Today

Macroeconomist Katheryn "Kadee" Russ analyzes how the deployment of 5G networks and technologies will lead to a change in the growth of the digital economy and digital trade.

article thumbnail

ICRM announces upcoming Certified Records Analyst and Manager workshops

IG Guru

We would like to share the below information to keep you updated on our exam prep workshops. Thank you in advance for sharing the below message with any colleagues that may be interested in preparing for an ICRM Certification. We also encourage you to take a look at the Nuclear Specialist and Federal Specialist Workshop options […]. The post ICRM announces upcoming Certified Records Analyst and Manager workshops appeared first on IG GURU.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Flaw Found in Moodle Online Learning Platform

Data Breach Today

Vulnerability in Authentication Module Patched The bug hunting team at pentesting firm Haxolot.com uncovered a remote code execution vulnerability in Moodle, an open-source online learning platform widely used by universities worldwide. The flaw has since been patched.

article thumbnail

NSA Warns Public Networks are Hacker Hotbeds

Threatpost

Agency warns attackers targeting teleworkers to steal corporate data.

IoT 141
article thumbnail

Phishing Attack: Clinic Says 450,000 May Have Been Affected

Data Breach Today

Florida Practice Says Incident Involved Fraud Attempt An Orlando-based family physicians' practice is notifying nearly 450,000 patients, employees and others about a phishing incident tied to a financial fraud attempt.

Phishing 184
article thumbnail

The Privacy Battle That Apple Isn’t Fighting

WIRED Threat Level

California has begun enforcing a browser-level privacy setting, but you still can’t find that option in Safari or iOS.

Privacy 97
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Card Stealer Malware Uses New Evasion Technique

Data Breach Today

JavaScript Loaded by Malware From Blocked Domains A new card stealer malware campaign that loads JavaScript malware from blocked domain lists to evade detection is targeting e-commerce sites that run Adobe's Magento, software security firm Sucuri reports.

Security 184
article thumbnail

What’s new in OpenText Internet of Things Platform

OpenText Information Management

The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText Internet of Things Platform. Check out the latest updates below. July 2021: What’s new in CE 21.2 for OpenText Internet of Things Platform Update 1: Use mobile devices to register, validate and install IoT sensors or gateways Mobile provisioning takes the IoT device … The post What’s new in OpenText Internet of Things Platform appeared first on OpenText Blogs.

IoT 72
article thumbnail

Senate Bill Proposes Further Restrictions on Huawei, ZTE

Data Breach Today

Legislation Would Prohibit Using Stimulus Funds to Buy Companies' Gear Two U.S. senators are looking to place additional restrictions on the use of telecom equipment from Chinese equipment manufacturers Huawei and ZTE by prohibiting using funds from the $1.9 trillion American Rescue Plan stimulus package to buy such equipment.

article thumbnail

What’s new in OpenText Encase Forensic and OpenText EnCase Endpoint Investigator

OpenText Information Management

The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator. Check out the latest updates below. July 2021: What’s new in OpenText ?EnCase Forensic and OpenText EnCase Endpoint Investigator CE 21.3 Update 1: Reach deeper to find more evidence OpenText™ EnCase Forensic (designed for law enforcement investigations) and EnCase Endpoint Investigator … The post What’s new in OpenText Encase Forensic

Cloud 64
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Credential Stuffing vs Brute Force – When Strong Passwords Are Not Enough

Adapture

Credential Stuffing vs Brute Force Over the past couple of decades, we’ve been constantly reminded to use strong passwords. This was supposed to minimize the risk of an account takeover (ATO) and, more importantly, a full-blown data breach. Strong passwords were supposed to fend off brute force attacks, the most commonly used attack vector to break into an account.

article thumbnail

Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee

The Security Ledger

With Black Hat and DEFCON upon us, we revisit a 2015 interview with Chris Valasek about his wireless, software based hack of a Chrysler Jeep Cherokee. The post Encore Podcast: Chris Valasek on Hacking The Jeep Cherokee appeared first on The Security Ledger with Paul F. Roberts. Related Stories Encore Podcast: Is Autonomous Driving Heading for a Crash?

article thumbnail

CREATE OR REPLACE: Agile Deployment of Db2 for z/OS Stored Procedures

Robert's Db2

A relatively recent Db2 for z/OS enhancement that might have escaped your notice may well merit your consideration. Here's what I'm talking about: Db2 12 function level 507 (available since June of 2020, related to APAR PH24371) introduced CREATE OR REPLACE syntax for stored procedures. In a Db2 for z/OS context, CREATE OR REPLACE syntax was initially provided for Db2 12 advanced triggers , and it eliminated what had been a real irritant with regard to modifying a trigger.

IT 62