Tue.Sep 14, 2021

article thumbnail

Researchers: 61M Health IoT Device User Records Exposed

Data Breach Today

Database Belonged to a Firm That Apparently Just Shut Down An unsecured database belonging to an apparently recently defunct firm exposed 61 million records of wearable health and fitness device users on the internet, say the security researchers who discovered the non-password-protected database in cooperation with the WebsitePlanet research team.

IoT 294
article thumbnail

Millions of HP OMEN gaming PCs impacted by CVE-2021-3437 driver flaw

Security Affairs

A high severity vulnerability, tracked as CVE-2021-3437 , in HP OMEN laptop and desktop gaming computers exposes millions of systems to DoS and privilege escalation attacks. Millions of HP OMEN laptop and desktop gaming computers are exposed to multiple attacks by a high severity vulnerability tracked as CVE-2021-3437 that was discovered by SentinelLabs researchers. “Potential security vulnerabilities have been identified in an OMEN Gaming Hub SDK package which may allow escalation of pri

Access 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BitSight, Mastercard and Tenable Make Acquisitions

Data Breach Today

Risk Assessment, Improving DevSecOps, Cryptocurrency Risk Research Drive Deals Merger and acquisition activity picked up in September with BitSight, Tenable and Mastercard, all making deals. Moody's became BitSight's largest shareholder after making a $250 million investment in the company.

Risk 267
article thumbnail

Apple Patches Vulnerabilities in iOS Exploited by Spyware

eSecurity Planet

Apple continues to be haunted by spyware developed by an Israeli security firm that hostile governments used to hack into Apple devices to spy on journalists, activists and world leaders (see Apple Security Under Scrutiny Amid Fallout from NSO Spyware Scandal ). News of the nefarious uses of NSO Group’s Pegasus software first surfaced in July.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Microsoft Patches MSHTML Vulnerability

Data Breach Today

Flaws in Windows Scripting Engine and DNS Fixed Microsoft's September Patch Tuesday security update covers 61 vulnerabilities, with four rated critical. These include a fix for the critical MSHTML Vulnerability Microsoft revealed last week and patches to a Windows scripting engine flaw and a Windows DNS flaw.

Security 238

More Trending

article thumbnail

SEC Chair Pushes for Additional Cryptocurrency Regulations

Data Breach Today

Testifying Before Senate Committee, Gary Gensler Again Calls Crypto 'Wild West' U.S. SEC Chair Gary Gensler testified before the Senate on Tuesday and again called for comprehensive cryptocurrency regulations, citing a need to reduce cybersecurity risks, other market risks, and criminal efforts to defraud investors, while simultaneously advancing the space.

Marketing 176
article thumbnail

Microsoft Patch Tuesday fixes CVE-2021-40444 MSHTML zero-day

Security Affairs

Microsoft Patch Tuesday security updates for September 2021 addressed a high severity zero-day flaw actively exploited in targeted attacks. Microsoft Patch Tuesday security updates for September 2021 addressed a high severity zero-day RCE actively exploited in targeted attacks aimed at Microsoft Office and Office 365 on Windows 10 computers. The flaw, tracked as CVE-2021-40444 , resides in the MSHTML, which is the main HTML component of the Windows Internet Explorer browser, it is also used in

Security 103
article thumbnail

Top Initial Attack Vectors: Passwords, Bugs, Trickery

Data Breach Today

Use of LOLBins, GitHub Tools and Cobalt Strike Also Widespread, Researchers Say The top three tactics attackers have been using to break into corporate and government networks are brute-forcing passwords, exploiting unpatched vulnerabilities, and social engineering via malicious emails, says security firm Kaspersky in a roundup of its 2020 incident response investigations.

Passwords 167
article thumbnail

Innovating with your customers

OpenText Information Management

From healthcare to supply chains to cyber security, the global pandemic has fundamentally changed how we live and work. Although digital transformation was already becoming a key priority across most industries, the disruption caused by the pandemic has accelerated the need for increased connectivity, automation, and access to information when and where you need it. … The post Innovating with your customers appeared first on OpenText Blogs.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New York Vaccine Passport App Stored Forged Credentials

Data Breach Today

NCC Group: Users Could Fraudulently Create QR Code, Get COVID Pass A recently patched flaw in a mobile app allowing N.Y. residents to acquire and store a COVID-19 vaccine credential did not validate user input properly and stored forged verifications, according to security researchers. Experts say similar flaws could have dire consequences.

Security 157
article thumbnail

Microsoft Patches Actively Exploited Windows Zero-Day Bug

Threatpost

On Patch Tuesday, Microsoft fixed 66 CVEs, including an RCE bug in MSHTML under active attack as threat actors passed around guides for the drop-dead simple exploit.

Security 106
article thumbnail

OnDemand | Cyber Threats Facing Oil, Gas & Chemical Businesses

Data Breach Today

Understanding Defense, Detection and Response How oil, gas, and chemical businesses can mitigate the threats facing them.

167
167
article thumbnail

Reported Rates of Major Security Incidents by Market

Dark Reading

In the "Proven Success Factors for Endpoint Security" report, Cisco Security shares a global perspective on reported cyber events in the past two years.

Marketing 111
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

US CISA appointed Kiersten Todt as new chief of staff

Security Affairs

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has appointed Kiersten Todt as its new chief of staff. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced to have appointed Kiersten Todt as its new chief of staff, she will replace Acting Chief of Staff Kate Nichols. “The Cybersecurity and Infrastructure Security Agency (CISA) announced today Kiersten E.

article thumbnail

It’s a Good Day to Update All Your Devices. Trust Us

WIRED Threat Level

iOS, Windows, and Chrome all have zero-day vulnerabilities that hackers are going after. Now that the fixes are here, you need to install them ASAP.

Security 103
article thumbnail

M?ris Bot infects MikroTik routers compromised in 2018

Security Affairs

Latvian vendor MikroTik revealed that recently discovered M?ris botnet is targeting devices that were compromised three years ago. Last week, the Russian Internet giant Yandex has been targeting by the largest DDoS attack in the history of Runet, the Russian Internet designed to be independent of the world wide web and ensure the resilience of the country to an internet shutdown.

article thumbnail

NHS app storing facial verification data via contract with firm linked to Tory donors

The Guardian Data Protection

Exclusive: Campaigners raise privacy concerns over government deal with iProov The NHS app is collecting and storing facial verification data from UK citizens in a process which has fuelled concerns about transparency and accountability. The data collection is taking place under a contract with a company linked to Tory donors called iProov, awarded by NHS Digital in 2019, which has yet to be published on the government website.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Pair of Google Chrome Zero-Day Bugs Actively Exploited

Threatpost

The security vulnerabilities bring the web behemoth up to 10 browser zero-days found so far this year.

Security 106
article thumbnail

Ransomware Operators Ramp Up Pressure on Victims via Multiple Extortion Attacks

Dark Reading

Though overall ransomware attack volumes dipped in the first half of this year, the number of campaigns involving three and four extortion methods increased.

article thumbnail

The Importance of Legal Identity and Significance of International Identity Day

HID Global

The Importance of Legal Identity and Significance of International Identity Day. ksangal. Tue, 09/14/2021 - 10:30.

98
article thumbnail

ZLoader’s Back, Abusing Google AdWords, Disabling Windows Defender

Threatpost

The well-known banking trojan retools for stealth with a whole new attack routine, including using ads for Microsoft TeamViewer and Zoom to lure victims in.

80
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microsoft Patches MSHTML Vuln Among 66 CVEs

Dark Reading

This month's Patch Tuesday release addresses a remote code execution bug under active attack and a publicly known flaw in Windows DNS.

83
article thumbnail

Unpatched Bugs Plague Databases; Your Data Is Probably Not Secure – Podcast

Threatpost

Imperva's Elad Erez discusses findings that 46 percent of on-prem databases are sitting ducks, unpatched and vulnerable to attack, each with an average of 26 flaws.

article thumbnail

The shifting diversity and inclusion landscape

OpenText Information Management

Whether it’s the rise in global activism or the disproportionate impact the global pandemic has had on women in the workforce, a renewed focus has been placed on the importance of corporate diversity and inclusion programs over the past 18 months. We sat down with Professor Sally Eaves, CEO, Aspirational Futures, and Bethany Saint Clair, … The post The shifting diversity and inclusion landscape appeared first on OpenText Blogs.

62
article thumbnail

2021’s Most Dangerous Software Weaknesses

Threatpost

Saryu Nayyar, CEO at Gurucul, peeks into Mitre's list of dangerous software bug types, highlighting that the oldies are still the goodies for attackers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

45TB LTO-9 tape media and drives just debuted via The Register

IG Guru

Check out the article here. The post 45TB LTO-9 tape media and drives just debuted via The Register appeared first on IG GURU.

Risk 77
article thumbnail

Adobe Snuffs Critical Bugs in Acrobat, Experience Manager

Threatpost

Adobe releases security updates for 59 bugs affecting its core products, including Adobe Acrobat Reader, XMP Toolkit SDK and Photoshop.

article thumbnail

Outlining Risks to the World's Vital Cyber-Physical Systems

Dark Reading

The key to protecting these systems is not only to ensure the control environment is secure and protected but also to deploy emerging technologies such as confidential computing.

Risk 86