Tue.Oct 12, 2021

article thumbnail

Ransomware: No Decline in Victims Posted to Data-Leak Sites

Data Breach Today

Count of Victims - Listed on Leak Sites or Not - Appears To Be Holding Steady One measure of the damage being done by ransomware groups continues to be how many victims get listed on ransomware operators' dedicated data-leak sites, as part of their so-called double extortion tactics. Unfortunately, the number of victims doesn't appear to be declining.

article thumbnail

Patch Tuesday, October 2021 Edition

Krebs on Security

Microsoft today issued updates to plug more than 70 security holes in its Windows operating systems and other software, including one vulnerability that is already being exploited. This month’s Patch Tuesday also includes security fixes for the newly released Windows 11 operating system. Separately, Apple has released updates for iOS and iPadOS to address a flaw that is being actively attacked.

Security 236
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OnDemand Webinar | Fraud ROI for Ecommerce: Drive More Revenue with Fewer False Positives

Data Breach Today

OnDemand Webinar | Fraud ROI for Ecommerce: Drive More Revenue with Fewer False Positives Watch this onDemand webinar which includes an e-commerce case study on fighting fraud & user friction.

317
317
article thumbnail

Apple Releases Urgent iOS Updates to Patch New Zero-Day Bug

Threatpost

The bug is under attack. Within hours of the patch release, a researcher published POC code, calling it a "great" flaw that can be used for jailbreaks and local privilege escalation.

IT 135
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CISA to Access Agencies' Endpoints, Help Enhance Security

Data Breach Today

OMB Memo: Agencies Have 90 Days to Allow CISA to Begin Reviewing EDR Status In an effort to bolster endpoint protection within the U.S. government, the White House is ordering federal agencies to allow CISA to access existing deployments. It is also setting timelines for improving the protection of workstations, mobile phones and servers.

Access 241

More Trending

article thumbnail

Former Executive Accessed PHI of Nearly 38,000 Individuals

Data Breach Today

Accountable Care Organization Says It's Investigating 2020 Incident A compromise of sensitive health information affecting nearly 38,000 individuals discovered nearly a year after a terminated company executive accessed the data spotlights some of the top security and privacy challenges covered entities and business associates face with insiders.

Access 159
article thumbnail

Microsoft mitigated a record 2.4 Tbps DDoS attack in August

Security Affairs

Microsoft Azure cloud service mitigated a massive DDoS attack of 2.4 terabytes per second (Tbps) at the end of August, it is the largest DDoS attack to date. Microsoft announced that its Azure cloud service mitigated a 2.4 terabytes per second (Tbps) DDoS attack at the end of August, it represents the largest DDoS attack recorded to date. The attack was aimed at an Azure customer in Europe, but Microsoft did not disclose the name of the victim.

Cloud 122
article thumbnail

On Demand Webinar | For Retail : Preventing Application Fraud while Removing User Friction

Data Breach Today

On Demand Webinar | For Retail : Preventing Application Fraud while Removing User Friction Watch this onDemand webinar which includes a focused retail case study on fighting fraud & user friction.

Retail 130
article thumbnail

Data Breaches are More Expensive than Last Year, New IBM Security Report Finds

Data Matters

Death, taxes and data breaches. Cybersecurity incidents have grown in frequency, scale and seriousness. As articulated in President Biden’s May 2021 Executive Order , Improving the Nation’s Cybersecurity , “[t]he United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

GitKraken flaw lead to the generation of weak SSH keys

Security Affairs

Git GUI client GitKraken team fixed a flaw that lead to the generation of weak SSH keys, users are recommended to revoke and renew their keys. The development team behind the Git GUI client GitKraken has fixed a vulnerability that was leading to the generation of weak SSH keys. The developers addressed the flaw with the release of version 8.0.1. The issue resides in the open-source library used by the Git GUI client to generate SSH keys, all the keys generated using versions 7.6.x, 7.7.x, and 8.

Libraries 105
article thumbnail

Microsoft Kills Bug Being Exploited in MysterySnail Espionage Campaign

Threatpost

Microsoft's October 2021 Patch Tuesday included security fixes for 74 vulnerabilities, one of which is a zero-day being used to deliver the MysterySnail RAT to Windows servers.

article thumbnail

Adobe addresses four critical flaws in its products

Security Affairs

Adobe addressed ten vulnerabilities across its Acrobat and Reader, Connect, Commerce, and Campaign Standard products. Adobe has released security updates to address ten vulnerabilities across its Acrobat and Reader, Connect, Commerce, and Campaign Standard products. The IT giant addressed four vulnerabilities in Acrobat and Reader for Windows and macOS, two arbitrary code execution flaws, tracked as CVE-2021-40728 and CVE-2021-40731, and two privilege escalation issues, tracked as CVE-2021-40729

IT 101
article thumbnail

Hundreds of professional footballers threaten legal action over use of data

The Guardian Data Protection

Issue arises over allegedly unlawful use of players’ statistics Project Red Card led by former Cardiff manager Russell Slade Hundreds of professional footballers have threatened legal action against major gaming, betting and sports data companies over the allegedly unlawful use of personal information and performance statistics, which could lead to a shakeup of a multibillion-pound industry.

82
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Necro botnet now targets Visual Tools DVRs

Security Affairs

The FreakOut (aka Necro, N3Cr0m0rPh) Python botnet evolves, it now includes a recently published PoC exploit for Visual Tools DVR. Operators behind the FreakOut (aka Necro, N3Cr0m0rPh) Python botnet have added a PoC exploit for Visual Tools DVR, a professional digital video recorder used in surveillance video systems. The POC exploit code for this vulnerability is publicly available since July 2021.

Mining 99
article thumbnail

Want the full benefits of cloud? Rethink the journey.

DXC Technology

There’s no denying that companies have realized many benefits from using public clouds – hyperscalability, faster deployment and, perhaps most importantly, flexible operating costs. Cloud has helped organizations gain access to modern applications and new technologies without many upfront costs, and it has transformed software development processes.

Cloud 80
article thumbnail

Olympus US was forced to take down computer systems due to cyberattack

Security Affairs

Olympus US was forced to take down IT systems in the American region (U.S., Canada, and Latin America) following a cyberattack. The medical technology giant Olympus was forced to shut down its computer network in America (U.S., Canada, and Latin America) following a cyberattack. The attack took place on October 10, 2021. “Upon detection of suspicious activity, we immediately mobilized a specialized response team including forensics experts, and we are currently working with the highest pri

article thumbnail

Google Launches Security Advisory Service, Security to Workspaces

Dark Reading

Internet giant aims to help companies use the cloud securely and adds more security features to its productivity workspaces to better compete with Microsoft.

Security 119
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

INFOGOV.NET LAUNCHES LOBBYING FOR INFORMATION GOVERNANCE PROFESSION

IG Guru

Contact Information:Nick InglisInfoGov.net401-808-2762nick@infogov.net Release Date:October 7, 2021 Industry Veteran, Nick Inglis’ newest venture is to focus on lobbying efforts to continue the growth of the information governance profession. (Providence, RI; October 7, 2021) InfoGov.net announces the launch of lobbying services on behalf of the information governance profession.

article thumbnail

Florida’s Protecting DNA Privacy Act Goes into Effect

Hunton Privacy

On October 1, 2021, Florida’s Protecting DNA Privacy Act (the “Act”), took effect. The Act, signed into law by Governor Ron DeSantis on June 29, restricts certain willful collection, retention, analysis and disclosure of the DNA samples or DNA analysis results of persons in Florida without their express consent. Under the law, a person is guilty of a misdemeanor when, without express consent, they willfully collect or retain another individual’s DNA sample with the intent to perform DNA analysis

Privacy 81
article thumbnail

Windows Zero-Day Actively Exploited in Widespread Espionage Campaign

Threatpost

The cyberattacks, linked to a Chinese-speaking APT, deliver the new MysterySnail RAT malware to Windows servers.

95
article thumbnail

High-Profile Breaches Are Shifting Enterprise Security Strategy

Dark Reading

Increased media attention is driving changes in enterprise security strategy -- some positive, some negative.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why Is The Streaming Experience So Terrible?

John Battelle's Searchblog

I wrote this for P&G’s Signal360 publication, but I thought I’d toss it up here as well. I know I’ve been very, very absent from writing for – well, for the entire pandemic. I plan to change that, but for now, here’s a mini-rant (I could have gone on forever) about the state of the television experience for us cord cutters out there. .

article thumbnail

Why Choke-Point Analysis Is Essential in Active Directory Security

Dark Reading

Defense should focus on high-value choke points first to ensure that their most critical assets are protected, before moving on to deal with other attack paths.

article thumbnail

Office 365 Spy Campaign Targets US Military Defense

Threatpost

An Iran-linked group is taking aim at makers of drones and satellites, Persian Gulf ports and maritime shipping companies, among others.

article thumbnail

Kaspersky Updates Industrial Cybersecurity Service

Dark Reading

Kaspersky Industrial CyberSecurity unlocks centralized management and visibility across entire OT infrastructure.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to Use PKIaaS to Simplify Certificate Automation in Microsoft Active Directory

HID Global

How to Use PKIaaS to Simplify Certificate Automation in Microsoft Active Directory. mchandarana. Tue, 10/12/2021 - 10:41.

52
article thumbnail

Microsoft Fixes Zero-Day Flaw in Win32 Driver

Dark Reading

A previously known threat actor is using the flaw in a broad cyber-espionage campaign, security vendor warns.

article thumbnail

How LATAM Banks Can Face Down Fraud Amid Booming Digital Business

HID Global

How LATAM Banks Can Face Down Fraud Amid Booming Digital Business. walvarez. Tue, 10/12/2021 - 10:20.

52