Wed.Oct 20, 2021

article thumbnail

Hyperautomation drives the cultural shifts needed for transformation

DXC Technology

Enterprises must make business decisions faster in today’s fast-changing markets. To that end — so that time and effort are not squandered, nor productivity hampered — business leaders need to transform and optimize their business processes, technology and people’s roles. This is where hyperautomation comes in. It plays an integral role in helping organizations make […].

article thumbnail

Hacker in UPMC Data Theft, Fraud Case Gets Maximum Sentences

Data Breach Today

Federal Judge Imposes 7-Year Prison Time in Human Resources Database Hack Case A federal judge has imposed the maximum sentences - a total of seven years in prison - on a hacker who earlier pleaded guilty in a conspiracy case involving the hacking of University of Pittsburgh Medical Center human resources databases and the theft of personal information of 65,000 employees - some which was sold on the dark web and used for federal tax fraud.

315
315
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phones as security keys in Chrome

Imperial Violet

With Chrome 94, if you have an Android phone with Chrome on it, and it’s syncing to the same Google account as Chrome on a Chrome OS/Windows/macOS device, then you’ll be able to use that phone as a security key. You should be able to try this out on any WebAuthn using website, for example here. (But not accounts.google.com, which uses a different system.).

Security 145
article thumbnail

Bugs in Malware Serve As Backdoor to Undo Damage

Data Breach Today

System Infection Can be Prevented Using Flaws in Malware Researchers at Zscaler say that malware is often prone to bugs and coding errors which can cause it to crash or serve as a backdoor for defenders to undo the damage it might have caused. They suggest defenders proactively use malware bugs to stop them from spreading and infecting the system.

IT 277
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

YouTube creators’ accounts hijacked with cookie-stealing malware

Security Affairs

A Cookie Theft malware was employed in phishing attacks against YouTube creators, Google’s Threat Analysis Group (TAG) warns. Financially motivated threat actors are using Cookie Theft malware in phishing attacks against YouTube creators since late 2019. According to Google’s Threat Analysis Group (TAG) researchers, who spotted the campaign, the attacks were launched by multiple hack-for-hire actors recruited on Russian-speaking forums.

Phishing 127

More Trending

article thumbnail

Pwned - The Collected Blog Posts of Troy Hunt (Preview)

Troy Hunt

We choose this photo for the cover because this was when it all started. 18-year old Troy, having just discovered the web in early 1995 and chomping at the bit to do something with it. The full tale of what I first did (and how disastrous it ultimately became), is up front early in the book so I won't relay it here, but it's quite the story.

article thumbnail

Ransomware Soap Opera Continues With REvil’s Latest Outage

Data Breach Today

Who Hijacked Infrastructure of Ransomware Public Enemy No. 1 REvil, aka Sodinokibi? Is there any bigger cybercrime soap opera than the life and times of ransomware operators? Take the REvil, aka Sodinokibi, ransomware-as-a-service operation, which feels like it's disappeared and reappeared more times than the secret, identical twin of the protagonist in your favorite melodrama.

article thumbnail

China-linked LightBasin group accessed calling records from telcos worldwide

Security Affairs

China-linked cyberespionage group LightBasin hacked mobile telephone networks around the world and used specialized tools to access calling records. A China-linked hacking group, tracked as LightBasin (aka UNC1945 ), hacked mobile telephone networks around the globe and used specialized tools to access calling records and text messages from telecommunications companies.

Access 115
article thumbnail

Textbook Rental Scam

Schneier on Security

Here’s a story of someone who, with three compatriots, rented textbooks from Amazon and then sold them instead of returning them. They used gift cards and prepaid credit cards to buy the books, so there was no available balance when Amazon tried to charge them the buyout price for non-returned books. They also used various aliases and other tricks to bypass Amazon’s fifteen-book limit.

109
109
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FTC to Hold Virtual Open Meeting on October 21, 2021, on Findings From Agency’s 6(b) Orders to ISPs

Hunton Privacy

The FTC will hold a virtual open meeting on Thursday, October 21, 2021, at 1pm ET to present the agency’s findings on evidence gathered pursuant to the FTC’s issuance of 6(b) orders in 2019 to six Internet Service Providers and three of their advertising affiliates regarding the parties’ privacy practices. Public release of the FTC Staff report is subject to a vote by the Commission.

Privacy 105
article thumbnail

Acer suffers a second data breach in a week

Security Affairs

T ech giant Acer was hacked again in a few days, after the compromise of the servers in India, threat actors also breached some of its systems in Taiwan. Tech giant Acer was hacked twice in a week, the same threat actor (Desorden) initially breached some of its servers in India , now it is claiming to have also breached some systems in Taiwan. Last week the company revealed that its after-sales service systems in India were hit by an isolated attack.

article thumbnail

VPN Exposes Data for 1M Users, Leading to Researcher Questioning

Threatpost

Experts warn that virtual private networks are increasingly vulnerable to leaks and attack.

Cloud 127
article thumbnail

PurpleFox botnet variant uses WebSockets for more secure C2 communication

Security Affairs

Researchers warn of a new evolution of the PurpleFox botnet, operators included exploits and leverage WebSockets for C2 communication. Researchers from TrendMicro have documented a recent evolution of the PurpleFox botnet, the experts discovered a new.NET backdoor, dubbed FoxSocket, that is highly associated with the PurpleFox operation. Its operators have added new exploits and payloads, according to the experts, the new variant leverages WebSockets to implement more secure C2 bidirectional com

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google Crushes YouTube Cookie-Stealing Channel Hijackers

Threatpost

Google has caught and brushed off a bunch of cookie-stealing YouTube channel hijackers who were running cryptocurrency scams on, or auctioning off, ripped-off channels. .

article thumbnail

Application Security is Key to Stopping Ransomware, Vendor Says

eSecurity Planet

Recent news headlines have shown how vulnerable even large companies with many resources at their disposal are to ransomware. While these attacks may feel inevitable, there are measures that businesses can take to protect themselves. One vendor says application security may be the key to stopping ransomware. Preventing Ransomware with Application Security.

article thumbnail

Why Emotionally Intelligent People Still Follow Colin Powell’s 13 Rules for Leaders via Inc.

IG Guru

A compelling and complicated legacy, plus emotionally intelligent leadership that works. Check out the article here. The post Why Emotionally Intelligent People Still Follow Colin Powell’s 13 Rules for Leaders via Inc. appeared first on IG GURU.

87
article thumbnail

Moving forward to M1

Jamf

Money Forward looked to better their device choice program by bringing on M1 Mac devices with Apple silicon. Yuto Mughal was at JNUC to share the lessons learned from their experience and how to expect and overcome some of the same barriers they faced.

84
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Geriatric Microsoft Bug Exploited by APT Using Commodity RATs

Threatpost

Disguised as an IT firm, the APT is hitting targets in Afghanistan & India, exploiting a 20-year-old+ Microsoft Office bug that's as potent as it is ancient.

IT 89
article thumbnail

How Hackers Hijacked Thousands of YouTube Accounts

WIRED Threat Level

Google has shed light on a spate of attacks that turned creator channels into cryptocurrency scam livestreams.

article thumbnail

Deepfake Audio Scores $35M in Corporate Heist

Dark Reading

A combination of business email compromise and deepfake audio led a branch manager to transfer millions to scammers, in a case that serves as a warning to organizations.

104
104
article thumbnail

The future of digital asset management (DAM 3.0)

OpenText Information Management

DAM 1.0: Building a better asset warehouse The first generation of digital asset management (DAM) software was a lifesaver, a huge improvement over shared drives and file sharing platforms. Yes, these older methods provided shared access to assets – but they lacked the metadata, faceted search, fast previews and other DAM features that are crucial … The post The future of digital asset management (DAM 3.0) appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Ransomware Payment Dilemma: Should Victims Pay or Not?

Dark Reading

It's time to steer the conversation away from whether payment bans should be implemented to how and when they should take effect.

article thumbnail

Remediating security events with Jamf Pro, Jamf Protect and Jamf Connect

Jamf

Join consulting engineers from Jamf’s security and Identity platforms as they perform a real-world demonstration of how Jamf Pro, Jamf Protect and Jamf Connect work symbiotically to automate risk mitigation on Apple endpoints.

article thumbnail

Microsoft-Signed Rootkit Targets Gaming Environments in China

Dark Reading

FiveSys is the second publicly known rootkit since June that attackers have managed to sneak past Microsoft's driver certification process.

85
article thumbnail

Google Chrome and Jamf

Jamf

Google Chrome for Apple and Jamf make a powerful partnership for managing and supporting macOS and iOS-based devices. In this JNUC session , learn about the latest additions to Google’s Chrome Browser that help Mac admins make short work of deploying and managing the software.

59
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Removing Friction for the Enterprise With Trusted Access

Dark Reading

Our work lives are supposed to be simpler and easier because of technology. At least that’s the promise.

Access 90
article thumbnail

Jamf cybersecurity advancements: Mobile Threat Defense, Data Policy and Private Access

Jamf

Jamf’s latest software acquisitions - Jamf Threat Defense, Jamf Data Policy and Jamf Private Access - are security-focused offerings that protect devices, users and data from malware and security threats. Additionally, they allow you to achieve & maintain compliance while securing network communications based on powerful, Zero Trust Network Access (ZTNA) technology.

Access 52
article thumbnail

Google: Phishing Campaign Targets YouTube Creators

Dark Reading

The attackers behind the campaign, which distributes cookie theft malware, are attributed to actors recruited in a Russian-speaking forum.