Tue.Feb 15, 2022

article thumbnail

Google fixes a Chrome zero-day flaw actively exploited in attacks

Security Affairs

Google fixed a high-severity zero-day flaw actively exploited with the release of Chrome emergency update for Windows, Mac, and Linux. Google fixed a high-severity zero-day flaw, tracked as CVE-2022-0609, actively exploited with the release of Chrome emergency update for Windows, Mac, and Linux. This is the first Chome zero-day fixed this year by Google.

article thumbnail

Conditional access with Jamf + Google Cloud BeyondCorp

Jamf

Learn how the partnership between Jamf Pro and Google BeyondCorp enables you to construct a compliance and security framework around end-user devices, blending Jamf’s device management with Google’s endpoint management security for a comprehensive, cloud-based, Zero Trust solution.

Cloud 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Warn About Critical Infrastructure Ransomware Attacks, Vulnerabilities

eSecurity Planet

Ransomware attacks on critical infrastructure and a surge in exploited vulnerabilities are getting the attention of U.S. cybersecurity agencies, which highlighted the threats in a pair of warnings issued in recent days. The FBI and U.S. Secret Service issued a detailed advisory on the BlackByte Ransomware as a Service (RaaS) group, which has attacked critical infrastructure industries in recent months, among them government, financial and food and agriculture targets.

article thumbnail

Secret CIA Data Collection Program

Schneier on Security

Two US Senators claim that the CIA has been running an unregulated — and almost certainly illegal — mass surveillance program on Americans. The senator’s statement. Some declassified information from the CIA. No real details yet.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

CPRA Law + Tech Series

Data Matters

WEBINAR. REGISTER HERE. 12:00 p.m. PT / 3:00 p.m. ET. Sidley Senior Managing Associate Sheri Porath Rockwell (Chair, California Lawyers Association Privacy Law Section) and Stacey Gray, Director of Legislative Research & Analysis at the Future of Privacy Forum, will be leading a multi-session webinar series, CPRA Law + Tech , that focuses on the technologies and data practices at the heart of emerging state privacy legislation, including the California Privacy Rights Act (CPRA).

More Trending

article thumbnail

DLA Piper Privacy Matters - Untitled Article

DLA Piper Privacy Matters

Expert opinion on US surveillance laws highlights FISA risk for data transfers to the US. By: Andrew Serwin, Carol A.F. Umhoefer, Verena Grentzenberg, and Hayley R. Curry. Germany’s Data Protection Conference (DSK) recently made public an expert opinion on Section 702 of the US Foreign Intelligence Surveillance Act (FISA), which came under close scrutiny in the July 16, 2020 decision of the Court of Justice of the European Union (Schrems II).

article thumbnail

Securonix Secures Over $1B in Growth Investment From Vista Equity

Dark Reading

Deal is the second one topping $1 billion since November and sets the stage for what could be another record-breaking year for investment in the cybersecurity industry.

article thumbnail

Ukraine: Military defense agencies and banks hit by cyberattacks

Security Affairs

Ukraine ‘s defense agencies and two state-owned banks were hit by Distributed Denial-of-Service (DDoS) attacks. The Ministry of Defense and the Armed Forces of Ukraine and state-owned banks, Privatbank (Ukraine’s largest bank) and Oschadbank were hit by Distributed Denial-of-Service (DDoS) attacks. The website of the Ukrainian Ministry of Defense has been taken down by the wave of DDoS attacks. “Starting from the afternoon of February 15, 2022, there is a powerful DDOS attack o

article thumbnail

How to Make Cybersecurity Effective and Invisible

Dark Reading

Cybersecurity should be a shield that protects the business, not a barrier that holds it back.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

BlackCat gang claimed responsibility for Swissport ransomware attack

Security Affairs

The BlackCat ransomware group (aka ALPHV), claimed responsibility for the attack on Swissport that interfered with its operations. The BlackCat ransomware group (aka ALPHV), has claimed responsibility for the cyberattack on Swissport that impacted its operations, causing flight delays. Swissport International Ltd. is an aviation services company providing airport ground,lounge hospitality and cargo handling services owned by an international group of investors.

article thumbnail

Implementing Data Protection and Key Management in DevOps without slowing things down

Thales Cloud Protection & Licensing

Implementing Data Protection and Key Management in DevOps without slowing things down. divya. Tue, 02/15/2022 - 05:15. As enterprises develop software in today’s environment, where everything has digitally transformed and must follow Zero Trust policies, new challenges arise that can complicate and slow down the DevOps software pipeline. Plus, insecure implementations can leave sensitive data at risk.

article thumbnail

QNAP extends security Updates for some EOL devices

Security Affairs

Taiwanese vendor QNAP extended the security update window for some devices that have reached end-of-life (EOL). Taiwanese vendor QNAP extended the security update for some devices that have reached end-of-life (EOL) years ago. The company decided to extend until October this year the security updates for some models that have reached EOL, the decision aims at giving time its users time to upgrade devices.

article thumbnail

The US Watches Warily for Russia-Ukraine Tensions to Spill Over

WIRED Threat Level

Conversations with more than a dozen senior cybersecurity leaders in both the public and private sector outline the major areas of risk.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Chrome Zero-Day Under Active Attack: Patch ASAP

Threatpost

The year's 1st Chrome zero-day can lead to all sorts of misery, ranging from data corruption to the execution of arbitrary code on vulnerable systems.

article thumbnail

What’s New in CMMC 2.0

Daymark

The Cybersecurity Maturity Model Certification (CMMC) Framework is used by the DoD to verify that sensitive data being handled by defense industrial base (DIB) contractors is properly protected on the contractors’ systems to avoid risk of a compromise from a cybersecurity attack. CMMC uses third-party assessment organizations to verify contractors’ safeguarding of controlled unclassified information (CUI) including International Traffic in Arms Regulations (ITAR) data, federal contract informati

article thumbnail

SquirrelWaffle Adds a Twist of Fraud to Exchange Server Malspamming

Threatpost

Researchers have never before seen SquirrelWaffle attackers use typosquatting to keep sending spam once a targeted Exchange server has been patched for ProxyLogon/ProxyShell.

article thumbnail

Keep customer data streams clean with cloud capture from OpenText

OpenText Information Management

Did you know that the average worker is using an average of nine apps in a day? This is just for routine tasks like invoice processing, contract management, customer support, and other tasks workers find annoying because they take them away from their day job— not to mention the main apps they use for their … The post Keep customer data streams clean with cloud capture from OpenText appeared first on OpenText Blogs.

Cloud 62
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Machine Learning in 2022: Data Threats and Backdoors?

Dark Reading

While research illustrates some sly threats, experts say attackers will likely focus on data exposure and finding ways to fool algorithms.

99
article thumbnail

TA2541: APT Has Been Shooting RATs at Aviation for Years

Threatpost

Since 2017, the attacker has flung simple off-the-shelf malware in malicious email campaigns aimed at aviation, aerospace, transportation and defense.

article thumbnail

Red Canary Launches Partner Program

Dark Reading

Red Canary Partner Connect will unite a diverse ecosystem of incident response, risk and managed services partners.

Risk 71
article thumbnail

Two Arrested for Alleged Conspiracy to Launder $4.5 Billion in Stolen Cryptocurrency from the DOJ

IG Guru

Government Seized $3.6 Billion in Stolen Cryptocurrency Directly Linked to 2016 Hack of Virtual Currency Exchange. The post Two Arrested for Alleged Conspiracy to Launder $4.5 Billion in Stolen Cryptocurrency from the DOJ appeared first on IG GURU.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Akamai To Acquire Linode

Dark Reading

Akamai will discuss the acquisition on its Q4 and year end 2021 financial results conference call today, February 15, at 4:30 p.m. ET.

IT 64
article thumbnail

Nintex Acquires Process Discovery Innovator and RPA Leader Kryon

Info Source

Addition of AI-enabled Process Discovery Technology Furthers Nintex’s Position as the Process System of Record for Commercial Enterprises and Government Agencies. BELLEVUE, Wash., Feb. 15, 2022 /PRNewswire/ — Nintex, the global standard for process intelligence and automation, announced the company has acquired Kryon , a process discovery innovator and robotic process automation (RPA) leader, to further extend the intelligent process automation (IPA) capabilities of the Nintex Proces

article thumbnail

How Nonprofits Can Evade Ransomware Attacks

Dark Reading

Just as small businesses can't be complacent, nonprofits also need to prepare for cyberattacks.

article thumbnail

Nintex Acquires Process Discovery Innovator and RPA Leader Kryon

Info Source

Addition of AI-enabled Process Discovery Technology Furthers Nintex’s Position as the Process System of Record for Commercial Enterprises and Government Agencies. BELLEVUE, Wash., Feb. 15, 2022 /PRNewswire/ — Nintex, the global standard for process intelligence and automation, announced the company has acquired Kryon , a process discovery innovator and robotic process automation (RPA) leader, to further extend the intelligent process automation (IPA) capabilities of the Nintex Proces

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

3 Critical Software Development Security Trends and Best Practices

Dark Reading

Organizations should focus on proactive, development-based approaches to security.

article thumbnail

2022 SAA Records Management Section Virtual Colloquium – Call for Submissions!

The Schedule

For Records and Information Management month (April), we are seeking proposals for 5-7 minute presentations on the topic of records management. The colloquium will be scheduled for the later half of April working with presenters availability. If you are interested in presenting or participating please complete the following survey questions regarding the colloquium no later than March 4th, 2022.

article thumbnail

The Unsettling Reason Why Your Help Desk May Be Your Greatest Security Vulnerability

Dark Reading

A rogue help-desk employee could gain access to user accounts through unauthorized password resets. It's time to bring zero trust to the help desk.