Wed.May 05, 2021

article thumbnail

Malicious Office 365 Apps Are the Ultimate Insiders

Krebs on Security

Phishers targeting Microsoft Office 365 users increasingly are turning to specialized links that take users to their organization’s own email login page. After a user logs in, the link prompts them to install a malicious but innocuously-named app that gives the attacker persistent, password-free access to any of the user’s emails and files, both of which are then plundered to launch malware and phishing scams against others.

Passwords 312
article thumbnail

Ransomware Hits Australian Telecom Provider Telstra’s Partner

Data Breach Today

Avaddon Group Claims It Stole SIM Card Data, Banking Information A ransomware gang claims to have stolen SIM card data and banking information in an attack on Schepisi Communications, a service provider to Australian telecommunications company Telstra, a local news outlet reports.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Spectre-Like Attacks

Schneier on Security

There’s new research that demonstrates security vulnerabilities in all of the AMD and Intel chips with micro-op caches, including the ones that were specifically engineered to be resistant to the Spectre/Meltdown attacks of three years ago. Details : The new line of attacks exploits the micro-op cache: an on-chip structure that speeds up computing by storing simple commands and allowing the processor to fetch them quickly and early in the speculative execution process, as the team explains

Security 123
article thumbnail

Millions of Dell Devices Vulnerable to Update Driver Flaw

Data Breach Today

Dell Has Patched Driver Issue Found by SentinelOne Dell has patched five issues in a firmware update driver that has shipped in millions of laptops, tablets and desktops since 2009. The vulnerabilities apparently have not been exploited in the wild and are not remotely exploitable.

273
273
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

DCMS Cyber Security Breaches Survey 2021 highlights more still to be done by the majority of businesses

DLA Piper Privacy Matters

The Department for Culture Media and Sport recently published its annual Cyber Security Breaches Survey (the “Survey” ), which aims to capture trends in cyber security incidents and provides a snapshot of the approach of UK businesses to the risks of an incident and the types of incidents seen in the previous 12 months. We have tracked the Survey since it was first published in 2016 and some interesting trends are emerging.

Security 105

More Trending

article thumbnail

Peloton’s Leaky API Spilled Riders’ Private Data

Threatpost

On top of the privacy spill, Peloton is also recalling all treadmills after the equipment was linked to 70 injuries and the death of one child.

Privacy 117
article thumbnail

3 Bills Focus on Enhancing Electrical Grid Cybersecurity

Data Breach Today

Each Proposal Calls for a Different Approach to Mitigating Risks Lawmakers in the Senate and House have introduced legislation designed to improve and enhance the nation's electrical grid and respond to concerns that the country's power system is prone to cyberthreats.

article thumbnail

Cyber Defense Magazine – May 2021 has arrived. Enjoy it!

Security Affairs

Cyber Defense Magazine March 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 90 pages of excellent content. Cyber Defense Magazine May 2021. OVER 90+ PAGESLOADED WITH EXCELLENT CONTENT Learn from the experts, cybersecurity best practices Find out about upcoming information security related conferences, expos and trade shows.

IT 100
article thumbnail

Securing Your Building Management System

Data Breach Today

With all the talk of sophisticated adversaries and evolving threats to users and devices – what about threats to building management systems? Jeremy Morgan of Industrial Defender discusses this threat landscape and the role of automated tools to defend it.

Security 279
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UNC2529, a new sophisticated cybercrime gang that targets U.S. orgs with 3 malware

Security Affairs

A new cybercrime gang, tracked as UNC2529 , has targeted many organizations in the US and other countries using new sophisticated malware. A new financially motivated threat actor, tracked by FireEye Experts as UNC2529, has targeted many organizations in the United States and other countries using several new pieces of malware. The group targeted the organization with phishing attacks aimed at spreading at least three new sophisticated malware strains.

article thumbnail

SmileDirectClub: Attack Taking Big Bite Out of Revenue

Data Breach Today

SEC Filing Predicts $10 Million to $15 Million Impact SmileDirectClub, which sells teeth-straightening appliances, expects that a recent cyberattack, which disrupted the manufacturing of its products, will take a $10 million to $15 million bite out of its second-quarter revenue.

article thumbnail

Experts found critical authentication bypass flaw in HPE Edgeline Infrastructure Manager

Security Affairs

Researchers found a critical vulnerability in HPE Edgeline Infrastructure Manager that could be exploited by a remote attacker to bypass authentication. Researchers from Tenable have disclosed a critical authentication bypass vulnerability in HPE Edgeline Infrastructure Manager (EIM), tracked as CVE-2021-29203 , that could be exploited by attackers to compromise a customer’s cloud infrastructure. “A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also

article thumbnail

PHP Composer Flaw That Could Affect Millions of Sites Patched

Data Breach Today

Experts Stress Importance of Upgrading the Tool and Auditing Files A patch has been issued for a serious vulnerability that affects PHP Composer - a tool used to manage and install software dependencies in the PHP ecosystem. Security researchers at SonarSource say the flaw could put millions of websites at risk.

Risk 196
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Three Things that DNS Outages Teach Administrator

PerezBox

Rarely do you wake up thinking to yourself, “wonder how my DNS is doing today?” but I can guarantee it’s been the root cause of one, or two, sleepless nights, Read More. The post Three Things that DNS Outages Teach Administrator appeared first on PerezBox.

IT 83
article thumbnail

New Crypto-Stealer ‘Panda’ Spread via Discord

Threatpost

PandaStealer is delivered in rigged Excel files masquerading as business quotes, bent on stealing victims' cryptocurrency and other info.

96
article thumbnail

Wanted: The (Elusive) Cybersecurity 'All-Star'

Dark Reading

Separate workforce studies by (ISC) 2 and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the field.

article thumbnail

Anti-Spam WordPress Plugin Could Expose Website User Data

Threatpost

'Spam protection, AntiSpam, FireWall by CleanTalk' is installed on more than 100,000 sites -- and could offer up sensitive info to attackers that aren't even logged in.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The 3-minute test for energy companies

OpenText Information Management

It’s been 25 years since Bill Gates declared, “Content is king.” And how right he was. Today, content truly reigns supreme, with on-demand access at every turn. From streaming services to social media, content practically lands in our laps, personalized to our interests and always within reach. But in the Energy sector, we seem to … The post The 3-minute test for energy companies appeared first on OpenText Blogs.

Access 73
article thumbnail

Black Hat Asia Speakers Share Secrets About Sandboxes, Smart Doors, and Security

Dark Reading

Find video interviews with some of the coolest Black Hat Asia experts right here, as part of the Dark Reading News Desk this week.

article thumbnail

Feds Shut Down Fake COVID-19 Vaccine Phishing Website

Threatpost

‘Freevaccinecovax.org’ claimed to be that of a biotech company but instead was stealing info from visitors to use for nefarious purposes.

article thumbnail

Attackers Seek New Strategies to Improve Macros' Effectiveness

Dark Reading

The ubiquity of Microsoft Office document formats means attackers will continue to use them to spread malware and infect systems.

115
115
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Raft of Exim Security Holes Allow Linux Mail Server Takeovers

Threatpost

Remote code execution, privilege escalation to root and lateral movement through a victim's environment are all on offer for the unpatched or unaware.

article thumbnail

Debating Law Enforcement's Role in the Fight Against Cybercrime

Dark Reading

The FBI's action to remove Web shells from compromised Microsoft Exchange Servers sparks a broader discussion about officials' response to cyberattacks.

72
article thumbnail

Cisco fixes critical flaws in SD-WAN vManage and HyperFlex HX software

Security Affairs

Cisco fixed critical flaws in SD-WAN vManage and HyperFlex HX software that could allow creating admin accounts, and executing commands as root. Cisco has addressed critical vulnerabilities affecting SD-WAN vManage and HyperFlex HX software that could allow creating admin accounts and executing commands as root. Cisco SD-WAN vManage Software flaws (CVE-2021-1275, CVE-2021-1468, CVE-2021-1505, CVE-2021-1506, CVE-2021-1508) could be exploited by an unauthenticated, remote attacker to execute arbit

article thumbnail

DoD Lets Researchers Target All Publicly Accessible Info Systems

Dark Reading

The Department of Defense expands its vulnerability disclosure program to include a broad range of new targets.

Access 91
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Wait, Is That a COVID-19 Record?

IG Guru

Check out this amazing article from Zasio. The post Wait, Is That a COVID-19 Record? appeared first on IG GURU.

article thumbnail

How supply chains are shifting from global to local

OpenText Information Management

Vaccine shortages in different parts of the world are a stark reminder of how global supply chains have been hit by the COVID-19 pandemic and how serious such disruptions can be. While first-world countries, such as the US and UK, have vaccinated large parts of their populations, emerging market countries, such as South Africa, haven’t … The post How supply chains are shifting from global to local appeared first on OpenText Blogs.

article thumbnail

Top MDR Services for 2021

eSecurity Planet

Managed Detection and Response (MDR) services offer their clients 24/7 turnkey threat monitoring, detection and remote response capabilities. These services are managed by outsourced teams of experts to help remove some of the need for dedicated onsite security staff and to decrease the amount of day-to-day work for their clients. Despite the similarity in name to endpoint detection and response (EDR) technology, MDR providers are more like general managed security service providers (MSSPs) , op

Cloud 57