Fri.Mar 11, 2022

article thumbnail

Report: Recent 10x Increase in Cyberattacks on Ukraine

Krebs on Security

As their cities suffered more intense bombardment by Russian military forces this week, Ukrainian Internet users came under renewed cyberattacks, with one Internet company providing service there saying they blocked ten times the normal number of phishing and malware attacks targeting Ukrainians. John Todd is general manager of Quad9 , a free “anycast” DNS platform.

Phishing 257
article thumbnail

SEC Proposes Cybersecurity Rules for Public Companies

Hunton Privacy

On March 9, 2022, the Securities and Exchange Commission (“SEC”) held an open meeting and proposed new cybersecurity disclosure rules for public companies by a 3-1 vote. If adopted, the new rules would impose substantial new reporting obligations with respect to material cybersecurity incidents and cybersecurity risk management, strategy, and governance for both domestic and foreign private issuers subject to the reporting requirements under the Securities Exchange Act of 1934.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anonymous hacked Roskomnadzor agency revealing Russian disinformation

Security Affairs

The Anonymous collective continues to launch attacks against Russian entities, this is a summary of recent offensives. Anonymous announced to have hacked the Russian Federal Service for Supervision of Communications, Information Technology and Mass Media, also known as Roskomnadzor. The agency is responsible for monitoring, controlling and censoring Russian mass media and according to Anonymous, it is controlling the disinformation campaign about the ongoing invasion of Ukraine.

article thumbnail

Russia Issues Its Own TLS Certs

Threatpost

The country’s citizens are being blocked from the internet because foreign certificate authorities can't accept payments due to Ukraine-related sanctions, so it created its own CA.

IT 101
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Lapsus$ Ransomware Group is hiring, it announced recruitment of insiders

Security Affairs

Lapsus$ Ransomware gang is looking for insiders willing to sell remote access to major technology corporations and ISPs. Thursday, March 10, Lapsus$ ransomware gang announced they’re starting to recruit insiders employed within major technology giants and ISPs, such companies include Microsoft, Apple, EA Games and IBM. Their scope of interests include – major telecommunications companies such as Claro, Telefonica and AT&T.

More Trending

article thumbnail

Jamf School helps Euroform deliver cutting-edge vocational training

Jamf

With the support of Jamf School Certified Reseller C&C, the trade school network is using Apple technology to power positive learning outcomes across a wide range of professional tracks.

98
article thumbnail

Email-Based Vishing Attacks Skyrocket 554% as Phishing, Social Media, and Malware Attacks Are All on the Rise

KnowBe4

New analysis of attacks in 2021 show massive increases across the board, painting a very concerning picture for this year around cyberattacks of all types.

Phishing 105
article thumbnail

Open database leaves major Chinese ports exposed to shipping chaos?

Security Affairs

The freight logs of two major Chinese shipping ports have been leaking data, a problem which if left unresolved could disrupt the supply chain of up to 70,000 tonnes of cargo a day, with potentially serious consequences for international shipping. The cybernews® research team identified an open ElasticSearch database, which contained more than 243GB of data detailing current and historic ship positions that is exposed to the public.

article thumbnail

Raccoon Stealer Crawls Into Telegram

Threatpost

The credential-stealing trash panda is using the chat app to store and update C2 addresses as crooks find creative new ways to distribute the malware.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Enterprises Can Get Used to Deploying AI for Security

Dark Reading

It's important to take a "trust journey" to see how AI technology can benefit an organization's cybersecurity.

article thumbnail

CISA compiles list of free cybersecurity tools and services via BleepingComputer

IG Guru

Check out the article here. The post CISA compiles list of free cybersecurity tools and services via BleepingComputer appeared first on IG GURU.

article thumbnail

Is XDR Right for My Organization?

Dark Reading

Well. it depends on what you're trying to accomplish, at least for now. The good news is that many modern SIEMs are starting to adopt XDR-like capabilities.

IT 71
article thumbnail

RFIDConnect for Gimmal Physical

Gimmal

Gimmal announces the release of the new RFIDConnect. Created to facilitate detection of RFID tags that are in range of the network-connected RFID antenna. Using a network-enabled Zebra FX7500 RFID reader, clients can accurately and efficiently check items out to individuals or into a location. RFIDConnect communicates with Gimmal Physical software through a robust API that enables real-time tracking of all indexed assets.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ukrainian Man Arrested for Alleged Role in Ransomware Attack on Kaseya, Others

Dark Reading

He's the fifth member of the REvil ransomware gang to get busted in the past year.

article thumbnail

ScannerConnect for Gimmal Physical

Gimmal

Gimmal announces the release of the new ScannerConnect. Created as a system tray application to facilitate the scanning of barcodes with a tethered or cordless scanner. The barcodes of locations and trackable items can be scanned, and the Gimmal Physical application updated in real-time. Barcodes can also be manually entered, and the transfer process completed with the click of a button.

52
article thumbnail

Identity Attacks Threaten Workloads, Not Just Humans

Dark Reading

Companies have embraced the cloud and accelerated adoption, but with insider access to infrastructure even more available, can businesses defend their expanded attack surface?

Cloud 86
article thumbnail

How-to: Send Webhooks from Jamf Pro to Microsoft Teams with PowerAutomate

Jamf

Amsterdam-based Thijs Xhaflaire, a consulting engineer on identity and management for Jamf, walks through how to enable Microsoft Teams Channel notifications when an Apple device is enrolled into Jamf Pro.

52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Combat the No. 1 Cause of Security Breaches: Complexity

Dark Reading

The scaling of hardware, software and people has created an ever-growing complexity problem.

article thumbnail

5 Ways You Can Get More from Your Terminal Emulator

Rocket Software

For businesses that rely on mainframes, secure access to the data stored there is simply a business requirement. Terminal emulation and host access to these critical resources is key to enabling a range of business processes from serving customers more efficiently to ensuring regulatory compliance. While organizations with a mainframe or IBM® i need a terminal emulator for access, users shouldn’t be limited by a specific endpoint strategy.

Retail 52
article thumbnail

The Fight Against the Hydra: New DDoS Report from Link11

Dark Reading

Complexity and number of attacks increased again.

97
article thumbnail

The Case for Encrypting Everything: A Q&A With PKI Expert Mrugesh Chandarana

HID Global

The Case for Encrypting Everything: A Q&A With PKI Expert Mrugesh Chandarana. mchandarana. Fri, 03/11/2022 - 17:00.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

When IT Spending Plans Don't Reflect Security Priorities

Dark Reading

Data shows a disconnect between what decisionmakers consider top endpoint security priorities and how they focus their budget.

article thumbnail

UNECE Vehicle Regulations: UN R155 & UN R156

ForAllSecure

In mid-2021, the UNCE released new vehicle cybersecurity regulations in an effort to keep up with the rapid reliance of digitization within the automotive industry. These new standards, UN R155 and UN R156, take similar stances to the ISO SAE 21434 and ISO 26262 standards. What are the UN R155 and UN R156 regulations? The UNECE Vehicle Regulations are a set of regulations that deal with Vehicle Cybersecurity.

article thumbnail

Setting the Bar for Government Access to Have I Been Pwned

Troy Hunt

Over the last 4 years, I've onboarded 28 national government CERTs onto Have I Been Pwned (HIBP) and given them free and open access to APIs that enable them to query and monitor their gov domains. This doesn't give them access to any information they can't already access via the free public domain search feature , but it makes their lives easier.

article thumbnail

Friday Squid Blog: 328-million-year-old Vampire Squid Ancestor Discovered

Schneier on Security

A fossilized ancestor of the vampire squid — with ten arms — was discovered and named Syllipsimopodi bideni after President Biden. Here’s the research paper. Note: Vampire squids are not squids. (Yes, it’s weird.). As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Paper 82
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.