Mon.Oct 31, 2022

article thumbnail

5 Key Takeaways from Microsoft Ignite 2022

Daymark

Microsoft recently held its annual Ignite Conference where they announced over 100 updates to its suite of cloud services and products. Daymark was on the ground at the Convention Center in Seattle to explore the innovations and engage with Microsoft on the latest changes. 100 updates is a lot to digest! Here are our thoughts on 5 important ones worth paying attention to. 1.

article thumbnail

Ransomware: 'Amateur' Tactics Lead Fewer Victims to Pay

Data Breach Today

Criminals Shooting Themselves in the Foot With Faulty Decryptors, Re-Extortion Many ransomware-wielding attackers - including big-name groups - have been collectively shooting themselves in the foot by resorting to "amateur" tactics, including decryptors that fail to decrypt as well as gangs re-extorting the same victims. Cue fewer victims opting to pay a ransom.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian Invasion

Krebs on Security

A 26-year-old Ukrainian man is awaiting extradition from The Netherlands to the United States on charges that he acted as a core developer for Raccoon , a popular “malware-as-a-service” offering that helped paying customers steal passwords and financial data from millions of cybercrime victims. KrebsOnSecurity has learned that the defendant was busted in March 2022, after fleeing mandatory military service in Ukraine in the weeks following the Russian invasion.

Military 276
article thumbnail

North Korea Disguising Android Malware as Legitimate Apps

Data Breach Today

Apps Masquerade as Google Security Plug-In and Document Viewer North Korean state hacking group Kimsuky is developing Android malware targeted at South Korean users by disguising the apps as legitimate apps including a Google security plug-in and a document viewer. Seoul-based cybersecurity company S2W dubs the apps FastFire, FastSpy and FastViewer.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

GUEST ESSAY: A roadmap to achieve a better balance of network security and performance

The Last Watchdog

Here’s a frustrating reality about securing an enterprise network: the more closely you inspect network traffic, the more it deteriorates the user experience. Related: Taking a risk-assessment approach to vulnerabilities. Slow down application performance a little, and you’ve got frustrated users. Slow it down a lot, and most likely, whichever knob you just turned gets quickly turned back again—potentially leaving your business exposed.

Security 182

More Trending

article thumbnail

GitHub flaw could have allowed attackers to takeover repositories of other users

Security Affairs

A critical flaw in the cloud-based repository hosting service GitHub could’ve allowed attackers to takeover other repositories. The cloud-based repository hosting service GitHub has addressed a vulnerability that could have been exploited by threat actors to takeover the repositories of other users. The vulnerability was discovered by Checkmarx that called the attack technique RepoJacking.

Cloud 117
article thumbnail

Honeywell's James DeLuccia on Product Security vs IT Defense

Data Breach Today

Consistency Is the Objective in IT Security, But Product Security Must Be Flexible Organizations expect the IT security landscape to be consistent - from builds and hardware to operating systems - but for product security, everything Honeywell makes is a snowflake with flexible, highly tailored design across many technologies, says Honeywell Product Security Chief James DeLuccia.

IT 143
article thumbnail

Apple Only Commits to Patching Latest OS Version

Schneier on Security

People have suspected this for a while, but Apple has made it official. It only commits to fully patching the latest version of its OS, even though it claims to support older versions. From ArsTechnica : In other words, while Apple will provide security-related updates for older versions of its operating systems, only the most recent upgrades will receive updates for every security problem Apple knows about.

Security 107
article thumbnail

Cyberattack Hits German Copper Manufacturing Giant

Data Breach Today

Aurubis Shuts Down IT Systems at Various Productions Locations One of the world's largest copper smelters disclosed it underwent a cyberattack, stating that production "could largely be maintained." Germany-based Aurubis owns Europe's largest copper smelting facility, capable of refining 450,000 metric tonnes annually and located in Hamburg.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

VMware warns of the public availability of CVE-2021-39144 exploit code

Security Affairs

VMware warned of the availability of a public exploit for a recently addressed critical remote code execution flaw in NSX Data Center for vSphere (NSX-V). VMware warned of the existence of a public exploit targeting a recently addressed critical remote code execution (RCE) vulnerability, tracked as CVE-2021-39144 (CVSS score of 9.8), in NSX Data Center for vSphere (NSX-V).

Libraries 106
article thumbnail

LinkedIn Phishing Attack Bypassed Email Filters Because it Passed Both SPF and DMARC Auth

KnowBe4

Researchers at Armorblox have observed a phishing campaign impersonating LinkedIn. The emails inform the user that their LinkedIn account has been suspended due to suspicious activity.

article thumbnail

Actively exploited Windows Mark-of-the-Web zero-day received an unofficial patch

Security Affairs

An unofficial patch for an actively exploited flaw in Microsoft Windows that allows to bypass Mark-of-the-Web (MotW) protections. 0patch released an unofficial patch to address an actively exploited security vulnerability in Microsoft Windows that could allow bypassing Mark-of-the-Web ( MotW ) protections by using files signed with malformed signatures.

article thumbnail

What Happens to an Organisation When It Has No Security Culture?

KnowBe4

Let’s begin by looking at what culture is and why it matters. Culture is tacit and elusive in its very nature. It is often unspoken, based on behaviours, hidden in the thoughts and minds of people. We often see it embedded in the organisation’s framework: in its vision, mission and values, which can also describe the attitudes it has towards various things.

IT 83
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Snatch group claims to have hacked military provider HENSOLDT France

Security Affairs

The Snatch ransomware group claims to have hacked HENSOLDT France, a company specializing in military and defense electronics. The Snatch ransomware group claims to have hacked the French company HENSOLDT France. HENSOLDT is a company specializing in military and defense electronics. HENSOLDT France offers a wide range of critical electronics solutions, products and services for the aeronautical, defence, energy and transport sectors, whether for air, naval or land applications, both in France

Military 104
article thumbnail

Australia's Lacking Cybersecurity Workforce Results to a Influx in Attacks

KnowBe4

Australia has now become the newest target for attacks in part due to a overworked cybersecurity workforce that are not able to stop these bad actors.

article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

Reflecting on the Wannacry ransomware attack, which is the lesson learnt e why most organizations are still ignoring it. In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware.

IT 97
article thumbnail

Extend your Document Management solution with enhanced OpenText eDOCS InfoCenter solutions

OpenText Information Management

OpenText™ eDOCS Cloud Editions (CE) 22.4 brings a number of new user collaboration and features to the OpenText InfoCenter interface. These exciting enhancements help users and improve user productivity and business processes within eDOCS and can be leveraged both in desktop and mobile browsers without any additional configurations or intermediary software.

Cloud 63
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Malicious dropper apps on Play Store totaled 30.000+ installations

Security Affairs

ThreatFabric researchers discovered five malicious dropper apps on Google Play Store with more than 130,000 downloads. Researchers at ThreatFabric have discovered five malicious dropper apps on the official Google Play Store. The malicious dropper apps are designed to deliver banking trojans, such as SharkBot and Vultur , that already totaled over 130,000 installations. “Droppers on Google Play went from using AccessibilityService to auto-allow installation from unknown sources to using le

article thumbnail

Transform your HR platform by Extending SAP SuccessFactors

OpenText Information Management

HR business administrators and IT leaders across the globe are seeking to shift from on-premise, physical or siloed employment files. These often require in-house expertise and additional budget to maintain and update. They are finding that a secure managed cloud solution for centralized employee records allows them to free up internal resources and provide flexibility … The post Transform your HR platform by Extending SAP SuccessFactors appeared first on OpenText Blogs.

Cloud 63
article thumbnail

You Need to Update Google Chrome, Windows, and Zoom Right Now

WIRED Threat Level

Plus: Important patches from Apple, VMWare, Cisco, Zimbra, SAP, and Oracle.

article thumbnail

Stopping threats cold

OpenText Information Management

Imagine NFL football before Don “Red Dog” Ettinger changed the game by “blitzing” linebackers into the opposing team’s backfield, or hockey before Bobby Orr showed that a defenceman can be the most effective offensive player on the ice. If you want to change the game, you can’t afford to sit back and let the other … The post Stopping threats cold appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

[WARNING] Micro Transactions Lead to a Drained Bank Account

KnowBe4

Our friend R. Friederich at M arshalsec sent us this warning.

article thumbnail

October 2022: E-Invoicing & VAT compliance updates

OpenText Information Management

Introduction Welcome to the October 2022 edition of our regular e-Invoicing newsletter. Please refer to our “Hot topics” section for items which may require imminent consideration on your part – this month some updates from the French tax authorities about their mandate for 2024 – while there is still a fair bit of time it … The post October 2022: E-Invoicing & VAT compliance updates appeared first on OpenText Blogs.

article thumbnail

Enter to Win a Free CEDS Standard Package!

IG Guru

Mark Your Calendar for E-Discovery Day Thursday, December 1, 2022 The best day of the year for e-discovery is just around the corner! To celebrate this year’s E-Discovery Day, ACEDS has teamed up with Exterro to offer a FREE Certified E-Discovery Specialist (CEDS) Standard Package ($1495 value) to two lucky winners. Enter to Win by Completing This Quick, Fun […].