Sat.May 22, 2021

article thumbnail

Attackers Allegedly Target Russian Federal Networks

Data Breach Today

Russian Federal Executive Authorities Hit by Cyberattacks in 2020 An unidentified nation-state hacking group targeted several Russian federal agencies as part of part of cyberespionage campaign that compromised the country’s federal networks to steal sensitive data, according to a report released by Russian security firm Solar JSOC.

Security 253
article thumbnail

Qlocker ransomware leverages HBS flaw to infect QNAP NAS devices

Security Affairs

QNAP warns customers of updating the HBS 3 disaster recovery app to prevent Qlocker ransomware attack. Taiwanese vendor QNAP is warning its customers of updating the HBS 3 disaster recovery app running on their Network Attached Storage (NAS) devices to prevent Qlocker ransomware infections. At the end of April, experts warned of a new strain of ransomware named Qlocker that was infecting hundreds of QNAP NAS devices on daily bases.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 244

Troy Hunt

For a week where I didn't think I had much to talk about, I was surprised by what I ended up with by the time I sat down to broadcast. Turns out there's always a lot to discuss, and that's before questions from the live audience as well. As I allude to at the end of this update, next week I'm going to have something really, really cool to announce that has been a long time in the works so keep an eye out for that one ??

article thumbnail

Air India suffered a data breach, 4.5 million customers impacted

Security Affairs

Air India disclosed a data breach that impacted roughly 4.5 million of its customers, two months after its Passenger Service System provider SITA was hacked. Air India has disclosed a data breach that impacted 4.5 million of its customers, exposed data includes the personal information of customers registered between August. 26, 2011 and February. 3, 2021.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Goodbye Internet Explorer—and Good Riddance

WIRED Threat Level

Microsoft will finally put the venerated, vulnerability-ridden browser out to pasture, but it's still got a year to cause some trouble.

IT 99

More Trending

article thumbnail

Apple Exec Calls Mac Malware Levels Unacceptable Under Oath

WIRED Threat Level

Ireland's ransomware crisis continues, a Russian scammer gets sentenced, and more of the week's top security news.

article thumbnail

Foreign hackers breached Russian federal agencies, said FSB

Security Affairs

FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have breached networks of Russian federal agencies. A joint report published by Rostelecom-Solar and the FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have stolen information from Russian federal agencies. The attacks were spotted in 2020, threat actors leveraged spear-phishing attacks, exploitation of vulnerabilities in web applications, hacking the inf

article thumbnail

If Apple is the only outfit capable of defending our privacy, it really is time to worry | John Naughton

The Guardian Data Protection

A giant private company is doing the work governments should be doing on regulation of user data. That’s not a good thing A few weeks ago, Apple dropped its long-promised bombshell on the data-tracking industry. The latest version (14.5) of iOS – the operating system of the iPhone – included a provision that required app users explicitly to confirm that they wished to be tracked across the internet in their online activities.

Privacy 76
article thumbnail

How to Avoid Those Infuriating Cookie Pop-Ups

WIRED Threat Level

Cookie consent notices are everywhere, and opting out of tracking is a pain. It doesn’t have to be this way.

IT 76
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.