Wed.Apr 22, 2020

article thumbnail

Cybercriminals Using Zoom, WebEx as Phishing Lures: Report

Data Breach Today

Campaigns Aimed at Stealing Credentials, Distributing Malware Cybercriminals are using spoofed messages and images from Zoom and Cisco WebEx as lures in new phishing campaigns that are designed to steal credentials or distribute malware, according to the security firm Proofpoint.

Phishing 314
article thumbnail

China-linked Winnti APT targets South Korean Gaming firm

Security Affairs

China-linked Winnti cyberespionage group targets South Korean video gaming company Gravity, QuoIntelligence (QuoINT) firm reported. Security experts from QuoIntelligence (QuoINT) firm reported that China-linked Winnti cyberespionage group targets South Korean video gaming company Gravity. The Winnti group was first spotted by Kaspersky in 2013, but according to the researchers the gang has been active since 2007.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SBA May Have Exposed Data on 8,000 Loan Applicants

Data Breach Today

Reports: Application Portal Flaw May Have Leaked Social Security Numbers, Other Data The U.S. Small Business Administration says a flaw in an online application portal may have exposed the personal data - including Social Security numbers - of approximately 8,000 loan applicants seeking help coping with the economic impact of the COVID-19 pandemic, according to news reports.

article thumbnail

Secure Together: Netflix scams and how to report suspicious emails

IT Governance

With the UK government recently confirming that the lockdown will be extended for a further three weeks, we hope you’re comfortable in your remote work set-up – or, at least, as comfortable as one can hope. The isolation will be challenging in the best of situations, but plenty of people – such as those with children or unruly housemates – are facing a particularly tough time.

Security 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

WHO, Gates Foundation Credentials Dumped Online: Report

Data Breach Today

NIH, CDC, World Bank Among the Other Organizations Apparently Affected About 25,000 email addresses and passwords that are apparently for staff at the World Health Organization, the Gates Foundation, the U.S. National Institutes of Health and other organizations have been dumped online, according to the Washington Post.

Passwords 205

More Trending

article thumbnail

Senate Report Affirms Russian Election Interference Findings

Data Breach Today

Fourth in Series of Reports Says Intel Agencies Made Correct Assessment A bipartisan Senate Intelligence Committee report released this week affirms that the U.S. intelligence community and its various agencies correctly assessed that Russia interfered in the 2016 U.S. presidential election.

IT 165
article thumbnail

DoppelPaymer Ransomware hits City of Torrance and demands a 680K+ ransom

Security Affairs

The City of Torrance of the Los Angeles metropolitan area, California, is the last victim of the DoppelPaymer Ransomware, hackers also stole its data. On Sunday, the computer systems in the city of Torrance suffered a cyber attack that interrupted access to email accounts and server functions. The City of Torrance is located in the South Bay along the Pacific coast, it has a population of approximately 150,000 people.

article thumbnail

EDPB Adopts Guidelines on the Processing of Health Data During COVID-19

Hunton Privacy

On April 21, 2020, the European Data Protection Board (“EDPB”) adopted Guidelines on the processing of health data for scientific purposes in the context of the COVID-19 pandemic. The aim of the Guidelines is to provide clarity on the most urgent matters relating to health data, such as legal basis for processing, the implementation of adequate safeguards and the exercise of data subject rights.

GDPR 96
article thumbnail

Fast-Moving DDoS Botnet Exploits Unpatched ZyXel RCE Bug

Threatpost

The rapidly evolving Hoaxcalls botnet is exploiting an unpatched vulnerability in the ZyXEL Cloud CNM SecuManager in a bid to widen its spread.

Cloud 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Amid Its Covid-19 Crisis, China Was Still Hacking Uighurs’ iPhones

WIRED Threat Level

Security researchers reveal a months-long, indiscriminate campaign targeting the iPhones of Chinese Muslims.

IT 115
article thumbnail

COVID-19 – Neo-Nazis spread a list of credentials for Gates Foundation, NIH, and WHO employees

Security Affairs

Nearly 25,000 email credentials allegedly from NIH, WHO, Gates Foundation and other organizations involved in the containment of COVID-19 pandemic are dumped online. While the principal organizations engaged in the fight against COVID-19 are the targets of conspiracy theories, a data dump containing email credentials from the Gates Foundation, World Health Organization (WHO), Center for Disease Control and Prevention (CDC), and a virology center based in Wuhan, appeared online.

article thumbnail

Google Sees State-Sponsored Hackers Ramping Up Coronavirus Attacks

WIRED Threat Level

More than 12 government-backed groups are using the pandemic as cover for digital reconnaissance and espionage, according to a new report.

article thumbnail

Earth Day 2020: Using Data and AI to bridge the gap between ethos and action

IBM Big Data Hub

The year 2020 could very well go down as the year that individuals, enterprises and governments worked more closely than ever to apply technology to solve the world’s most critical problems. Before the global response to COVID-19, world economic leaders attending the World Economic Forum Annual Meeting in Davos, Switzerland earlier this year were urged to tackle climate change by setting 2050 net-zero emissions targets.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Apple Patches Two iOS Zero-Days Abused for Years

Threatpost

Researchers revealed two zero-day security vulnerabilities affecting Apple's stock Mail app on iOS devices.

Security 101
article thumbnail

12 Steps to Data Intelligence: Part 1

Collibra

There are always analogies to describe the value of data. British data scientist Clive Humby famously called it ‘the new oil’ powering modern business. That metaphor lasted for more than a decade, but was, a bit pedantically, ridiculed for being a false equivalence. For example, oil is hoarded by the few whereas data must be ubiquitous and shared. Further comparisons with atomic energy and even outer space have been presented, indicating the limitless possibilities and dangers within. .

article thumbnail

Attackers Prefer Ransomware to Stealing Data

Dark Reading

Financial data is still in demand, but ransomware becomes the most popular way to try to cash in from compromised companies, according to Trustwave.

article thumbnail

NY Department of Financial Services Issues Guidance to Regulated Entities Regarding Cybersecurity During the COVID-19 Pandemic

Hunton Privacy

On April 13, 2020, the New York Department of Financial Services (“NYDFS”) issued guidance (“April guidance”) to all New York State entities covered under NYDFS’s cybersecurity regulation regarding assessing and addressing heightened cybersecurity risks due to the COVID-19 pandemic. In asking regulated entities to address risks “appropriately,” the April guidance references NYDFS’s earlier March 10, 2020 guidance calling on regulated institutions to submit to the agency (within 30 days of the gu

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Learning From the Honeypot: A Researcher and a Duplicitous Docker Image

Dark Reading

When Larry Cashdollar set up a honeypot in a Docker image, he found behavior that was more enlightening than he had imagined.

article thumbnail

LA County Hit with DoppelPaymer Ransomware Attack

Threatpost

The DoppelPaymer ransomware group is claiming that it launched a cyberattack against Torrance - and is now leaking the LA city's data online.

article thumbnail

NSA Issues Guidance for Combating Web Shell Malware

Dark Reading

The US intelligence agency teamed up with Australian Signals Directorate in newly released information on how to protect Web servers from the malware.

79
article thumbnail

COVID-19 and climate change

IT Governance

Today is Earth Day , an annual global event that aims to raise awareness of environmental issues. This year’s event – the fiftieth Earth Day – falls in the midst of an unprecedented interruption to life as we know it, and so provides a unique opportunity for us to understand the impact we and our working habits have on the natural world. The environmental benefits of staying at home.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Book Review: Records and Information Management 2nd Edition

IG Guru

April 22, 2020 Dr. Pat Franks is a well-known teacher and author throughout the Record and Information Management (RIM) profession. Her countless articles and publications have helped many of us run and manage our RIM programs. It is an honor to review her latest book, Records and Information management: Second Edition. It is no secret […]. The post Book Review: Records and Information Management 2nd Edition appeared first on IG GURU.

article thumbnail

SBA Security Incident May Affect Nearly 8,000 Businesses

Dark Reading

Business owners who applied for federal disaster loans may have had information exposed to other applicants, the Small Business Administration reports.

article thumbnail

Hackers Target Oil Companies as Prices Plunge

WIRED Threat Level

The sophisticated spear-phishing campaign hit as energy companies planned their response to falling crude prices. .

article thumbnail

8 Steps to Enhance Government Agencies' Security Posture

Dark Reading

Given the heterogeneous architectures of critical state and local systems, it's imperative we learn from the security exposures of other critical infrastructure and pledge to be better

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Small Businesses Tapping COVID-19 Loans Hit with Data Exposure

Threatpost

The SBA said sensitive information about applicants may have been revealed to others applying for disaster loan program funds.

article thumbnail

Making the Case for Process Documentation in Cyber Threat Intel

Dark Reading

Standard language and processes, not to mention more efficient dissemination of findings and alerts all make documenting your security processes a must

article thumbnail

Microsoft Issues Out-Of-Band Security Update For Office, Paint 3D

Threatpost

The flaws exist in Autodesk's FBX library, integrated in Microsoft's Office, Office 365 ProPlus and Paint 3D applications.