Wed.Oct 09, 2019

article thumbnail

FBI: Cybercriminals Are Bypassing Multifactor Authentication

Data Breach Today

Threat Actors Using Social Engineering, Other Technical Techniques to Circumvent MFA Protections The FBI is warning banks, businesses and other organizations that cybercriminals are using social engineering and other technical techniques to circumvent multifactor authentication security protections.

article thumbnail

SHARED INTEL: What it takes to preserve business continuity, recover quickly from a cyber disaster

The Last Watchdog

To pay or not to pay? That’s the dilemma hundreds of organizations caught in the continuing surge of crippling ransomware attacks have faced. Related: How ransomware became such a scourge The FBI discourages it, as you might have guessed. What’s more, the U.S. Conference of Mayors this summer even passed a resolution declaring paying hackers for a decryption key anathema.

IT 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Twitter Apologizes for Repurposing Phone Numbers

Data Breach Today

Phone Numbers Provided for Security Were Used for Targeted Advertising Twitter apologized on Tuesday for repurposing phone numbers provided by users for security features for use in targeted advertising, claiming the move was a mistake. Earlier, Facebook was reprimanded for a similar practice.

Security 181
article thumbnail

Security Tool Sprawl Reaches Tipping Point

Dark Reading

How a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

NSA Is Latest Intelligence Agency to Sound VPN Patch Alarm

Data Breach Today

Not Just Patch or Perish, But Also Pay Attention, Security Experts Warn The U.S. National Security Agency is the latest intelligence agency to warn that unpatched flaws in three vendors' VPN servers are being actively exploited by nation-state attackers. Security experts say such alerts, which are rare, are a clear sign that serious damage is being caused.

Security 175

More Trending

article thumbnail

Preventing Election Meddling: New Recommendations

Data Breach Today

Senate Intel Committee Calls for Congress, White House and Social Media Firms to Take Action To counter efforts to interfere in the 2020 presidential election, the Senate Intelligence Committee recommends new security measures for social media companies, new legislation and creating an interagency task force.

Security 171
article thumbnail

Illegal Data Center Hidden in Former NATO Bunker

Schneier on Security

Interesting : German investigators said Friday they have shut down a data processing center installed in a former NATO bunker that hosted sites dealing in drugs and other illegal activities. Seven people were arrested. [.]. Thirteen people aged 20 to 59 are under investigation in all, including three German and seven Dutch citizens, Brauer said. Authorities arrested seven of them, citing the danger of flight and collusion.

article thumbnail

HHS Proposes Allowing Cybersecurity Donations to Doctors

Data Breach Today

'Safe Harbor' Would Modify Stark Law, Anti-Kickback Regulations Federal regulators are proposing a "safe harbor" that would permit hospitals to donate certain cybersecurity software and services to physicians. The move would modify the so-called Stark Law and federal anti-kickback regulations.

article thumbnail

Multiple APT groups are exploiting VPN vulnerabilities, NSA warns

Security Affairs

NSA is warning of multiple state-sponsored cyberespionage groups exploiting enterprise VPN Flaws. Last week, the UK’s National Cyber Security Centre (NCSC) reported that advanced persistent threat (APT) groups have been exploiting recently disclosed VPN vulnerabilities in enterprise VPN products in attacks in the wild. Threat actors leverage VPN vulnerabilities in Fortinet, Palo Alto Networks and Pulse Secure, to breach into the target networks.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Report: Attacks Target Sites Running Volusion Payment Platform

Data Breach Today

Check Point Researcher Identifies Card Skimming Attacks on Sesame Street Live, Other Sites A security researcher has uncovered credit card skimming attacks targeting websites that use a cloud-based payment platform from Volusion. Among the victims: The Sesame Street Live online store.

Cloud 145
article thumbnail

Catches of the month: Phishing scams for October 2019

IT Governance

Security experts often warn us about the threat of phishing, but how are we supposed to know what a scam looks like in practice? Our ‘catches of the month’ series provides real-life examples to help you understand how to spot malicious emails. So, what do you need to look out for this month? 1. British Gas customers told they’re eligible for a refund.

article thumbnail

The Unspoken Insider Threat

Data Breach Today

When it comes to identifying and stopping malicious and even accidental insider threats, organizations are often overlooking a significant gap. Nathan Hunstad of Code42 discusses how to plug this costly leak.

IT 142
article thumbnail

Quick Threat Model Links October 2019

Adam Shostack

Trail of Bits released a threat model for Kubernetes. There’s some context from Aaron Small, who made the project happen. Continuum has a blog and a spreadsheet on threat modeling lambdas (as a category, not specific to Amazon Lambda), and also a post on threat modeling with CAPEC. Ntrepid has released a blog posts on “Threat Modeling for Managed Attribution” ( part 1 , part 2 , part 3 ) The W3C has updated the questionnaire it uses for web feature development, including questi

Privacy 75
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cheating at Professional Poker

Schneier on Security

Interesting story about someone who is almost certainly cheating at professional poker. But then I start to see things that seem so obvious, but I wonder whether they aren't just paranoia after hours and hours of digging into the mystery. Like the fact that he starts wearing a hat that has a strange bulge around the brim -- one that vanishes after the game when he's doing an interview in the booth.

article thumbnail

Researchers discovered a code execution flaw in NSA GHIDRA

Security Affairs

Security researchers discovered a code-execution vulnerability that affects versions through 9.0.4 of the Ghidra software reverse engineering (SRE) framework. GHIDRA is a multi-platform reverse engineering framework that runs on major OSs (Windows, macOS, and Linux). The framework was first mentioned in the CIA Vault 7 dump that was leaked in 2017.

article thumbnail

A Realistic Threat Model for the Masses

Dark Reading

For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here's why.

article thumbnail

vBulletin addresses three new high-severity vulnerabilities

Security Affairs

vBulletin has recently published a new security patch update that addresses three high-severity vulnerabilities in the popular forum software. vBulletin has recently published a new security patch update that addresses three high-severity flaws in vBulletin 5.5.4 and prior versions. The vulnerabilities could be exploited by remote attackers to take complete control over targeted web servers and steal sensitive user information.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How the Software-Defined Perimeter Is Redefining Access Control

Dark Reading

In a world where traditional network boundaries no longer exist, VPNs are showing their age.

Access 92
article thumbnail

Twitter inadvertently used Phone Numbers collected for security for Ads

Security Affairs

Twitter admitted having “inadvertently” used phone numbers and email addresses, collected for security purposes, for advertising. Twitter apologized to have used phone numbers and email addresses, privided by the users for security purposes, for advertising. According to the social media company, data used for account authentication were also matched with advertisers’ database to improve the efficiency of ads. “We recently discovered that when you provided an email addres

article thumbnail

Virginia a Hot Spot For Cybersecurity Jobs

Dark Reading

State has highest number of people in information security roles and the most current job openings, Comparitech study finds.

article thumbnail

Thai cafes forced to track customers' wifi use, sparking free speech fears

The Guardian Data Protection

Minister says law to retain browsing records would help monitor ‘fake news’, but critics say it will be used to stifle dissent The Thai government has come under fire for a new regulation that forces coffee shop owners to track and store the data of customers using their wifi, a move critics say will be used to stifle political dissent and free speech.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

USB Drive Security Still Lags

Dark Reading

While USB drives are frequent pieces of business hardware, a new report says that one-third of US businesses have no policy governing their use.

article thumbnail

Ops, popular iTerm2 macOS Terminal App is affected by a critical RCE since 2012

Security Affairs

Security experts discovered a critical remote code execution vulnerability, tracked as CVE-2019-9535, in the GPL-licensed iTerm2 macOS terminal emulator app. Security experts at cybersecurity firm Radically Open Security (ROS) discovered a 7-year old critical remote code execution vulnerability in the GPL-licensed iTerm2 macOS terminal emulator app.

article thumbnail

Twitter Slip-Up Spills MFA Phone Numbers, Emails to Advertisers

Dark Reading

Email addresses and phone numbers provided to secure user accounts were accidentally shared with marketers.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

Every so often, a technology comes along that seems to perfectly capture the zeitgeist : representing all that is both promising and troubling about the future. In the 1960s, you think of plastic, which was a pillar of a massively expanding consumer culture in the United States that put “convenience” above all else. That’s the joke behind the now-famous “advice” given to Dustin Hoffman’s Benjamin Braddock in the 1967 movie “The Graduate” by the old

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Most Americans Fail Cybersecurity Quiz

Threatpost

Study participants fail to correctly identify core security concepts and tools to help them stay safe online.

article thumbnail

Top 5 reasons to attend Enfuse 2019

OpenText Information Management

OpenText™ Enfuse 2019 is taking place at the Venetian Resort Las Vegas from November 11-14. Recognized by CIO.com as a “must attend” cybersecurity event, Enfuse is the top conference for digital investigators, legal teams, law enforcement and security professionals to network with experts and peers; learn about emerging trends in security, digital forensics and eDiscovery; … The post Top 5 reasons to attend Enfuse 2019 appeared first on OpenText Blogs.

article thumbnail

The Perils of Distracted Fighting

WIRED Threat Level

Opinion: Without proper guidelines, smartphones on the battlefield may kill more soldiers than they save.