Mon.Apr 08, 2019

article thumbnail

Attackers Shift to Malware-Based Cryptominers

Data Breach Today

Cryptocurrency Market Slide Makes In-Browser Mining Less Appealing Browser-based cryptocurrency miners are falling out of favor as virtual currency prices remain low, IBM says. But the company says malware-based miners are coming back, including fileless ones that rely on Powershell. Here's the lowdown.

Mining 265
article thumbnail

A Year Later, Cybercrime Groups Still Rampant on Facebook

Krebs on Security

Almost exactly one year ago, KrebsOnSecurity reported that a mere two hours of searching revealed more than 100 Facebook groups with some 300,000 members openly advertising services to support all types of cybercrime, including spam, credit card fraud and identity theft. Facebook responded by deleting those groups. Last week, a similar analysis led to the takedown of 74 cybercrime groups operating openly on Facebook with more than 385,000 members.

Passwords 194
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Congressional Report Rips Equifax for Weak Security

Data Breach Today

Senate Panel Says Company Lacked Strong Security Culture Before Massive Data Breach The lack of a strong security culture at Equifax - especially compared its two main competitors - was a key factor contributing to its 2017 data breach that exposed the personal records of 145 million Americans, according to a 71-page Congressional report.

article thumbnail

87% of organisations have an insufficient cyber security budget

IT Governance

Although organisations are devoting more resources to cyber security in order to tackle the growing threat of data breaches, 87% say they don’t have the budget to meet their needs, a new report has found. According to the EY Global Information Security Survey 2018–19 , organisations are forced to focus on the fundamentals of defence and neglect more advanced processes.

Security 110
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Planning for Financial Impact of Data Breaches

Data Breach Today

Healthcare organizations need to plan ahead for the financial burden of data breaches stemming from cyberattacks and also take preventive steps to help minimize those expenses, says attorney Laura Hammargren of the law firm Mayer Brown.

More Trending

article thumbnail

Attacking Phishing With SOAR

Data Breach Today

Myke Lyons of ServiceNow on Tackling Social Engineering Threats Phishing remains one of the most significant attack vectors, and security automation, orchestration and response, or SOAR, can help minimize the threat, says Myke Lyons of ServiceNow.

Phishing 174
article thumbnail

Recent Roaming Mantis campaign hit hundreds of users worldwide

Security Affairs

Kaspersky Lab reported that hundreds of users have been targeted with malware over the past month as part of a recent Roaming Mantis campaign. Security experts at Kaspersky Lab reported that hundreds of users have been targeted with malware over the past month as part of a new campaign associated with Roaming Mantis gang. Roaming Mantis surfaced in March 2018 when hacked routers in Japan redirecting users to compromised websites.

article thumbnail

Why prescriptive analytics and decision optimization are crucial

IBM Big Data Hub

Prescriptive analytics helps identify the best course of action that can enable businesses to achieve organizational goals. Although figuring out what you should do is a crucial aspect of business, the value of prescriptive analytics is often missed. There is still an inclination to “go with the gut” when looking at an array of possible scenarios. Read on to understand what prescriptive analytics is, how it relates to predictive analytics, and why it is critical to businesses today.

article thumbnail

Victims of Planetary Ransomware can decrypt their files for free

Security Affairs

Researchers at Emsisoft developed a decryptor for the Planetary Ransomware family that could allow victims to decrypt their files for free. Good news for the victims of the Planetary Ransomware, security firm Emsisoft has released a decryptor that allows victims to decrypt their files for free. The name Planetary ransomware comes from the use of the names of planets for the extensions the malicious code adds to the file names of encrypted files (i.e.mira,yum , Pluto, or.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Credential-Stuffing Attacks Behind 30 Billion Login Attempts in 2018

Dark Reading

Using e-mail addresses and passwords from compromised sites, attackers most often targeted retail sites, video-streaming services, and entertainment companies, according to Akamai.

Retail 82
article thumbnail

Production and predictive maintenance use cases for digital twins in manufacturing

OpenText Information Management

Ever-increasing volumes of information have changed the way manufacturers operate. More and more, manufacturers are adopting digital twins to help their organizations shift to digital-driven asset management. Last week, I shared how digital twins are transforming business through five use cases for digital twins in the Manufacturing industry. Today I’d like to share three production … The post Production and predictive maintenance use cases for digital twins in manufacturing appeared first

article thumbnail

Ignore the Insider Threat at Your Peril

Dark Reading

Attacks from insiders often go undiscovered for months or years, so the potential impact can be huge. These 11 countermeasures can mitigate the damage.

90
article thumbnail

Ghidra: NSA's Reverse-Engineering Tool

Schneier on Security

Last month, the NSA released Ghidra , a software reverse-engineering tool. Early reactions are uniformly positive. Three news articles.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

8 Steps to More Effective Small Business Security

Dark Reading

Small business face the same security challenges as large enterprises but with much smaller security teams. Here are 8 things to do to get the most from yours.

article thumbnail

Enterprise asset management puts focus on content for energy companies

OpenText Information Management

Assets are the lifeblood of the energy industry. As new layers of change – including deregulation, new legislation, new market entrants, new consumption patterns – impact the sector, enterprise asset management becomes key to the profitability and long-term sustainability for many oil and gas and utility companies. Effectively harnessing the data and information within the … The post Enterprise asset management puts focus on content for energy companies appeared first on OpenText Blogs.

article thumbnail

TP-Link Routers Vulnerable to Zero-Day Buffer Overflow Attack

Threatpost

Consumer router models allowed authenticated users to take unrestricted remote control over TL-WR940N and TL-WR941ND routers.

article thumbnail

RM outsourcing: what to look for in the team assigned to your records

TAB OnRecord

In a two-part blog post we are exploring the benefits and business case of records management outsourcing. In last week’s blog post we looked at the business benefits delivered by outsourcing the management of your active file rooms. These included, cost savings, increased revenue, and process efficiencies. Today, we discuss the top three things you should be looking for in the team that will be managing your records.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FINLAND: PARLIAMENT APPROVES NEW ACT ON THE SECONDARY USE OF SOCIAL AND HEALTH CARE PERSONAL DATA

DLA Piper Privacy Matters

By Joonas Dammert. Background. The Finnish Parliament has approved the new general Act on the Secondary Use of Social Welfare and Health Care Data (Laki sosiaali- ja terveystietojen toissijaisesta käytöstä, based on government proposal HE 159/2017) in March 2019. The Act shall become effective within the following weeks. The Act is a welcome change to the old regime where national provisions concerning the subject matter have been scattered into different regulations, namely the Patient’s Rights

article thumbnail

New Mirai Samples Grow the Number of Processor Targets

Threatpost

Researchers said that they discovered new Mirai samples in February 2019, capable of infecting devices powered by a broadened range of processors.

IoT 72
article thumbnail

8 Steps to More Effective Small Business Security

Dark Reading

Small business face the same security challenges as large enterprises but with much smaller security teams. Here are 8 things to do to get the most from yours.

article thumbnail

Gulf countries came under hackers’ spotlight in 2018, with more than 130 000 payment cards compromised

Security Affairs

Bahrain, 08.04.2019 – Group-IB, an international company that specializes in preventing cyberattacks , and NGN International, a global system integrator, analyzed cybersecurity landscape in Gulf countries in 2018. Group-IB Threat Intelligence team identified compromised credentials of 7 306 users from the Gulf countries in 2018 and detected the total of 138 978 compromised cards issued by the Gulf countries’ banks.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

'Exodus' Spyware Posed as a Legit iOS App

WIRED Threat Level

Researchers had already found a spyware app called Exodus plaguing Android. Now it's shown up on iPhones, too.

IT 74
article thumbnail

Take this waltz….

Micro Focus

Like many others hitting the blog, Mark Plant has just returned from the Micro Focus Universe in Vienna. A favorite city covered by one of his favorite artists Leonard Cohen and his classic Take this waltz. Did he find a bar where the boys have stopped talking because they’ve been sentenced to death by the. View Article.

article thumbnail

AeroGrow suffered a payment card data breach

Security Affairs

The developer, marketer, direct-seller, and wholesaler of indoor garden systems, AeroGrow International, suffered a payment card data breach. AeroGrow International, a developer, marketer, direct-seller, and wholesaler of indoor garden systems, recently notified customers of a payment card data breach. The incident impacted the company website. “On March 4, 2019, AeroGrow learned that an unauthorized person may have acquired, through the use of malicious code, the payment card information

article thumbnail

SAS 2019: Exodus Spyware Found Targeting Apple iOS Users

Threatpost

The surveillance tool was signed with legitimate Apple developer certificates.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft Products Under EU Investigation About Data Collection

Dark Reading

A new inquiry aims to determine whether contracts between Microsoft and EU organizations violate GDPR.

article thumbnail

Spam Campaigns Spread TrickBot Malware with Tax Lure

Threatpost

Three recent spam campaigns are pretending to be from ADP and Paychex; in reality, the malicious emails are spreading the TrickBot trojan.

article thumbnail

'Exodus' iOS Surveillance Software Masqueraded as Legit Apps

Dark Reading

Italian firm appears to have developed spyware for lawful intercept purposes, Lookout says.

69