Thu.Apr 23, 2020

article thumbnail

When in Doubt: Hang Up, Look Up, & Call Back

Krebs on Security

Many security-conscious people probably think they’d never fall for a phone-based phishing scam. But if your response to such a scam involves anything other than hanging up and calling back the entity that claims to be calling, you may be in for a rude awakening. Here’s how one security and tech-savvy reader got taken for more than $10,000 in an elaborate, weeks-long ruse.

Phishing 358
article thumbnail

Prosecutors: Insider 'Sabotaged' Medical Equipment Shipments

Data Breach Today

Hacker Disrupted Delivery of Supplies Used in COVID-19 Crisis, DOJ Says The former vice president of finance at a Georgia-based medical supplies company has been charged with hacking into the firm's computers and "sabotaging" shipment of personal protective equipment in the midst of the COVID-19 crisis.

327
327
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Bring Business Process Management to Your Business

AIIM

Businesses looking for ongoing growth and scalability try to achieve these goals through different approaches that can provide “that extra advantage.” One such approach is business process management , which aims to find and make ongoing improvements in the operations of a business. This is currently a popular tactic in the business world, featuring various applications, techniques, and tools which make it a complex field of business development.

article thumbnail

Apple Rushes to Patch iOS Zero-Day Flaws

Data Breach Today

Vulnerabilities Have Likely Been Exploited for Years, Researchers Warn Apple is now preparing final patches for two zero-day vulnerabilities that a security firm says have been exploited by certain attackers to seize control of iPhone and iPad email apps, giving them access to users' messages.

Access 258
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

White-Hat Hackers Help 'Fold' COVID-19 Proteins

Dark Reading

A grassroots effort provides scientists with computing power to help simulate the novel coronavirus' proteins and come up with therapeutic solutions for the disease.

145
145

More Trending

article thumbnail

State-sponsored hackers are using COVID-19 lures, Google warns

Security Affairs

Google warns that nation-backed hackers are exploiting the COVID-19 pandemic to organizations involved in the fight against the pandemic. Google is warning that nation-state actors are exploiting the COVID-19 (Coronavirus) pandemic to target health care organizations and entities involved in the fight against the pandemic. Google’s Threat Analysis Group (TAG) shared its latest findings related to state-backed attacks and revealed that it has identified more than a dozen state-sponsored groups us

Phishing 126
article thumbnail

US, UK Authorities Crack Down on Suspicious COVID-19 Domains

Data Breach Today

Scam Sites Used to Spread Malware, Steal Credentials, Officials Say U.S. and U.K. law enforcement officials have shut down hundreds of suspicious domains with COVID-19 names and themes that have been used to support criminal efforts to steal credentials, spread malware and spoof government sites and programs.

article thumbnail

Expert identifies new Nazar APT group referenced in 2017 Shadow Brokers leak

Security Affairs

A security expert uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017. Juan Andres Guerrero-Saade, a former Kaspersky and Google researcher, uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017.

Libraries 105
article thumbnail

Remote Workforce: Securing the Next Normal

Data Breach Today

SailPoint's Mike Kiser on Rising Need for Zero Trust, Cloud Governance The global pandemic has revealed a lot about the extended remote workforce and its haves and have-nots, says Mike Kiser of SailPoint Technologies. In a preview of an upcoming virtual roundtable, he describes the cybersecurity forces shaping the new post-crisis workforce.

Security 147
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Discover patterns and prescribe actions on a multicloud data and AI platform

IBM Big Data Hub

Innovation and adaptability are more vital than ever. Our ability to discover new insights, examine patterns and build hypotheses continuously helps us adjust and improve our response to rapidly changing conditions. The Innovator’s DNA by Jeff Dyer, et.al describes five discovery skills which are essential in helping innovators generate new growth opportunities: associating, questioning, observing, networking and experimenting.

97
article thumbnail

COVID-19 Contact-Tracing App Must-Haves: Security, Privacy

Data Breach Today

Governments Have One Chance to Earn Users' Trust, Says Security Expert Alan Woodward Many governments are pursuing contact-tracing apps to combat COVID-19, but such projects risk subjecting populations to invasive, long-term surveillance - as well as insufficient adoption - unless they take an open, transparent and as decentralized approach, says cybersecurity expert Alan Woodward.

Privacy 147
article thumbnail

Uptick in RPA Software Adoption Reveals Need for Anti-Hacking Training

Security Affairs

With smart-working many companies turn to tools like robotic process automation (RPA software) to help make adjustments on the business processes … is it secure? In response to the Coronavirus pandemic, many companies have adjusted how they do business. As they shift to remote work and establish new policies, some companies find these changes to be challenging undertakings.

article thumbnail

WHO, CDC and Bill and Melinda Gates Foundation Victims of Credential Dump, Report

Threatpost

Hackers have used credentials allegedly stolen from the WHO, CDC and other notable groups to spread coronavirus misinformation online.

Passwords 103
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft issued Out-of-Band advisory to address Autodesk FBX flaws

Security Affairs

Microsoft released an out-of-band advisory to address security vulnerabilities affecting Autodesk FBX vulnerabilities in Office, Office 365, and Paint 3D. . Researchers from Autodesk discovered multiple vulnerabilities that affect the Autodesk FBX software development kit (SDK), the issues could lead to code execution and trigger denial of service conditions. .

article thumbnail

Chinese COVID-19 Disinformation Campaign

Schneier on Security

The New York Times is reporting on state-sponsored disinformation campaigns coming out of China: Since that wave of panic, United States intelligence agencies have assessed that Chinese operatives helped push the messages across platforms, according to six American officials, who spoke on the condition of anonymity to publicly discuss intelligence matters.

120
120
article thumbnail

Skype Phishing Attack Targets Remote Workers’ Passwords

Threatpost

Attackers are sending convincing emails that ultimately steal victims' Skype credentials.

Passwords 116
article thumbnail

Vietnam-linked APT32 group launches COVID-19-themed attacks against China

Security Affairs

The Vietnam-linked cyberespionage group tracked as APT32 carried out hacking campaigns against Chinese entities to collect intelligence on the COVID-19 crisis. Vietnam-linked APT group APT32 , also known as OceanLotus and APT-C-00, carried out cyber espionage campaigns against Chinese entities to gather intelligence on the COVID-19 crisis. The APT32 group has been active since at least 2012, it has targeted organizations across multiple industries and foreign governments, dissidents, and journal

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Valve Confirms CS:GO, Team Fortress 2 Source-Code Leak

Threatpost

Leaked source code for Counter-Strike: Global Offensive and Team Fortress 2 has led to widespread gamer worries about security and cheating.

article thumbnail

5 Ways to Prove Security's Worth in the Age of COVID-19

Dark Reading

Tightened budgets are placing jobs at risk, but security pros say they're armed with ways to demonstrate that what they're doing merits keeping them employed.

article thumbnail

COVID-19: Walking the Line Between Worker Safety and Privacy

Data Matters

The COVID-19 pandemic poses unprecedented challenges for employers. Businesses must walk the line between keeping workers safe and respecting their privacy. How do employers ensure a safe and healthy workplace? And how do they manage layoffs, furloughs and benefits in this rapidly deteriorating economic environment? Our latest episode of The Sidley Podcast grapples with those questions and many others.

Privacy 74
article thumbnail

Enablement, security and onboarding in unexpected environments

Jamf

Allen Houchins, Senior Director of IT at Jamf, discusses how Jamf — amid the unpredictability of today’s environment — was poised to transition to an entirely remote workforce in under 24 hours while ensuring our staff had the same capabilities and processes as before.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A Dozen Nation-Backed APTs Tap COVID-19 to Cover Spy Attacks

Threatpost

Iran's Charming Kitten and other nation-state actors are using the coronavirus pandemic to their advantage, for espionage.

article thumbnail

How the Dark Web Fuels Insider Threats

Dark Reading

New decentralized, criminal marketplaces and "as-a-service" offerings make it easy for employees to monetize their knowledge and access to enterprise networks and systems.

Access 105
article thumbnail

Looking to build a partner ecosystem? Here’s some advice.

DXC Technology

The current times have been a stark reminder that we are all in this together and no one can do it alone. Partnerships in business, government and even in our personal lives are more important now than ever. When building a partner ecosystem, there are some very basic steps that can be taken to achieve […].

article thumbnail

Demand for Cybersecurity Jobs Declines But Still Outperforms Other Sectors

Dark Reading

While companies are cutting back on plans to hire, cybersecurity and the technology industry as a whole are doing better than the general economy.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Fake Skype, Signal Apps Used to Spread Surveillanceware

Threatpost

Threat groups are increasingly relying on trojanized apps pretending to be legitimate - such as Skype or Signal - but are really spreading surveillanceware.

73
article thumbnail

Benefits of OpenText Magellan for the aviation industry

OpenText Information Management

The airline industry has been growing at an outstanding rate with an annual growth rate about 6% worldwide in passenger load for the past decade. The airport transport industry around the globe has faced extreme challenges in handling high volumes of passengers due to the economy growth and most of them are already operating at … The post Benefits of OpenText Magellan for the aviation industry appeared first on OpenText Blogs.

article thumbnail

Public Sector Ransomware Attacks Rage On: Can Your Organization Repel Them?

Threatpost

To pay or not to pay continues to be the question as ransomware targets cities, even amid COVID-19.