Fri.Mar 19, 2021

article thumbnail

Purpose Built: Securing vSphere Workloads

Data Breach Today

Protecting Servers Is Foundational For Modern Data Center Security. View this OnDemand webinar to learn how VMware Carbon Black is delivering unified workload protection that’s purpose-built for vSphere.

Security 345
article thumbnail

Millions of sites could be hacked due to flaws in popular WordPress plugins

Security Affairs

Experts found vulnerabilities in two WordPress plugins that could be exploited to run arbitrary code and potentially take over a website. Security researchers disclosed vulnerabilities in Elementor and WP Super Cache WordPress plugins that could be exploited to run arbitrary code and take over a website under certain circumstances. The flaws were uncovered in the Elementor and WP Super Cache plugin, the former is a website builder plugin with over seven million installs while the latter has ov

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Charge Verkada Camera Hacker With 'Theft and Fraud'

Data Breach Today

Swiss Citizen Allegedly Leaked Multiple Victims' Stolen Data, Including Source Code A Swiss national who recently highlighted flaws in Verkada surveillance cameras has been charged with hacking by a U.S. federal grand jury, and accused of illegally accessing and leaking data from a number of organizations, apparently including Intel, Nissan and the U.S.

Access 341
article thumbnail

Russian National pleads guilty to conspiracy to plant malware on Tesla systems

Security Affairs

The Russian national who attempted to convince a Tesla employee to plant malware on Tesla systems has pleaded guilty. The U.S. Justice Department announced on Thursday that the Russian national Egor Igorevich Kriuchkov (27), who attempted to convince a Tesla employee to install malware on the company’s computers, has pleaded guilty. “A Russian national pleaded guilty in federal court today for conspiring to travel to the United States to recruit an employee of a Nevada company into a schem

Security 128
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers Used Trojanized Xcode to Target macOS Developers

Data Breach Today

Supply Chain Attack Hits Development Environment Hackers used Trojanized Xcode projects to install backdoors on developers' devices as part of a supply chain attack, according to security firm Sentinel Labs. Xcode is Apple's integrated development environment for macOS.

Security 334

More Trending

article thumbnail

Malicious Emails Target BP Pulse Customers

Data Breach Today

Electric Vehicle Charging Firm Investigating Criminal Campaign Criminals have been targeting customers of British electric vehicle charging infrastructure provider BP Pulse with malicious emails that appear to have been sent from legitimate accounts and domains tied to BP Chargemaster, which is what the service was previously called.

334
334
article thumbnail

CopperStealer Malware Targets Facebook and Instagram Business Accounts

Threatpost

A previously undocumented password and cookie stealer has been compromising accounts of big guns like Facebook, Apple, Amazon and Google since 2019 and then using them for cybercriminal activity.

Passwords 115
article thumbnail

WordPress LMS Tutor Plug-In Flaws Patched

Data Breach Today

Vulnerabilities Enabled Stealing of User Credentials Researchers at security firm Wordfence discovered vulnerabilities in Tutor LMS, a learning management WordPress plug-in installed on over 20,000 sites. The flaws have been patched.

Security 262
article thumbnail

Easy SMS Hijacking

Schneier on Security

Vice is reporting on a cell phone vulnerability caused by commercial SMS services. One of the things these services permit is text message forwarding. It turns out that with a little bit of anonymous money — in this case, $16 off an anonymous prepaid credit card — and a few lies, you can forward the text messages from any phone to any other phone.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Analysis: Microsoft Exchange Server Hacks

Data Breach Today

This edition of the ISMG Security Report features an analysis of the Microsoft Exchange on-premises server hacks – from who might have leaked the vulnerability exploits to how ransomware gangs are taking advantage of the flaws. Also featured: Tackling the cybercrime business model; assessing "zero trust.

article thumbnail

Millions of People Can Lose Sensitive Data through Travel Apps, Privacysavvy reports

Security Affairs

According to a report published by researchers at PrivacySavvy, many travel companies expose users’ data through their booking apps. In a report published on the 16 th of March by PrivacySavvy, many travel companies expose users’ data through their booking apps. PrivacySavvy is a digital security company on a mission to educate internet users on issues concerning their digital lives’ privacy.

article thumbnail

GAO: Electrical Grid's Distribution Systems More Vulnerable

Data Breach Today

Audit Recommends Energy Department Implement Better Protections The U.S. electrical grid's distribution systems that deliver electricity directly to customers are increasingly prone to cyberthreats, and the Department of Energy needs to do more to protect this critical infrastructure, according to a GAO audit.

241
241
article thumbnail

CISA and FBI warn of ongoing TrickBot attacks

Security Affairs

CISA and FBI are warning of ongoing TrickBot attacks despite security firms took down the C2 infrastructure of the infamous botnet in October. The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) warn of ongoing Trickbot attacks despite in October multiple security firms dismantled its C2 infrastructure in a joint operation.

Phishing 101
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Bogus Android Clubhouse App Drops Credential-Swiping Malware

Threatpost

The malicious app spreads the BlackRock malware, which steals credentials from 458 services - including Twitter, WhatsApp, Facebook and Amazon.

Security 114
article thumbnail

Out With the Old, In with the New: Five Members Join the California Privacy Protection Agency Board and California Attorney General Xavier Becerra Moves to HHS

DLA Piper Privacy Matters

The California Privacy Rights Act 2020 Initiative (“CPRA”) both amends the California Consumer Privacy Act (“CCPA”) and establishes the first administrative privacy agency in the US, the California Privacy Protection Agency (“CPPA”). The CPPA is charged with protecting the fundamental privacy rights of Californians with respect to their personal information.

Privacy 101
article thumbnail

AI: Ethical Underpinnings of Artificial Intelligence

Information Governance Perspectives

Futurist Roy Amara says that “We tend to overestimate the effect of a technology in the short run and underestimate the effect in the long run.” In Tomorrow's Jobs Today we interviewed over twenty of today's most innovative business leaders, like Dr. Anand Rao, to offer solid perspective on where we are today with Artificial Intelligence, Big Data, Block Chain, Privacy, and the Internet of Things, as well as a near-magical crystal ball into what tomorrow holds.

article thumbnail

How Us Shady Geeks Put Others Off Security

Dark Reading

Early adopters of security and privacy tools may be perceived by others as paranoid, which, in turn, may repel non-experts from protecting themselves online.

Security 106
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

An Agency Is Born: California Appoints Board of Its New California Privacy Protection Agency

Data Matters

On March 17, 2021, California officials announced the appointment of five board members of the California Privacy Protection Agency ( the “CPPA”), the first data protection agency in the United States. The CPPA, created by the California Privacy Rights Act (“CPRA”) which California voters approved in November 2020, is charged with promulgating the CPRA regulations; enforcing the CCPA and CPRA; and educating consumers about their privacy rights.

Privacy 88
article thumbnail

Office 365 Phishing Attack Targets Financial Execs

Threatpost

Attackers move on new CEOs, using transition confusion to harvest Microsoft credentials.

Phishing 128
article thumbnail

Threat actors are attempting to exploit CVE-2021-22986 in F5 BIG-IP devices in the wild

Security Affairs

Cybersecurity experts warn of ongoing attacks aimed at exploiting a recently patched critical vulnerability in F5 BIG-IP and BIG-IQ networking devices. Cybersecurity experts from NCC Group and Bad Packets security firm this week detected a wave of attacks exploiting a recently patched critical vulnerability, tracked as CVE-2021-22986 , in F5 BIG-IP and BIG-IQ networking devices.

article thumbnail

SolarWinds-Linked Attackers Target Microsoft 365 Mailboxes

Dark Reading

Researchers observe attackers altering mailbox folders to assign read-only permissions to any authenticated user on a target machine.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A SpaceX Engineer's Dark Web Insider Trading Sparks SEC First

WIRED Threat Level

“MillionaireMike” allegedly ran a stock tip scam that earned him $27,000 in bitcoin payments.

article thumbnail

Verkada Attacker Charged with Wire Fraud, Conspiracy in US

Dark Reading

Swiss national Till Kottmann and co-conspirators are accused of breaking into dozens of US companies and government entities.

article thumbnail

iOS developers targeted by new XcodeSpy malware

Jamf

XcodeSpy is a new supply-chain attack aimed at Mac developers. Here is how to detect and remediate it.

IT 83
article thumbnail

What’s new in OpenText Extended ECM Platform CE 21.1 and OpenText Content Suite Platform CE 21.1

OpenText Information Management

OpenText™ continues to push the boundaries of industry leading Content Services with these latest enhancements that provide better ways to use information to help businesses thrive. As flexible cloud solutions, OpenText™ Extended ECM Platform CE 21.1 and OpenText™ Content Suite Platform CE 21.1 empower organizations to accelerate operational transformation, provide deep connections between content and … The post What’s new in OpenText Extended ECM Platform CE 21.1 and OpenText Content Suit

ECM 58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Webinar: Emoji in Communication via the ARMA Mid-Michigan Chapter on Thursday, March 25th, 12-1pm Eastern

IG Guru

A Free Web Event The percentage of the connected population utilizing emoji in workplace communication has increased from 33% in 2016 to 77% today. More than 26 million custom emoji have been created in Slack and the use of emoji in Teams is universal, revolutionizing the way we communicate. Some employees have entire discussions with just emoji, […].

article thumbnail

Episode 207: Sarah Tatsis of BlackBerry on finding and Keeping Women in Cyber

The Security Ledger

In this week’s episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the information security field. The post Episode 207: Sarah Tatsis of BlackBerry on finding and Keeping Women in Cyber. Read the whole entry. » Related Stories Encore Edition: Veracode CEO Sam King on Infosec’s Leaky Talent Pipeline Episode 205 – Google’s Cam

article thumbnail

Why is most of the 20th Century invisible to AI?

CILIP

Why is most of the 20th Century invisible to AI? Copyright has created a digital dark age where the most powerful tools for cultural analysis are blind between 1910 and the rise of social media, says Melissa Terras , Professor of Digital Culture at Edinburgh University and keynote speaker at CILIP?s Copyright Conference 2021. Risk aversion is the issue that Professor Melissa Terras returns to again and again when she talks about copyright.