Mon.May 10, 2021

article thumbnail

Colonial Pipeline Starts Recovery from Ransomware

Data Breach Today

Report: DarkSide Ransomware Gang Infected Fuel Supplier Colonial Pipeline Company has restored smaller pipelines that ship fuels to the U.S. East Coast after a ransomware incident, but its larger ones are still offline as it assesses safety. Citing U.S. officials, the Associated Press reports the company was infected by the DarkSide ransomware group.

article thumbnail

RSAC insights: CyberGRX finds a ton of value in wider sharing of third-party risk assessments

The Last Watchdog

The value of sharing threat intelligence is obvious. It’s much easier to blunt the attack of an enemy you can clearly see coming at you. Related: Supply chains under siege. But what about trusted allies who unwittingly put your company in harm’s way? Third-party exposures can lead to devastating breaches, just ask any Solar Winds first-party customer.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More Healthcare Disruptions Tied to Vendor Incidents

Data Breach Today

Pharmacy Administration Vendor, EMR Hosting Firm Among Latest Victims Two companies that serve the healthcare sector have reported disruptive cyber incidents affecting their clients, the latest in a string of similar supply chain incidents.

312
312
article thumbnail

Colonial Pipeline Cyberattack: What Security Pros Need to Know

Dark Reading

As the massive US pipeline operator works to restore operations after a DarkSide ransomware attack late last week, experts say it's a cautionary tale for critical infrastructure providers.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Pipeline Attack: 'Time for a Disproportionate Response'

Data Breach Today

Philip Reitinger of Global Cyber Alliance on Responding to Latest Ransomware Incident It’s serious, impactful and raises new questions about critical infrastructure protection. But don’t tell Philip Reitinger of the Global Cyber Alliance that the Colonial Pipeline ransomware attack is any kind of a “wakeup call.” He says we’re long past that.

More Trending

article thumbnail

FBI: DarkSide Ransomware Used in Colonial Pipeline Attack

Data Breach Today

Company Moves Into Remediation Phase; White House Monitoring Incident The FBI and White House confirmed Monday that the DarkSide ransomware variant was used in the Friday attack that caused disruptions at Colonial Pipeline Co., which operates a pipeline that supplies fuel throughout the eastern U.S. But the gang behind the ransomware tried to shift the blame to an affiliate.

article thumbnail

FBI confirmed that Darkside ransomware gang hit Colonial Pipeline

Security Affairs

The U.S. FBI confirmed that the attack against the Colonial Pipeline over the weekend was launched by the Darkside ransomware gang. The U.S. Federal Bureau of Investigation confirmed that the Colonial Pipeline was shut down due to a cyber attack carried out by the Darkside ransomware gang. “The FBI confirms that the Darkside ransomware is responsible for the compromise of the Colonial Pipeline networks.

article thumbnail

Malspam Campaign Used Hancitor to Download Cuba Ransomware

Data Breach Today

Attackers Co-Opted Malware for Data Exfiltration and Ransom, Group-IB Finds Attackers co-opted the Hancitor malware downloader and recently used it to deliver Cuba ransomware as part of an email spam campaign for data exfiltration and ransom extortion, a new report by security firm Group-IB finds.

article thumbnail

Ransomware Shuts Down US Pipeline

Schneier on Security

This is a major story : a probably Russian cybercrime group called DarkSide shut down the Colonial Pipeline in a ransomware attack. The pipeline supplies much of the East Coast. This is the new and improved ransomware attack: the hackers stole nearly 100 gig of data, and are threatening to publish it. The White House has declared a state of emergency and has created a task force to deal with the problem, but it’s unclear what they can do.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

OnDemand | From Endpoint to Cloud: 2021 Best Practices for Securing a Data Path

Data Breach Today

50% of phishing attacks targeting financial services intend on stealing corporate login credentials View this session to learn why mobile threat exposures continue to increase & best practices for mitigating the threats.

article thumbnail

City of Tulsa, is the last US city hit by ransomware attack

Security Affairs

The city of Tulsa, Oklahoma, has been hit by a ransomware attack over the weekend that impacted its government’s network and shut down its websites. One of the biggest cities in the US by population size, the City of Tulsa, was victim of a ransomware attack that affected its government’s network and forced the shutdown of official websites over the weekend.

article thumbnail

Google Play to Require Android App Data Privacy and Security Disclosures

Hunton Privacy

On May 6, 2021, Google announced that beginning in the second quarter of 2022, mobile app developers submitting new apps and app updates to the Google Play store will be required to disclose certain information regarding their apps’ data collection, use, sharing and security practices, as well as provide a privacy policy for their apps. This information will be displayed in a new “safety section” of Google Play.

Privacy 112
article thumbnail

10 Security Awareness Training Mistakes to Avoid

Dark Reading

Give your cybersecurity culture a boost by adding these to the "don't" column of your cybersecurity awareness training do's and don'ts list.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ARMA Report: 2021 ARMA IG Maturity Index

IG Guru

The Information Governance Maturity Index Report—2021 presents the results of the IG Maturity Index Survey conducted in the last quarter of 2020. The survey and index are intended to create a definitive, data-driven benchmark for information governance (IG). The survey aligns with ARMA’s Information Governance Implementation Model (IGIM) and is designed to measure overall IG program maturity […].

article thumbnail

Apple Execs Chose to Keep a Hack of 128 Million iPhones Quiet

WIRED Threat Level

Emails from the Epic Games lawsuit show Apple brass discussing how to handle a 2015 iOS hack. The company never directly notified affected users.

Security 105
article thumbnail

WhatsApp will not deactivate accounts for not accepting new privacy terms

Security Affairs

WhatsApp will not deactivate the accounts of users who don’t accept the new privacy policy update that requires sharing data with other companies owned by Facebook. WhatsApp on Friday announced that it will not deactivate accounts of users who don’t accept its new privacy policy that will be rolled out on May 15. The company will only continue to remind its users to accept the new privacy policy. “No one will have their accounts deleted or lose functionality of WhatsApp on May

Privacy 96
article thumbnail

Google and iPad: Maximizing the power of multiple ecosystems

Jamf

In education specifically, schools invested in Google education tools or considering these services may believe Chromebook is the only viable hardware to take advantage of Google. However, blending the best of Google services on Apple hardware opens the door to a wealth of educational possibilities for students, teachers and parents.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Colonial Pipeline’s Ransomware Attack Sparks Emergency Declaration

Threatpost

Security researchers mull possible perpetrators of the attack, and warned that the incident could be a harbinger of things to come. .

article thumbnail

Ariane Seiferth and Abi Aminu of Thales Recognized in CRN’s 2021 Women of the Channel List

Thales Cloud Protection & Licensing

Ariane Seiferth and Abi Aminu of Thales Recognized in CRN’s 2021 Women of the Channel List. madhav. Mon, 05/10/2021 - 13:56. At Thales, we are thrilled to celebrate the news that CRN ® , a brand of The Channel Company , has named Ariane Seiferth, Director Americas Channel, and Abi Aminu, Americas Channel Programs Manager, to the highly respected Women of the Channel list for 2021.

Sales 71
article thumbnail

Embracing our PLANET Together

Micro Focus

Bringing people together who are passionate about reducing their environmental impact – this is the spirit of Micro Focus’ newest employee resource group (ERG) called PLANET, dedicated to sustainability awareness and advocacy. As Micro Focus celebrates Earth Day and Beyond, it’s an opportunity to put the spotlight on our PLANET ERG and show how it supports the.

IT 73
article thumbnail

Exchange Exploitation: Not Dead Yet

Dark Reading

The mass exploitation of Exchange Servers has been a wake-up call, and it will take all parties playing in concert for the industry to react, respond, and recover.

IT 82
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Lemon Duck Cryptojacking Botnet Changes Up Tactics

Threatpost

The sophisticated threat is targeting Microsoft Exchange servers via ProxyLogon in a wave of fresh attacks against North American targets.

81
article thumbnail

Four Plead Guilty to RICO Conspiracy Involving Hosting Services for Cybercrime

Dark Reading

The "bulletproof hosting" organization hosted malware including Zeus, SpyEye, Citadel, and the Blackhole Exploit Kit.

123
123
article thumbnail

Is Shadow IT Putting Your Business Data at Risk?

OneHub

What is shadow IT? Shadow IT refers to your employees’ use of software, apps, email, browsers, or devices that aren’t part of your company’s approved technology plan. This tech is outside your IT team’s control and may violate security protocols. It creates a serious cybersecurity risk that could cost your company millions. It also means all the money spent on authorized devices, apps, and software is going to waste.

Risk 52
article thumbnail

Tulsa Deals With Aftermath of Ransomware Attack

Dark Reading

Weekend attack shuts down several city sites and service.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Postmates Delivers Intuitive, Review-Ready Slack Data Exports With the Help of Hanzo Hold

Hanzo Learning Center

Postmates—a rapidly growing delivery service—considers the collaboration platform Slack to be a critical component of its business communications. As the importance of Slack has grown, the IT team was concerned by how long it took to search for and export data for internal investigations and ediscovery matters. Rather than having his engineers as a persistent bottleneck, the head of IT at Postmates was determined to find a solution that would allow HR professionals and lawyers to quickly search

article thumbnail

Comma – connecting people, technology and data

Information Matters

As data increasingly becomes a strategic tool for companies as well as a competitive differentiator, building the skills and capabilities to move into a data-driven future is a growing challenge Read more. The post Comma – connecting people, technology and data appeared first on Information Matters.

52
article thumbnail

10 Questions Every CFO Should Ask About Invoice Automation

Docuware

As we look toward the third quarter of 2021, economic recovery is well underway. The issues that are up for debate include how much and how fast the economy will bounce back. In the past two years, many companies turned to technology to enable efficient work at home and provide the business agility demanded by quick and unexpected shifts in the economic climate According to a CFO magazine article, 10 Vital Roles for CFOs , “Digital fluency is more important as finance departments increasingly us

48