Wed.Mar 16, 2022

article thumbnail

Adding Cybersecurity to the Curriculum

Data Breach Today

Gary Henderson: Educate Teachers So They Can Educate Students to Protect Their Data We look at cybersecurity largely focused on the immediate future. But educator Gary Henderson says we need to look a little further ahead. He makes the case for educating teachers about cybersecurity so they can educate their students, who can then go on to use those best practices in their careers.

article thumbnail

Hacker breaches key Russian ministry in blink of an eye

Security Affairs

In mere seconds, a hacker remotely accessed a computer belonging to a regional Russian Ministry of Health, taking advantage of sloppy cybersecurity practices to expose its entire network. Original post at [link]. Spielerkid89, who wished to remain anonymous, did not intend to harm the organization and left its systems intact. However, his experiment is a perfect example of how poor cyber hygiene can leave organizations vulnerable to cyber attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Impose Fine, Get Sued: A Day at the Irish DPC

Data Breach Today

Watchdog Fines Meta the Same Day It Gets Sued Over 'Inaction' in Google Case On Tuesday, Ireland's Data Protection Commission imposed an $18.6 million penalty on tech firm Meta. That same day, the privacy watchdog was sued by a member of the nonprofit Irish Council for Civil Liberties over its "prolonged inaction" in the Google data breach case.

article thumbnail

New Phishing Method Uses VNC to Bypass MFA Measures and Gives Cybercriminals Needed Access

KnowBe4

Despite cloud vendors like Google detecting reverse proxies or man-in-the-middle (MiTM) attacks and halting logons to thwart malicious actions, a new method easily gains access.

Access 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ukrainian Cyber Official Offers Update on 'IT Army'

Data Breach Today

Cyber Officials on Alert as Putin Advances, Hacktivists Continue Efforts War in Ukraine continues into its third week, and Russia is closing in on major Ukrainian cities, upping its targeting of civilian infrastructure. In the U.S., cybersecurity officials continue to urge a "Shields Up" approach - while the digital conflict has devolved deeply into the underground.

IT 257

More Trending

article thumbnail

Tennessee Pediatric Hospital Responding to Cyber Incident

Data Breach Today

Other Healthcare Entities Reporting Breaches Tied to Their Own Recent Attacks A Tennessee pediatric hospital is dealing with a cyber incident disrupting patient services, and a Missouri medical center and Colorado cardiology group have reported breaches linked to their recent security events. Experts say these are reminders of the threats facing healthcare sector entities.

Security 245
article thumbnail

Breaking RSA through Insufficiently Random Primes

Schneier on Security

Basically, the SafeZone library doesn’t sufficiently randomize the two prime numbers it used to generate RSA keys. They’re too close to each other, which makes them vulnerable to recovery. There aren’t many weak keys out there, but there are some: So far, Böck has identified only a handful of keys in the wild that are vulnerable to the factorization attack.

article thumbnail

Critical Steps: Applying Threat Modeling to Medical Devices

Data Breach Today

MITRE's Margie Zuk and Penny Chase Discuss FDA's Threat Modeling Playbook It is critical for medical device manufacturers to take a threat modeling approach early in a product's design stage, say MITRE medical device cybersecurity experts Margie Zuk and Penny Chase, co-authors of the recently released Playbook for Threat Modeling Medical Devices commissioned by the FDA.

article thumbnail

Ransomware-Related Data Leaks Increase 82% as the Number of Cybercriminal Groups Nearly Triples

KnowBe4

New insight into the state of the attacks and threats paints a picture where the cybercriminals are growing in number, sophistication and successes, while victims just sit back seemingly helpless.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Upcoming Executive Order on ID Theft: Key Points to Consider

Data Breach Today

A Panel of Experts Discuss the Vital Measures the Govt Must Consider What should be in the upcoming executive order to control identity theft in pandemic relief programs? John Buzzard, lead fraud and security analyst, Javelin Strategy & Research; Frank McKenna, chief fraud strategist, PointPredictive; and Jake Emry, fraud prevention SME, NICE Actimize; share ideas.

Security 209
article thumbnail

What the Newly Signed US Cyber-Incident Law Means for Security

Dark Reading

Bipartisan cybersecurity legislation comes amid increased worries over ransomware, and fears of cyberattacks from Russia in the wake of its invasion of Ukraine.

article thumbnail

Re-examining RTLS options in Healthcare

RFID Global Solution, Inc.

For years, hospitals and other medical care facilities have deployed systems to track the location of critical assets as they moved throughout their buildings. These Real Time Location Systems (RTLS), typically use some sort of active RFID technology that includes a battery powered beacon. The beacon transmits its presence every few seconds and this signal … Re-examining RTLS options in Healthcare Read More ».

IT 98
article thumbnail

Enhancing DLP With Natural Language Understanding for Better Email Security

Dark Reading

Natural language understanding is well-suited for scanning enterprise email to detect and filter out spam and other malicious content. Armorblox introduces a data loss prevention service to its email security platform using NLU.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Russia-linked threats actors exploited default MFA protocol and PrintNightmare bug to compromise NGO cloud

Security Affairs

FBI and CISA warn Russia-linked threats actors gained access to an NGO cloud after enrolling their own device in the organization’s Duo MFA. The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) warned that Russia-linked threat actors have gained access to a non-governmental organization (NGO) cloud by exploiting misconfigured default multifactor authentication (MFA) protocols and enrolled their own device in the organization’s Cisco’s

Cloud 90
article thumbnail

How Should My Security Analyst Use the MITRE ATT&CK Framework?

Dark Reading

As a curated knowledgebase for adversary behavior, the MITRE ATT&CK framework can guide defenders on how to conduct an investigation and the order of things to look for.

article thumbnail

Russia’s disinformation uses deepfake video of Zelenskyy telling people to lay down arms

Security Affairs

Russian disinformation continues, this time it used a deepfake video of Zelenskyy inviting Ukrainians to ‘lay down arms.’ A deepfake video of the Ukrainian president Volodymyr Zelenskyy telling its citizens to lay down arms is the last example of disinformation conducted by Russia-linked threat actors. The fake video shows President Zelenskyy saying ‘It turned out to be not so easy being the president’ ” “My advice to you is to lay down arms and return to your

article thumbnail

Why integration matters for your employees and your business

OpenText Information Management

Every organization depends on a variety of systems to get work done, and they usually exist in siloes scattered across the enterprise. This makes it almost impossible to have full visibility into the overall performance of the business, especially in rapidly growing organizations. Purposeful integration connects people, systems and things that matter and provides business … The post Why integration matters for your employees and your business appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CISA adds 15 new flaws to the Known Exploited Vulnerabilities Catalog

Security Affairs

The US Cybersecurity and Infrastructure Security Agency (CISA) added 15 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added 15 vulnerabilities to its Known Exploited Vulnerabilities Catalog. According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities , FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks

article thumbnail

‘CryptoRom’ Crypto-Scam is Back via Side-Loaded Apps

Threatpost

Scammers are bypassing Apple's App Store security, stealing thousands of dollars’ worth of cryptocurrency from the unwitting, using the TestFlight and WebClips programs.

article thumbnail

How Pen Testing Gains Critical Security Buy-in and Defense Insight

Dark Reading

It's more important than ever for companies to challenge their defenses, learning about new gaps and opportunities for improvement along the way.

article thumbnail

Another Destructive Wiper Targets Organizations in Ukraine

Threatpost

CaddyWiper is one in a barrage of data-wiping cyber-attacks to hit the country since January as the war on the ground with Russia marches on.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Five Ways HID Global iON Technology Boosts Card Issuance Productivity and Cuts Costs

HID Global

Five Ways HID Global iON Technology Boosts Card Issuance Productivity and Cuts Costs. dkappl. Wed, 03/16/2022 - 09:45.

98
article thumbnail

Secure and streamline collaboration by integrating with popular tools

OpenText Information Management

In the Modern Workplace, seamless integration between the tools your employees use most is vital. Empowering people to stay in their workflows – while integrations take place in the background – maximizes productivity and creates a positive employee experience. Microsoft Teams, for example, has become indispensable at many organizations to keep work moving wherever it … The post Secure and streamline collaboration by integrating with popular tools appeared first on OpenText Blogs.

article thumbnail

The Workaday Life of the World’s Most Dangerous Ransomware Gang

WIRED Threat Level

A Ukrainian researcher leaked 60,000 messages from inside the Conti ransomware group. This is what they reveal.

article thumbnail

Would 'Cyber Geneva Conventions' Defuse Online Aggression?

Dark Reading

International treaties could force nation-states to police bad actors within their borders to avoid penalties.

85
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

8 Interesting Predictions for the Intelligent Information Capture Market in 2022

Info Source

At the beginning of the year, I wrote out a list of predictions for 2022 and shared them on LinkedIn (and in Document Imaging Report ). Here’s my list again, plus more detailed thoughts on each prediction for the Intelligent Information Capture market: The future of work is partly remote – Increased remote work is the new normal The mix of business inputs accepted in case management solutions will increase AI-based platforms will pivot The subscription economy has reached the Capture marke

article thumbnail

Jamf Threat Labs research findings on cyber-warfare between Russia and Ukraine

Jamf

As the war between Russia and Ukraine continues, cybersecurity researchers identify the malicious threats that are occurring as cyber warfare unfolds. Virtually unseen by most, but affecting many, as malware variants, phishing campaigns, advanced persistent threats (APTs) and command & control (C2) attacks are unleashed, threatening to compromise the security of users on both sides.

article thumbnail

Alumna of San Jose State University Master of Archives and Records Administration (MARA) program talks about an exciting research project

IG Guru

The post Alumna of San Jose State University Master of Archives and Records Administration (MARA) program talks about an exciting research project appeared first on IG GURU.