Thu.Apr 14, 2022

article thumbnail

APTs Using New Tools to Target ICS/SCADA

Data Breach Today

US Government Agencies, Mandiant, Dragos, Schneider Electric Issue Joint Advisory U.S. government agencies, including the Department of Energy, CISA, the NSA and the FBI issued a joint cybersecurity advisory about advanced persistent threat actors using new tools and malwares to target industrial control systems and supervisory control and data acquisition devices.

article thumbnail

BEST PRACTICES: Blunting ‘BEC’ capers that continue to target, devastate SMBs and enterprises

The Last Watchdog

It’s no secret that cyberattacks can happen to any business, and we should all be suspicious of messages from unfamiliar senders appearing in our email inboxes. Related: Deploying human sensors. But surely, we can feel confident in email communications and requests from our organization’s executives and fellow coworkers, right? The short answer: Not always.

Phishing 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Disrupt Cyberattack Aimed at Pacific Communications

Data Breach Today

Target Was Submarine Cable Servers Covering 95% of Regional Telecommunications A branch of the U.S. Department of Homeland Security says that it stopped an international hacking group from launching a major cyberattack on an underground cable system's servers. If the attackers had been successful, the incident could have become a national security threat, security experts say.

article thumbnail

5 Recommendations for a Hybrid Cloud and On-Prem Approach

AIIM

Cloud-based systems and applications are popular across organizations in all industries today and are largely regarded as a powerful platform for process innovation and improved organizational performance. According to the IDG 2021 Cloud Computing Survey , the majority (55%) of organizations are now using more than one public cloud. Cloud adoption has also reached more than two-thirds in every industry.

Cloud 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Strategies to Modernize Ransomware Response

Data Breach Today

Accenture's Robert Boyce on Adopting an Effective Communications Plan Accenture's new ransomware report reveals key challenges in executing an effective communications plan. Robert Boyce, managing director of global cyber response, discusses why existing recovery strategies aren't enough and offers practical steps for managing a ransomware response.

More Trending

article thumbnail

Russia-Ukraine Crisis: What's the Threat to Energy Sector?

Data Breach Today

The latest edition of the ISMG Security Report analyzes the latest cyberthreats to the energy sector as Russia's invasion of Ukraine continues. It also examines best practices for Customer Identity and Access Management and how healthcare institutions can sharpen their defense strategies.

Access 263
article thumbnail

Privacy by Design and Data Minimisation

Data Matters

*This article was first published by Global Data Review in March 2022. “Privacy by design” refers to the practice of integrating and embedding privacy and data protection into the development and implementation of information technology systems, business practices and policies, and products and applications. Despite the fact that the concept of privacy by design has existed for a long time, many organizations still struggle with how to meet and implement the requirements in practice.

Privacy 97
article thumbnail

Obsidian Security Raises $90M to Safeguard More SaaS Apps

Data Breach Today

Funding Will Help Obsidian Security Stop Session Hijacking on More Platforms Obsidian Security has closed a Series C funding round to prevent session hijacking on more platforms and increase the number of SaaS applications being defended. Obsidian wants to go from protecting 25 major SaaS applications today to safeguarding hundreds of SaaS applications in a year or two.

Security 263
article thumbnail

US gov agencies e private firms warn nation-state actors are targeting ICS & SCADA devices

Security Affairs

The US government agencies warned of threat actors that are targeting ICS and SCADA systems from various vendors. The Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) published a joint Cybersecurity Advisory (CSA) to warn of offensive capabilities developed by APT actors that could allow them to compromise multiple industrial control system (ICS)/supervisory control and data

Passwords 104
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Lawsuit Filed Against SuperCare in Breach Affecting 318,000

Data Breach Today

Proposed Class Action Litigation Follows a Familiar Trend, Experts Say A lawsuit filed alleges, among other claims, that respiratory care provider SuperCare Health Inc. was negligent in failing to protect sensitive health information from a 2021 hacking incident affecting more than 300,000 patients. Experts say the litigation follows an increasingly familiar trend.

261
261
article thumbnail

7 Ways to Reduce Ediscovery Costs

Hanzo Learning Center

There’s no way around it: ediscovery can be expensive. With the constantly expanding universe of data—and the continually growing variety of business applications giving rise to new data formats and new ediscovery challenges—legal teams face considerable challenges in managing their ediscovery budgets. When an organization needs to conduct an investigation or respond to the threat of litigation, combing through its data to identify and eventually produce relevant information consumes considerabl

IT 104
article thumbnail

Microsoft Disrupts ZLoader Botnet in Global Operation

Data Breach Today

Tech Firm Seizes 65 Domains Used by ZLoader Operators Microsoft says it has seized control of 65 domains that the ZLoader gang has been using to grow, control and communicate with its botnet. ZLoader, a descendant of the ubiquitous Zeus banking malware, is run by a global, internet-based, organized crime gang operating malware as a service.

article thumbnail

Reduce Your Chances of Getting Scammed

KnowBe4

In today's connected world, nearly everyone has a story where they have been targeted by a scam and either that person or someone they know have lost money to scams.

Phishing 102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Feds: APTs Have Tools That Can Take Over Critical Infrastructure

Threatpost

Threat actors have developed custom modules to compromise various ICS devices as well as Windows workstations that pose an imminent threat, particularly to energy providers.

98
article thumbnail

Weekly Update 291

Troy Hunt

Bit of a long one this week, just due to a bunch of stuff all coinciding at the same time. The drone is obviously the coolest one and it was interesting to hear other people's experiences with theirs. This is just super cool tech and I can't remember the last time I looked at a consumer product and thought "wow, I didn't know they could do that!

article thumbnail

Critical VMware Workspace ONE Access CVE-2022-22954 flaw actively exploited

Security Affairs

Threat actors are actively exploiting a critical vulnerability in VMware Workspace ONE Access and Identity Manager recently patched by the vendor. Threat actors are actively exploiting a critical flaw, tracked as CVE-2022-22954 , in VMware Workspace ONE Access and Identity Manager recently patched by the vendor. Researchers from cyber threat intelligence BadPackets also reported that the vulnerability is actively exploited in the wild.

Access 92
article thumbnail

Strategies to Achieve Compliance and Real Risk Reduction at the Same Time

KnowBe4

Organizations like yours use regulatory guides and compliance frameworks as the foundation of their list of controls. You can easily have many hundreds to thousands of controls to create and manage.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CISA adds Windows CLFS Driver Privilege Escalation flaw to its Known Exploited Vulnerabilities Catalog

Security Affairs

The U.S. CISA added the CVE-2022-24521 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the CVE-2022-24521 privilege escalation vulnerability in Microsoft Windows Common Log File System (CLFS) Driver. According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities , FCEB agencies have to address the ident

IT 91
article thumbnail

Elon Musk Is Right About Twitter

WIRED Threat Level

It really is the closest thing we have to an online public square—and that's terrible for democracy. Let his takeover bid be a wakeup call.

IT 102
article thumbnail

The Misconceptions of 2021's Black Swan Cyber Events

Dark Reading

Organizations can defend themselves from future unknows attacks by implementing targeted security hardening measures, turning on built-in security protections, and leveraging existing technology stack to achieve microsegmentation and credential hygiene.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at Future Summits in Antwerp, Belgium on May 18, 2022. I’m speaking at IT-S Now 2022 in Vienna on June 2, 2022. I’m speaking at the 14th International Conference on Cyber Conflict, CyCon 2022, in Tallinn, Estonia on June 3, 2022. I’m speaking at the RSA Conference 2022 in San Francisco, June 6-9, 2022.

IT 76
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Data Scientists, Watch Out: Attackers Have Your Number

Dark Reading

Researchers should take extra care in deploying data-science applications to the cloud, as cybercriminals are already targeting popular data-science tools such as Jupyter Notebook.

article thumbnail

Industrial Control System Malware Discovered

Schneier on Security

The Department of Energy, CISA, the FBI, and the NSA jointly issued an advisory describing a sophisticated piece of malware called Pipedream that’s designed to attack a wide range of industrial control systems. This is clearly from a government, but no attribution is given. There’s also no indication of how the malware was discovered. It seems not to have been used yet.

article thumbnail

New Malware Tools Pose 'Clear and Present Threat' to ICS Environments

Dark Reading

The recent discovery of highly customized malware targeting programmable logic controllers has renewed concerns about the vulnerability of critical infrastructure.

89
article thumbnail

Transform inbound fax processes with automated capture 

OpenText Information Management

Picture this: a large, integrated health system has dozens of employees devoted to manually indexing fax. Due to volume, they’re experiencing delays – from days to weeks to months. It’s hard to keep up between staff turnover, absences, changing schedules and other challenges. What’s the best way forward? Our answer: eliminate manual process.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Inside a Data Center Outage: Lessons About Resilience

Dark Reading

A power failure at a major London data center shows that a truly resilient network is flexible, not just redundant.

90
article thumbnail

WhatsApp Doubles Down With End-to-End Encrypted ‘Communities’

WIRED Threat Level

More than just group DMs, WhatsApp's new feature is a major expansion of its comprehensive encrypted messaging.

article thumbnail

greymatter.io Closes $7.1 Million Series A to Meet Rising Need for Its Enterprise Microservices Platform

Dark Reading

Elsewhere Partners invests in proven service mesh and API management innovator as it grows team and breaks into new markets.

IT 78