Fri.Jan 08, 2021

article thumbnail

SolarWinds Hires Chris Krebs to Reboot Its Cybersecurity

Data Breach Today

Hacked Firm Also Taps Former Facebook CSO as It Responds to Supply Chain Attack As security software firm SolarWinds investigates the supply chain attack involving its Orion software and looks to rebuild its security processes and reputation, it's hired former U.S. cybersecurity czar Chris Krebs and former Facebook CSO Alex Stamos as advisers.

article thumbnail

Ezuri memory loader used in Linux and Windows malware

Security Affairs

Multiple threat actors have recently started using the Ezuri memory loader as a loader to executes malware directly into the victims’ memory. According to researchers from AT&T’s Alien Labs, malware authors are choosing the Ezuri memory loader for their malicious codes. The Ezuri memory loader tool allows to load and execute a payload directly into the memory of the infected machine, without writing any file to disk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Federal Courts Investigate 'Apparent Compromise' of System

Data Breach Today

Meanwhile, Courts Suspend Use of SolarWinds, Adopt New Document Security Measures The U.S. federal court system is investigating an "apparent compromise" of a confidential electronic filing system used for sensitive legal documents. Meanwhile, it has suspended its use of the hacked Solarwind Orion system, plus it has changed document security procedures while conducting an audit.

Security 345
article thumbnail

SolarWinds Hires Chris Krebs, Alex Stamos in Wake of Hack

Threatpost

Former CISA director Chris Krebs and former Facebook security exec Alex Stamos have teamed up to create a new consulting group - and have been hired by SolarWinds.

Security 136
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ryuk Ransomware Profits: $150 Million

Data Breach Today

Researchers Track Funds in 61 Cryptocurrency Wallets Researchers say cryptocurrency wallets used by the operators behind the Ryuk ransomware strain and the gang's affiliates hold more than $150 million.

More Trending

article thumbnail

Researchers Warn Attackers Are Scanning for Zyxel Products

Data Breach Today

Recently Disclosed Vulnerability Could Create Hard-Coded Backdoor Security researchers are warning that attackers appear to have stepped up scanning for vulnerable Zyxel products, including VPN gateways, access point controllers and firewalls. A recently disclosed vulnerability in the company's firmware can create a hard-coded backdoor.

Access 283
article thumbnail

Welcome Bureau of Cyberspace Security and Emerging Technologies (CSET)

Security Affairs

United States Department of State approved the creation of the Bureau of Cyberspace Security and Emerging Technologies (CSET). The United States Secretary of State Mike Pompeo approved the creation of the Bureau of Cyberspace Security and Emerging Technologies (CSET) that was first announced in 2019. The CSET Bureau was created to increase the resilience of the country to foreign cyber-threats and lead the emerging cybersecurity diplomacy efforts. “Secretary Pompeo has approved the creatio

Security 120
article thumbnail

2021: The State of Privacy

Data Breach Today

IAPP's Trevor Hughes Previews the Year's Global Trends, Challenges and Legislation From contact tracing to data transfer to the new California Privacy Rights Act, 2021 already is shaping up to be a big year for privacy. Trevor Hughes, CEO and president of the International Association of Privacy Professionals, offers a "state of privacy" overview.

Privacy 264
article thumbnail

WhatsApp Has Shared Your Data With Facebook for Years

WIRED Threat Level

A pop-up notification has alerted the messaging app's users to a practice that's been in place since 2016.

Privacy 144
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analysis: The Latest SolarWinds Hack Developments

Data Breach Today

This edition of the ISMG Security Report features an analysis of the very latest information about the SolarWinds hack. Also featured are discussions of "zero trust" for the hybrid cloud environment and data privacy regulatory trends.

article thumbnail

Unsecured Git server exposed Nissan North America

Security Affairs

A misconfigured Git server is the root cause for the leak of source code of mobile apps and internal tools belonging to Nissan North America. A misconfigured Git server has caused the leak of the source code of mobile apps and internal software used by Nissan North America. The situation is embarrassing because the software engineer Tillie Kottmann was informed by an anonymous source that the Git server was exposed online and accessible to anyone using the default login credentials admin/admin.

Libraries 111
article thumbnail

JPMorgan Chase Hacker Sentenced to 12 Years in Prison

Data Breach Today

Russian Andrei Tyurin Pleaded Guilty to Numerous Charges A Russian national who pleaded guilty to hacking JPMorgan Chase and other financial institutions has been sentenced to 12 years in federal prison. The hacking scheme affected more than 100 million bank customers.

248
248
article thumbnail

CIPL Submits Response to the EDPB Guidelines 09/2020 on Relevant and Reasoned Objections under the GDPR

Hunton Privacy

On November 23, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth submitted its response to the European Data Protection Board (“EDPB”) consultation on draft guidelines on relevant and reasoned objections under the General Data Protection Regulation (“GDPR”) cooperation and consistency mechanisms (the “Guidelines). The consultation on the Guidelines took place a few weeks before the EDPB issued its first binding decision under the Article 65 GDPR dispute resolut

GDPR 108
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FBI Warns of Egregor Attacks on Businesses Worldwide

Threatpost

The agency said the malware has already compromised more than 150 organizations and provided insight into its ransomware-as-a-service behavior.

article thumbnail

Malware Developers Refresh Their Attack Tools

Dark Reading

Cisco analyzes the latest version of the LokiBot malware for stealing credentials, finding that its developers have added more misdirection and anti-analysis features.

IT 140
article thumbnail

A Look Ahead at 2021: SolarWinds Fallout and Shifting CISO Budgets

Threatpost

Threatpost editors discuss the SolarWinds hack, healthcare ransomware attacks and other threats that will plague enterprises in 2021.

article thumbnail

OCR Settles Thirteenth Investigation in HIPAA Right of Access Initiative via OCR Listserv

IG Guru

December 22, 2020 The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) announces its thirteenth settlement of an enforcement action in its HIPAA Right of Access Initiative. OCR announced this initiative as an enforcement priority in 2019 to support individuals’ right to timely access their health records at […].

Access 96
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Malicious Software Infrastructure Easier to Get and Deploy Than Ever

Threatpost

Researchers at Recorded Future report a rise in cracked Cobalt Strike and other open-source adversarial tools with easy-to-use interfaces.

Security 109
article thumbnail

SolarWinds Hires Chris Krebs and Alex Stamos for Breach Recovery

Dark Reading

The former US cybersecurity official and former Facebook security chief will help SolarWinds respond to its recent attack and improve security.

article thumbnail

Nvidia releases security updates for GPU display driver and vGPU flaws

Security Affairs

Nvidia has released security updates to address high-severity vulnerabilities affecting the Nvidia GPU display driver and vGPU software. . Nvidia has addressed a total of 16 flaws , including high-severity vulnerabilities affecting the Nvidia GPU display driver and vGPU software. . The addressed flaws may lead to denial of service, escalation of privileges, data tampering, or information disclosure.

article thumbnail

Evolving customer communications

OpenText Information Management

Targeted customer communications are a powerful way to increase engagement and build brand loyalty. Done poorly, they’re also an effective way to drive your audience away. Your audience is being bombarded by tons of messages every day and the problem is getting worse, not better. It’s easy for customers to switch off and start ignoring everything, even brands they like.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

APT Horoscope

Schneier on Security

This delightful essay matches APT hacker groups up with astrological signs. This is me: Capricorn is renowned for its discipline, skilled navigation, and steadfastness. Just like Capricorn, Helix Kitten (also known as APT 35 or OilRig) is a skilled navigator of vast online networks, maneuvering deftly across an array of organizations, including those in aerospace, energy, finance, government, hospitality, and telecommunications.

article thumbnail

Ryuk Rakes in $150M in Ransom Payments

Threatpost

An examination of the malware gang's payments reveals insights into its economic operations.

IT 103
article thumbnail

Cartoon: Shakin' It Up at the Office

Dark Reading

And the winner of our December cartoon caption contest is.

IT 121
article thumbnail

Making compliance part of your information governance strategy

OpenText Information Management

Compliance should be a major part of any information governance strategy. Taking relevant laws, policies and regulations into consideration, while striving to protect individuals and organizations, must be a top organizational priority. At the same time, organizations must strive to ensure quality and/or consistent products and services by adhering to sets of standards and guidelines when conducting business To this end, organizations are subject to … The post Making compliance part of y

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Top 5 'Need to Know' Coding Defects for DevSecOps

Dark Reading

Integrating static analysis into the development cycle can prevent coding defects and deliver secure software faster.

Security 115
article thumbnail

Episode 199 COVID’s Other Legacy: Data Theft and Enterprise Insecurity

The Security Ledger

In this episode of the podcast (#199), sponsored by LastPass, we talk with Sareth Ben of Securonix about how massive layoffs that have resulted from the COVID pandemic put organizations at far greater risk of data theft. In our second segment, we’re joined by Barry McMahon, a Senior Global Product Marketing Manager at LogMeIn, to talk about data. Read the whole entry. » Related Stories Episode 197: The Russia Hack Is A 5 Alarm Fire | Also: Shoppers Beware!

article thumbnail

Is 2021 the year of European Deep Tech startups?

Information Matters

Dealroom has published its annual European startups report with a focus on companies operating in the “Deep Tech” area. They define Deep Tech firms as those incorporating significant science or Read more. The post Is 2021 the year of European Deep Tech startups? appeared first on Information Matters - Data-Driven Innovation in the UK.

IT 52