Tue.May 31, 2022

article thumbnail

Experts warn of ransomware attacks against government organizations of small states

Security Affairs

Cyber Research Labs reported a rise in ransomware attacks in the second quarter of 2022, small states are more exposed to these attacks. Cyber Research Labs observed a rise in ransomware attacks in the second quarter of 2022, some of them with a severe impact on the victims, such as the attack that hit the Costa Rican government that caused a nationwide crisis.

article thumbnail

Breach At Turkey’s Pegasus Airlines Exposes 6.5 TB of Data

Data Breach Today

Misconfigured AWS S3 Bucket, Which Led to the Breach, Has Now Been Secured A data breach at Turkish firm Pegasus Airlines has put more than 6.5 TB of sensitive electronic flight bag data at risk, including sensitive flight details, source code and staff data, say researchers. A misconfigured AWS S3 bucket, which led to the incident, has now been secured.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Costa Rica May Be Pawn in Conti Ransomware Group’s Bid to Rebrand, Evade Sanctions

Krebs on Security

Costa Rica’s national health service was hacked sometime earlier this morning by a Russian ransomware group known as Hive. The intrusion comes just weeks after Costa Rican President Rodrigo Chaves declared a state of emergency in response to a data ransom attack from a different Russian ransomware gang — Conti. Ransomware experts say there is good reason to believe the same cybercriminals are behind both attacks, and that Hive has been helping Conti rebrand and evade international sa

article thumbnail

Ukraine Observed Nearly 14M Cyber Incidents in Q1 2022

Data Breach Today

The Majority of Incidents Entailed Malware Distribution, Phishing and Intrusion Attempts Three months after Russia’s ongoing invasion of Ukraine began, the country takes a look back at the turbulence the nation has faced in its cyber sphere during Q1 2022, and considers the way ahead.

Phishing 283
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

RSAC insights: Why vulnerability management absolutely must shift to a risk-assessment approach

The Last Watchdog

Vulnerability management, or VM, has long been an essential, if decidedly mundane, component of network security. Related: Log4J’s long-run risks. That’s changing — dramatically. Advanced VM tools and practices are rapidly emerging to help companies mitigate a sprawling array of security flaws spinning out of digital transformation. I visited with Scott Kuffer, co-founder and chief operating officer of Sarasota, FL-based Nucleus Security , which is in the thick of this development.

Risk 210

More Trending

article thumbnail

Microsoft shared workarounds for the Microsoft Office zero-day dubbed Follina

Security Affairs

Microsoft released workarounds for a recently discovered zero-day vulnerability, dubbed Follina, in the Microsoft Office productivity suite. Microsoft has released workarounds for a recently discovered zero-day vulnerability, dubbed Follina and tracked as CVE-2022-30190 (CVSS score 7.8), in the Microsoft Office productivity suite. “On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in Windows vulnerability.” reads the adviso

article thumbnail

Where the Healthcare Sector Lags in Security

Data Breach Today

The healthcare sector is still behind many other critical infrastructure sectors in implementing critically important security technologies to protect against the rise in potentially devastating cyber incidents, says threat intelligence analyst Christiaan Beek of security firm Trellix.

Security 217
article thumbnail

The Limits of Cyber Operations in Wartime

Schneier on Security

Interesting paper by Lennart Maschmeyer: “ The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations “: Abstract: Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. Many expect cyber operations to provide independent utility in both warfare and low-intensity competition.

Paper 106
article thumbnail

Future of supply chain collaboration – How is your organization tackling these 3 challenges?

OpenText Information Management

Supply chains remain a hot topic among organizations due to the continued disruption across industries. Boosted by increased attention from top management – and in some cases by government initiatives – investments in supply chain technology aimed at addressing the related challenges are driving digital transformation in global supply chains at an unprecedented speed and scale.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New Microsoft Zero-Day Attack Underway

Dark Reading

"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially crafted Office documents.

101
101
article thumbnail

Twitter to Pay $150 Million to Settle Allegations of Data Misuse

Hunton Privacy

On May 25, 2022, Twitter reached a proposed $150 million settlement with the Department of Justice (“DOJ”) and the Federal Trade Commission to resolve allegations that the company deceptively used nonpublic user contact information obtained for account security purposes to serve targeted ads to Twitter users. In a complaint filed in federal court, the government alleged that Twitter violated both the FTC Act and a 2011 FTC Order by misrepresenting the extent to which the company maintained and p

Privacy 99
article thumbnail

SideWinder carried out over 1,000 attacks since April 2020

Security Affairs

SideWinder, an aggressive APT group, is believed to have carried out over 1,000 attacks since April 2020, Kaspersky reported. Researchers from Kaspersky have analyzed the activity of an aggressive threat actor tracked as SideWinder (aka RattleSnake and T-APT-04). The group stands out for the high frequency and persistence of its attacks, researchers believe that the APT group has carried out over 1,000 attacks since April 2020.

article thumbnail

You Need to Update iOS, Chrome, Windows, and Zoom ASAP

WIRED Threat Level

Plus: Google patches 36 Android vulnerabilities, Cisco fixes three high-severity issues, and VMWare closes two “serious” flaws.

Privacy 92
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hive ransomware gang hit Costa Rica public health service

Security Affairs

Costa Rican Social Security Fund, Costa Rica ‘s public health service, was hit by a Hive ransomware attack. Costa Rican Social Security Fund, Costa Rica ‘s public health service (aka CCCS), was hit today by a Hive ransomware attack, BleepingComputer reported. The attack occurred early this morning, Tuesday, May 31, 2022. The authorities are investigating the security breach, but the public health service confirmed that the attack did not impact the EDUS (Unified Digital Health) and t

article thumbnail

You Need to Update iOS, Chrome, Windows, and Zoom ASAP

WIRED Threat Level

Plus: Google patches 36 Android vulnerabilities, Cisco fixes three high-severity issues, and VMWare closes two “serious” flaws.

Privacy 92
article thumbnail

Regional privacy but global clouds. How to manage this complexity?

Thales Cloud Protection & Licensing

Regional privacy but global clouds. How to manage this complexity? madhav. Tue, 05/31/2022 - 07:04. The UN Fundamental Declaration of Human Rights states: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.”.

Cloud 71
article thumbnail

How to Keep Your Enterprise Safe From Digital Supply Chain Attacks

Dark Reading

Digital supply chains are more vulnerable than ever; here's what you need to do to secure them.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Relationships Between Data, Information, and Records via The Texas Record

IG Guru

Check out the article here. The post The Relationships Between Data, Information, and Records via The Texas Record appeared first on IG GURU.

article thumbnail

Biometric Data Offers Added Security — But Don't Lose Sight of These Important Risks

Dark Reading

With rising fraud, businesses are seeking authentication methods that are security- and user-friendly. But with that comes a few complications.

Risk 79
article thumbnail

Security and Human Behavior (SHB) 2022

Schneier on Security

Today is the second day of the fifteenth Workshop on Security and Human Behavior , hosted by Ross Anderson and Alice Hutchings at the University of Cambridge. After two years of having this conference remotely on Zoom, it’s nice to be back together in person. SHB is a small, annual, invitational workshop of people studying various aspects of the human side of security, organized each year by Alessandro Acquisti, Ross Anderson, Alice Hutchings, and myself.

article thumbnail

ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats

Threatpost

The malvertiser’s use of PowerShell could push it beyond its basic capabilities to spread ransomware, spyware or steal data from browser sessions, researchers warn.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Three Things to Consider When Moving to the Cloud

eDiscovery Daily

By: Kyle Taylor. Cloud computing is trending today, and for good reasons. Reports from Flexera show that 50% of decision-makers in organizations believe that migration to the cloud will continue to increase. While some consider it a risky move for data security, others think it’s necessary for business in many ways. What benefits do companies stand to enjoy by moving to the cloud?

Cloud 73
article thumbnail

Fewer DDoS Attacks in 2021, Still Above Pre-Pandemic Levels

Dark Reading

New research finds a rise in TCP acknowledgement (ACK) DDoS attacks, which rely on a smaller amount of traffic to disrupt targets.

77
article thumbnail

Addressing the ‘You can’t still be using that!’ conundrum

OpenText Information Management

It’s great to be part of the OpenText™ Public Sector team, after more than 20 years working at a senior level within U.S. government agencies. I think I’m joining the company at a really exciting time because I strongly believe that agencies – wherever they are in the world – must renew their focus on … The post Addressing the ‘You can’t still be using that!

article thumbnail

3.6M MySQL Servers Found Exposed Online

Dark Reading

Researchers from Shadowserver recommend removing the servers from the Internet to shrink external attack surface.

81
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The GDPR 4 years on and beyond

OpenText Information Management

As we mark the fourth anniversary of the GDPR, we have seen so many positive advances by businesses and other covered entities investing in privacy. Organizations have transformed their IT infrastructure and improved their security and data governance posture to mitigate data privacy and protection risk. Despite these gains, demands made by data subjects and … The post The GDPR 4 years on and beyond appeared first on OpenText Blogs.

GDPR 63
article thumbnail

New CyberCatch Research Discovers Alarming Increase in Cyber Vulnerabilities for Small and Medium Sized Businesses in US and Canada

Dark Reading

For the first time, CyberCatch's SMBVR detected significant vulnerability to 'session riding' attacks among North American SMBs.

74
article thumbnail

World War II Records Digitized

Unwritten Record

World War II records from the Adjutant General’s Office of the War Department (Record Group 407) have been digitized and are available to view and download from the National Archives Catalog. This series consists of maps and charts, overlays, city plans, aerial photographs, photomaps, pencil sketches, and architectural drawings relating to the European, Mediterranean, and Pacific theaters of war during World War II.