Sun.Sep 01, 2019

article thumbnail

Lyceum APT Group a New Threat to Oil and Gas Companies

Data Breach Today

Reports Say Group Also Targeting Telecom Firms An emerging cyber espionage group that apparently started its work in South Africa last year is now focusing on targeting critical control systems for oil and gas companies in the Middle East, according to researchers at two cybersecurity firms.

article thumbnail

Cisco addresses CVE-2019-12643 critical flaw in virtual Service Container for IOS XE

Security Affairs

Cisco released security updates for Cisco IOS XE operating system to address a critical vulnerability that could be exploited by a remote attacker to bypass authentication. Cisco released security updates for Cisco IOS XE OS to address a critical flaw, tracked as CVE-2019-12643, that could be exploited by a remote attacker to bypass authentication. “On August 28th, 2019, Cisco published a Security Advisory titled “Cisco REST API Container for Cisco IOS XE Software Authentication Bypass Vul

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attack on Vendor Affects Hundreds of Dental Practices

Data Breach Today

Practices Waiting for Restoration of Their Files After Ransomware Attack A ransomware attack on a cloud services provider has affected hundreds of U.S. dental practices, which are now awaiting restoration of their files.

article thumbnail

Malspam campaign bypasses secure email gateway using Google Docs

Security Affairs

Attackers are using Google Docs to deliver the TrickBot banking Trojan to unsuspecting victims via camouflaged as PDF documents. Security experts at Cofense uncovered a malspam campaign the leverages Google Docs to deliver the TrickBot banking Trojan to unsuspecting victims via executables camouflaged as PDF documents. TrickBot is a popular banking Trojan that has been around since October 2016, its authors has continuously upgraded it by implementing new features.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Keeping New York's Connected Infrastructure Secure

Data Breach Today

Mike Krygier of NYC Cyber Command Describes Risk Mitigation Initiatives Mike Krygier of the New York City Cyber Command outlines threats to connected cities and critical infrastructure, including ransomware, and what steps can be taken to mitigate risks

Security 166

More Trending

article thumbnail

Third-Party Risk Management: The Pitfalls

Data Breach Today

Ryan Davis of Veracode Describes Common Mistakes, Outlines Effective Strategies Security practitioners often overlook the risks of third-party resources, says Ryan Davis of Veracode, who outlines the biggest potential pitfalls and describes effective risk management techniques.

Risk 160
article thumbnail

Weekly Update 154

Troy Hunt

How's that for a setting in this week's video? ?? First day of spring here which aligned with a father's day on the water: May all your father’s days be full of fun and laughter ?? pic.twitter.com/pN1dQ38cDr — Troy Hunt (@troyhunt) September 1, 2019 Back on business as usual, there's the SIM hijacking issue with Jack Dorsey's Twitter account, more data breaches and joyously, the HIBP API being back in full swing with the 500 subscription limit issue on Azure's APIM now being overcome.

article thumbnail

Security Affairs newsletter Round 229 – News of the week

Security Affairs

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs. Hi folk, let me inform you that I suspended the newsletter service, anyway I’ll continue to provide you a list of published posts every week through the blog. Once again thank you! 80 defendants charged with participating in massive BEC and romance scams.

article thumbnail

Why now is the right time to start working in cybersecurity

ITPro.TV

IT Security in Today’s Environment If the constant, news about ransomware attacks and security breaches is not enough to highlight the critical importance of cybersecurity roles today, nothing will. The world is full of bad actors intent on doing harm to businesses, governments, and individuals. Only good actors, intent on thwarting these insidious and damaging … Continue reading Why now is the right time to start working in cybersecurity → The post Why now is the right time to start

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New Google bug bounty allows reporting the abuses of Google API, Chrome, and Android user data

Security Affairs

Recently, Google announced a new bug bounty program for experts that can report the abuses of Google API , Chrome, and Android user data. Google announced the Developer Data Protection Reward Program (DDPRP) , a new bounty program aimed at security experts that discover data abuse issues in popular Android applications, OAuth projects, and Chrome extensions. .

Access 86