Fri.May 22, 2020

article thumbnail

Microsoft Warns of COVID-19 Phishing Emails Spreading RAT

Data Breach Today

Malicious Messages Attempt to Install NetSupport Manager Tool on Devices Microsoft is warning Windows users about an ongoing "massive" COVID-19-themed phishing campaign that is attempting to install the NetSupport Manager on devices. Attackers can turn NetSupport into a remote access Trojan, or RAT.

Phishing 359
article thumbnail

Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

ZLab researchers spotted a new malicious espionage activity targeting Italian companies operating worldwide in the manufacturing sector. Introduction. During our Cyber Threat Intelligence monitoring we spotted new malicious activities targeting some Italian companies operating worldwide in the manufacturing sector, some of them also part of the automotive production chain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishing Campaign Leverages Google to Harvest Credentials

Data Breach Today

Researchers: Emails Contain Google Links to Make Them Appear Credible Some fraudsters waging phishing campaigns are using fake websites hosted on Google's Firebase Storage service in an attempt to harvest credentials, according to Trustwave, which notes the phishing emails contain links to the service to make them look more credible.

Phishing 304
article thumbnail

5 Tips for Fighting Credential Stuffing Attacks

Dark Reading

With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts?

Security 132
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

RagnarLocker Deploys a Virtual Machine to Hide Ransomware

Data Breach Today

Ragnar Gang's Innovation: Installing Oracle VirtualBox Windows XP Virtual Machine As ransomware gangs continue to try and boost their illicit profits, the RagnarLocker ransomware gang has brought a new tactic to bear: installing a full virtual machine on victims' systems to hide their crypto-locking malware while it forcibly encrypts files, warns security firm Sophos.

More Trending

article thumbnail

Framework for Managing Identity in Healthcare Introduced

Data Breach Today

H-ISAC Guidance Offers a Step-by-Step Approach In response to the growing threat of identity-centric cyberattacks in healthcare, the Health Information Sharing and Analysis Center has published a framework for managing identity for the full work lifecycle of employees, practitioners, patients and business partners.

258
258
article thumbnail

Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry

Security Affairs

The Winnti hacking group continues to target gaming industry, recently it used a new malware named PipeMon and a new method to achieve persistence. Winnti hacking group is using a new malware dubbed PipeMon and a novel method to achieve persistence in attacks aimed at video game companies. The Winnti group was first spotted by Kaspersky in 2013, but according to the researchers the gang has been active since 2007.

article thumbnail

Hackers Tried to Exploit Zero-Day Flaw in Sophos Firewall

Data Breach Today

Attackers Attempted to Plant Trojan, Ransomware By Exploiting Vulnerability Hackers tried two methods of exploiting a zero-day vulnerability in Sophos' XG firewall, but Sophos says it made a temporary fix that mitigated the risks. Attackers originally attempted to plant a Trojan, but then switched to ransomware.

article thumbnail

Security & Trust Ratings Proliferate: Is That a Good Thing?

Dark Reading

Phishing ratings, security ratings, human-ness ratings -- we are looking at a future filled with grades of security and trustworthiness. But there is a downside.

Security 139
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Analysis: The Long-Term Implications of 'Work From Home'

Data Breach Today

The latest edition of the ISMG Security Report features Retired General Keith Alexander, former NSA director, discussing the long-term security implications of the shift to working from home. Also: an update on ransomware gangs leaking data and an analysis of using open source code for app development.

article thumbnail

Chafer APT Hits Middle East Govs With Latest Cyber-Espionage Attacks

Threatpost

Government and air transportation companies in Kuwait and Saudi Arabia were targeted in a recent attack tracked back to the Chafer APT.

article thumbnail

Experts found a Privilege escalation issue in Docker Desktop for Windows

Security Affairs

A severe privilege escalation vulnerability, tracked as CVE-2020-11492, has been addressed in the Windows Docker Desktop Service. . Cybersecurity researchers from Pen Test Partners publicly disclosed a privilege escalation vulnerability in the Windows Docker Desktop Service. . The CVE-2020-11492 issue affects the way the service uses named pipes when communicating as a client to child processes. . “Docker Desktop for Windows suffers from a privilege escalation vulnerability to SYSTEM.

article thumbnail

NSO Group Impersonates Facebook Security Team to Spread Spyware — Report

Threatpost

An investigation traces an NSO Group-controlled IP address to a fake Facebook security portal.

Security 126
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft warns of “massive campaign” using COVID-19 themed emails

Security Affairs

Experts from the Microsoft Security Intelligence team provided some details on a new “massive campaign” using COVID-19 themed emails. Researchers from the Microsoft Security Intelligence team provided some details on a new massive phishing campaign using COVID-19 themed emails. The messages used weaponized Excel documents, the IT giant observed a spike in the number of malicious documents in malspam campaigns which use Excel 4.0 macros. “For several months now, we’ve been seein

article thumbnail

Free Webinar – Blockchain DLT: Records, Rewards and Risks via San Jose State University on May 27 Noon ET

IG Guru

The agenda for the webinar includes: Blockchain Technology Industry Use Cases RIM Challenges & Unknowns Risk and Audit Considerations Panelists: Darra Hofman – Assistant Professor – University of British Columbia Pari J. Swift – Records Manager – The Ohio State University Patricia C. Franks – MARA Program Administrator – San Jose State University Amitabh Srivastav […].

article thumbnail

Home Chef Serves Up Data Breach for 8 Million Records

Threatpost

The meal-kit company's customer records were leaked as part of the Shiny Hunters breach.

article thumbnail

Indonesia investigates leak of more than two million voters' personal information

The Guardian Data Protection

Data breach included names, home addresses and national identification numbers Indonesia is investigating how 2.3 million voters’ personal information was leaked online, the election commission said. The data breach, which included names, home addresses and national identification numbers, appeared to be from the 2014 election voter list, the General Election Commission revealed on Friday.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

‘Coronavirus Report’ Emails Spread NetSupport RAT, Microsoft Warns

Threatpost

Attackers used malicious Excel 4.0 documents to spread the weaponized NetSupport RAT in a spear-phishing campaign.

Phishing 103
article thumbnail

10 iOS Security Tips to Lock Down Your iPhone

Dark Reading

Mobile security experts share their go-to advice for protecting iPhones from hackers, thieves, and fraudsters.

Security 104
article thumbnail

The API economy: Embrace your business, not your infrastructure

OpenText Information Management

Modern businesses face constant demands from customers, suppliers and employees. Better experiences, new products, faster service and lower cost. This can place a huge strain on existing IT systems, some of which have been in place for decades. A key factor in doing business better and faster is being able to connect all parts of … The post The API economy: Embrace your business, not your infrastructure appeared first on OpenText Blogs.

IT 74
article thumbnail

Weekly Update 192

Troy Hunt

Hey, check out that haircut! And shirt! It's almost like I'm a professional again ?? Come Monday, schools here return as usual so I figured it was time for both my son and I to head to the barber. Other events of the day had me sprucing up to a level I don't think I've seen since Feb and I've gotta say, it's actually kind of nice. If only I had somewhere I could actually go out to.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Dark Reading Edge Cybersecurity Crossword Puzzle, May 22th

Dark Reading

Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues.

article thumbnail

When agencies should collaborate – and not compete

OpenText Information Management

The world of agency work is notoriously competitive. But how can agencies get past that when the client wants more than one agency to work together on a campaign? Layla Revis, VP Brand & Digital Services, OpenText and Rebecca Ewan, VP Global Account Director, Leo Burnett examined three different scenarios where agencies and their clients … The post When agencies should collaborate – and not compete appeared first on OpenText Blogs.

article thumbnail

Former Salesforce Execs Launch Data Protection Startup

Dark Reading

Cloud-based API service stores and manages sensitive consumer data with a zero-trust, database-as-a service approach.

Cloud 77
article thumbnail

OpenText Developer: One place for all your developer needs

OpenText Information Management

Application Developers are the foundation of software companies around the world. Their expertise, abilities and creativity fuel the creation of new applications and solutions that expand the boundaries of current business solutions. At OpenText™, we are committed to supporting the developer community by bringing new services and solutions that will help the community expedite, facilitate … The post OpenText Developer: One place for all your developer needs appeared first on OpenText Blogs

58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Productive on Power Part One: User Experience Modernization

Rocket Software

Introduction. There are companies willing to invest millions of dollars and take enormous business risk to move their legacy applications and data to new platforms. Yet most don’t take the time, or invest the minimal effort needed, to examine the existing options for delivering the latest user experiences on IBM i. If they did, they would find that their understanding of IBM i is—ironically—outdated.

Risk 52
article thumbnail

Delivering smiles and curbside meals during COVID-19

OpenText Information Management

Smiles from students tell the story: instead of chatting with friends in cafeteria lines, children and teenagers receive sack lunches sitting in cars lined along the curb. Still, during the coronavirus crisis, they are comforted by the familiar flavors of school meals, provided at no cost by the Garland Independent School District (ISD). More than … The post Delivering smiles and curbside meals during COVID-19 appeared first on OpenText Blogs.

article thumbnail

Library History with Heritage & University Archives

Archives Blogs

The history of libraries at Florida State University traces back almost 100 years to the 1920s. In 1923, FSU’s first library opened in what is now Dodd Hall. Dodd Hall served as the library for Florida State College for Women and then for Florida State University until Strozier Library was built in 1956. The Library, undated, [link]. The first record of university librarians is documented in the 1925 Florida State College for Women course catalog, which lists Louise Richardson as Librarian and C