Wed.Dec 23, 2020

article thumbnail

Ex-NSA Director: SolarWinds Breach Is 'A Call for Action'

Data Breach Today

Ret. Gen. Keith Alexander on How Public and Private Sectors Must Respond He has commanded armed forces and directed the NSA. Now, he's president of vendor IronNet Cybersecurity. From this unique perspective, retired General Keith Alexander says the SolarWinds breach is "a call for action.

article thumbnail

Hey Alexa, Who Am I Messaging?

Threatpost

Research shows that microphones on digital assistants are sensitive enough to record what someone is typing on a smartphone to steal PINs and other sensitive info.

IoT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishing Email Campaign Uses Updated COVID-19 Theme

Data Breach Today

Researchers: Fraudsters Offer Lure of $600 Payment for Pandemic Relief A recently uncovered phishing campaign is spoofing messages from the New York State Department of Labor, claiming to offer $600 as part of a COVID-19 relief program, according to Abnormal Security. The goal is to harvest personally identifiable information.

Phishing 219
article thumbnail

Investigating the Navalny Poisoning

Schneier on Security

Bellingcat has investigated the near-fatal poisoning of Alexey Navalny by the Russian GRU back in August. The details display some impressive traffic analysis. Navalny got a confession out of one of the poisoners, displaying some masterful social engineering. Lots of interesting opsec details in all of this.

Security 123
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FBI Warns of COVID-19 Vaccine Fraud Schemes

Data Breach Today

Fraudsters Attempt to Steal Money, Personal Information The FBI is warning that fraudsters are exploiting the recent news surrounding the availability of COVID-19 vaccines to launch schemes designed to steal personal information and money.

200
200

More Trending

article thumbnail

Emotet Botnet Returns After 2-Month Hiatus

Data Breach Today

Researchers: Malware Revamped to Better Avoid Network Defenses After a nearly two-month hiatus, the Emotet botnet recently sprung back to life with a fresh spamming and phishing campaign designed to spread other malware as secondary payloads, according to security researchers. The botnet has also been revamped to better avoid network defenses.

Phishing 199
article thumbnail

US, European Law Enforcement Shut Down Cybercrime-Friendly VPN Services

Adam Levin

Law enforcement agencies from the United States and Europe seized domain names and servers belonging to a virtual private network (VPN) provider long linked to online cybercrime. In a press release issued December 22, U.S. Attorney Matthew Schneider announced the action, called “Operation Nova,” which disrupted the activities of a so-called “bulletproof hosting service” in coordination with Europol and law enforcement agencies from Germany, France, Switzerland, and the Netherlands.

Phishing 104
article thumbnail

'UltraRank' Targets More E-Commerce Sites

Data Breach Today

Group Uses JavaScript Sniffer to Steal Payment Card Data A cybercriminal gang known as "UltraRank" has launched a new campaign, targeting at least a dozen e-commerce sites to steal payment card data using a JavaScript sniffer, says security firm Group-IB.

Security 176
article thumbnail

2020 in review: July to December

IT Governance

Welcome to the second part of our cyber security review of 2020, in which we look back at the biggest stories from July to December. You can read the first part here >>. July. With COVID-19 under control, the UK government announced that lockdown measures would be eased from 4 July, with pubs, cafés, cinemas and museums allowed to reopen. Unfortunately, there was a hitch, with the government forced to scrap its original track and trace app, pushing the launch date back by months.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NIST's Ron Ross: 'The Adversary Lives in the Cracks'

Data Breach Today

SolarWinds Breach Calls Attention to Fundamental Need for Better DevSecOps In the wake of the SolarWinds breach, NIST's Ron Ross has turned his attention to systems security engineering - and the reality that the adversaries are exploiting it to their advantage better than the defenders are. This disparity, Ross says, has to change.

Security 176
article thumbnail

Best Practices to Make Sure VPN Access Remains Seamless

eSecurity Planet

The COVID-19 pandemic of 2020 has forced enterprises of all sizes and industries to adopt new work approaches that keep employees safe at home while ensuring productivity and security. Not only have videoconferencing applications such as Zoom, Skype, and Cisco Webex gone through the roof in usage, but new and more sophisticated networking and security products are also in high demand.

Access 95
article thumbnail

Leveraging CIAM to Fight Fraud

Data Breach Today

Nuance Communications' Simon Marchand Offers Strategic Insights Data collected through customer identity and access management can play an important role in fraud investigations, says Simon Marchand, chief fraud prevention officer at Nuance Communications.

article thumbnail

Lazarus Group Hits COVID-19 Vaccine-Maker in Espionage Attack

Threatpost

The nation-state actor is looking to speed up vaccine development efforts in North Korea.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

White Ops Announces Its Acquisition

Dark Reading

A group including Goldman Sachs Merchant Banking Division, ClearSky Security, and NightDragon has purchased the human verification technology company.

IT 121
article thumbnail

Emotet Returns to Hit 100K Mailboxes Per Day

Threatpost

Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot.

Security 130
article thumbnail

Enterprise IoT Security Is a Supply Chain Problem

Dark Reading

Organizations that wish to take advantage of the potential benefits of IoT systems in enterprise environments should start evaluating third-party risk during the acquisition process.

IoT 109
article thumbnail

Financial Regulators Announce Proposed 36-Hour Notification Requirement for Notification Incidents

Hunton Privacy

On December 18, 2020, federal financial regulatory agencies, including the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation and the Office of the Comptroller of the Currency (collectively, the “Agencies”) announced a proposed rule (the “Proposed Rule”) that would require “banking organizations” to notify their primary federal regulator within 36 hours following any “computer-security incident” that rises to the level of a “notification incident.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Lazarus Group Seeks Intelligence Related to COVID-19

Dark Reading

Researchers attribute attacks targeting a pharmaceutical company and a government ministry related to COVID-19 response.

article thumbnail

Third-Party APIs: How to Prevent Enumeration Attacks

Threatpost

Jason Kent, hacker-in-residence at Cequence, walks through online-retail card fraud and what to do about it.

Retail 89
article thumbnail

Microsoft, McAfee, Rapid7, and Others Form New Ransomware Task Force

Dark Reading

Industry group wants to get a framework in the hands of the new administration's cybersecurity officials by early spring 2021.

article thumbnail

OCR Issues Audit Report on Health Care Industry Compliance with the HIPAA Rules

IG Guru

December 17, 2020 The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) released its 2016-2017 HIPAA Audits Industry Report that reviewed selected health care entities and business associates for compliance with certain provisions of the HIPAA Privacy, Security, and Breach Notification Rules. The Health Information Technology for Economic […].

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Nozzle – building an AI-powered business on the Amazon platform

Information Matters

Our interviews with leaders of some of the most innovative, data-driven companies in the UK continues with this conversation with Rael Cline, Co-Founder and CEO of Nozzle. For obvious reasons, ecommerce has taken a huge leap forward over the last 9 months. Amazon has been a major beneficiary of this with the company’s global headcount Read more. The post Nozzle – building an AI-powered business on the Amazon platform appeared first on Information Matters - Data-Driven Innovation in the UK.

52
article thumbnail

Chang’e 5!

Adam Shostack

Congratulations to the Chinese for the success of their Chang’e 5 lunar sample return mission! The complexity of landing a robot on the moon and returning it safely to Earth is enormous. In contrast to the Apollo series of missions, which launched and returned inside of a week, Chang’e took a week to get to the moon, and two weeks to return.

IT 40
article thumbnail

Comments Sought on Proposed Rulemaking: Computer-Security Incident Notification Requirements for Banking Organizations and Their Bank Service Providers

Data Matters

On December 15, 2020, the U.S. Federal Deposit Insurance Corporation (FDIC) approved and the federal banking agencies jointly announced on December 18 a notice of proposed rulemaking, Computer-Security Incident Notification Requirements for Banking Organizations and Their Bank Service Providers (NPR). 1 The NPR is a joint proposal by the Office of the Comptroller (OCC), the Board of Governors of the Federal Reserve System (Board), and the FDIC.

article thumbnail

2020 Shows the Danger of a Decapitated Cyber Regime

WIRED Threat Level

Trump's White House has long been AWOL on cybersecurity. That lack of oversight almost seemed to be working—until the SolarWinds hack.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Well That Was A Year: A Review of My 2020 Predictions

John Battelle's Searchblog

From the Department of Didn’t See THAT Coming… Yes, it’s true: Last year, I did not predict a global pandemic in 2020. COVID is a gravitational force that warps everything it touches, so I approach this annual ritual of self-grading with trepidation. As I start, I honestly don’t remember what I predicted twelve months ago…but regardless, I’m expecting a train wreck.

Marketing 111
article thumbnail

Cybersecurity Outlook 2021: Trends and Predictions

eSecurity Planet

Just when it seemed that 2020 couldn’t get any weirder, news broke that Russian state-sponsored hackers had spent much of the year exploiting vulnerabilities in SolarWinds ‘ widely used Orion IT management software to hack into major federal agencies and corporations. Suddenly the year wasn’t about the massive shift toward remote work caused by the COVID-19 pandemic, so in a way the incident had a feeling of normalcy by returning the focus to timeless IT security issues – with