Fri.Jan 01, 2021

article thumbnail

Facebook ads used to steal 615000+ credentials in a phishing campaign

Security Affairs

Cybercriminals are abusing Facebook ads in a large-scale phishing scam aimed at stealing victims’ login credentials. Researchers from security firm ThreatNix spotted a new large-scale campaign abusing Facebook ads. Threat actors are using Facebook ads to redirect users to Github accounts hosting phishing pages used to steal victims’ login credentials.

Phishing 145
article thumbnail

Weekly Update 224

Troy Hunt

It's a new year! With lots of breaches to discuss already ? Ok, so these may not be 2021 breaches but I betcha that by next week's update there'll be brand new ones from the new year to discuss. I managed to get enough connectivity in the middle of the Australian outback in front of Uluru to do the live stream this week, plus talk a bunch more about what we've been doing on our epic Australian journey.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Expert found a secret backdoor in Zyxel firewall and VPN

Security Affairs

Zyxel addressed a critical flaw in its firmware, tracked as CVE-2020-29583 , related to the presence of a hardcoded undocumented secret account. The Taiwanese vendor Zyxel has addressed a critical vulnerability in its firmware related to the presence of a hardcoded undocumented secret account. The vulnerability, tracked as CVE-2020-29583 received a CVSS score of 7.8, it could be exploited by an attacker to login with administrative privileges and take over the networking devices. “Firmw

Passwords 136
article thumbnail

Inbox Attacks: The Miserable Year (2020) That Was

Threatpost

Reflecting on 2020's record-breaking year of spam and inbox threats.

Phishing 112
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Today Adobe Flash Player reached the end of life (EOL)

Security Affairs

Today Adobe Flash Player has reached its end of life (EOL), its vulnerabilities were exploited by multiple threat actors in attacks in the wild over the years. Adobe Flash Player has reached the end of life (EOL) today, over the years, threat actors have exploited multiple vulnerabilities in the popular software. Adobe will no longer release updates for its Flash Player and web browsers will not offer the support for the Adobe Flash Plugin. “Since Adobe will no longer be supporting Flash P

Security 130

More Trending

article thumbnail

Alleged docs relating to Covid-19 vaccine leaked in darkweb

Security Affairs

Experts from threat intelligence firm Cyble have found documents relating to Covid-19 vaccine of European Medicines Agency in the Darkweb. Security experts from threat intelligence firm Cyble have found several documents relating to the Covid-19 vaccine allegedly stolen from the European Medicines Agency (EMA) leaked in the Darkweb. While the pandemic is spreading on a global scale, threat actors continue to target government organizations and entities in the pharmaceutical industry.

article thumbnail

Enabling trusted Business Intelligence with Google Looker integration

Collibra

Data-driven organizations rely on business intelligence (BI) tools like Google Looker to derive insights from data. Yet those insights are only of true value when they are derived from trusted data. At the same time, changing workplace practices brought about by the COVID-19 pandemic have placed even greater emphasis on maintaining agile data operations and ensuring effective data governance.

article thumbnail

Happy New Year from IG GURU!

IG Guru

The post Happy New Year from IG GURU! appeared first on IG GURU.

70
article thumbnail

Friday Squid Blogging: Linguine allo Scoglio Recipe

Schneier on Security

Delicious seafood pasta dish — includes squid — from America’s Test Kitchen. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Predictions 2021: Disinformation, SPACs, Africa, Facebook, and a Return to Tech Optimism

John Battelle's Searchblog

Never in my five-plus decades has a year been so eagerly anticipated, which makes this business of prediction particularly daunting. I’m generally inclined to be optimistic, but rose-colored glasses stretch time. Good things always take longer to emerge than any of us would wish. Over 18 years of doing this I’ve learned that it’s best to not predict what I wish would happen, instead, it’s wise to go with what feels most likely in the worlds I find fascinating (for me, th

Marketing 144