Mon.Mar 08, 2021

article thumbnail

John McAfee Charged With Cryptocurrency Fraud

Data Breach Today

Latest Federal Indictment Comes After Tax Evasion Charges Cybersecurity entrepreneur John McAfee, who already faces tax evasion charges, has now been indicted for allegedly using his vast social media following to run cryptocurrency pump-and-dump schemes as well as promote virtual currencies to investors without revealing his stake in them, federal prosecutors say.

article thumbnail

A Basic Timeline of the Exchange Mass-Hack

Krebs on Security

Sometimes when a complex story takes us by surprise or knocks us back on our heels, it pays to revisit the events in a somewhat linear fashion. Here’s a brief timeline of what we know leading up to last week’s mass-hack, when hundreds of thousands of Microsoft Exchange Server systems got compromised and seeded with a powerful backdoor Trojan horse program.

Access 357
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

McAfee to Sell Enterprise Unit for $4 Billion

Data Breach Today

Company Will Then Focus on Its Consumer Business The cybersecurity firm McAfee Corp. announced Monday it will sell its enterprise business unit to the private equity firm Symphony Technology Group for $4 billion cash and then focus solely on its consumer business. STG also owns RSA.

article thumbnail

MY TAKE: Apple users show strong support for Tim Cook’s privacy war against Mark Zuckerberger

The Last Watchdog

Like a couple of WWE arch rivals, Apple’s Tim Cook and Facebook’s Mark Zuckerberg have squared off against each other in a donnybrook over consumer privacy. Cook initially body slammed Zuckerberg — when Apple issued new privacy policies aimed at giving U.S. consumers a smidgen more control over their personal data while online. Related: Raising kids who care about their privacy.

Privacy 149
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

COVID-19: Are We Rounding the Corner?

Data Breach Today

Pandemic Expert Regina Phelps on Variants, Vaccines and Surge Risk COVID-19 infection rates are down from their record highs, and vaccination numbers grow each day. Are we rounding the corner in this pandemic battle? Keep an eye on the virus variants, says pandemic expert Regina Phelps. We may be on the cusp of yet another surge.

Risk 260

More Trending

article thumbnail

Lawmakers Urge FTC to Enforce Health Breach Notification Rule

Data Breach Today

Letter to FTC Spotlights Potential Violations by Fertility-Tracking Apps Members of Congress are again calling on the Federal Trade Commission to begin using its existing authority to protect personal health data. In particular, they are demanding the FTC take enforcement action against certain fertility-tracking mobile apps that allegedly violate the decade-old FTC Health Breach Notification Rule.

IT 200
article thumbnail

International Women’s Day 2021: Choose to Challenge

OpenText Information Management

Today we celebrate International Women’s Day, honoring the social, economic, cultural and political achievements of women around the world. We also take stock of how far we have to go to make gender equity a reality. International Women’s Day is particularly important this year—as we have seen many of the gains made over the past … The post International Women’s Day 2021: Choose to Challenge appeared first on OpenText Blogs.

116
116
article thumbnail

Zero trust and the Critical Role for Strong Authentication

Data Breach Today

CyberEdBoard Executive Members, Bernardo Vasquez and Rob Hornbuckle, guest speak on panel at ISMG Identity & Access Management Virtual Cybersecurity Summit

article thumbnail

Microsoft updated MSERT to detect web shells used in attacks against Microsoft Exchange installs

Security Affairs

Microsoft updated its Microsoft Safety Scanner (MSERT) tool to detect web shells employed in the recent Exchange Server attacks. Early this month, Microsoft has released emergency out-of-band security updates that address four zero-day issues (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) in all supported Microsoft Exchange versions that are actively exploited in the wild.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Better Identity Coalition: A Project Update

Data Breach Today

Jeremy Grant, Coalition Coordinator, Discusses Identity Management Progress Jeremy Grant, coordinator of the Better Identity Coalition, offers a progress report on the 3-year-old organization's efforts to help prevent breaches with better identity management.

179
179
article thumbnail

UnityMiner targets unpatched QNAP NAS in cryptocurrency mining campaign

Security Affairs

Experts warn of ongoing attacks targeting QNAP network-attached storage (NAS) devices to abuse them in cryptocurrency mining. Researchers at 360Netlab are warning of a cryptocurrency malware campaign targeting unpatched QNAP network-attached storage (NAS) devices. via the unauthorized remote command execution vulnerability (CVE-2020-2506 & CVE-2020-2507).

Mining 110
article thumbnail

Fake Google reCAPTCHA Phishing Attack Swipes Office 365 Passwords

Threatpost

A phishing attack targeting Microsoft users leverages a bogus Google reCAPTCHA system.

Phishing 141
article thumbnail

Honoring Women in Tech: Challenging IT Industry Perceptions

erwin

International Women’s Day is a global celebration of the social, economic, cultural and political achievements of women. Celebrated this year on Monday, March 8, the theme is #ChooseToChallenge. That motivated us to honor women in technology, including one of our inspiring customer advocates who is herself choosing to challenge limitations in how we view data and IT.

IT 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Crypto-Miner Campaign Targets Unpatched QNAP NAS Devices

Threatpost

Researchers warn two critical bugs impacting multiple QNAP firmware versions are under active attack.

123
123
article thumbnail

Hackers compromised Microsoft Exchange servers at the EU Banking Regulator EBA

Security Affairs

The European Banking Authority (EBA) disclosed a cyberattack that resulted in the hack of its Microsoft Exchange email system. The European Banking Authority announced that it was the victim of a cyber attack against its email system that exploited recently disclosed zero-day vulnerabilities in Microsoft Exchange. On March 2nd, Microsoft has released emergency out-of-band security updates that address four zero-day issues (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) in

article thumbnail

Why your hybrid cloud needs the software-defined data center

DXC Technology

If there is one thing that 2020 has taught us, it is that things can change on a dime. Over the last year, we have learned how to better cope with dramatic change in how we run our businesses – setting up remote working, creating more online services to satisfy customers’ new demands and migrating […]. The post Why your hybrid cloud needs the software-defined data center appeared first on DXC Blogs.

Cloud 83
article thumbnail

Hong Kong: Right to be Forgotten is declared “not a thing” in Hong Kong

DLA Piper Privacy Matters

Author: Carolyn Bigg. Unlike Europe, the Personal Data (Privacy) Ordinance ( “PDPO” ) in Hong Kong does not have a stand-alone “right to be forgotten” ( “RTBF” ). However, over the past few years, there were commentaries suggesting that there is some basis under Hong Kong law that RTBF exists. This uncertainty has finally been resolved recently in a ruling made by Hong Kong’s Administrative Appeals Board ( “AAB” ).

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Intel, Microsoft Aim for Breakthrough in DARPA Encryption Project

Dark Reading

Together, the vendor giants aim to make "in use" encryption -- also known as "fully homomorphic encryption" -- economical and practical.

article thumbnail

Celebrating International Women’s Day (IWD) at Micro Focus

Micro Focus

At Micro Focus, we celebrate the many achievements of women colleagues as well as in our communities and in our personal lives on International Women’s Day (IWD) but also throughout the year. Aligned to the theme of this year’s IWD, #ChooseToChallenge, our aim is to encourage everyone to call out norms that can affect gender. View Article.

80
article thumbnail

Newest Intel Side-Channel Attack Sniffs Out Sensitive Data

Threatpost

A new side-channel attack takes aim at Intel's CPU ring interconnect in order to glean sensitive data.

105
105
article thumbnail

The Accellion Breach Keeps Getting Worse—and More Expensive

WIRED Threat Level

What started as a few vulnerabilities in firewall equipment has snowballed into a global extortion spree.

Security 101
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Microsoft Exchange Server Attack Escalation Prompts Patching Panic

Dark Reading

US government officials weigh in on the attacks and malicious activity, which researchers believe may be the work of multiple groups.

article thumbnail

Virginia’s new Consumer Data Protection Act

Data Protection Report

On March 2, 2021, the Governor of the Commonwealth of Virginia signed into law the Consumer Data Protection Act , which contains many elements of California’s Consumer Privacy Act (CCPA) and Europe’s General Data Protection Regulation (GDPR). The new law goes into effect on January 1, 2023. But first, you need to determine whether the law applies to your business.

article thumbnail

‘Retaliation’ for Russia's SolarWinds Spying Isn't the Answer

WIRED Threat Level

It will be hard pointing to a specific line the Kremlin crossed that the US hasn't crossed as well.

IT 87
article thumbnail

50 years of service: Robins records manager, Jeanette McElhaney, reflects on career via DVIDS

IG Guru

Check out the story on Jeanette’s amazing career here. The post 50 years of service: Robins records manager, Jeanette McElhaney, reflects on career via DVIDS appeared first on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

INSPIRE 20 Podcast: Meet Allia McLeod, Head of Brand Relations and Content Development, Verizon Media Studios

Micro Focus

An award-winning producer and self-described queer woman of color, Allia McLeod is continually striving to advance the cultural conversation around diversity. As Head of Brand Relations and Content Development for Verizon Media Studios in Canada, McLeod is uniquely positioned to influence inside and outside her organisation. Allia has created content for HuffPost Canada and selected films.

59
article thumbnail

The Edge Pro Tip: Proceed With Caution

Dark Reading

Security pros offer up their post-SolarWinds patch-management advice.

article thumbnail

Tomorrow’s Jobs Today Will Present at San Jose State University on March 16th

Information Governance Perspectives

With AI looming ahead, we may even have to redefine what work is. Man is no longer the scale, the ruler, the canon. The post Tomorrow’s Jobs Today Will Present at San Jose State University on March 16th appeared first on Rafael Moscatel.

52