Tue.Jan 11, 2022

article thumbnail

AvosLocker ransomware now targets Linux systems, including ESXi servers

Security Affairs

AvosLocker is the latest ransomware that implemented the capability to encrypt Linux systems including VMware ESXi servers. AvosLocker expands its targets by implementing the support for encrypting Linux systems, specifically VMware ESXi servers, Bleeping computed reported. “While we couldn’t find what targets were attacked using this AvosLocker ransomware Linux variant , BleepingComputer knows of at least one victim that got hit with a $1 million ransom demand.” reported Blee

article thumbnail

MY TAKE: What if Big Data and AI could be intensively focused on health and wellbeing?

The Last Watchdog

Might it be possible to direct cool digital services at holistically improving the wellbeing of each citizen of planet Earth? Related: Pursuing a biological digital twin. A movement aspiring to do just that is underway — and it’s not being led by a covey of tech-savvy Tibetan monks. This push is coming from the corporate sector. Last August, NTT , the Tokyo-based technology giant, unveiled its Health and Wellbeing initiative – an ambitious effort to guide corporate, political and community

Big data 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘Wormable’ Flaw Leads January 2022 Patch Tuesday

Krebs on Security

Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving attackers a head start in figuring out how to exploit them in unpatched systems. More concerning, Microsoft warns that one of the flaws fixed this month is “wormable,” meaning no human interaction would be required for an attack to spread from one vulnerable Windows box to another.

Libraries 233
article thumbnail

Cloud Apps Replace Web as Source for Most Malware Downloads

Dark Reading

Two-thirds of all malware distributed to enterprise networks last year originated from cloud apps such as Google Drive, OneDrive, and numerous other cloud apps, new research shows.

Cloud 135
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cybersecurity Employment in 2022: Solving the Skills Gap

eSecurity Planet

As we enter 2022, the shortage of cybersecurity pros hasn’t gotten better. In fact, it’s gotten worse. There are currently about 435,000 cybersecurity job openings available in the United States, up from approximately 314,000 in 2019. The move to remote work in response to the COVID-19 pandemic increased the workloads for skilled IT professionals, and combined with the rising rate of ransomware attacks , many security pros are suffering from burnout.

More Trending

article thumbnail

Apple’s Private Relay Is Being Blocked

Schneier on Security

Some European cell phone carriers , and now T-Mobile , are blocking Apple’s Private Relay anonymous browsing feature. This could be an interesting battle to watch. Slashdot thread.

article thumbnail

Microsoft Kicks Off 2022 With 96 Security Patches

Dark Reading

Nine of the Microsoft patches released today are classified as critical, 89 are Important, and six are publicly known.

Security 145
article thumbnail

Top predictions for the Manufacturing Industry in 2022

OpenText Information Management

When the New York Times runs with the headline ‘How the World Ran Out of Everything’, you know it’s been a challenging year for manufacturing. Sales and confidence reached an all-time high as vaccines kicked the economy back into action, but recently have begun to dip. We’ve not reached the much-vaunted ‘new normal’ and my … The post Top predictions for the Manufacturing Industry in 2022 appeared first on OpenText Blogs.

article thumbnail

5 Global Data Protection Trends To Watch In 2022

Data Matters

*This article was first published by Law360 on January 3, 2022. A recent discussion with Elizabeth Denham and Claudia Berg of the U.K. Information Commissioner’s Office provided ample food for thought on the direction in which data protection regulation both in the U.K. and internationally is headed, including key trends to watch for in data protection.

Privacy 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Enterprise Security at CES 2022 Marked by IoT, Biometrics, and PC Chips

Dark Reading

Amid the onslaught of mostly consumer-oriented announcements in Las Vegas, a few key items pertaining to enterprise security emerged.

IoT 127
article thumbnail

Millions of Routers Exposed to RCE by USB Kernel Bug

Threatpost

The high-severity RCE flaw is in the KCodes NetUSB kernel module, used by popular routers from Netgear, TP-Link, DLink, Western Digital, et al.

IoT 115
article thumbnail

Why Security Awareness Training Should Begin in the C-Suite

Dark Reading

It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.

article thumbnail

Microsoft Patch Tuesday fixes critical Office RCE

Security Affairs

Microsoft Patch Tuesday security updates fix a critical Office flaw that can allow remote attackers to execute malicious code on vulnerable systems. Microsoft Patch Tuesday security updates for January 2022 patch 96 vulnerabilities in Microsoft Windows and Windows Components, Microsoft Edge (Chromium-based), Exchange Server, Microsoft Office and Office Components, SharePoint Server,NET Framework, Microsoft Dynamics, Open-Source Software, Windows Hyper-V, Windows Defender, and Windows Remote Desk

Security 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

MacOS Bug Could Let Creeps Snoop On You

Threatpost

The flaw could allow attackers to bypass Privacy preferences, giving apps with no right to access files, microphones or cameras the ability to record you or grab screenshots.

Privacy 99
article thumbnail

Night Sky ransomware operators exploit Log4Shell to target hack VMware Horizon servers

Security Affairs

Another gang, Night Sky ransomware operation, started exploiting the Log4Shell vulnerability in the Log4j library to gain access to VMware Horizon systems. The Night Sky ransomware operation started exploiting the Log4Shell flaw (CVE-2021-44228) in the Log4j library to gain access to VMware Horizon systems. The ransomware gang started its operations on December 27, 2021, and has already hacked the corporate networks of two organizations from Bangladesh and Japan respectively.

article thumbnail

Microsoft Faces Wormable, Critical RCE Bug & 6 Zero-Days

Threatpost

The large January 2022 Patch Tuesday update covers nine critical CVEs, including a self-propagator with a 9.8 CVSS score.

IoT 121
article thumbnail

Why the Insider Threat Will Motivate Cyber and Physical Teams to Collaborate More Than Ever in 2022

Dark Reading

It's hard to have a crystal ball in the world of security, but if one were to make a safe prediction, it's this: Organizations will need to further integrate their cybersecurity and physical security functions throughout 2022 and beyond. So argues former chief psychologist for the US Secret Service, Dr. Marisa Randazzo, who now heads up Ontic's Center of Excellence.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Webinar: The RIM / IG Subject Matter Expert You Need To Be on January 11th, 2022 from 11:45am-1pm EST via Greater Chattanooga Area Chapter – ARMA

IG Guru

Check out the post here. The post Webinar: The RIM / IG Subject Matter Expert You Need To Be on January 11th, 2022 from 11:45am-1pm EST via Greater Chattanooga Area Chapter – ARMA appeared first on IG GURU.

article thumbnail

Honeywell Adds Deception Tech to Building Automation Systems Security

Dark Reading

New OT security platform directs attackers toward phony assets to deflect threats.

Security 123
article thumbnail

FIN7 Mailing Malicious USB Sticks to Drop Ransomware

Threatpost

The FBI warned that attackers are impersonating Health & Human Services and/or Amazon to mail BadUSB-poisoned USB devices to targets in transportation, insurance & defense.

article thumbnail

5 Things to Know About Next-Generation SIEM

Dark Reading

NG-SIEM is emerging as a cloud- and analytics-driven alternative to legacy SIEMs. Based on new research, Omdia highlights five important new insights for anyone considering a NG-SIEM purchase.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

‘Fully Undetected’ SysJoker Backdoor Malware Targets Windows, Linux & macOS

Threatpost

The malware establishes initial access on targeted machines, then waits for additional code to execute.

Access 104
article thumbnail

Businesses Suffered 50% More Cyberattack Attempts per Week in 2021

Dark Reading

The rise — partly due to Log4j — helped boost cyberattack attempts to an all-time high in Q4 2021, new data shows.

100
100
article thumbnail

Apple’s Private Relay Roils Telecoms Around the World

WIRED Threat Level

Security experts say there's little reason for the criticism from Europe’s mobile operators and US limitations over the VPN-like iCloud tool.

article thumbnail

Kaspersky Research Uncovers Cybersecurity Budgets, Insurance, and Vendor Expectations for 2022

Dark Reading

Kaspersky commissioned a survey in October 2021 targeting 600 employees based in the US and Canada who are key decision makers for the cybersecurity sector within their company.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

WordPress Bugs Exploded in 2021, Most Exploitable

Threatpost

Record-number WordPress plugin vulnerabilities are wicked exploitable even with low CVSS scores, leaving security teams blind to their risk.

Risk 77
article thumbnail

FBI, NSA & CISA Issue Advisory on Russian Cyber Threat to US Critical Infrastructure

Dark Reading

Advisory explains how to detect, respond to, and mitigate cyberattacks from Russian state-sponsored hacking groups.

95
article thumbnail

Here’s REALLY How to Do Zero-Trust Security

Threatpost

It's not about buying security products! Joseph Carson, chief security scientist from ThycoticCentrify, offers practical steps to start the zero-trust journey.