Mon.Mar 23, 2020

article thumbnail

COVID-19 Phishing Schemes Escalate; FBI Issues Warning

Data Breach Today

Latest Schemes Target At-Home Employees; Some Spoof Health Agencies As the global COVID-19 pandemic worsens, security firms and law enforcement, including the FBI, are warning of increasing phishing and other the cybercriminal scams targeting a largely at-home workforce.

Phishing 362
article thumbnail

Who’s Behind the ‘Web Listings’ Mail Scam?

Krebs on Security

In December 2018, KrebsOnSecurity looked at how dozens of U.S. political campaigns, cities and towns had paid a shady company called Web Listings Inc. after receiving what looked like a bill for search engine optimization (SEO) services rendered on behalf of their domain names. The story concluded that this dubious service had been scamming people and companies for more than a decade, and promised a Part II to explore who was behind Web Listings.

Sales 250
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia Blamed for COVID-19 Disinformation Campaigns

Data Breach Today

Pro-Kremlin Outlets Complicating Public Health Response, Nation-State Watchers Warn Disinformation campaigns with ties to Russia are continuing in an attempt to impede other governments' responses to the COVID-19 pandemic, complicating public health efforts to combat the disease, European officials warn.

article thumbnail

NEW TECH: Start-up QuoLab enters emerging ‘Security Operations Platform’ — SOP — space

The Last Watchdog

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day. I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR technologies have arisen in just the past few years to help companies try to make sense of it all, even as catastrophic breaches persist.

Security 113
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

CA AG Modifies CCPA Regs - Again

Data Breach Today

Attorney Sadia Mirza Reviews 'Spring Cleaning' of Landmark Privacy Act Amidst the COVID-19 pandemic crisis, the California Attorney General's Office on March 11 released a second modification of the proposed regulations to implement the California Consumer Protection Act. Attorney Sadia Mirza explains what's included in this "spring cleaning" and how the coronavirus impacts the global privacy landscape.

Privacy 227

More Trending

article thumbnail

Fintech Firm Finastra Recovering From Ransomware Attack

Data Breach Today

Attackers Targeted Corporate Network, Forcing Company to Shut Down IT Operations Finastra, a large financial services software provider based in London, continues to recover from a ransomware attack that forced the company to take its IT operations offline Friday to prevent further damage to its corporate network, according to the company's CEO.

article thumbnail

538 Million Weibo users’ records being sold on Dark Web

Security Affairs

Hackers are offering for sale on the dark web data belonging to 538 million Weibo users, including 172 million phone numbers. Data of 538 million Weibo users are available for sale on the dark web the news was reported by several Chinese media and users on social networks. 107 million records include personal data and basic account information such as the user ID, number of Weibo tweets, number of followers and accounts users are following, account gender, geographic location and more.

Sales 123
article thumbnail

BEC Campaign Targets HR Departments: Report

Data Breach Today

Cybercriminal Group TA505 Sending Trojanized CV Files, Prevailian Reports TA505, a notorious cybercriminal group believed to be operating in Russia, is using business email compromise tactics to target a new group of victims - HR departments, according to security researchers, who describe the new scheme.

Security 202
article thumbnail

How to facilitate remote learning: Part 3 — Peer-to-peer interaction

Jamf

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience. In part three of our five-part blog series, we show you ways to promote peer-to-peer interaction.

Education 114
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

COVID-19: Security Risks As Manufacturers Shift Gears

Data Breach Today

As automobile manufacturers and others rush to shift to production of ventilators and other medical equipment and supplies to help fight the COVID-19 pandemic, they must take steps to ensure security, privacy and safety risks are addressed, says technology attorney Steven Teppler.

article thumbnail

Botnet operators target multiple zero-day flaws in LILIN DVRs

Security Affairs

Experts observed multiple botnets exploiting zero-day vulnerabilities in DVRs for surveillance systems manufactured by Taiwan-based LILIN. Botnet operators are exploiting several zero-day vulnerabilities in digital video recorders (DVRs) for surveillance systems manufactured by Taiwan-based LILIN-. According to the Chinese security firm Qihoo 360’s Netlab team, operators of several botnets , including Chalubo , FBot , and Moobot , targeting LILIN DVRs at least since August 30, 2019. “

article thumbnail

How to empower a remote workforce: Part 3 ? Ongoing support

Jamf

Today, more organizations than ever before are examining their remote employee and work-from-home policies — be it for health, employee retention or employee productivity reasons. In the conclusion of our three-part blog series, we show you how to fully support permanent and temporarily remote employees.

IT 107
article thumbnail

The University of Utah Health discloses security breach

Security Affairs

The University of Utah Health disclosed a security breach, it has discovered malware on its systems and revealed unauthorized access to some employee email accounts. The University of Utah Health disclosed a security breach, the research hospital has discovered unauthorized access to some employee email accounts along with the presence of malware on its systems.

Security 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

APEC Endorses Third U.S. CBPR Accountability Agent

Hunton Privacy

The International Trade Administration at the U.S. Department of Commerce recently announced that NCC Group has been approved as a U.S. Accountability Agent under the APEC Cross-Border Privacy Rules (“CBPR”) system. NCC Group joins TrustArc and Schellman as the third U.S. Accountability Agent under the CBPR and the sixth Accountability Agent approved under the system overall.

Privacy 103
article thumbnail

Microsoft warns of targeted attacks exploiting Windows zero-day flaws

Security Affairs

Microsoft warns of hackers actively exploiting two zero-day remote code execution vulnerabilities in Windows Adobe Type Manager Library. Microsoft warns of hackers exploiting two zero-day remote code execution (RCE) vulnerabilities in the Windows Adobe Type Manager Library, both issues impact all supported versions of Windows. The vulnerabilities affects the way Windows Adobe Type Manager Library handles a specially-crafted multi-master font – Adobe Type 1 PostScript format. “Microso

article thumbnail

Protect Your Home Office and Network With These 5 Tips

Adam Levin

Secure Your Router: If you’re still using your router’s manufacturer default password, it’s past time for a change. Your password should be include letters, numbers and special characters in a combination you haven’t used on other accounts. You can also create an extra firewall by configuring your router to block unwanted incoming internet traffic. Secure Your Webcam: If you’re using an external webcam for videoconferences, disconnect it when you’re not using it.

article thumbnail

Operation Pangea: Europol dismantles criminal gangs selling coronavirus medicine, surgical masks

Security Affairs

Operation Pangea is the name of a joint international operation lead by the Interpol that seized €13 million in counterfeit drugs for care. . The Coronavirus outbreak is sustaining an unprecedented demand in hygiene products, surgical masks, and drugs that could care the COVID infection. The Europol announced the result of an international operation, dubbed Operation Pangea , has brought together police from over 90 countries in a bid to stem a rising flood of criminal enterprises relating to C

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

At Jamf, we are here to help

Jamf

We are committed to doing everything we can to ensure that your business, school or healthcare organization can continue to operate as smoothly as possible.

103
103
article thumbnail

Five Ways to Secure Your Home Office Webcam

Adam Levin

Covid-19 is increasing the number of employees working from home, and more businesses are relying on video conferences as a means of keeping in regular communication. . Follow these tips to make sure your webcam isn’t compromising your privacy and your data: Unplug/disable your camera when it’s not in use: If you’re using an external camera, don’t just turn it off when you’re not in a conference–unplug it completely.

article thumbnail

Hacking Voice Assistants with Ultrasonic Waves

Schneier on Security

I previously wrote about hacking voice assistants with lasers. Turns you can do much the same thing with ultrasonic waves : Voice assistants -- the demo targeted Siri, Google Assistant, and Bixby -- are designed to respond when they detect the owner's voice after noticing a trigger phrase such as 'Ok, Google'. Ultimately, commands are just sound waves, which other researchers have already shown can be emulated using ultrasonic waves which humans can't hear, providing an attacker has a line of si

Paper 118
article thumbnail

Governance doesn't stop when working from home

Gimmal

The current pandemic has more people working from home than ever before, but that should not stop your organization from being diligent with information governance practices. Just like washing your hands, and social distancing can slow down the spread of germs, steps can be taken to ensure that the health of your information systems stay strong as well.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

FBI Warns of Fake CDC Emails in COVID-19 Phishing Alert

Dark Reading

Fraudsters exploit concerns by claiming to offer virus-related information or promising stimulus checks.

Phishing 135
article thumbnail

U.S. Office of the Comptroller of the Currency Updates Third-Party Relationships Risk Management Guidance

Data Matters

On March 5, 2020, the Office of the Comptroller of the Currency (OCC) issued an updated set of answers to frequently asked questions (FAQs) 1 regarding risk management in national bank relationships with third parties to further supplement its 2013 guidance, OCC Bulletin 2013-29 (the Bulletin), 2 and its 2017 FAQs (Prior FAQs) on the topic. 3 Twelve of the 27 FAQs are new and elaborate on a wide range of topics, including the broad intended scope of third-party risk management obligations,

Risk 68
article thumbnail

Fake Coronavirus ‘Vaccine’ Website Busted in DoJ Takedown

Threatpost

Authorities have cracked down on a website that claimed to give out coronavirus vaccine kits - but that was actually stealing victims' payment card data and personal information.

article thumbnail

Complimentary Webinar: Intentional Impact – Revolutionizing Your Leadership Approach: Creating IG Champions on 3/26

IG Guru

This complimentary webinar provides a method for creating Records and Information Governance “Champions” in your organization. You will improve your leadership skills with the practical methods demonstrated in this session and you will walk away feeling empowered and encouraged despite the challenges we are currently facing in our industry and across the globe.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Hackers Actively Exploit 0-Day in CCTV Camera Hardware

Threatpost

Criminals behind botnets Chalubo, FBot and Moobot attack unpatched vulnerabilities in the commercial DVRs made by LILIN.

IoT 84
article thumbnail

Weaponizing a Lazarus group implant

Jamf

Repurposing or recycling malware is a technique that can be used by malware authors to quickly reuse capabilities of existing known malware, reducing development time while confusing attribution should the bad actor be caught.

59
article thumbnail

Belgian DPA Publishes Statement Regarding COVID-19 and Workplace-Related Processing of Personal Data

Hunton Privacy

On March 13, 2020, the Belgian Data Protection Authority (the “Belgian DPA”) released a statement regarding workplace-related processing of personal data in the context of the COVID-19 crisis (the “Statement”). The key takeaways from Statement are: Lawfulness. Under the EU General Data Protection Regulation (the “GDPR”), every processing activity must be lawful, even where such processing activities relate to preventive health measures.