Wed.Apr 15, 2020

article thumbnail

TikTok Content Could Be Vulnerable to Tampering: Researchers

Data Breach Today

Video-Sharing Service Does Not Always Use TLS/SSL Encryption TikTok, a video-sharing service, has been delivering video and other media without TLS/SSL encryption, which means it may be possible for someone to tamper with content, researchers say. That could be especially damaging in the current pandemic environment, where misinformation and confusion abounds.

article thumbnail

COVID-19 Has United Cybersecurity Experts, But Will That Unity Survive the Pandemic?

Krebs on Security

The Coronavirus has prompted thousands of information security professionals to volunteer their skills in upstart collaborative efforts aimed at frustrating cybercriminals who are seeking to exploit the crisis for financial gain. Whether it’s helping hospitals avoid becoming the next ransomware victim or kneecapping new COVID-19-themed scam websites, these nascent partnerships may well end up saving lives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Emotet, Ryuk, TrickBot: 'Loader-Ransomware-Banker Trifecta'

Data Breach Today

More Advanced Cybercrime Services Help Hackers Boost Illicit Earnings Many criminals are continuing to tap cybercrime platforms and services to make it easier to earn an illicit paycheck, sometimes by combining tools, such as Emotet, Ryuk and TrickBot. This "loader-ransomware-banker trifecta has wreaked havoc" in recent years, says security firm Intel 471.

article thumbnail

Data Governance for Smart Data Distancing

erwin

Hello from my home office! I hope you and your family are staying safe, practicing social distancing, and of course, washing your hands. These are indeed strange days. During this coronavirus emergency, we are all being deluged by data from politicians, government agencies, news outlets, social media and websites, including valid facts but also opinions and rumors.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Microsoft Issues Patches for 3 Zero-Day Vulnerabilities

Data Breach Today

Software Giant Had Previously Warned 2 Vulnerabilities Were Being Exploited Microsoft issued patches for three zero-day vulnerabilities as part of its most recent Patch Tuesday update. The software giant had previously warned users about two vulnerabilities in the Adobe Type Manager Library that were being exploited in the wild.

Libraries 264

More Trending

article thumbnail

Malware Risk Higher for Those Working at Home: Report

Data Breach Today

BitSight Study Analyzes Exposure to Botnets, Other Threats The shift to telework due to the global COVID-19 pandemic has raised the risk of exposure to botnets as well as Mirai and Trickbot malware, according to the security firm BitSight.

Risk 254
article thumbnail

A zero-day exploit for Zoom Windows RCE offered for $500,000

Security Affairs

Hackers are selling two zero-day exploits for critical issues affecting the video conferencing software Zoom that would allow attackers to spy on communications. Hackers are offering for sale an exploit for a zero-day remote code execution vulnerability affecting the Windows client for Zoom. The zero-day exploit goes for $500,000, hackers are also offering another exploit code for a flaw in the Zoom macOS client. “Hackers are selling two critical vulnerabilities for the video conferencin

Sales 128
article thumbnail

Fresh COVID-19 Phishing Scams Try to Spread Malware: Report

Data Breach Today

Organizations Targeted With Ransomware, Infostealer Two recently uncovered phishing campaigns used COVID-19 themes as a lure in an attempt to spread ransomware and information stealers, according to Palo Alto Networks' Unit 42 division.

Phishing 254
article thumbnail

Secure Together: video conferencing, credential stuffing and eye strain

IT Governance

As we enter the fourth week of the lockdown, you’ve hopefully begun to find a routine in your new work arrangement. Perhaps you’re able to get out of bed and shower before logging on instead of lying in bed until 8:55 am and crawling to your desk. Maybe you feel less guilty about having a mid-morning video chat with a colleague in lieu of your normal coffee break.

Security 124
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

When Will COVID-19-Related Scams Show Up on Breach Tally?

Data Breach Today

Ransomware Attacks Recently Added to Health Data Breach Tally Predated the Virus Surge How long will it be until breaches related to COVID-19-related scams begin showing up on the Department of Health and Human Services' HIPAA breach reporting website? Experts offer their opinions.

article thumbnail

'Nothing's Off the Table': Will Infosec Jobs Survive the Recession?

Dark Reading

With COVID-19 making a mess of the global economy, companies are seeking to cut corners - and some boardrooms still see security as a "cost center." Are infosec careers vulnerable now?

Security 112
article thumbnail

OnDemand Webinar | Benchmarking Digital Risk Factors

Data Breach Today

Findings For CISOs From Latest RIsk Surface Report. View this OnDemand webinar and learn about the key dimensions of internet risk surface.

Risk 147
article thumbnail

Which InfoSec Jobs Will Best Survive a Recession?

Dark Reading

With COVID-19 making a mess of the global economy, companies are seeking to cut corners - and some boardrooms still see security as a "cost center." Are infosec careers vulnerable now?

Security 109
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How much is the phish? Underground market of phishing kits is booming – Group-IB

Security Affairs

The report focuses on phishing kits – the driving force of the phishing industry, which is hard to detect but extremely valuable in terms of fight against phishing. Group-IB, a Singapore-based cybersecurity company, has found out that phishing kits are the new bestsellers of the underground market, with the number of phishing kit ads on underground forums and their sellers having doubled in 2019 compared to the previous year.

Phishing 105
article thumbnail

Belgian DPA Releases Guidance Materials and FAQs on Cookies and Other Tracking Technologies

Hunton Privacy

On April 9, 2020, the Belgian Data Protection Authority (the “Belgian DPA”) released guidance and a set of frequently asked questions (“FAQs”) regarding the use of cookies and other tracking technologies. Key takeaways from the Belgian DPA’s guidance and the FAQs include: Transparency: Users must be informed about the use of cookies. In particular, a cookie policy should be posted on the relevant site or mobile app, and should contain information about the identity and contact details of the dat

article thumbnail

Coronavirus-themed attack: Experts uncovered flight refund scam

Security Affairs

Experts at email security firm Mimecast has uncovered a flight refund scam that attempts to exploit the ongoing coronavirus outbreak. Researchers at email security firm Mimecast have uncovered a new flight refund scam that attempts to exploit the ongoing C oronavirus outbreak. The campaign is simple as effective, scammers attempt to target individuals that are waiting for refunds from airlines that deleted the flights due to Coronavirus shutdown.

article thumbnail

Data Integration: The vital baking ingredient in your AI strategy

IBM Big Data Hub

When people dream about becoming a baker or a pastry chef, they often think about the delicious pastries they'll create, delighting their patrons with towering cakes wrapped in impossibly smooth fondant. But very rarely does anyone start off by thinking about the preparation involved in baking… Without being able to use freshly milled flour for baking, for example, you would actually never be able to eat a good piece of cake or a crusty loaf of bread.

93
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google removed 49 Chrome Extensions that were hijacking cryptocurrency wallets

Security Affairs

Google has removed 49 new Chrome browser extensions from its official Web Store that hide the code to hijack cryptocurrency wallets. Google has removed 49 new Chrome browser extensions from its official Web Store that contain the code to steal sensitive information and hijack cryptocurrency wallets. The Chrome browser extensions were discovered by researchers from MyCrypto and PhishFort that speculate the involvement of Russian hackers.

article thumbnail

No office, no problems

Jamf

Switching to a remote workforce is tough, but this company is built on it. Read Tumlinson electric's story about how Apple, PlanGrid and Jamf Now allow them to thrive with no office.

IT 84
article thumbnail

Do You Have the DevOps Skills to Accelerate Your Digital Transformation?

Micro Focus

All change… Events and sudden market shifts can dramatically change the business outcomes for many companies. The winners will adapt to the changing environment and transform how they deliver value to their customers, but the losers will fail to adjust to the “new normal”. The coronavirus (COVID-19) pandemic is an example of this sea change. View Article.

article thumbnail

Your Email Needs to Shelter in Place, Too

Adam Levin

The Covid-19 pandemic created an opportunity for hackers to target the newly remote workforce. Hospitals have been targeted by ransomware (despite initial assurances to the contrary), phishing scams are using pandemic-related scare tactics, and video conferencing apps have become the new go-to for everything from domain-spoofing attacks to zoombombing.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Intel Fixes High-Severity Flaws in NUC, Discontinues Buggy Compute Module

Threatpost

Intel fixed nine high- and medium-severity flaws in its April security update, which could enable privilege escalation and denial of service attacks.

article thumbnail

DHS Issues Alert for New North Korean Cybercrime

Dark Reading

Cyber actors from North Korea's intelligence agencies are launching new attacks on financial targets, including hacks for hire on the open market.

article thumbnail

Dutch DPA Imposed a Controversial Fine on the Royal Dutch Tennis Association

HL Chronicle of Data Protection

The Dutch Data Protection Authority (Dutch DPA) recently imposed a fine of EUR 525,000 on the Royal Dutch Tennis Association (KNLTB) for sharing the personal data of its members with two of its sponsors in June 2018 on the basis of its own commercial interests. Before the Dutch DPA initiated its investigation in 2018, Dutch sports associations seemed to be of the understanding that the KNLTB’s practice was allowed.

article thumbnail

New York State Confirms Breach of Government Network

Dark Reading

The January incident led state officials to hire an external forensics firm and change thousands of employee passwords.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Taxpayers Targeted With Improved NetWire RAT Variant

Threatpost

Taxpayers are being targeted by a new NetWire RAT variant in a recent malspam campaign that makes use of an improved keylogger and an Excel 4.0 Macro.

Access 73
article thumbnail

Slack's Incoming Webhooks Can Be Weaponized in Phishing Attacks

Dark Reading

Researchers report how attackers could weaponize a feature in the Slack collaboration platform to access corporate data and messages.

article thumbnail

PPE, COVID-19 Medical Supplies Targeted by BEC Scams

Threatpost

FBI said that government agencies aiming to buy critical items like ventilators have unknowingly transferred funds to threat actors.