Tue.Dec 08, 2020

article thumbnail

FireEye Says Nation-State Attackers Stole Pen Test Tools

Data Breach Today

Security Vendor Believes No Customer Data Was Exfiltrated FireEye, one of the world's top cybersecurity firms, says in a striking announcement on Tuesday that attackers stole its penetration testing tools and sought information about its government clients. However, FireEye doesn't believe the attackers exfiltrated data.

article thumbnail

Patch Tuesday, Good Riddance 2020 Edition

Krebs on Security

Microsoft today issued its final batch of security updates for Windows PCs in 2020, ending the year with a relatively light patch load. Nine of the 58 security vulnerabilities addressed this month earned Microsoft’s most-dire “critical” label, meaning they can be abused by malware or miscreants to seize remote control over PCs without any help from users.

Security 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fresh Spear-Phishing Email Spoofs Microsoft Domain

Data Breach Today

Researchers Say Fraudsters Are Likely Harvesting Office 365 Credentials An ongoing spear-phishing campaign is spoofing the official Microsoft.com domain name and targeting users of the company's Office 365 suite, according to security firm Ironscales. Fraudsters are likely using these attacks to harvest credentials.

Phishing 245
article thumbnail

[Podcast] Best of 2020 - A Special Year-End Episode

AIIM

Over the past several years, I've had the pleasure of interviewing hundreds of guests for AIIM On Air. It never fails to impress me that the level of knowledge and leadership among AIIM members and supporters is the best in the business. Each month we cover a variety of topics – from the latest in automation and innovation, to pressing and emerging challenges and opportunities that tell the story of the current state of IIM today.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

As Ransomware Booms, Are Cyber Insurers Getting Cold Feet?

Data Breach Today

Expect to See Extortion and Social Engineering Attacks Excluded From More Policies Are insurers getting cold feet over covering losses to ransomware? With claims due to ransomware skyrocketing, some insurers have reportedly been revising offerings to make it tougher for companies claim for some types of cybercrime, including extortion.

Insurance 239

More Trending

article thumbnail

Payment Card Skimming Group Deployed Raccoon Infostealer

Data Breach Today

Researchers: Fraudsters Hit E-Commerce Sites For Payment Credential Theft A JavaScript card skimmer group dubbed "FakeSecurity" recently deployed the Raccoon information stealer malware in order to target e-commerce sites to steal payment card details from victims, according to security firm Group-IB.

Security 231
article thumbnail

Keeping Cyber Secure at Christmas

Dark Reading

Sylvain Cortes, Security Evangelist and cybersecurity expert at Alsid, highlights the need for security departments to raise awareness through their organizations over cyber threats this Christmas.

Security 129
article thumbnail

Meeting Identity Proofing Challenges

Data Breach Today

Andrew Bud of iProov Discusses How Technology Can Counter Emerging Fraud Techniques Knowing your customer has become of more a challenge in a world where in-person interaction has become scarce. Andrew Bud of iProov discusses how identity proofing is evolving to meet the challenge.

191
191
article thumbnail

Oblivious DNS-over-HTTPS

Schneier on Security

This new protocol , called Oblivious DNS-over-HTTPS (ODoH), hides the websites you visit from your ISP. Here’s how it works: ODoH wraps a layer of encryption around the DNS query and passes it through a proxy server, which acts as a go-between the internet user and the website they want to visit. Because the DNS query is encrypted, the proxy can’t see what’s inside, but acts as a shield to prevent the DNS resolver from seeing who sent the query to begin with.

Paper 124
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Bitcoin Exchange Operator Sentenced to 5 Years in Prison

Data Breach Today

Russian National Alexander Vinnik Found Guilty of Money Laundering in France Alexander Vinnik, a Russian national who founded the now-defunct BTC-e cryptocurrency exchange, has been found guilty of money laundering in France and has been sentenced to five years in prison, according to media reports. He faces additional charges in the U.S. and Russia.

179
179
article thumbnail

Unauthenticated Command Injection bug opens D-Link VPN routers to hack

Security Affairs

An unauthenticated command injection vulnerability could be exploited by threat actors to compromise D-Link VPN routers. Security researchers at Digital Defense discovered three vulnerabilities in D-Link VPN routers, including command injection flaws, and an authenticated crontab injection flaw. The experts initially discovered the flaws in DSR-250 router family running firmware version 3.17, further investigation allowed the experts to determine that these vulnerabilities also affect other devi

article thumbnail

‘Amnesia:33’ TCP/IP Flaws Affect Millions of IoT Devices

Threatpost

A new set of vulnerabilities has been discovered affecting millions of routers and IoT and OT devices from more than 150 vendors, new research warns.

IoT 126
article thumbnail

Critical remote code execution fixed in PlayStation Now

Security Affairs

Security flaws in the PlayStation Now cloud gaming Windows application allowed hackers to execute arbitrary code on Windows systems. Bug bounty hunter Parsia Hakimian discovered multiple security flaws in the PlayStation Now (PS Now) cloud gaming Windows application that allowed hackers to execute arbitrary code on Windows devices running vulnerable app versions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to Save with Azure Reserved Instances

Daymark

I haven’t met an organization yet that isn’t interested in saving money and optimizing their cloud spend. That’s where Azure Reserved Instances (RIs) come in. Properly leveraged, Reserved Instances, particularly Virtual Machine Reserved Instances can result in some significant savings. In fact, it was the topic of discussion at one of our recent Daymark Cloud Clinics where our technical cloud consultants offer free technical training and tips on a wide range of Azure and Office 365 features.

Cloud 110
article thumbnail

Apache Software Foundation fixes code execution flaw in Apache Struts 2

Security Affairs

The Apache Software Foundation addressed a possible remote code execution vulnerability in Struts 2 related to the OGNL technology. . The Apache Software Foundation has released a security update to address a “possible remote code execution” flaw in Struts 2 that is related to the OGNL technology. . The remote code execution flaw, tracked as CVE-2020-17530, resides in forced OGNL evaluation when evaluated on raw user input in tag attributes. “Forced OGNL evaluation, when evaluated on raw u

article thumbnail

AWS unveils Micro Focus as Modernization Competency Partner

Micro Focus

Micro Focus’ modernization leadership position received yet another vote of confidence – this time at AWS Re:Invent show, as we were listed in AWS’s new mainframe competency program. AWS recognizes Micro Focus as cloud modernization partner At the recent AWS Re:Invent Conference, Micro Focus was named as one of AWS’s Partners for its pre-announced AWS.

Cloud 98
article thumbnail

Expert discloses zero-click, wormable flaw in Microsoft Teams

Security Affairs

Security expert disclosed technical details about a wormable, cross-platform flaw in Microsoft Teams that could allow stealth attacks. Security researcher Oskars Vegeris from Evolution Gaming has published technical details on a wormable, cross-platform vulnerability in the business communication platform Microsoft Teams. The flaw is a cross-site scripting (XSS) issue that impacts the ‘teams.microsoft.com’ domain, it could be exploited by an attacker to achieve remote code execution in the MS Te

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Attackers Know Microsoft 365 Better Than You Do

Dark Reading

Users have taken to Microsoft Office 365's tools, but many are unaware of free features that come with their accounts -- features that would keep them safe.

141
141
article thumbnail

QNAP fixed eight flaws that could allow NAS devices takeover

Security Affairs

Network-attached storage (NAS) vendor QNAP addressed vulnerabilities that could enable attackers to take over unpatched NAS devices. The Taiwanese vendor QNAP has released security updates to fix eight vulnerabilities that could be exploited by attackers to over unpatched NAS devices. The list of vulnerabilities addressed by QNAP is available here , it includes XSS and command injection issues.

article thumbnail

Spearphishing Attack Spoofs Microsoft.com to Target 200M Office 365 Users

Threatpost

It remains unknown as to why Microsoft is allowing a spoof of their very own domain against their own email infrastructure.

article thumbnail

Top cybersecurity firm FireEye hacked by a nation-state actor

Security Affairs

The cyber security giant FireEye announced that it was hacked by nation-state actors, likely Russian state-sponsored hackers. The cybersecurity firm FireEye is one of the most prominent cybersecurity firms, it provides products and services to government agencies and companies worldwide. The company made the headlines because it was the victim of a hack, and experts blame Russia-linked hackers for the attack. “FireEye revealed on Tuesday that its own systems were pierced by what it called

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Open-Source Developers Still Not Interested in Secure Coding

Dark Reading

Security and development are still two different worlds, with open-source developers resistant to spending time finding and fixing vulnerabilities.

Security 141
article thumbnail

Russian Alexander Vinnik sentenced in Paris to five years in prison for money laundering

Security Affairs

Russian citizen Alexander Vinnik was sentenced in Paris to five years in prison for money laundering and ordered to pay 100,000 euros in fines. Russian citizen Alexander Vinnik was sentenced in Paris to five years in prison for money laundering and ordered to pay 100,000 euros in fines. The man went on trial in Paris for having defrauded nearly 200 victims across the world of 135M euros using ransomware.

article thumbnail

FireEye Cyberattack Compromises Red-Team Security Tools

Threatpost

An attacker stole FireEye's Red Team assessment tools that the company uses to test its customers’ security.

Security 119
article thumbnail

The Christchurch Shooter and YouTube's Radicalization Trap

WIRED Threat Level

The platform has gotten better about stamping out extremist content. But researchers say its policies and algorithms are still too opaque.

IT 98
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Remote-Work Transition Shifts Demand for Cyber Skills

Threatpost

According to Cyberseek, an interactive mapping tool that tracks the current state of the security job market, there are more than half a million open cybersecurity positions available in the U.S. alone (522,000).

article thumbnail

US: Archivists’ Victory over Overbroad Copyright Claim via Human Rights Watch

IG Guru

Check out the article here. The post US: Archivists’ Victory over Overbroad Copyright Claim via Human Rights Watch appeared first on IG GURU.

article thumbnail

Nation-State Hackers Breached FireEye, Stole Its Red Team Tools

Dark Reading

"Novel techniques" used by the attackers cheated security tools and forensics, according to FireEye CEO Kevin Mandia.

IT 97