Tue.Feb 23, 2021

article thumbnail

Chinese Hacking Group 'Cloned' NSA Exploit Tool

Data Breach Today

Researchers: 'Jian' Hacking Tool Targeted Zero-Day Flaw in Windows A Chinese hacking group reportedly "cloned" and deployed a zero-day exploit developed by the NSA's Equation Group before Microsoft patched the Windows flaw being exploited, according to Check Point Research. The analysis shows how some U.S. cyber weapons have been turned against their developers.

295
295
article thumbnail

SHARED INTEL: Forrester poll – security decision makers report breaches escalated as Covid 19 spread

The Last Watchdog

Human suffering and economic losses weren’t the only two things that escalated with the spread of Covid 19 last year. Related: Can ‘SASE’ help companies secure connectivity? Network breaches also increased steadily and dramatically month-to-month in 2020. This development is delineated in a recent report from technology research firm Forrester.

Security 175
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Marine Corps Looks to Expand Insider Threat Program

Data Breach Today

Marines Seek to Deploy User Activity Monitoring System on Networks The U.S. Marine Corps looks to expand its insider threat program and seeks proposals to include activity monitoring technology on its enterprise and classified networks. The goal is to give the Marines greater ability to monitor network traffic and stop insiders from exposing data.

IT 279
article thumbnail

The Gulf Between IM and IT

AIIM

How many times have you left a joint meeting of members of your organization's Information Management (IM) and IT teams thinking that everyone was on the same page, only to find out a few days later that the decisions your colleagues in the "other" unit took away were totally different from what your unit did? It happens more often than we think. And when it does happen, we should consider ourselves lucky if it takes only a few days for the inconsistent understanding to surface.

IT 116
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Mobile Health App and API Security: Common Flaws

Data Breach Today

Broken object level authorization, or BOLA, vulnerabilities are among the most common and worrisome weaknesses contained in dozens of mobile health applications used by patients and clinicians, posing security and privacy risks to health information, says cybersecurity researcher Alissa Knight.

Security 257

More Trending

article thumbnail

Fraudsters Using Telegram API to Harvest Credentials

Data Breach Today

Phishing Campaign Bypasses Secure Email Gateway A newly-discovered phishing campaign posts harvested credentials using the Telegram messaging app's application programming interface to bypass secure email gateways, report researchers at the Cofense Phishing Defense Center.

Phishing 252
article thumbnail

Dependency Confusion: Another Supply-Chain Vulnerability

Schneier on Security

Alex Birsan writes about being able to install malware into proprietary corporate software by naming the code files to be identical to internal corporate code files. From a ZDNet article : Today, developers at small or large companies use package managers to download and import libraries that are then assembled together using build tools to create a final app.

Libraries 109
article thumbnail

Ukraine Blames Russia for DDoS Attack on Defense Websites

Data Breach Today

Alleged Attack Targeted Vulnerable Government Web Servers The National Security and Defense Council of Ukraine accuses Russia of turning Ukrainian government servers into a botnet for massive distributed denial-of-service attacks that then caused the servers to be blocked.

article thumbnail

Adapt, pivot and persevere: Life Sciences in 2021

OpenText Information Management

Even with 2020 in the rearview mirror, the impact of last year will linger for some time. Clinical trials moved to virtual models, supply chain disruptions reached historic levels and telehealth became routine — all nearly overnight. As a result, Life Sciences organizations start 2021 with new perspectives and new priorities, viewed through a lens … The post Adapt, pivot and persevere: Life Sciences in 2021 appeared first on OpenText Blogs.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

SonicWall Was Hacked. Was it Also Extorted?

Data Breach Today

Hacker Claims SonicWall Paid Ransom; SonicWall Stays Silent SonicWall was recently attacked via a zero-day flaw in one of its own products. Curiously, SonicWall hasn't said much about the extent and damage of the breach since its announcement. But there are strong indications it may have been targeted by an extortion attempt.

IT 220
article thumbnail

Thales leading the way with PCI-approved remote management solutions

Thales Cloud Protection & Licensing

Thales leading the way with PCI-approved remote management solutions. madhav. Tue, 02/23/2021 - 06:20. There is an increasing focus in the payments world regarding certifications. After all, transaction processing systems require robust security techniques in their attempts to defeat the fraudsters. Payment card fraud is still a major issue as can be seen from detailed analysis provided by UK Finance (which covers the UK market) and by the Nilson Report which reported $28.65 billion card fraud l

article thumbnail

Silver Sparrow Malware Infects 30,000 Macs

Data Breach Today

Called Serious Threat, But Has Yet to Take Malicious Action A previously undetected malware variant has infected almost 30,000 Apple Macs. So far, however, researchers have not seen the code, called Silver Sparrow, deliver any malicious payloads to these endpoints, according to a new report.

221
221
article thumbnail

Crowdstrike Firewall Management Product Review

eSecurity Planet

Crowdstrike’s Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It’s a module within the broader Falcon endpoint protection suite, which includes antivirus protection as well as optional features like EDR, threat intelligence, and threat hunting. Crowdstrike Falcon uses next-generation technology like machine learning and artificial intelligence to detect and mitigate sophisticated threats before they can cause significant harm.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

France Warns of Stolen Healthcare Credentials

Data Breach Today

Alert Comes Amid Recent Ransomware Attacks on Hospitals, Others French authorities are warning the country's healthcare sector of the discovery of a glut of stolen credentials, apparently belonging to hospital workers, that were found for sale on the dark web. The alert comes amid a recent rise in ransomware attacks on hospitals and other healthcare entities.

Sales 227
article thumbnail

Finnish IT Giant Hit with Ransomware Cyberattack

Threatpost

A major Finnish IT provider has been hit with a ransomware attack that has forced the company to turn off some services and infrastructure in a disruption to customers, while it takes recovery measures. Norwegian business journal E24 reported the attack on Espoo, Finland-based TietoEVRY on Tuesday, claiming to have spoken with Geir Remman, a […].

article thumbnail

Indian Critical Infrastructure Protection Center Vulnerable

Data Breach Today

Hacking Group: Flaws That Could Lead to Breach Remain Unpatched Multiple critical vulnerabilities that could enable hackers to access sensitive data have been found in India's National Critical Information Infrastructure Protection Center, and most of them remain unpatched, says ethical hacking group Sakura Samurai.

Access 172
article thumbnail

Hunton Partner Dora Luo Publishes “China: The Draft PIPL and the GDPR – A Comparative Perspective”

Hunton Privacy

In the February 2021 issue of the Data Protection Leader , Hunton partner Dora Luo discusses China’s draft Personal Information Protection Law (“Draft PIPL”) ( in Chinese ) in the context of other comprehensive data protection frameworks, such as the EU General Data Protection Regulation (“GDPR”). The article examines the Draft PIPL in the context of advanced technologies that have accelerated the collection of personal information more frequently than before.

GDPR 102
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analysis: Russia's Sandworm Hacking Campaign

Data Breach Today

This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.

Security 170
article thumbnail

Belgium: EU takes another step towards strengthening the cybersecurity of 5G networks

DLA Piper Privacy Matters

Authors: Kristof De Vulder , Heidi Waem , Gilles Hachez. The EU has been steadily ramping up its cybersecurity efforts over the last few years. This has been previously evidenced by its adoption of a new Cybersecurity strategy (the ‘Cybersecurity Strategy for the Digital Decade’ part of its Shaping Europe’s Digital Future strategy, its Recovery Plan for Europe and its Security Union Strategy 2020-2025) and by the adoption of a proposal for a Directive on measures for a high common level of cyb

article thumbnail

Sequoia Capital Investigating 'Cybersecurity Incident'

Data Breach Today

Few Details Are Known, But Phishing Attack May Have Played a Role Venture capital firm Sequoia Capital confirmed it was recently involved in a "cybersecurity incident," but offered no details on exactly what may have transpired. Cybersecurity teams and law enforcement agencies have been notified.

article thumbnail

FIN11 cybercrime group is behind recent wave of attacks on FTA servers

Security Affairs

FireEye experts linked a series of attacks targeting Accellion File Transfer Appliance (FTA) servers to the cybercrime group UNC2546, aka FIN11. Security experts from FireEye linked a series of cyber attacks against organizations running Accellion File Transfer Appliance (FTA) servers to the cybercrime group UNC2546, aka FIN11. “Starting in mid-December 2020, malicious actors that Mandiant tracks as UNC2546 exploited multiple zero-day vulnerabilities in Accellion’s legacy File Transfer App

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

8 tips for fostering user centricity in content services

OpenText Information Management

A prime measure of the success of a content management platform is its effectiveness in accelerating and improving the efficiency in the day-to-day activities of the user community. Implementing a content management system that is connected to critical business applications and offers personalized, easy, and secure access to the right information at the right time … The post 8 tips for fostering user centricity in content services appeared first on OpenText Blogs.

article thumbnail

Twitter removes 100 accounts linked to Russia disseminating disinformation

Security Affairs

Twitter removed dozens of accounts allegedly used by Russia-linked threat actors to disseminate disinformation and target western countries. Twitter has removed dozens of accounts used by Russia-linked threat actors that were used to disseminate disinformation and to target the European Union, the United States, and the NATO alliance. Experts believe the accounts were part of two separate clusters that were operated by Russian actors and that targeted different entities.

article thumbnail

CVSS as a Framework, Not a Score

Dark Reading

The venerable system has served us well but is now outdated. Not that it's time to throw the system away -- use it as a framework to measure risk using modern, context-based methods.

Risk 103
article thumbnail

NurseryCam daycare cam service shut down after security breach

Security Affairs

Daycare camera product NurseryCam was hacked last week, the company was forced to shut down its IoT camera service. On Friday, The Register become aware of the compromise of the NurseryCam network. NurseryCam is produced by the companies FootfallCam Ltd and Meta Technologies Ltd. In response to the incident, the company shut down its IoT camera service on Saturday and reported the security breach to the parents. “On 17:18 Friday 19th February 2021, it has come to our attention of a cyber i

IoT 77
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Shift Your Career into High Gear with the New Reltio Certification Program

Reltio

The move to cloud computing and the increasing reliance on data as a driver of competitive business advantage is creating new career opportunities for enterprise architects and data integration specialists around the world. It’s also generating a way for data integrators and service providers to build confidence in their expertise with new and existing customers.

Cloud 72
article thumbnail

Security + Fraud Protection: Your One-Two Punch Against Cyberattacks

Dark Reading

When siloed functions unite in the face of cyberthreats, organizations can continue, uninterrupted, along their paths to digital transformation.

article thumbnail

Daycare Webcam Service Exposes 12,000 User Accounts  

Threatpost

NurseryCam suspends service across 40 daycare centers until a security fix is in place.