Fri.May 19, 2023

article thumbnail

Apple Fixes 3 Zero-Days Exploited in the Wild

Data Breach Today

Vulnerabilities Exist in Apple-Mandated WebKit Browser Engine Apple is patching actively exploited zero-day flaws in its browser rendering engine for mobile devices, and one cybersecurity firm says the vulnerabilities are likely evidence of takeover attacks. Two of the bugs were the subject of Apple's first-ever Rapid Security Response.

article thumbnail

RSAC Fireside Chat: Upgrading containment to counter Putin’s weaponizing of ransomware

The Last Watchdog

The ransomware plague endures — and has arisen as a potent weapon in geopolitical conflicts. Related: The Golden Age of cyber espionage Cyber extortion remains a material threat to organizations of all sizes across all industries. Ransomware purveyors have demonstrated their capability to endlessly take advantage of a vastly expanded network attack surface – one that will only continue to expand as the shift to massively interconnected digital services accelerates.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishing Vendor Sells IP Addresses to Duck Anomaly Detection

Data Breach Today

BulletProofLink Found A Way To Thewart Impossible Travel Detection A large-scale phishing-as-a-service operation is shifting tactics to allow attackers to avoid anomaly detection by using localized IP addresses, warns Microsoft. The U.S. Secret Service has reported that BEC incidents cost global enterprises more than $43 billion in losses over a five-year span.

Phishing 236
article thumbnail

UK Sets Out It’s “Pro-Innovation” Approach To AI Regulation

Data Matters

On 29 March 2023, the UK’s Department for Science Innovation and Technology (“ DSIT ”) published its long awaited White Paper on its “pro-innovation approach to AI regulation” (the “ White Paper ”), along with a corresponding impact assessment. The White Paper builds on the “proportionate, light touch and forward-looking” approach to AI regulation set out in the policy paper published in July 2022.

Paper 97
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cyberattacks on Taiwan Surge Amid Chinese Aggression

Data Breach Today

Surge In PlugX Malware Use Points Towards Chinese Nation-State Activity Taiwan was buffeted during April by a three day surge in malicious emails that increased to four times the usual amount, a reflection of increased tensions in the Taiwan Strait, say threat analysts. Following the wave, Trellix observed a fifteen-fold increase in PlugX infections.

204
204

More Trending

article thumbnail

The FTC Pushes Boundaries With Proposed Health Rule Change

Data Breach Today

Consumer Health Data Needs More Protections - Is the FTC Up to It? The Federal Trade Commission's proposed changes to its 14-year-old Health Breach Notification Rule come at a time when some advocates say stronger consumer data privacy protections are needed. But will the FTC potentially face legal challenges to its authority to make these sweeping changes?

article thumbnail

First look: Rapid Security Response contents

Jamf

With the release of macOS Ventura 13.4, iOS 16.5 and iPadOS 16.5, Apple is showing us for the first time how they plan to document the CVEs that were addressed with prior Rapid Security Responses.

article thumbnail

Zero Trust Authentication: Foundation of Zero Trust Security

Data Breach Today

Beyond Identity's Husnain Bajwa on a Solution That Supports Zero Trust Architecture Identity is more important than ever in today's "work from anywhere" world where the need for secure authentication has become paramount. Zero Trust Authentication complements security investments in EDRs, EPPs, SIEMs and existing SSOs and delivers a passwordless experience that drives productivity.

article thumbnail

eDiscovery is not just for litigation anymore  

OpenText Information Management

Organizations are facing an evolving legal and regulatory landscape involving everything from complying with stringent data privacy laws to combating sophisticated cyber threats that force organizations to prepare for when – not if – an incident or data breach will occur. To minimize these new and emerging risks, legal professionals do not have to look … The post eDiscovery is not just for litigation anymore appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ISMG Editors: The Plot Thickens for Capita in Breach Fallout

Data Breach Today

Also: The EU Adopts a Crypto Regulation; M&A Trends In the latest weekly update, four ISMG editors discuss the mounting fallout from the March hack of Capita and accompanying data breach, the comprehensive crypto regulation adopted by the EU, and Crosspoint Capital's agreement to purchase Absolute Software for $657 million.

article thumbnail

Top 5 Application Security Tools & Software for 2023

eSecurity Planet

Application security tools and software solutions are designed to identify and mitigate vulnerabilities and threats in software applications. Their main purpose is to protect applications from unauthorized access, data breaches, and malicious attacks. These tools play a vital role in ensuring the security, integrity, and confidentiality of sensitive information, such as personal data and financial records.

article thumbnail

Apple Patches 3 Zero-Days Possibly Already Exploited

Dark Reading

In an advisory released by the company, Apple revealed patches for three previously unknown bugs it says may already have been used by attackers.

IT 101
article thumbnail

February cyber incident will cost molten metal flow engineering firm Vesuvius ÂŁ3.5 million

Security Affairs

Vesuvius, a leader in molten metal flow engineering and technology, revealed that the February cyber incident will cost it ÂŁ3.5 million Vesuvius is a global leader in molten metal flow engineering and technology, it employs more than 10,000 people and is listed on the London Stock Exchange. In February the company disclosed a security breach and revealed that it discovered unauthorized access to its systems.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Zasio Enterprises, Inc. Announces Versatile 2023

IG Guru

Zasio Enterprises, Inc., a global leader in business-to-business information governance and records management solutions, is pleased to announce the newest flagship product in its Versatile lineup, Versatile 2023. The soon-to-be-released software includes all of Zasio’s industry-changing information governance solutions under a singular umbrella suite.

article thumbnail

Lemon Group gang pre-infected 9 million Android devices for fraudulent activities

Security Affairs

The Lemon Group cybercrime ring has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices. A cybercrime group tracked has Lemon Group has reportedly pre-installed malware known as Guerilla on almost 9 million Android devices. Infected devices were used for multiple malicious activities, including traffic redirections through mobile proxies, info-stealing, click fraud, and social media and online messaging accounts and monetization via advertisements.

article thumbnail

TDC Digital leverages IBM Cloud for transparent billing and improved customer satisfaction

IBM Big Data Hub

Web-based ERP providers are experiencing significant growth and demand as more companies seek to streamline their business processes, cut costs and improve operational efficiency. With the rise of cloud computing, web-based ERP providers increasingly offer Software as a Service (SaaS) solutions, which have become a popular option for businesses of all sizes.

Cloud 77
article thumbnail

NPM packages found containing the TurkoRat infostealer

Security Affairs

Experts discovered two malicious packages in the npm package repository, both were laced with an open-source info-stealer called TurkoRat. ReversingLabs discovered two malicious packages, respectively named nodejs-encrypt-agent and nodejs-cookie-proxy-agent, in the npm package repository containing an open-source info-stealer called TurkoRat. TurkoRat is an information-stealing malware that can obtain a broad range of data from the infected machine, including account login credentials, cryptocu

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

3 Common Initial Attack Vectors Account for Most Ransomware Campaigns

Dark Reading

The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.

article thumbnail

Explore Declarative Device Management in Jamf School.

Jamf

In a recent update, Jamf School added support for Declarative Device Management (DDM). With these new capabilities, Jamf is helping schools move from MDM for schools toward the future of Apple device management: MDM and DDM partnerships.

MDM 72
article thumbnail

Data Siloes: Overcoming the Greatest Challenge in SecOps

Dark Reading

It's not lack of data that's the problem, but the inability to piece it together to truly understand and reduce risk.

Risk 90
article thumbnail

A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks

WIRED Threat Level

Kaspersky researchers have uncovered clues that further illuminate the hackers’ activities, which appear to have begun far earlier than originally believed.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Debuts Quality Ratings for Security Bug Disclosures

Dark Reading

New rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.

article thumbnail

Security Risks of New.zip and.mov Domains

Schneier on Security

Researchers are worried about Google’s.zip and.mov domains, because they are confusing. Mistaking a URL for a filename could be a security vulnerability.

Risk 73
article thumbnail

FTC Issues Policy Statement on Biometric Information and Section 5 of the FTC Act to Address Concerns about Misuse

Hunton Privacy

On May 18, 2023, the Federal Trade Commission issued a policy statement on “Biometric Information and Section 5 of the Federal Trade Commission Act.” The statement warns that the use of consumer biometric information and related technologies raises “significant concerns” regarding privacy, data security, and bias and discrimination, and makes clear the FTC’s commitment to combatting unfair or deceptive acts and practices related to the collection and use of consumers’ biometric information and

Sales 55
article thumbnail

How You, or Anyone, Can Dodge Montana’s TikTok Ban

WIRED Threat Level

Montana’s TikTok ban will be impossible to enforce. But it could encourage copycat crackdowns against the social media app.

IT 67
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Best 9 Angular Component Libraries in 2023

Enterprise Software Blog

Many applications bump into a stack of similar challenges, like providing an intuitive and consistent user interface (UI), handling or rendering large data sets, allowing seamless data integration, and communicating with other systems using APIs. And as it appears, Angular is a top framework that enables developers to tackle these challenges with the help of extended features and capabilities packed in different UI libraries.

article thumbnail

7 Essential DevSecOps Best Practices Every Development Team Should Implement

ForAllSecure

As software development teams move towards a DevOps culture, security is becoming an increasingly important aspect of the development process. DevSecOps is a practice that integrates security into the DevOps workflow. The aim is to build secure, reliable and compliant applications from the outset of the development process, rather than addressing security as an afterthought.

article thumbnail

Vacancy Announcement

National Archives Records Express

Our office has posted a vacancy announcement for an Instructional Systems Specialist in the Records Management Training Program. This announcement will be open until Tuesday, May 30, 2023. Instructional Systems Specialist Agency: National Archives and Records Administration Salary: $98,496 – $158,432 per year Series and Grade: GS-1750-13 Open Period: Friday, May 19, 2023 – Tuesday, May 30, 2023.