Wed.Nov 09, 2022

article thumbnail

Approaches to long-term planning with IBM Planning Analytics

IBM Big Data Hub

In our collective rush to react to ever-changing marketplace dynamics and shifts in the economy, it’s easy to focus on short-term plans, to the neglect of long-term planning. Today’s leaders need to have several plans – short-term, medium-term, and long-term. Different plans for different needs. How do these plans differ? A short-term plan is designed to show granular details for a limited time frame.

article thumbnail

IT Army of Ukraine Targets Russian Banks

Data Breach Today

Hacktivists Claim Central Bank of Russia and Alfa Bank as Victims Hacktivists fighting a proxy online battle against Russia after its invasion of Ukraine claim to have dumped online a trove of files from the Central Bank of Russia. The IT Army of Ukraine also claimed to have disrupted payments processing at Moscow's Alfa Bank.

IT 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Defeating Phishing-Resistant Multifactor Authentication

Schneier on Security

CISA is now pushing phishing-resistant multifactor authentication. Roger Grimes has an excellent post reminding everyone that “phishing-resistant” is not “phishing proof,” and that everyone needs to stop pretending otherwise. His list of different attacks is particularly useful.

article thumbnail

The Role of Cybersecurity in the Russia-Ukraine War

Data Breach Today

In this episode of "Cybersecurity Unplugged," Dr. Chris Miller, an associate professor of international history at the Fletcher School at Tufts University, discusses the cybersecurity aspects of the Russia-Ukraine war and how perceptions of the two countries may have been inaccurate.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Surveillance vendor exploited Samsung phone zero-days

Security Affairs

Google Project Zero researchers reported that a surveillance vendor is using three Samsung phone zero-day exploits. Google Project Zero disclosed three Samsung phone vulnerabilities, tracked as CVE-2021-25337, CVE-2021-25369 and CVE-2021-25370, that have been exploited by a surveillance company. The three issues are: CVE-2021-25337 : Improper access control in clipboard service in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows untrusted applications to read or write certain local

More Trending

article thumbnail

MSSPs Fare Well in First MITRE Evaluations

eSecurity Planet

If MITRE Engenuity’s new MSSP evaluations are any indication, managed security service providers are a little like children from Lake Wobegon: They’re all above average. Of the 15 MSSPs that participated in MITRE’s first-ever security services testing, only three failed to report attack techniques in all 10 of the evaluation steps, and in two of those cases it was because the test didn’t successfully execute because of a web shell failure.

Cleanup 104
article thumbnail

Microsoft Patches ProxyNotShell Exchange Vulnerabilities

Data Breach Today

State-Backed Hackers, Possibly Chinese, Exploited Zero-Days Microsoft released patches fixing a pair of Exchange vulnerabilities revealed publicly in late September and collectively known as ProxyNotShell. The computing giant assesses with "medium confidence" that state-sponsored hackers have exploited the now-squashed bugs.

130
130
article thumbnail

Microsoft Patch Tuesday updates fix 6 actively exploited zero-days

Security Affairs

Microsoft Patch Tuesday updates for November 2022 addressed 64 vulnerabilities, including six actively exploited zero-days. Microsoft Patch Tuesday updates for November 2022 addressed 64 new vulnerabilities in Microsoft Windows and Windows Components; Azure and Azure Real Time Operating System; Microsoft Dynamics; Exchange Server; Office and Office Components; SysInternals; Visual Studio; SharePoint Server; Network Policy Server (NPS); Windows BitLocker; and Linux Kernel and Open Source Software

article thumbnail

Could a Digital Red Cross Protect Hospitals From Ransomware?

Data Breach Today

International Committee Calls for Criminals to View Red Cross Symbol as Off Limits The Red Cross symbol has marked people and facilities off limits to attack across a century of wars, but security experts are skeptical about a proposal to create a digital Red Cross marker to protect healthcare and humanitarian groups from cyberattacks. The reason? You can't trust cybercriminals.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Here Is What You Can Do To Inspect SMS URL Links Before Clicking

KnowBe4

Phishing via Short Message Service (SMS) texts, what is known as smishing , is becoming increasingly common (some examples are shown below). There is probably not a person on Earth who does not get at least one smishing message a month. It is a big problem.

article thumbnail

Lenovo warns of flaws that can be used to bypass security features

Security Affairs

Lenovo fixed two high-severity flaws impacting various laptop models that could allow an attacker to deactivate UEFI Secure Boot. Lenovo has released security updates to address a couple of high-severity vulnerabilities impacting various ThinkBook, IdeaPad, and Yoga laptop models. An attacker can exploit the flaws to disable UEFI Secure Boot. Secure Boot is a security feature of the latest Unified Extensible Firmware Interface (UEFI) 2.3.1 designed to detect tampering with boot loaders, key ope

article thumbnail

European Commission publishes draft Cyber Resilience Act

Data Matters

On 15 September 2022, the European Commission (“Commission” or “EC”) published a draft proposal for a Cyber Resilience Act (“CRA” ). The CRA comes in response to the increasingly common occurrence of cyberattacks, with some predicting that the global cost of cyberattacks for companies will reach $10.5 trillion annually by 2025, up from $3 trillion in 2015.

article thumbnail

VMware fixes three critical flaws in Workspace ONE Assist

Security Affairs

VMware address three critical bugs in the Workspace ONE Assist solution that allow remote attackers to bypass authentication and elevate privileges. VMware has released security updates to address three critical vulnerabilities impacting the Workspace ONE Assist product. Remote attackers can exploit the vulnerabilities to bypass authentication and elevate privileges to admin.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cookie-stealing Feature Added by Phishing-as-a-Service Provider To Bypass MFA

KnowBe4

The Robin Banks phishing -as-a-service platform now has a feature to bypass multi-factor authentication by stealing login session cookies, according to researchers at IronNet. The phishing kit’s developer used an open-source tool to implement this feature, which targets Google, Yahoo, and Outlook accounts.

article thumbnail

Experts observed Amadey malware deploying LockBit 3.0 Ransomware

Security Affairs

Experts noticed that the Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems. Researchers from AhnLab Security Emergency Response Center (ASEC) reported that the Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned. Amadey Bot is a data-stealing malware that was first spotted in 2018, it also allows operators to install additional payloads.

article thumbnail

Contracting for Cybersecurity Risks: Mitigating Weak Links

Data Protection Report

Managing vendor risks includes putting pen to paper. Organizations are increasingly susceptible to risks outside their controlled IT infrastructure as they engage third-party vendors to manage online platforms and process data. Even though an organization may have little to no control over a vendor’s security practices, it bears the ultimate responsibility for safeguarding its own data and systems.

Risk 116
article thumbnail

[EYES OUT] This Scary Strain of Sleeper Ransomware Is Really a Data Wiper in Disguise

KnowBe4

This Data wiper replaces every other 666 bytes of data with junk. Techradar reported that a new data-wiping malware has been detected, infecting more and more endpoints with each passing day - but what's most curious is that it poses as ransomware.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Patch ASAP: Critical Citrix, VMware Bugs Threaten Remote Workspaces With Takeover

Dark Reading

Hole-y software alert, Batman: Cybercriminal faves Citrix Gateway and VMware Workspace ONE have authentication-bypass bugs that could offer up total access to attackers.

article thumbnail

Gain the information advantage with a complete 360-degree customer view

OpenText Information Management

The market continues to be volatile and change is occurring with great velocity. Shortages and price increases have made customers less loyal, and the landscape is more competitive as customers look for alternatives. Organizations try to keep up, but masses of dispersed business information make it difficult to satisfy constantly changing customer needs as the … The post Gain the information advantage with a complete 360-degree customer view appeared first on OpenText Blogs.

article thumbnail

What We Really Mean When We Talk About ‘Cybersecurity’

Dark Reading

A lack of precision in our terminology leads to misunderstandings and confusion about the activities we engage in, the information we share, and the expectations we hold.

article thumbnail

OpenText is a leader in Detection and Response

OpenText Information Management

MITRE Engenuity released today the results of its first ATT&CK Evaluations for Managed Services. OpenText™ joins the top tier with an outstanding performance for its Managed Extended Detection and Response (MxDR) service. The evaluation, code named OilRig 2022, assessed the industry’s top sixteen Managed Detection and Response (MDR) services as well as Managed Security Services … The post OpenText is a leader in Detection and Response appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Experian, T-Mobile Pay Up in Multimillion-Dollar Data Breach Settlements

Dark Reading

Massachusetts Attorney General announced settlements across multiple states for damages from Experian's 2012 and 2015 breaches that violated consumer protection and notification laws.

article thumbnail

Boost workplace productivity with Apple OS upgrades

Jamf

macOS Ventura and iOS/iPadOS 16 introduce a host of new features, many of which have the potential to make work more productive and collaborative. Learn about some of our favorites and hear how we think they will make an impact in a workplace environment.

52
article thumbnail

Understanding the Rise of Risk-Based Vulnerability Management

Dark Reading

Risk-based vulnerability management solutions foster the convergence of risk management and vulnerability management. Andrew Braunberg explains what’s driving the emergence of RBVM.

Risk 72
article thumbnail

Collibra Data Quality & Observability: Now Cloud-enabled

Collibra

The new cloud offering of Collibra Data Quality & Observability brings scalability, agility, and security to your data quality operations across multiple clouds. Working with this SaaS model offering helps you. Reduce IT overheads by deploying data quality in the cloud of your choice without sensitive data leaving your environment. Enable teams to scale compute power rapidly. .

Cloud 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Long Island Midterm Votes Delayed Due to Cyberattack Aftereffects

Dark Reading

Suffolk County had to hand deliver voting databases with ballot results to the county election headquarters.

87
article thumbnail

Upgrade or restore macOS offline with a bootable USB installer

Jamf

Learn about a method available to users and MacAdmins to restore macOS when they need it most but don’t have access to the internet. The workflow will help upgrade your Mac to the latest version or restore it so that it is ready to be managed by Jamf Pro after enrollment.

Access 52
article thumbnail

Cloud9 Malware Offers a Paradise of Cyberattack Methods

Dark Reading

The Swiss Army knife-like browser extension is heaven for attackers — and can be hell for enterprise users.

82