Tue.May 12, 2020

article thumbnail

Enhanced Zeus Sphinx Trojan Used in COVID-19 Schemes

Data Breach Today

Researchers Say New Features and Functionality Added The operators behind the Zeus Sphinx malware have added new features and functionality to the Trojan, and more cybercriminals have deployed it within phishing campaigns that use the COVID-19 crisis as a lure, according to IBM X-Force. The Trojan has become more efficient at stealing banking data.

Phishing 349
article thumbnail

Microsoft Patch Tuesday, May 2020 Edition

Krebs on Security

Microsoft today issued software updates to plug at least 111 security holes in Windows and Windows-based programs. None of the vulnerabilities were labeled as being publicly exploited or detailed prior to today, but as always if you’re running Windows on any of your machines it’s time once again to prepare to get your patches on. May marks the third month in a row that Microsoft has pushed out fixes for more than 110 security flaws in its operating system and related software.

Risk 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ATM Manufacturer Diebold Nixdorf Hit With Ransomware

Data Breach Today

Company Says April Attack Caused 'Limited IT Systems Outage' Diebold Nixdorf, one of the largest makers of ATMs, says it sustained a ransomware attack on April 25, but it experienced only a "limited IT systems outage" and ATM machines were not affected.

article thumbnail

Scaling Your Business for Digital Transformation - 6 Important Factors

AIIM

Each year brings a rapid increase in technological advancements that can benefit both your personal and professional life. Constant tech advancements can make it feel hard to keep up with competing businesses if your company isn't adapting fast enough. In this day and age, digital transformations are integral for a growing business's future, as technology changes the advancements and operations of every company.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Health Data Breach Update: What Are the Causes?

Data Breach Today

Phishing Still a Major Culprit, But Other Challenges Emerge Phishing scams continue to be a leading cause of health data breaches so far this year.

More Trending

article thumbnail

COVID-19: 3 Future Scenarios

Data Breach Today

Pandemic Expert Regina Phelps Outlines Potential Paths for Coronavirus There are three distinct scenarios for how the COVID-19 virus might spread over the next 18 to 24 months, says pandemic expert Regina Phelps. None is pleasant, but one may exact a smaller economic and human toll. And our next moves might determine which scenario unfolds.

274
274
article thumbnail

Total cost of ownership: Mac versus PC in the enterprise

Jamf

If the upfront cost is more, how can Mac be less expensive than PC? We examine the numbers and put the Mac versus PC in the enterprise myths to bed.

145
145
article thumbnail

The Fraud Implications of E-Commerce Surge During Pandemic

Data Breach Today

Jordan McKee of 451 Research Discusses Card Payment Trends The surge in e-commerce as a result of the COVID-19 pandemic means more payment card transactions - and more card fraud, says Jordan McKee of 451 Research, who discusses the latest trends.

182
182
article thumbnail

Accelerating the Journey to AI for government in a post-COVID world

IBM Big Data Hub

AI is transforming how businesses operate and deliver value, while simultaneously improving efficiencies across the organization. Governments have taken an increasingly important role in the advent of COVID-19 as citizens look to government agencies for trusted information for their individual safety, well-being and beyond – to both support and benefit themselves socially, economically and emotionally.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New Thunderbolt Flaws Disclosed to Intel

Data Breach Today

But Attacks Would Require Physical Access to a Computer New research shows it's possible to unlock a password-protected Windows computer in about five minutes by exploiting vulnerabilities in Intel's Thunderbolt hardware controller. The vulnerabilities add to a growing list of issues around Thunderbolt, which is used for connecting peripherals.

Passwords 175
article thumbnail

REvil Ransomware Attack Hits A-List Celeb Law Firm

Threatpost

Cybercriminals used the REvil ransomware to attack a law firm used by the likes of Lady Gaga, Drake and Madonna. Now, they're threatening to leak the 756 gigabytes of stolen data.

article thumbnail

Why data privacy requires a cross-functional approach

Collibra

Our lives have become increasingly digital over the last few decades and the rate of digital transformation has skyrocketed in recent weeks due to the global health crisis. Spending more time ingrained in the digital world means more data generated. More data generated means more analyses and insights for businesses. More analyses and insights leads to powerful business decisions and outcomes. .

article thumbnail

Trojan Lampion is back after 3 months

Security Affairs

Trojan Lampion is back after 3 months. The malware was observed last days with a new obfuscation layer, new C2, and distributed inside an MSI file. Trojan Lampion is a malware observed at the end of the year 2019 impacting Portuguese users using template emails from the Portuguese Government Finance & Tax and EDP. The latest campaigns in Portugal were observed during February 2020, according to the threat indicators available at 0xSI_f33d – The Portuguese Abuse Open Feed.

Cloud 106
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Three Years After WannaCry, Ransomware Accelerating While Patching Still Problematic

Dark Reading

Using a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons.

article thumbnail

Data Innovator Spotlight - Top 6 Characteristics of Data Innovators

Reltio

We live in a data world, where data innovators are the modern-day explorers. They are in demand in Global 2000 companies because they help solve problems caused by data issues. And, they uncover monetization opportunities with the right data. Data innovators support digital and customer experience transformations. They work on important and interesting initiatives like how to use customer data to create connected customer experiences and to drive hyper-personalization at scale.

article thumbnail

Anubis Malware Upgrade Logs When Victims Look at Their Screens

Threatpost

Threat actors are cooking up new features for the sophisticated banking trojan that targets Google Android apps and devices.

Phishing 116
article thumbnail

Zeus Sphinx continues to be used in Coronavirus-themed attacks

Security Affairs

The Zeus Sphinx banking Trojan continues to evolve while receiving new updates it is employed in ongoing coronavirus-themed scams. . IBM security researcher continues to monitor the evolution of the infamous Zeus Sphinx banking Trojan (aka Zloader or Terdot ) that receives frequent updates and that was involved in active coronavirus scams. . The Zeus Sphinx banking Trojan is based on the code of the Zeus v.2 Trojan that was leaked online.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

COVID-19: addressing your organisation’s cyber risk and data privacy response measures

IT Governance

We recently hosted a webinar in which a team of experts discussed the short- and long-term effects that coronavirus will have on organisations. COVID-19 Cyber Risk and Data Privacy Response featured Camilla Winlo, DQM’s director of consultancy services; Geraint Williams, GRC International Group’s chief information security officer; and John Potts, GRCI Law’s head of DPO, DSAR and breach support.

article thumbnail

Patch now your vBulletin install before hacker will target your forum

Security Affairs

Maintainers of the vBulletin project have released an important fix to address a security vulnerability tracked as CVE-2020-12720. Administrators of online discussion forums based on the popular vBulletin CMS urge to update their install to address a critical security vulnerability tracked as CVE-2020-12720. “A security exploit has been reported within vBulletin 5.6.1.

CMS 93
article thumbnail

Preparing For An Exit

PerezBox

In my last article I shared the journey we embarked on when selling Sucuri. In this article I will share insights I have collected over the past decade working with. Read More. The post Preparing For An Exit appeared first on PerezBox.

91
article thumbnail

6 Free Cybersecurity Training and Awareness Courses

Dark Reading

Most are designed to help organizations address teleworking risks related to COVID-19 scams.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft Addresses 111 Bugs for May Patch Tuesday

Threatpost

Important-rated EoP flaws make up the bulk of the CVEs; SharePoint continues its critical run with four worrying bugs.

IT 109
article thumbnail

Attack Against PC Thunderbolt Port

Schneier on Security

The attack requires physical access to the computer, but it's pretty devastating : On Thunderbolt-enabled Windows or Linux PCs manufactured before 2019, his technique can bypass the login screen of a sleeping or locked computer -- and even its hard disk encryption -- to gain full access to the computer's data. And while his attack in many cases requires opening a target laptop's case with a screwdriver, it leaves no trace of intrusion and can be pulled off in just a few minutes.

article thumbnail

A cyber attack hit a port on Strait of Hormuz, Iran said

Security Affairs

Iran ‘s officials revealed that hackers compromised and damaged a small number of computers at the port of Shahid Rajaei in the city of Bandar Abbas. Iranian officials announced on sunday that hackers damaged a small number of systems at the port of Shahid Rajaei in the city of Bandar Abbas. Bandar Abbas is the capital of Hormozg?n Province on the southern coast of Iran, on the Persian Gulf.

Risk 86
article thumbnail

Website Attacks Become Quieter & More Persistent

Dark Reading

Threat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says.

109
109
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Adobe addresses critical issues in Acrobat, Reader, and DNG SDK

Security Affairs

Adobe has released security updates to address 36 vulnerabilities in Adobe Acrobat, Reader, and Adobe DNG Software Development Kit. Adobe has released security updates for Adobe Acrobat, Reader, and Adobe DNG Software Development Kit that address thirty-six security vulnerabilities in Adobe Acrobat, Reader, and Adobe DNG Software Development Kit. Sixteen vulnerabilities addressed by Adobe have been rated as ‘Critical’ and could be exploited by attackers to execute arbitrary code or t

article thumbnail

Adobe Kills 16 Critical Flaws in Acrobat and Reader, Digital Negative SDK

Threatpost

Adobe patched 36 flaws, including critical vulnerabilities in Acrobat and Reader and its DNG Software Development Kit.

IT 101
article thumbnail

Popular Page Builder WordPress plugin fixes critical issues. Update it now!

Security Affairs

Two issues in the popular Page Builder by SiteOrigin WordPress plugin could be exploited to carry out code execution attacks on vulnerable websites. Two high severity vulnerabilities found in the Page Builder WordPress can be exploited by attackers to create new admin accounts and deliver malicious code taking over the compromised websites. The vulnerabilities are a Cross-Site Request Forgery (CSRF) leading to Reflected Cross-Site Scripting (XSS) attacks and they affect all Page Builder versions

IT 82