Tue.Dec 29, 2020

article thumbnail

SolarWinds Attack: 'This Hit the Security Community Hard'

Data Breach Today

RiskIQ CEO Lou Manousos Details Lessons to Learn in Supply-Chain Attack Aftermath The SolarWinds breach is a case study in how attackers can subvert a widely used piece of software to turn it to their advantage, says Lou Manousos, CEO of RiskIQ. The attack surface management expert details lessons all organizations must learn in the wake of this "unprecedented" attack.

Security 313
article thumbnail

Happy 11th Birthday, KrebsOnSecurity!

Krebs on Security

Today marks the 11th anniversary of KrebsOnSecurity! Thank you, Dear Readers, for your continued encouragement and support! With the ongoing disruption to life and livelihood wrought by the Covid-19 pandemic, 2020 has been a fairly horrid year by most accounts. And it’s perhaps fitting that this was also a leap year, piling on an extra day to a solar rotation that most of us probably can’t wait to see in the rearview mirror.

Phishing 260
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SolarWinds Orion: Fixes Aim to Block Sunburst and Supernova

Data Breach Today

Both Strains of Malware Among Multiple Tactics Being Used by Supply Chain Attackers Software vendor SolarWinds has updated multiple versions of its Orion network-monitoring software to address the Sunburst backdoor that was added to its code, and to block Supernova malware that exploited a vulnerability in Orion. But incident response experts have warned that full cleanup may take years.

Cleanup 291
article thumbnail

Japanese Kawasaki Heavy Industries discloses security breach

Security Affairs

Japanese giant Kawasaki Heavy Industries discovered unauthorized access to a Japanese company server from multiple overseas offices. Kawasaki Heavy Industries disclosed a security breach, the company discovered unauthorized access to a Japanese company server from multiple overseas offices. Information from its overseas offices might have been stolen as a result of a security breach that took place earlier this year.

Security 135
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Kawasaki: Cyber Incident May Have Resulted in Data Loss

Data Breach Today

Attackers Gained Access to Company's Network Through Remote, Overseas Servers Kawasaki Heavy Industries is reporting that an unknown threat actor gained access to its internal network through servers located in an overseas office, according to a company statement. The result: Some corporate data may have leaked to a third party.

Access 274

More Trending

article thumbnail

'WeLeakInfo' Site: UK Police Arrest 21 Alleged Users

Data Breach Today

Now-Shuttered Site Sold Access to 12 Billion Personal Records, Authorities Say Britain's National Crime Agency says 21 individuals have been arrested on suspicion of purchasing personally identifiable information from the WLeakInfo website. Authorities say the site provided access to more than 12 billion personal records culled from 10,000 data breaches.

article thumbnail

What are organisations doing to address cyber security in 2021?

IT Governance

With data breaches soaring over the past two years and organisations struggling with the technical demands of the coronavirus pandemic, PwC has declared this a critical point for the cyber security industry. Its Cyber security strategy 2021: An urgent business priority report notes that the pandemic means organisations can no longer ignore the importance of cyber security.

Security 122
article thumbnail

Finnish Officials Investigate Hack of Lawmakers' Email

Data Breach Today

Police and Parliament Say the Incident Happened Earlier This Year Finnish police and parliament officials are investigating a security incident that happened earlier this year in which attackers gained access to internal IT networks and appear to have compromised lawmakers' email accounts, according to a statement. Police are calling the intrusion an act of espionage.

Access 228
article thumbnail

6 Questions Attackers Ask Before Choosing an Asset to Exploit

Threatpost

David “moose” Wolpoff at Randori explains how hackers pick their targets, and how understanding "hacker logic" can help prioritize defenses.

Cloud 129
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Fresh Card Skimmer Attacks Multiple E-Commerce Platforms

Data Breach Today

Researcher: Malware Found On Several Large Content Management Systems A recently uncovered payment card skimmer is targeting several large content management systems that support the online checkout pages of dozens of e-commerce sites, according to researchers with Sansec. The malware works by using a keylogger to harvest payment and personal data.

article thumbnail

Security Pros Reflect on 2020

Dark Reading

Eight cybersecurity leaders go deep on their most valuable (and very human) takeaways from a year like no other we've known.

Security 136
article thumbnail

New York Temporarily Bans Facial Recognition Technology in Schools

Hunton Privacy

On December 22, 2020, New York Governor Andrew Cuomo signed into law legislation that temporarily bans the use or purchase of facial recognition and other biometric identifying technology in public and private schools until at least July 1, 2022. The legislation also directs the New York Commissioner of Education (the “Commissioner”) to conduct a study on whether this technology is appropriate for use in schools.

Education 111
article thumbnail

CISA releases a PowerShell-based tool to detect malicious activity in Azure, Microsoft 365

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) released a tool for detecting potentially malicious activities in Azure/Microsoft 365 environments. The Cybersecurity and Infrastructure Security Agency (CISA)’s Cloud Forensics team has released a PowerShell-based tool, dubbed Sparrow , that can that helps administrators to detect anomalies and potentially malicious activities in Azure/Microsoft 365 environments.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Japanese Aerospace Firm Kawasaki Warns of Data Breach

Threatpost

The Japanese aerospace manufacturer said that starting in June, overseas unauthorized access to its servers may have compromised customer data.

article thumbnail

SolarWinds hackers aimed at access to victims’ cloud assets

Security Affairs

Microsoft says that SolarWinds hackers aimed at compromising the victims’ cloud infrastructure after deploying the Solorigate backdoor (aka Sunburst). The Microsoft 365 Defender Team revealed that the goal of the threat actors behind the SolarWinds supply chain attack was to move to the victims’ cloud infrastructure once infected their network with the Sunburst /Solorigate backdoor. “With this initial widespread foothold, the attackers can then pick and choose the specific orga

Cloud 98
article thumbnail

Reducing the Risk of Third-Party SaaS Apps to Your Organization

Dark Reading

Such apps may try to leak your data, or can contain malicious code. And even legitimate apps may be poorly written, creating security risks.

Risk 112
article thumbnail

Lawsuit Claims Flawed Facial Recognition Led to Man’s Wrongful Arrest

Threatpost

Black man sues police, saying he was falsely ID’d by facial recognition, joining other Black Americans falling victim to the technology’s racial bias.

102
102
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

US Treasury warns of ransomware attacks on COVID-19 vaccine research

Security Affairs

The US Treasury Department’s Financial Crimes Enforcement Network (FinCEN) warns of ransomware attacks on COVID-19 vaccine research organizations. The US Treasury Department’s Financial Crimes Enforcement Network (FinCEN) issued a noticed to warn financial institutions of ransomware attacks aimed at COVID-19 vaccine research organizations. “The Financial Crimes Enforcement Network (FinCEN) is issuing this Notice to alert financial institutions about the potential for fraud, ran

article thumbnail

India: A Growing Cybersecurity Threat

Dark Reading

Geopolitical tensions and a dramatic rise in offensive and defensive cyber capabilities lead India to join Iran, Russia, China, and North Korea as a top nation-state adversary.

article thumbnail

Poor data protection could put lives at risk, say Somalia aid workers

The Guardian Data Protection

‘Extremely dangerous’ if personal information needed to process mobile payments is lost or falls into wrong hands, say staff The rapid upscaling of digital technology use by international groups in Somalia is causing concern about the risk to the people whose data is being collected. The coronavirus pandemic has accelerated the use of programming by humanitarian organisations to deliver aid, but local staff working with several different NGOs say the organisations are not thinking enough about d

Risk 83
article thumbnail

Mac Attackers Remain Focused Mainly on Adware, Fooling Users

Dark Reading

Despite reports that Macs have encountered more threats than Windows systems, the platform still sees far fewer exploits and malware - including ransomware.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

2020 Work-for-Home Shift: What We Learned

Threatpost

Threatpost explores 5 big takeaways from 2020 -- and what they mean for 2021.

Phishing 103
article thumbnail

Feelings Have No Place in the World of Security

PerezBox

The quickest, and arguably most effective way, to compromise an organization is via social engineering. Social engineering in the digital sphere is almost always synonymous with some form of Phishing. Read More. The post Feelings Have No Place in the World of Security appeared first on PerezBox.

article thumbnail

A Holiday Message

ForAllSecure

Irrespective of what industry you’re in and where you’re located in this world, 2020 has been an unexpectedly eventful year. Ranging from the state of global health to national politics to social justice, the challenges we continue to face have rested heavy on our minds, hearts, and souls. Yet, in all of this, I also see the good that’s happened in 2020.

article thumbnail

An Anomalous and Awarding Year

Reltio

What pejoratives can I apply to 2020 that haven’t already been used.and are suitable for the company blog and LinkedIn? The best ones have been exhausted; and aren’t we all just a little exhausted? But the challenges of 2020 make it more important to identify and appreciate what went right because of the extraordinary challenges of the year. I marked my first anniversary on the Reltio product marketing and corporate communications teams last month.

MDM 52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

A Holiday Message

ForAllSecure

Irrespective of what industry you’re in and where you’re located in this world, 2020 has been an unexpectedly eventful year. Ranging from the state of global health to national politics to social justice, the challenges we continue to face have rested heavy on our minds, hearts, and souls. Yet, in all of this, I also see the good that’s happened in 2020.

article thumbnail

An Anomalous and Awarding Year

Reltio

What pejoratives can I apply to 2020 that haven’t already been used.and are suitable for the company blog and LinkedIn? The best ones have been exhausted; and aren’t we all just a little exhausted? But the challenges of 2020 make it more important to identify and appreciate what went right because of the extraordinary challenges of the year. I marked my first anniversary on the Reltio product marketing and corporate communications teams last month.

MDM 52
article thumbnail

A Digital Content Services Modernization Checklist from Alfresco and IDC

IG Guru

Today’s businesses rely on accessing and governing structured and unstructured content from a variety of sources, inside and outside the enterprise. This comprehensive checklist from technology analysts IDC will help you to develop a resilient digital content and process strategy, rooted in solid information governance, modern architecture and rapid development innovation, including:Deploying in the cloud for […].