Thu.Mar 23, 2023

article thumbnail

US Officials Urged to Examine Chinese Risk to Electric Grid

Data Breach Today

Utility Vendors Have Cut Back on Buying Chinese Transformers Due to Security Risks Utility companies have increasingly refrained from purchasing large power transformers from China given greater awareness of the security risks. Lawmakers sparred with the Energy Department's cybersecurity leader over how much of the electric grid contains components manufactured in China.

Risk 233
article thumbnail

Okta Post-Exploitation Method Exposes User Passwords

Dark Reading

Accidentally typing a password in the username field of the platform saves them to audit logs, to which threat actors can gain access and use to compromise enterprise services.

Passwords 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lawmakers Weigh New Regulations in U.S. Cyber Strategy

Data Breach Today

Don't 'Overregulate,' GOP Subcommittee Chairwoman Tells White House Official Members of a U.S. House panel got their first look at the Biden Administration's new National Cybersecurity Strategy and quizzed the White House cybersecurity director on the timeline, proposed regulations and incentives for private businesses.

article thumbnail

MITRE Rolls Out Supply Chain Security Prototype

Dark Reading

Cloud-based System of Trust application now available for test-driving quantitative risk assessment of suppliers of hardware, software, services.

Security 124
article thumbnail

Beware of Pixels & Trackers: A Client-Side Security Report

At the beginning of 2023, concern grew over pixels and trackers, which load into the browser as a part of the software supply chain, being used by data harvesting platforms to collect user data. The data is then transferred to the servers of the companies owning the pixels/trackers as a part of their advertising and marketing business. Aggressive data harvesting practices increase the likelihood and/or actual transfer of sensitive data, which may cause unintended consequences, including expensiv

article thumbnail

Online Card Fraud Flourishes, Thanks to the Magnetic Stripe

Data Breach Today

International Financial Crimes Expert Mark Solomon on Card Fraud Tactics and Trends EMV chip technology has taken a major bite out of credit card fraud at the point of sale, but card-not-present fraud continues to flourish thanks to an age-old technology - the magnetic stripe, says Mark Solomon, international president, International Association of Financial Crimes Investigators.

Sales 173

More Trending

article thumbnail

SideCopy APT Targets India's Premier Defense Research Agency

Data Breach Today

SideCopy APT Used Decoy Documents in Spear-Phishing Attack On DRDO Security researchers uncovered a Pakistani cyberespionage group employing fresh tactics to target workers at India's Defence Research and Development Organization and steal sensitive military secrets. A new campaign uses a PowerPoint file with information about India-developed K4 missile.

Phishing 162
article thumbnail

Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams

Dark Reading

Open source software continues to pose a challenge for companies. With the proper security practices, you can reduce your open source risk and manage it.

Security 129
article thumbnail

Cryptohack Roundup: BitPay, Euler Finance Gala Games

Data Breach Today

Also: Fireblocks, BitGo Clash; Bitzlato Users can Withdraw Some Funds Every week, ISMG rounds up cybersecurity incidents in the world of digital assets. In focus between March 17 and 23: New York State Department of Financial Services reminds BitPay that regulations exist. Also, Euler Finance, Gala Games, BitGo, ZenGo, General Bytes, Bitzlato and ParaSpace.

article thumbnail

TikTok Paid for Influencers to Attend the Pro-TikTok Rally in DC

WIRED Threat Level

The embattled social media company brought out the checkbook to ensure at least 30 of its biggest assets—creators—were in DC to help fend off critics.

IT 119
article thumbnail

Why You Need to Use Case Studies in Sales and Marketing (and How to Start Now)

Case studies are proof of successful client relations and a verifiable product or service. They persuade buyers by highlighting your customers' experiences with your company and its solution. In sales, case studies are crucial pieces of content that can be tailored to prospects' pain points and used throughout the buyer's journey. In marketing, case studies are versatile assets for generating business, providing reusable elements for ad and social media content, website material, and marketing c

article thumbnail

Credit Card Stealer Targets WordPress Payment Plug-Ins

Data Breach Today

MageCart Operators Hide Infection in Legitimate Payment Processing Software Attackers are deploying modified MageCart malware against WordPress websites that use the WooCommerce shopping cart plug-in, says website security firm Sucuri. Hackers inject PHP and JavaScript code and hide stolen credit card numbers in.jpg files.

Security 147
article thumbnail

SEC Advances Three New Cybersecurity Rule Proposals

Hunton Privacy

On March 15, 2023, the Securities and Exchange Commission (“SEC”) proposed three rules related to cybersecurity and the protection of consumer information. The SEC’s first proposal would amend Regulation S-P. Regulation S-P imposes privacy, data security, and data disposal rules on broker-dealers, investment advisers, and investment companies subject to the SEC’s authority under the Gramm-Leach-Bliley Act.

article thumbnail

Breach Roundup: Ferrari, Indian Health Ministry and the NBA

Data Breach Today

Also: Lionsgate, Royal Dirkzwager, New LockBit Claims and Latitude Financial This week's roundup of cybersecurity incidents around the world includes attacks on luxury car manufacturer Ferrari, the Indian health system and a Dutch maritime logistics company. Other data breach incidents involve the NBA, Lionsgate, the city of Oakland, McDonald's and Samsung.

article thumbnail

Ferrari Hits a Roadblock as Cyber Criminals Hold it to Ransom

IT Governance

Ferrari is racing to contain the damage after it was targeted by cyber criminals this week. The supercar manufacturer said that its systems were compromised and that customer data has been stolen. In a breach notification letter sent to affected individuals, Ferrari noted that a limited number of IT systems were breached, and some customers’ names, addresses, email addresses and telephone numbers were exposed.

IT 99
article thumbnail

Apache Cassandra® NoSQL for the Relational DBA

Unleash the power of NoSQL with "Apache Cassandra® NoSQL for the Relational DBA." Learn from Lewis DiFelice, an experienced Professional Services Consultant at Instaclustr, as he shares his journey transitioning from SQL to managing a 40-node Cassandra cluster. Gain insights into Cassandra's architecture, configuration strategies, and best practices.

article thumbnail

Splashtop Buys Foxpass to Bring Enterprise IAM to the Masses

Data Breach Today

Foxpass Purchase Will Thwart Password Sharing and Simplify Developer Onboarding Remote access provider Splashtop has bought server and network access management vendor Foxpass to get better visibility across co-managed and multi-tenant environments. The acquisition of Foxpass will simplify the onboarding experience for developers while ensuring passwords aren't being shared.

Passwords 130
article thumbnail

Cyber Insurers Quietly Remove Coverage for Social Engineering and Fraudulent Instruction Claims

KnowBe4

As cyber insurers become more experienced in what kinds of claims are being presented, and the threat action details therein, specific types of coverages are no longer being included.

article thumbnail

Episode 249: Intel Federal CTO Steve Orrin on the CHIPS Act and Supply Chain Security

The Security Ledger

Paul speaks with Steve Orrin, the Federal CTO at Intel Corp about representing Intel and its technologies to Uncle Sam and the impact of the CHIPS Act a massive new federal investment in semiconductors. The post Episode 249: Intel Federal CTO Steve Orrin on the CHIPS Act and Supply Chain Security appeared first on The Security Ledger with Paul F. Read the whole entry. » Click the icon below to listen.

article thumbnail

Pwn2Own Vancouver 2023 Day 1: Windows 11 and Tesla hacked

Security Affairs

On the first day of Pwn2Own Vancouver 2023, the organization awarded $375,000 (and a Tesla Model 3) for 12 zero-day flaws. The Pwn2Own Vancouver 2023 has begun, this hacking competition has 19 entries targeting nine different targets – including two Tesla attempts. On the first day of the event, the organization awarded $375,000 (and a Tesla Model 3) for 12 zero-day vulnerabilities demonstrated by the participants.

article thumbnail

Finding The Application Modernization Strategy That Is Right For Your Business

As a business leader, you know it's important to update your apps, but it can be tough to figure out the best approach. This whitepaper helps you in upgrading your current applications using modernization strategies without any business disruptions.

article thumbnail

Sophos XGS vs Fortinet FortiGate: Top NGFWs Compared

eSecurity Planet

Sophos and Fortinet both appear on our list of the top next-generation firewalls (NGFWs) , and while both offer very good security at their price points, they serve very different markets. What follows is a look at the key features and strengths and weaknesses of each solution. Which one is best for you will depend on your security and throughput needs – and budget.

Cloud 95
article thumbnail

The TikTok Hearing Revealed That Congress Is the Problem

WIRED Threat Level

The interrogation of CEO Shou Zi Chew highlighted US lawmakers’ own failure to pass privacy legislation.

Privacy 125
article thumbnail

Bundestag Bungle: Political Microtargeting of Facebook Users Draws Ire

Dark Reading

With shades of the Cambridge Analytica scandal, German political parties skirted consumer data privacy regulations during the country's last parliamentary election, a privacy watchdog warns.

article thumbnail

Experts published PoC exploit code for Veeam Backup & Replication bug

Security Affairs

Researchers released a PoC exploit code for a high-severity vulnerability in Veeam Backup & Replication (VBR) software. Veeam recently addressed a high-severity flaw, tracked as CVE-2023-27532 , in Veeam Backup and Replication (VBR) software. An unauthenticated user with access to the Veeam backup service (TCP 9401 by default) can exploit the flaw to request cleartext credentials.

article thumbnail

From Hadoop to Data Lakehouse

Getting off of Hadoop is a critical objective for organizations, with data executives well aware of the significant benefits of doing so. The problem is, there are few options available that minimize the risk to the business during the migration process and that’s one of the reasons why many organizations are still using Hadoop today. By migrating to the data lakehouse, you can get immediate benefits from day one using Dremio’s phased migration approach.

article thumbnail

Apple and Jamf help airline employees spread their wings

Jamf

The aviation industry is always on the move; their technology needs to be able to keep up. Apple and Jamf help airlines stay efficient and effective on the go—read this blog to learn more.

93
article thumbnail

Mass Ransomware Attack

Schneier on Security

A vulnerability in a popular data transfer tool has resulted in a mass ransomware attack : TechCrunch has learned of dozens of organizations that used the affected GoAnywhere file transfer software at the time of the ransomware attack, suggesting more victims are likely to come forward. However, while the number of victims of the mass-hack is widening, the known impact is murky at best.

article thumbnail

Just 1% of Nonprofit Domains Have Basic DMARC Email Security Protections

Dark Reading

DMARC blocks spam and phishing emails sent from spoofed domains, and it's vastly underutilized, a new report says.

Phishing 125
article thumbnail

Half of Organizations Report at Least Monthly Outages from Cyberattacks

KnowBe4

New data on the current state of cybersecurity shows that organizations are experiencing challenges, falling behind, and seeing the impact of all this post-attack.

article thumbnail

Finding The Application Modernization Strategy That Is Right For Your Business

As a business leader, you know it's important to update your apps, but it can be tough to figure out the best approach. This whitepaper helps you in upgrading your current applications using modernization strategies without any business disruptions.

article thumbnail

A million at risk from user data leak at Korean beauty platform PowderRoom

Security Affairs

South Korean beauty content platform, PowderRoom, has leaked the personal information of nearly one million people. Established in 2003, PowderRoom is a South Korean beauty content platform connecting 3.5 million members and thousands of beauty brands It calls itself the first and the biggest beauty community in South Korea that “allows you to experience new brand products faster than anyone else and share the experience” It exposed up to a million users’ full names, phone numbers, emails, Insta

Risk 87
article thumbnail

Are You Talking to a Carbon, Silicon, or Artificial Identity?

Dark Reading

In the triumvirate of identity types, protecting the identity, privacy, and data of carbon-based forms — humans — is key. Safeguards must be in place as AI becomes more interactive.

Privacy 100
article thumbnail

Dole discloses data breach after February ransomware attack

Security Affairs

Dole Food Company confirmed that threat actors behind the recent ransomware attack had access to employees’ data. Dole Food Company is an Irish agricultural multinational corporation, it is one of the world’s largest producers of fruit and vegetables, operating with 38,500 full-time and seasonal employees who supply some 300 products in 75 countries.