Fri.Nov 06, 2020

article thumbnail

How COVID-19 Changed the VC Investment Landscape for Cybersecurity Companies

Dark Reading

What trends can startups and investors expect to see going forward?

article thumbnail

Call in the National Guard: Entities Respond to Threats

Data Breach Today

National Guard Helps in Ransomware Recovery, While Other Healthcare Entities Turn Off Email The National Guard has been recruited to help a healthcare system recover from a recent ransomware attack, while some other healthcare entities have temporarily shut down their email systems in the wake of urgent federal cyber alerts. How warranted are these drastic measures?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Brazil’s court system shut down after a massive ransomware attack

Security Affairs

This week, Brazil’s Superior Court of Justice has temporarily shut down its operation following a ransomware attack during judgment sessions. Brazil’s Superior Court of Justice was hit by a ransomware attack on Tuesday during judgment sessions, the attack forced a temporary shut down of the court’s information technology network. “The Superior Court of Justice (STJ) announces that the court’s information technology network suffered a hacker attack, this Tuesday (3),

article thumbnail

Botnet Operators Abusing Legit GitHub, Pastebin Resources

Data Breach Today

Researchers: 'Gitpaste-12' Botnet Mainly Targets Linux And IoT Devices The operators behind a botnet dubbed "Gitpaste-12" are abusing legitimate services such as GitHub and Pastebin to help hide the malware's malicious infrastructure, according to Juniper Threat Labs. This botnet mainly targets Linux apps and IoT devices and can mine cryptocurrency.

IoT 268
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Prominent Italian firms under attack, Campari is the last one

Security Affairs

Campari Group, the Italian beverage giant has been hit by a ransomware attack that forced the company to shut down a large part of its IT network. Campari Group , the Italian beverage giant has been hit by a ransomware attack that forced the company to shut down a large part of its IT network. The Italian company is active since 1860, it produces spirits, wines, and soft drinks.

More Trending

article thumbnail

RansomExx ransomware now targets also Linux systems

Security Affairs

The RansomExx Ransomware gang is expanding its operations by creating a new version that is able to infect Linux machines. RansomExx ransomware operators are expanding their operations by developing a Linux version of their malware. Kaspersky researchers have analyzed the Linux version of the RansomExx ransomware, also tracked as Defray777. This week the RansomExx ransomware has been involved in the attacks against Brazil’s Superior Court of Justice.

article thumbnail

Apple Fixes iOS Zero Day Flaws Found by Google

Data Breach Today

Apple's 14.2 Update Fixes Bugs Being Exploited by Attackers Apple issued an update for iOS and iPadOS on Thursday that fixes three zero-day flaws found by Google's Project Zero bug-hunting team and a range of other security-related flaws. Google says the bugs are being exploited by attackers but haven't been used in election-related cyber activity.

Security 238
article thumbnail

Detecting Phishing Emails

Schneier on Security

Research paper: Rick Wash, “ How Experts Detect Phishing Scam Emails “: Abstract: Phishing scam emails are emails that pretend to be something they are not in order to get the recipient of the email to undertake some action they normally would not. While technical protections against phishing reduce the number of phishing emails received, they are not perfect and phishing remains one of the largest sources of security risk in technology and communication systems.

article thumbnail

Data-Exfiltrating Ransomware Gangs Pedal False Promises

Data Breach Today

Thieves Not Honoring 'Pay Us to Delete Stolen Data' Guarantees, Investigators Warn Victims of crypto-locking malware who pay a ransom to their attackers are paying, on average, more than ever before. But investigators warn that when victims pay for a guarantee that all data stolen during an attack will get deleted, criminals often fail to honor their promises.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Gitpaste-12 Worm Targets Linux Servers, IoT Devices

Threatpost

The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors.

IoT 104
article thumbnail

Hong Kong Updates Cybersecurity Fortification Initiative

Data Breach Today

Updated Version of Cybersecurity Framework Will Roll Out in January The Hong Kong Monetary Authority's Cybersecurity Fortification Initiative 2.0, an updated version of a framework designed to strengthen cyber resilience in the banking and financial sector, will officially roll out in January and be implemented over the following two years.

article thumbnail

New Gitpaste-12 Botnet Exploits 12 Known Vulnerabilities

Dark Reading

Researchers discover a new worm and botnet dubbed Gitpaste-12 for its ability to spread via GitHub and Pastebin.

IT 105
article thumbnail

ISMG's CyberEdBoard Community Launches New Engagement App

Data Breach Today

Members Can Use the App to Communicate and Exchange Information Information Security Media Group's members-only CyberEdBoard Community this week launched a new engagement app that will help bring together senior cybersecurity practitioners from around the world.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Campari Site Suffers Ransomware Hangover

Threatpost

The Ragnar Locker operators released a stolen contract between Wild Turkey and actor Matthew McConaughey, as proof of compromise.

article thumbnail

Chinese Hacking Group Using Fresh DLL Side-Loading Attack

Data Breach Today

Sophos: APT Group Targeted Organizations In Southeast Asia A recently identified Chinese hacking group is using multiple types of Dynamic Link Library side-loading attack techniques to target non-government organizations in Southeast Asia, especially Myanmar, according to Sophos.

Libraries 160
article thumbnail

Apple Patches 24 Vulnerabilities Across Product Lines

Dark Reading

The vulnerabilities include three for which exploits have already been seen in the wild.

109
109
article thumbnail

Analysis: Are Marriott and BA's GDPR Fines Big Enough?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the EU General Data Protection Regulation fines that have finally been imposed on Marriott and BA over serious data breaches each suffered. Also featured: Regional digital fraud trends, and a look at the CISO role and its responsibilities.

GDPR 157
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Webinar on Brexit and Adequacy: Separating Fact from Fiction

Hunton Privacy

On November 10, 2020, Hunton Andrews Kurth will host a webinar examining the data protection considerations that arise on the UK’s departure from the EU. The UK’s Brexit transition period ends on December 31, 2020, and it is not clear whether the EU will formally recognize the UK’s data protection regime as ‘adequate.’ What does this mean for companies’ plans to update their data transfer mechanisms?

IT 76
article thumbnail

Australia: Privacy Act Review

DLA Piper Privacy Matters

The Terms of Reference ( ToR ) and Issues Paper for the long-awaited review ( Review ) of the Privacy Act 1988 Cth ( Act ) has finally been released by the Government ( AG’s Department ). A commitment to review the Act was first announced by the Government following the ACCC’s Digital Platform Enquiry in 2018/19, and it is good to see proposals for this Review finally taking shape, notwithstanding COVID priorities.

Privacy 76
article thumbnail

Catches of the month: Phishing scams for November 2020

IT Governance

As the UK heads back into lockdown, we expect to see a fresh wave of phishing attacks capitalising on the public’s fear and uncertainty. At the start of the pandemic, we discussed emerging phishing scams centred on the coronavirus. Fortunately, these scams were short-lived – thanks to widespread warnings from experts and those who had already received bogus messages.

article thumbnail

The Oracle-Walmart-TikTok Deal Is Not Enough

Dark Reading

The social media deal raises issues involving data custodianship and trusted tech partnerships.

102
102
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Network Access to 7000 Organizations For Sale on Dark Web

Adam Levin

Network access to over 7,000 organizations in the U.S., Canada, and Australia is allegedly available for auction on Russian hacking forums. An unidentified hacker is advertising an archive of remote desktop protocol (RDP) credentials to several thousand organizations with bids starting at 25 bitcoins (roughly $390,000). . “I sell everything at once, without samples, convenient access via rdp to each network,” states the advertisement , promising administrative access to each compromised network.

Sales 72
article thumbnail

Name That Toon: Masks and Manners

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

85
article thumbnail

FBI Warns of CyberAttacks Targeting US Healthface Facilities

Adam Levin

Healthcare facilities are under an increased threat of cyberattack, according to the FBI. In a joint cybersecurity advisory with the Cybersecurity and Infrastructure Agency (CISA) and the Department of Health and Human Services (HHS), the FBI warned of an “increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.”. While there are currently several strains of malware actively targeting healthcare facilities, the advisory primarily focused on TrickBot, a program with a

article thumbnail

Feds Seize $1B in Bitcoin from Silk Road

Threatpost

The illegal marketplace was hacked prior to it's takedown -- the IRS has now tracked down those stolen funds, it said.

IT 86
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How do librarians oppose knowledge destruction?

CILIP

How do librarians oppose knowledge destruction? Richard Ovenden, Bodley?s Librarian, and author of Burning the Books will be a keynote speaker at the CILIP 2020 Conference: ?Reimagined. Here he discusses how the profession is still developing its defences. As the senior executive of the Bodleian Libraries, Richard heads one of the oldest libraries in Europe.

article thumbnail

Apple Patches Bugs Tied to Previously Identified Zero-Days

Threatpost

The actively exploited vulnerabilities discovered by Project Zero exist across iPhone, iPad and iPod devices.

article thumbnail

US authorities behind $1 billion Bitcoin transaction of Silk Road funds

Security Affairs

The United States announced the seizure of $1 billion worth of Bitcoin stolen by an individual from the Silk Road marketplace. On November 3, The United States this week announced that it has seized $1 billion worth of Bitcoin stolen by an individual from the Silk Road marketplace over half a decade ago. “The United States filed a civil complaint today to forfeit thousands of Bitcoins, valued at over $1 billion dollars, seized by law enforcement on November 3, 2020, announced United States

Sales 57