Wed.Jan 13, 2021

article thumbnail

Capitol Breach: Cybersecurity Lessons to Apply

Data Breach Today

Brian Honan: Security Professionals Can Take Action to Minimize Risks The physical breach of the U.S. Capitol by a violent mob, members of which allegedly accessed lawmakers' systems and stole devices, offers cybersecurity professional lessons to learn on authentication, encryption and more, says cybersecurity expert Brian Honan.

article thumbnail

Microsoft Patch Tuesday, January 2021 Edition

Krebs on Security

Microsoft today released updates to plug more than 80 security holes in its Windows operating systems and other software, including one that is actively being exploited and another which was disclosed prior to today. Ten of the flaws earned Microsoft’s most-dire “critical” rating, meaning they could be exploited by malware or miscreants to seize remote control over unpatched systems with little or no interaction from Windows users.

Marketing 248
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mimecast Says Hackers Compromised Digital Certificate

Data Breach Today

Email Security Company Says Fewer Than 10 Customers Targeted Email security provider Mimecast says hackers compromised a digital certificate that encrypts data that moves between several of its products and Microsoft's servers, putting organizations at risk of data loss.

article thumbnail

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

The Last Watchdog

Today’s children are online at a young age, for many hours, and in more ways than ever before. As adults, we know that bad online decisions can have negative or dangerous effects for years to come. Related: Web apps are being used to radicalize youth. The question isn’t whether we should educate children about online safety, but how we can best inspire them to learn to be thoughtful, careful, and safe in the cyber world for their lifetime.

Privacy 174
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Reducing Fraud Through Advanced IVR Technologies

Data Breach Today

Reducing Fraud Through Advanced IVR Technologies This podcast explores the security risks materializing as a result of the pandemic the readiness of enterprises to handle fraud risks (particularly in the IVR) and recommended strategies to secure the IVR.

Risk 255

More Trending

article thumbnail

COVID-19 Vaccine Documents, Personal Data Leaked

Data Breach Today

Information Stolen From European Medicines Agency Documents on COVID-19 vaccines and medications - including some containing personal information - that were stolen in a cyberattack last month on the European Medicines Agency have been leaked on the internet.

article thumbnail

Catches of the month: Phishing scams for January 2021

IT Governance

The start of 2021 is looking an awful lot like the end of 2020 – not least when it comes to cyber crime. Scammers are as active now as they ever have been, so it’s essential that you remain vigilant in the post-Christmas period. There have already been several warnings of new scams that people must be wary of, as we explain in this blog. Don’t be fooled by vaccine scams.

Phishing 124
article thumbnail

Watering Hole Operation Leveraged Zero-Day Exploits

Data Breach Today

Google Project Zero Offers Analysis of Hacking Campaign Google's Project Zero security team is describing its discovery last year of a complex "watering hole" operation that used four zero-day exploits to target Windows and Android mobile devices.

Security 228
article thumbnail

New German fine: EUR 10.4 million for unlawful CCTV

Data Protection Report

A German state data protection authority has issued a fine of EUR 10.4m against a mid-size online retailer who allegedly violated the EU General Data Protection Regulation (GDPR) by monitoring their employees using CCTV. The State Commissioner for Data Protection and Freedom of Information (Landesbeauftragte für Datenschutz und Informationsfreiheit) of Lower Saxony (the State Commissioner) imposed the fine on the electronics retailer “notebooksbilliger.de AG” (the Retailer) at the end of 2020.

Retail 113
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'SolarLeaks' Site Claims to Offer Attack Victims' Data

Data Breach Today

Advertised: Unverified Cache of Stolen Microsoft, Cisco, FireEye and SolarWinds Data A new leaks site claims to be selling data stolen via the SolarWinds supply-chain attack from Cisco, FireEye Microsoft and SolarWinds. Security experts question whether the offer is legitimate and note that it parallels previous efforts, including by Russia, designed to foil hack attack attribution.

Security 196
article thumbnail

Hackers Leak Stolen Pfizer-BioNTech COVID-19 Vaccine Data

Threatpost

On the heels of a cyberattack on the EMA, cybercriminals have now leaked Pfizer and BioNTech COVID-19 vaccine data on the internet.

128
128
article thumbnail

Beat the Bad Guys: Contact Center Security Solutions For Fraud Detection For 2021 and Beyond

Data Breach Today

Beat the Bad Guys: Contact Center Security Solutions For Fraud Detection For 2021 and Beyond Explore Evolving Challenges and Solutions in The Fight Against Fraud. Investigate emerging anti-fraud technology developed for the increased complexity of fraud across channels in malicious attacks in a live analyst discussion with Pindrop, featuring Aite Group.

Security 173
article thumbnail

On US Capitol Security — By Someone Who Manages Arena-Rock-Concert Security

Schneier on Security

Smart commentary : …I was floored on Wednesday when, glued to my television, I saw police in some areas of the U.S. Capitol using little more than those same mobile gates I had ­ the ones that look like bike racks that can hook together ­ to try to keep the crowds away from sensitive areas and, later, push back people intent on accessing the grounds.

Security 108
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Mobile RAT for Android Offered on Darknet Forums

Data Breach Today

Researchers: 'Rogue' Steals Data, Delivers Other Malware A recently identified mobile remote access Trojan dubbed "Rogue," which exploits Google's Firebase development platform, targets Android devices to exfiltrate personal data and can deliver other malware, according to Check Point Research. The RAT is being offered for sale or rent in darknet forums.

Sales 162
article thumbnail

Data Encryption Shields the Energy Sector Against Emerging Threats

Thales Cloud Protection & Licensing

Data Encryption Shields the Energy Sector Against Emerging Threats. madhav. Wed, 01/13/2021 - 09:42. Security of CNI is a national security issue. The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for modern life. According to the EU NIS Directive, these entities are Operators of Essential Services (OES) and their reliability and ability to meet consumers’ demands at all times is of national interest.

article thumbnail

How Law Enforcement Gets Around Your Smartphone's Encryption

WIRED Threat Level

New research has dug into the openings that iOS and Android security provide for anyone with the right tools.

article thumbnail

A 12-point framework for operational resilience

DXC Technology

Businesses today must take a new approach to operational resilience so that they can be more adept at anticipating disruptive events and agile in responding to and recovering from them. In a world where risks and compliance requirements rapidly expand and evolve, it’s not a question of if there will be a disruption to your […]. The post A 12-point framework for operational resilience appeared first on DXC Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Attackers targeted Accellion FTA in New Zealand Central Bank attack

Security Affairs

The root cause for the hack of the New Zealand Central Bank was the Accellion FTA (File Transfer Application) file sharing service. During the weekend, the New Zealand central bank announced that a cyber attack hit its infrastructure. According to the Government organization, one of its data systems has been breached by an unidentified hacker, commercially and personally sensitive information might have been accessed by the attackers.

Access 94
article thumbnail

Opportunity to Comment: Draft Standard Data Elements for Electronic Records Management

National Archives Records Express

We are requesting comments on our draft Standard Data Elements as part of our Federal Electronic Records Modernization Initiative (FERMI). Through FERMI, we have been working to improve the way agencies acquire ERM services and solutions. The use cases are a part of the Electronic Records Management Federal Integrated Business Framework (ERM-FIBF) and can serve as a starting point for agencies when seeking to procure services or solutions to manage electronic records.

article thumbnail

Rogue Android RAT emerges from the darkweb

Security Affairs

Experts discovered an Android Remote Access Trojan, dubbed Rogue , that can allow to take over infected devices and steal user data. Rogue is a new mobile RAT discovered by researchers from Check Point while investigating the activity of the darknet threat actors known as Triangulum and HeXaGoN Dev. Both actors are Android malware authors that are offering their malicious code on the darknet marketplaces.

article thumbnail

CISOs Prep For COVID-19 Exposure Notification in the Workplace

Threatpost

Security teams are preparing for the inevitable return to the workplace - and the privacy implications of exposure notification apps that companies may need to adopt.

Privacy 96
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Understanding TCP/IP Stack Vulnerabilities in the IoT

Dark Reading

Internet of Things devices are highly susceptible to attacks, breaches, and flaws emanating from issues within the TCP/IP network communications architecture. Here's an overview of what you need to know to mitigate risks.

IoT 128
article thumbnail

How Amazon Sidewalk Works—and Why You May Want to Turn It Off

WIRED Threat Level

The premise is convenient. But the e-commerce giant's privacy track record isn't exactly inspiring.

IT 108
article thumbnail

Sophisticated Hacks Against Android, Windows Reveal Zero-Day Trove

Threatpost

Watering-hole attacks executed by ‘experts’ exploited Chrome, Windows and Android flaws and were carried out on two servers.

article thumbnail

Preparing Your 2020 Form 10-K: A Summary of Recent Key Disclosure Developments, Priorities, and Trends

Data Matters

This Sidley Practice Note highlights certain key disclosure considerations for preparing your annual report on Form 10-K for fiscal year 2020, including recent amendments to U.S. Securities and Exchange Commission (SEC) disclosure rules and other developments that will affect 2020 Form 10-K filings as well as certain significant disclosure trends and current areas of SEC staff focus for disclosures.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Virtual Pen-Testing Competition Tasks College Students With Running a Red Team Operation

Dark Reading

Aimed at developing offensive cyber talent, last weekend's sixth annual Collegiate Penetration Testing Competition brought out some of the brightest from RIT and Stanford, among other universities.

77
article thumbnail

Critical WordPress-Plugin Bug Found in ‘Orbit Fox’ Allows Site Takeover

Threatpost

Two security vulnerabilities -- one a privilege-escalation problem and the other a stored XSS bug -- afflict a WordPress plugin with 40,000 installs.

article thumbnail

SolarWinds Attackers May Have Hit Mimecast, Driving New Concerns

Dark Reading

Mimecast no longer uses the SolarWinds Orion network management software that served as an attack vector for thousands of organizations.

114
114