Fri.Nov 12, 2021

article thumbnail

macOS Zero-Day exploited in watering hole attacks on users in Hong Kong

Security Affairs

Google revealed that threat actors recently exploited a zero-day vulnerability in macOS to deliver malware to users in Hong Kong. Google TAG researchers discovered that threat actors leveraged a zero-day vulnerability in macOS in a watering hole campaign aimed at delivering malware to users in Hong Kong. The attackers exploited a XNU privilege escalation vulnerability ( CVE-2021-30869 ) unpatched in macOS Catalina.

article thumbnail

MacOS Zero-Day Used against Hong Kong Activists

Schneier on Security

Google researchers discovered a MacOS zero-day exploit being used against Hong Kong activists. It was a “watering hole” attack, which means the malware was hidden in a legitimate website. Users visiting that website would get infected. From an article : Google’s researchers were able to trigger the exploits and study them by visiting the websites compromised by the hackers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Cybersecurity Best Practices to Combat Ransomware

Threatpost

Immutable storage and more: Sonya Duffin, data protection expert at Veritas Technologies, offers the Top 10 steps for building a multi-layer resilience profile.

article thumbnail

FTC Recommends Steps to Protect Against Ransomware

Hunton Privacy

On November 5, 2021, the Federal Trade Commission suggested two preventative steps small businesses can take to protect against ransomware risks: Step #1: Make sure your tech team is following best practices to fend off a ransomware attack. Be prepared by backing up data. Set up off-line, off-site encrypted backups of information essential to the business.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Threat from Organized Cybercrime Syndicates Is Rising

Threatpost

Europol reports that criminal groups are undermining the EU’s economy and its society, offering everything from murder-for-hire to kidnapping, torture and mutilation.

IT 116

More Trending

article thumbnail

How we broke the cloud with two lines of code: the full story of ChaosDB

Security Affairs

Wiz Research Team disclosed technical details about the discovery of the ChaosDB vulnerability in Azure Cosmos DB database solution. In August, 2021 the Wiz Research Team disclosed ChaosDB – a severe vulnerability in the popular Azure Cosmos DB database solution that allowed for complete, unrestricted access to the accounts and databases of several thousand Microsoft Azure customers, including many Fortune 500 companies.

Cloud 106
article thumbnail

Costco Confirms: A Data Skimmer’s Been Ripping Off Customers

Threatpost

Big-box behemoth retailer Costco is offering victims 12 months of credit monitoring, a $1 million insurance reimbursement policy and ID theft recovery services.

Retail 109
article thumbnail

If We Really Want to Drive Change, We Have to Work Together

Micro Focus

The final INSPIRE 20 podcast looks back at a number of the ways that individuals are promoting inclusion and diversity in their own lives and how organizations can do so at the highest levels of their businesses. The series, which showcased 20 executives from around the world making a difference in terms of inclusion and. View Article.

103
103
article thumbnail

Millions of Routers, IoT Devices at Risk from New Open-Source Malware

Threatpost

BotenaGo, written in Google’s Golang programming language, can exploit more than 30 different vulnerabilities.

IoT 131
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

SEC Identifies Deficiencies From its Electronic Investment Advice Initiative

Data Matters

On November 9, 2021, the U.S. Securities and Exchange Commission (SEC) Division of Examinations (EXAMS) released a risk alert (Risk Alert) concerning deficiencies it observed in its examinations of advisers providing electronic advisory services, including advisers known as “robo-advisers.” 1 Those deficiencies were in the areas of the robo-advisers’ compliance programs, portfolio management practices (including advisers’ fiduciary obligations), and marketing/performance advertising.

IT 88
article thumbnail

HTML Smuggling technique used in phishing and malspam campaigns

Security Affairs

Threat actors are increasingly using the HTML smuggling technique in phishing campaigns, Microsoft researchers warn. Microsoft experts warn that threat actors are increasingly using the HTML smuggling technique in phishing campaigns to stealthily deliver threats. Attackers increasingly use HTML smuggling in phishing and other email campaigns to stealthily deliver threats, but Microsoft Defender Office 365’s detonation technology provides durable protection against this evasive delivery technique

article thumbnail

Mac Zero Day Targets Apple Devices in Hong Kong

Threatpost

Google researchers have detailed a widespread watering-hole attack that installed a backdoor on Apple devices that visited Hong Kong-based media and pro-democracy sites.

article thumbnail

Retail giant Costco discloses data breach, payment card data exposed

Security Affairs

Costco Wholesale Corporation discloses a data breach, threat actors had access to customers’ payment card information. Retail giant Costco Wholesale Corporation notified its customers of a data breach that might have exposed their payment card information. Data was allegedly exposed while customers were shopping at one of its stores. Costco discovered the security breach after its staff spotted a card skimming device in one of its warehouses as part of a routine check.

Retail 90
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Open Source Project Aims to Detect Living-Off-the-Land Attacks

Dark Reading

The machine learning classifier from Adobe can determine whether system commands are malicious and classify them using a variety of tags useful for security analysts.

Security 118
article thumbnail

Windows 10 Privilege-Escalation Zero-Day Gets an Unofficial Fix

Threatpost

Researchers warn that CVE-2021-34484 can be exploited with a patch bypass for a bug originally addressed in August by Microsoft.

86
article thumbnail

Follow the Leaders: A Blueprint for Software Security Success

Dark Reading

Organizations can study software security leaders and emulate their habits and initiatives in order to build a successful software security program of their own.

article thumbnail

An open letter to anyone switching their supply chain integration services

OpenText Information Management

Dear Reader, If you’re here then you are at least marginally associated with some aspect of your company’s supply chain, and if you are associated with any aspect of your company’s supply chain then it comes as no surprise that supply chain integration has never been more pertinent. It’s all over the news: supply chain disruption is impacting all corners of … The post An open letter to anyone switching their supply chain integration services appeared first on OpenText Blogs.

IT 64
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

MSPAlliance Leadership Council Forms Vendor Council to Address Managed Services Supply Chain Risk

Dark Reading

MSP supply chain threats will be mitigated through transparency, education, business continuity planning, and managed services channel certification.

article thumbnail

4 ways cloud marketplaces give you a competitive edge

OpenText Information Management

Businesses can quickly adapt innovative technology to remain resilient and optimize internal resources by leveraging public cloud marketplaces. Digital procurement through public cloud marketplaces is a low-touch way to discover, try, and purchase software needed for immediate access. Organizations can buy through standard contracts and pre-allocated budgets, streamlining procurement and simplifying vendor management, bringing company-wide benefits.

Cloud 64
article thumbnail

How to Hire ?— and Retain ?—? Effective Threat Hunters

Dark Reading

Key characteristics that should be evaluated include curiosity, disposition, and fit with the culture.

94
article thumbnail

The Definitive Guide to Schrems II via Dataguidance.com

IG Guru

Check out the article here. The post The Definitive Guide to Schrems II via Dataguidance.com appeared first on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Emerging Security Tools Tackle GraphQL Security

Dark Reading

New security tools are proactively protecting APIs built with GraphQL, before attacks against them become more commonplace.

article thumbnail

The Sneaky Way TikTok Is Connecting You to Real-Life Friends

WIRED Threat Level

The social network got huge by ignoring who you know. That's increasingly no longer the case.

Privacy 78
article thumbnail

BT to Deploy 'Epidemiological AI' Based on the Spread of Viruses in Humans to Combat Cyberattacks

Dark Reading

Using the spread of viruses in human populations as a model to inform its AI, Inflame is a key component in BT’s recently-announced Eagle-i platform.

IT 65
article thumbnail

The Best Wi-Fi 6 Routers Secure and Fast Enough for Business

eSecurity Planet

Remote work and home offices were an afterthought until the COVID-19 pandemic. They were then vaulted to the forefront of security concerns so quickly that security and IT teams were caught off guard. Now, remote work is likely here to stay even after the pandemic is gone. That means that the temporary solutions put in place over the last 18 months will need to give way to more permanent solutions.

Security 133
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Ankura Launches Brooklyn Cyber Center

Dark Reading

New initiative addresses shortage of professionals and lack of diversity in cybersecurity by recruiting, training and retaining diverse talent from underrepresented backgrounds.

article thumbnail

Friday Squid Blogging: Giant Squid Art

Schneier on Security

Images of giant squid (and octopi) attacking. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

In Appreciation: Alan Paller

Dark Reading

Alan Paller, founder of the famed SANS Institute, passed away on Nov. 9.

62