Fri.Apr 17, 2020

article thumbnail

FBI: Hackers Targeting US COVID-19 Research Facilities

Data Breach Today

Nation-State Reconnaissance and Intrusion Campaigns Increasing, Expert Says Since the COVID-19 pandemic began earlier the year, the FBI has seen an increase in nation-state hackers targeting U.S. medical research facilities and healthcare organizations conducting research into the virus.

299
299
article thumbnail

[Podcast] Strategic Considerations for Information Governance Audits

AIIM

There are a few different scenarios for auditing your data. Audits can be performed to assess data quality, identify data liabilities, ensure data privacy, uncover data leaks, and so on. Information governance audits, in particular, are used to ensure compliance with relevant information governance policies and procedures. On this episode of the AIIM on Air podcast , your host Kevin Craine explores Information Governance Audits with AIIM member Andrew du Fresne.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Addressing Shadow IT Issues During COVID-19 Crisis

Data Breach Today

Security Experts Offer Risk Mitigation Tips With the massive shift to telework as a result of the COVID-19 pandemic, shadow IT is becoming a more critical security issue around the world. Security experts offer tips on mitigating the risks involved.

IT 279
article thumbnail

Zoom Bombing Attack Hits U.S. Government Meeting

Threatpost

A recent U.S. House Oversight Committee meeting was the latest victim of Zoom bombing, according to an internal letter.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'Zero Trust' Turns 10

Data Breach Today

John Kindervag Reflects on His Creation and Today's Broad Adoption The "zero trust" network architecture model is 10 years old - and suddenly more relevant than ever. How does John Kindervag, the creator of zero trust, feel about his "baby" today, and what advice does he give to organizations looking to adopt the model?

276
276

More Trending

article thumbnail

'5G Causes COVID-19' Conspiracy Theory: No Fix for Stupid

Data Breach Today

Suspected Arson Attacks on Transmitter Masts Disrupt Emergency Services As countries pursue national 5G rollouts, an unwanted security challenge has intensified: Some extremists have been vandalizing or even firebombing transmitter masts, driven by conspiracy theories suggesting not only that 5G poses a public health risk, but that it also helps cause COVID-19.

Risk 243
article thumbnail

Hackers Update Age-Old Excel 4.0 Macro Attack

Threatpost

XLS files sent via emails appear password protected but aren’t, opening automatically to install malware from compromised macros, according to researchers.

Passwords 116
article thumbnail

GAO: Pentagon's Cyber Hygiene Programs Come Up Short

Data Breach Today

Audit Finds DoD Would Benefit From Better Security Training The U.S. Defense Department needs to improve its cybersecurity training programs for civilian and military employees to reduce the risks that common security incidents pose, a new audit from the Government Accountability Office finds.

Military 218
article thumbnail

DHS Urges Pulse Secure VPN Users To Update Passwords

Threatpost

The DHS urged organizations to update their passwords and make sure that a critical Pulse Secure VPN flaw has been patched, as attackers continue to exploit the flaw.

Passwords 104
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Analysis: Insider Threats Posed by Remote Workforce

Data Breach Today

The latest edition of the ISMG Security Report offers a discussion of the potential insider threats posed by the remote workforce during the COVID-19 crisis. Also featured: An update on payment fraud shifts and the long-term outlook for the cybersecurity market.

Marketing 218
article thumbnail

Australian coronavirus contact tracing app voluntary and with 'no hidden agenda', minister says

The Guardian Data Protection

Stuart Robert says people can be assured there will be no geolocation, surveillance or tracking Sign up for Guardian Australia’s daily coronavirus email Download the free Guardian app to get the most important news notifications The Covid trace app is “entirely voluntary”, will not be a surveillance device and is designed to speed up coronavirus testing, the government services minister, Stuart Robert, has said.

article thumbnail

TA505 Group Targeted Corporate Networks With RAT: Report

Data Breach Today

Spear-Phishing Emails Appeared to Originate With HR Departments The prolific TA505 cybercrime group targeted corporate networks across Europe using spear-phishing emails to spread the SDBbot remote access Trojan, according to IBM X-Force researchers. The malicious messages were disguised as emails from HR departments.

Phishing 165
article thumbnail

A Vital Hack Could Turn Medical Devices Into Ventilators

WIRED Threat Level

Hundreds of thousands of lower-grade breathing devices are going unused because manufacturers say they can’t perform life-saving functions. But a new patch might change that. .

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Demand for Phishing Kits Is Strong: Report

Data Breach Today

Prices for Kits Soar; Ads Proliferate on Dark Net Markets Ads for phishing kits doubled last year on underground forums and dark net markets, with prices skyrocketing over 149 percent - an apparent indicator of strong demand, according to security firm Group-IB.

Phishing 165
article thumbnail

A Brand New Ursnif/ISFB Campaign Targets Italian Organizations

Security Affairs

Cybaze-Yoroy ZLab researchers spotted a new variant of Ursnif that is targeting organizations in Italy. Introduction. Ursnif is one of the most and widespread threats, it is delivered through malspam campaigns aimed at multiple industries across Italy and Europe. Recently, we have identified a new variant that is targeting Italian organizations. The malspam messages use attachments with subjects like “ Avviso di Pagamento_xxxx_date ” where xxxx is a number and date is a date reported in the form

article thumbnail

Ransomware Recovery in the 'New Normal'

Data Breach Today

The ransomware threat has scaled up to match the new remote workforce. But have backup policies and incident recovery procedures improved to keep pace? David Shaw and John Bilotti of Nasuni share tips on ransomware recovery, remote file-sharing and business continuity.

article thumbnail

Cybersecurity Home-School: The Robot Project

Dark Reading

This fun project can teach your homebound children and teens about cybersecurity (and keep them occupied for at least a little while).

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Advancing digitization and reducing costs to support a rebound in transportation

CGI

Advancing digitization and reducing costs to support a rebound in transportation. The transport and logistics industry relies heavily on the business continuity of global supply chains and the freedom to transport people, goods and services locally and globally. With production decreasing dramatically in key manufacturing hubs, consumer demand falling, borders closing, and airlines, railways and ground transportation modes curtailed, the industry is facing an unprecedented time with far-reaching

article thumbnail

Cisco addresses critical issues in IP Phones and UCS Director

Security Affairs

Cisco released security patches to address numerous flaws in its products, including critical severity issues that affect IP Phones and UCS Director. The critical vulnerability fixed by Cisco affects IP Phones and resides on the webserver , the flaw could be exploited by a remote, unauthenticated attacker to execute code with root privileges. The flaw, tracked as CVE-2020-3161, has been rated as a critical severity and received a CVSS score of 9.8. “A vulnerability in the web server for Ci

article thumbnail

Embracing new ways of working in financial services

CGI

Embracing new ways of working in financial services. Although the approaches to dealing with the COVID-19 pandemic vary by country, as governments and businesses come to grips with it, one thing is imperative: we will get through this. . The question is how, when disruptions in day-to-day life and business abound. How will banks respond, rebound and reinvent?

article thumbnail

You Can Now Check If Your ISP Uses Basic Security Measures

WIRED Threat Level

“Is BGP Safe Yet” is a new site that names and shames internet service providers who don't tend to their routing. .

Security 111
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Syria-linked APT group SEA targets Android users with COVID19 lures

Security Affairs

Syrian-linked APT group SEA recently used COVID-19-themed lures as part of a long-running surveillance campaign, security researchers warn. Syrian hackers are behind a long-running campaign that has been active since January 2018 and that targets Arabic-speaking Android users. The campaign aimed at users in Syria and surrounding regions was spotted by experts from mobile security firm Lookout, threat actors employed tens of Android apps, none of which is available in the official Google Play Sto

IT 86
article thumbnail

3 approaches for proactive responses to supply chain impacts in manufacturing

CGI

3 approaches for proactive responses to supply chain impacts in manufacturing. Since the COVID-19 outbreak began in the key global manufacturing hub of Wuhan, China, the impacts on the broader industry have been growing exponentially. They are compounded further by the complexities and interdependencies of a global supply chain. . As many manufacturers continue to slow or shut down operations, decisions are extremely difficult for leaders and their employees alike.

article thumbnail

Attacks on Linksys Routers Trigger Mass Password Reset

Threatpost

Linksys Smart Wi-Fi users were forced to reset their passwords after researchers discovered a router hack.

Passwords 112
article thumbnail

10 Standout Security M&A Deals from Q1 2020

Dark Reading

The first quarter of 2020 brought investments in enterprise IoT and endpoint security, as well as billion-dollar investments from private equity firms.

IoT 92
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Experts shed the light on the mysterious critical VMware vCenter Server issue

Security Affairs

Security firm Guardicore released technical information on a critical VMware vCenter Server vulnerability recently disclosed by VMware. Earlier this month, VMware has addressed a critical information disclosure flaw, tracked as CVE-2020-3952 , that could be exploited by attackers to compromise vCenter Server or other services that use the Directory Service ( vmdir ) for authentication.

Access 84
article thumbnail

Is Apple and Google's Covid-19 Contact Tracing a Privacy Risk?

WIRED Threat Level

Apple and Google's Bluetooth-based system isn't perfect. But many of the biggest concerns have solutions.

Risk 104
article thumbnail

New York Department of Financial Services Released New Guidance Addressing COVID-19 Related Cybersecurity Risks

HL Chronicle of Data Protection

Continuing its focus on COVID-19’s impact on its regulated entities, on April 13, the New York Department of Financial Services (NYDFS) released new cybersecurity guidance in response to the COVID-19 pandemic. The guidance highlights the heightened cybersecurity risks from the current crisis and NYDFS’ expectations that its regulated entities address those risks as large portions of their workforce have shifted to remote working arrangements.