Wed.Feb 26, 2020

article thumbnail

Experts Warn: Targeted Ransomware Attacks to Surge

Data Breach Today

McAfee and Microsoft Analysts Review 'Ransomware as a Service' Trends Targeted ransomware attacks against enterprises and government agencies are likely to surge in the coming months as "ransomware as a service" continues to evolve into a lucrative model for cybercriminals, security experts interviewed at RSA 2020 warn.

article thumbnail

Zyxel 0day Affects its Firewall Products, Too

Krebs on Security

On Monday, networking hardware maker Zyxel released security updates to plug a critical security hole in its network attached storage (NAS) devices that is being actively exploited by crooks who specialize in deploying ransomware. Today, Zyxel acknowledged the same flaw is present in many of its firewall products. This week’s story on the Zyxel patch was prompted by the discovery that exploit code for attacking the flaw was being sold in the cybercrime underground for $20,000.

IT 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Attacks Growing More Targeted and Professional

Data Breach Today

McAfee's John Fokker Charts the Increasingly Advanced Cybercrime Service Economy Ransomware-wielding attackers - aided by a service economy that gives them access to more advanced attack tools - are increasingly targeting organizations rather than individuals to shake them down for bigger ransom payoffs, says McAfee's John Fokker.

article thumbnail

Management of Public Records and FOI: Closing the Gaps in Responsiveness

ARMA International

Records managers around the world are likely familiar with freedom of information (FOI) laws in their respective countries, especially when considered at the national or federal levels. But recent research concerning local, municipal-level compliance with these laws holds important lessons, especially for records managers who work in the public sphere.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cloud Protection: How to Secure Server Environments

Data Breach Today

Jake King of Cmd Charts the Evolution of Cloud Workload Protection Platforms Development teams are increasingly building and deploying for the cloud, but DevOps practices too often fail to account for what happens after applications go from development into production and maintenance - and the ongoing security challenges they will face, says Jake King, CEO, of Cmd.

Cloud 254

More Trending

article thumbnail

Sizing Up the Roles of Behavioral Analytics, 'Zero Trust'

Data Breach Today

Security Experts Discuss Authentication Challenges in the Financial Services Sector Improvements in behavioral biometrics and analytics are changing the way many financial services firms approach authentication. And more companies also are taking a "zero trust" approach to improve identity and access management, according to two security experts interviewed at RSA 2020.

Analytics 191
article thumbnail

How a Hacker's Mom Broke Into a Prison—and the Warden's Computer

WIRED Threat Level

Security analyst John Strand had a contract to test a correctional facility’s defenses. He sent the best person for the job: his mother.

Security 145
article thumbnail

Security and Privacy: Often Aligned, But Sometimes Not

Data Breach Today

Few Continue to Conflate Security and Privacy, Says Attorney James Shreve Not so long ago, many were confused about how security and privacy differ, but that has been rapidly changing, thanks to regulations such as the European Union's General Data Protection Regulation and California's Consumer Privacy Act, says attorney James Shreve, a partner at Thompson Coburn LLP.

Privacy 165
article thumbnail

New Cyber Attack Campaign Leverages the COVID-19 Infodemic

Security Affairs

Researchers from Cybaze Yoroi ZLab have spotted a new campaign exploiting the interest in coronavirus (COVID-19) evolution to spread malware. Introduction. Nowadays, it is common to say that the physical world and the cyber world are strictly connected. The proof is the leverage of the current physical threat, the CoronaVirus (COVID-19), as a social engineering trick to infect the cyber world.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Reducing Security Complexity a Top Challenge for CISOs

Data Breach Today

Cisco's Jeff Reed on the Automation, Visibility and Integration Imperative Reducing security complexity remains one of the toughest challenges facing CISOs, driven by the non-stop increase in threats, says Jeff Reed of Cisco. Creating a sustainable solution will require advances in vendor interoperability, as well as automation and visibility, he says.

Security 162
article thumbnail

Billions of Devices Open to Wi-Fi Eavesdropping Attacks

Threatpost

The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.

article thumbnail

OnDemand Webinar | Fighting Fraud With Connected Security

Data Breach Today

How to Get Started in Implementing a More Connected Security Strategy View this webinar and learn how to fight fraud with a connected security strategy.

Security 165
article thumbnail

Simplify impact analysis with automated data lineage

Collibra

Before a chess match begins, there is order; the board is symmetrical, with all the pieces lined up in their rightful spots. The queen and king stand proudly in the center of the board, guarded on either side by the knights and bishops. The front line of pawns provide the initial shield to the queen and king. While this initial layout is orderly and methodical, as soon as the first player makes their move, chaos ensues.

IT 101
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Modified Draft CCPA Regulations: How They Impact Businesses

Data Breach Today

In an in-depth interview, privacy expert Caitlin Fennessy sorts through modified draft regulations to carry out the California Consumer Privacy Act that are designed to help businesses take a more pragmatic approach to privacy.

Privacy 147
article thumbnail

Stalkerware Attacks Increased 50 Percent Last Year, Report

Threatpost

Research puts the emerging mobile threat—which monitors the whereabouts and device activity of devices users as well as collects personal data—into clearer focus.

article thumbnail

OnDemand Webinar | How CISOs Scale Their AppSec Programs

Data Breach Today

How to Automate the Process in a CI/CD Pipeline. View this webinar and learn how to scale your AppSec program.

147
147
article thumbnail

5 Ways to Up Your Threat Management Game

Dark Reading

Good security programs start with a mindset that it's not about the tools, it's what you do with them. Here's how to get out of a reactive fire-drill mode with vulnerability management.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Silence Hacking Crew threatens Australian banks of DDoS attacks

Security Affairs

DDoS extortionists are blackmailing Australian banks asking for payments of large sums in Monero cryptocurrency threatening DDoS attacks. Cybercriminals are threatening Australian banks of DDoS attacks if they will not pay large sums in Monero cryptocurrency. The extortion campaign was observed over the past week, attackers are sending emails to the banks threatening to carry out distributed denial of service (DDoS) attacks if the financial organizations will not pay the ransom.

Cloud 98
article thumbnail

Elastic Security Makes Case For Blending 'Human Element,' Election Security

Dark Reading

Nate Fick, general manager of Elastic and former CEO of Endgame, talks about the impact of AI and machine learning on security professionals, and how what technologies can be tapped to improve security in the runup to November's election.

article thumbnail

Hackers Cashing In On Healthcare Industry Security Weaknesses

Threatpost

Between ransomware attacks on healthcare devices, malware-laced “medical” apps, and fraud services available on the dark net, attackers are pushing the boundaries on targeting healthcare.

article thumbnail

How to Prevent an AWS Cloud Bucket Data Leak

Dark Reading

Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.

Cloud 102
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Unpatched Security Flaws Open Connected Vacuum to Takeover

Threatpost

A connected, robotic vacuum cleaner has serious vulnerabilities that could allow remote hackers to view its video footage and launch denial of service attacks.

article thumbnail

Matt Newman helps drive better business decisions in a fast-growing industry

IBM Big Data Hub

This story is part of Analytics Heroes, a series of profiles on leaders transforming business analytics. Perched on a stool and going over his notes, Matt Newman prepares for an on-camera interview at Data and AI Forum in Miami, Florida. Matt is the Senior Financial Systems Manager at Sunbelt Rentals, the second-largest heavy equipment rental company in North America.

article thumbnail

Reading Municipal Light Department, an electric utility in Massachusetts, hit by ransomware

Security Affairs

The Reading Municipal Light Department (RMLD), an electric utility in Massachusetts, announced it was hit by a ransomware attack. This week, the Reading Municipal Light Department (RMLD), an electric utility in Massachusetts, announced it was hit by a ransomware attack. Reading Municipal Light Department provides electricity to over 68,000 citizens that live in the towns of Reading, North Reading, Wilmington and Lynnfield Center.

article thumbnail

RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks

Threatpost

When it comes to machine learning, research and cybercriminal activity is full speed ahead - but legal policy has not yet caught up.

IT 101
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Salt River Project protects water with creative flow

OpenText Information Management

The Salt River Project (SRP) is a public utility that serves users and the environment by going beyond the essentials. While the not-for-profit supplies power and water to more than a million customers in the greater Phoenix area, it also educates and empowers the same customers through outreach programs. Salt River Project lives and breathes … The post Salt River Project protects water with creative flow appeared first on OpenText Blogs.

article thumbnail

Samsung leaked data of a few UK Customers

Security Affairs

The South Korean multinational conglomerate Samsung announced that customers’ personal information was leaked online due to a “technical error”. Samsung announced that customers’ personal information was exposed online through its website due to a “technical error.”. The glitch only affected the U.K. website ( [link] ) for a total of 150 impacted customers. “People who logged on were able to see someone else’s name, phone number, address, email address and previous orders.

IT 82
article thumbnail

London Breakfast Briefing: Understanding Cybersecurity Threats and UK/EU Cyber Enforcement Trends

Hunton Privacy

On March 17, 2020, Hunton Andrews Kurth LLP will host a breakfast briefing in our London office to discuss the current cybersecurity threat environment and explore UK and EU cyber enforcement trends. In the face of record-breaking fines handed out by the regulators, securing networks, hardening systems, and protecting data from cyber attacks is becoming ever more critical.