Tue.Mar 24, 2020

article thumbnail

Hackers Targeted World Health Organization

Data Breach Today

Researcher Says Spear-Phishing Incident Has Hallmarks of Nation-State Attack A hacking group targeted the World Health Organization earlier this month with an apparently unsuccessful spear-phishing campaign designed to harvest credentials as the United Nations organization was grappling with the global COVID-19 pandemic.

Phishing 269
article thumbnail

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

The Last Watchdog

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day. I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR technologies have arisen in just the past few years to help companies try to make sense of it all, even as catastrophic breaches persist.

Security 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Modifies Consumer Privacy Regulations - Again

Data Breach Today

Attorney Sadia Mirza Reviews 'Spring Cleaning' of Landmark CCPA Privacy Law Amidst the COVID-19 pandemic, California's attorney general on March 11 released a second modification of the proposed regulations to implement the California Consumer Protection Act. Attorney Sadia Mirza explains what's included in this "spring cleaning.

Privacy 193
article thumbnail

Uncovering OpenWRT remote code execution (CVE-2020-7982)

ForAllSecure

Introduction. For ForAllSecure, I’ve been focusing on finding bugs in OpenWRT using their Mayhem software. My research on OpenWRT has been a combination of writing custom harnesses, running binaries of the box without recompilation, and manual inspection of code.

112
112
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

New Mirai Variant Exploits NAS Device Vulnerability

Data Breach Today

Researchers: Mukashi Botnet Can Use Infected Devices to Launch DDoS Attacks Security researchers are tracking a variant of the prolific Mirai botnet called Mukashi, that's taking advantage of vulnerabilities in network-area storage devices made by Zyxel and giving its operators the ability to launch DDoS attacks. Zyxel has issued a patch for the vulnerability.

Security 171

More Trending

article thumbnail

Microsoft Warns of New Zero-Day Vulnerabilities in Windows

Data Breach Today

Company Has Detected 'Limited Targeted Attacks' So Far Microsoft is warning that attackers are exploiting a pair of critical, zero-day flaws in Windows that allow for remote code execution, which could enable a threat actor to take over an infected device. Although a patch for the flaws is not expected until April, the company described workarounds.

161
161
article thumbnail

Business Process Modeling Use Case: Disaster Recovery

erwin

In these challenging times, many of our customers are focused on disaster recovery and business contingency planning. Disaster recovery is not just an event but an entire process defined as identifying, preventing and restoring a loss of technology involving a high-availability, high-value asset in which services and data are in serious jeopardy. Technical teams charged with maintaining and executing these processes require detailed tasks, and business process modeling is integral to their docum

Risk 97
article thumbnail

Election Integrity in COVID-19 Era

Data Breach Today

Matt Barrett and Joe Drissell of U.S. Cyberdome discuss the new initiative to foster cross-campaign cybersecurity collaboration and the ramifications of potentially holding an election during social distancing as a result of the COVID-19 pandemic.

article thumbnail

3 Tips to Secure Your Home Network

PerezBox

Whether we like it or not, we have all become the network administrators of our own home networks. As such, our responsibilities extend beyond protecting our families to helping to. Read More. The post 3 Tips to Secure Your Home Network appeared first on PerezBox.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Demystifying FBI Notes on Cyber Attacks Involving Multi-Factor Authentication

Data Breach Today

Hackers are Looking for Every Opportunity to Bypass Security Measures, and MFA is no Exception. Hackers are looking for every opportunity to bypass security measures, and MFA is no exception.

article thumbnail

Internet Voting in Puerto Rico

Schneier on Security

Puerto Rico is considered allowing for Internet voting. I have joined a group of security experts in a letter opposing the bill. Cybersecurity experts agree that under current technology, no practically proven method exists to securely, verifiably, or privately return voted materials over the internet. That means that votes could be manipulated or deleted on the voter's computer without the voter's knowledge, local elections officials cannot verify that the voter's ballot reflects the voter's in

article thumbnail

MFA Trials Can Be a Burden or a Breeze

Data Breach Today

Use These Five Tips to Quickly Spot Differences When Evaluating MFA Solutions Use these five tips to quickly spot differences when evaluating MFA solutions.

134
134
article thumbnail

COVID-19: Key EU And U.S. Cybersecurity Issues and Risk-Remediation Steps

Data Matters

The COVID-19 crisis has created significant cybersecurity risks for organizations across the world, particularly arising from remote working, scams and phishing attacks, and weakened information governance controls. These risks warrant attention by legal counsel and information security officers in light of potentially significant adverse legal, financial and reputational consequences that could arise – all while the organization is dealing with effects of a global pandemic.

Risk 79
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What's the Return on Investment of a Vendor Management Platform?

Data Breach Today

Improve Vendor Remote Access Security, Reduce 3rd Party Risk AND Reduce Costs An emerging technology, Vendor Privileged Access Management (VPAM) can provide both operational efficiencies and increased security in your projected ROI analysis. And that is a rare combination in InfoSec these days.

Risk 113
article thumbnail

How to facilitate remote learning: Part 4 — Active learning

Jamf

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience. In part four of our five-part blog series, we show you ways to offer active learning through projects and breakout groups.

article thumbnail

Nurturing relationships while working remotely

OpenText Information Management

In the midst of media reports of job cuts and business closures, the Bank of America has just announced the hiring of 1700 new employees into critical support roles. As more and more people are instructed to stay at home, it’s impossible to overestimate the importance of seamless and continuous engagements with financial services customers. … The post Nurturing relationships while working remotely appeared first on OpenText Blogs.

article thumbnail

WildPressure, a new APT group targets the Middle East’s industrial sector

Security Affairs

Security experts from Kaspersky Lab have uncovered the activity of a new threat actor, tracked as WildPressure, targeting the industrial sector in th e Middle East. The WildPressure was spotted for the first time in August 2019 when researchers detected a never-before-seen malware that has no similarities with other samples analyzed by the experts. “In August 2019, Kaspersky discovered a malicious campaign distributing a fully fledged C++ Trojan that we call Milum.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New York SHIELD Act Requires Safeguards to Protect Private Information

Hunton Privacy

On March 21, 2020, the data security provisions of New York’s Stop Hacks and Improve Electronic Data Security Act (“SHIELD Act”) went into effect. The SHIELD Act requires any person or business owning or licensing computerized data that includes the private information of a resident of New York (“covered business”) to implement and maintain reasonable safeguards to protect the security, confidentiality and integrity of the private information.

article thumbnail

Fortune 500 tech giant General Electric (GE) discloses data breach after Canon hack

Security Affairs

General Electric (GE) s a data breach that exposed personally identifiable information of current and former employees, as well as beneficiaries. The technology giant General Electric (GE) disclosed a data breach that exposed personally identifiable information of current and former employees, as well as beneficiaries. The data breach was caused by a security breach suffered by one of GE’s service providers, Canon Business Process Services.

article thumbnail

Cybercriminals' Promises to Pause During Pandemic Amount to Little

Dark Reading

As pandemic worsens, online profiteering -- from fraudsters to ransomware operators to cybercriminal hacking -- continues unabated, despite some promises from the underground.

article thumbnail

UNCOVERING OPENWRT REMOTE CODE EXECUTION (CVE-2020-7982)

ForAllSecure

Introduction. For ForAllSecure, I’ve been focusing on finding bugs in OpenWRT using their Mayhem software. My research on OpenWRT has been a combination of writing custom harnesses, running binaries of the box without recompilation, and manual inspection of code. I found this vulnerability initially by chance when I was preparing a Mayhem task for opkg.

IT 59
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

OCR Issues Bulletin on the Sharing and Security of PHI During Coronavirus Pandemic

Hunton Privacy

The Office for Civil Rights (“OCR”) at the U.S. Department of Health and Human Services (“HHS”) issued a Bulletin on sharing and protecting patients’ protected health information (“PHI”) in compliance with the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) during the COVID-19 national emergency. The Bulletin emphasizes that the HIPAA Privacy Rule is still in effect during this national emergency, but that HIPAA-covered entities may use or disclose patients’ PHI when necess

article thumbnail

How Web Data Can Benefit the Food Delivery Industry

Import.IO

The online food delivery industry has emerged and grown tremendously over the past decade. Users have increasingly come to realize the convenience that online food delivery can provide them, making the food delivery market seemingly limitless. As of January 2020, 60 percent of U.S. consumers order delivery or takeout once. The post How Web Data Can Benefit the Food Delivery Industry appeared first on Import.io.

article thumbnail

Uncovering OpenWRT Remote Code Execution (CVE-2020-7982)

ForAllSecure

Introduction. For ForAllSecure, I’ve been focusing on finding bugs in OpenWRT using their Mayhem software. My research on OpenWRT has been a combination of writing custom harnesses, running binaries of the box without recompilation, and manual inspection of code. I found this vulnerability initially by chance when I was preparing a Mayhem task for opkg.

IT 52
article thumbnail

MalwareBazaar – welcome to the abuse-ch malware repository

Security Affairs

Abuse. ch launched the MalwareBazaar service, a malware repository to allow experts to share known malware samples and related info. Abuse. ch launched a malware repository, called MalwareBazaar , to allow experts to share known malware samples and related analysis. MalwareBazaar is available for free and only collects known malware samples, the repository will not include adware or potentially unwanted applications (PUA/PUP). “ MalwareBazaar is a project operated by abuse. ch.

IT 57
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Automated Tools Make Cyberattacks Easier to Pull Off

Dark Reading

Gone are the days when threat actors had to actually spend time and effort planning and developing an attack on their own, Recorded Future says.

65
article thumbnail

The US Army Corps of Engineers Deploys Against Coronavirus

WIRED Threat Level

The US is desperate for hospital beds. The USACE can build thousands of them in a matter of days.

article thumbnail

How to Secure Your Kubernetes Deployments

Dark Reading

As more companies shift their software to a microservices-based architecture and orchestrate their containerized applications in Kubernetes, distributed security controls become a must.