Fri.Apr 09, 2021

article thumbnail

Fraudsters Flooding Collaboration Tools With Malware

Data Breach Today

Cisco Talos: Reliance on These Tools Expands Attack Surface The increasing reliance on collaboration tools such as Slack and Discord to support those working remotely during the COVID-19 pandemic has opened up new ways for fraudsters and cybercriminals to bypass security tools and deliver malware, Cisco Talos reports.

Security 322
article thumbnail

Backdoor Added — But Found — in PHP

Schneier on Security

Unknown hackers attempted to add a backdoor to the PHP source code. It was two malicious commits , with the subject “fix typo” and the names of known PHP developers and maintainers. They were discovered and removed before being pushed out to any users. But since 79% of the Internet’s websites use PHP, it’s scary. Developers have moved PHP to GitHub, which has better authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Roundup: Biden’s Cybersecurity Proposals and More

Data Breach Today

ISMG Editors Discuss Hot Topics, Including Health Data Breaches Four editors at Information Security Media Group discuss important cybersecurity issues, including President Biden’s latest cybersecurity proposals and large vendor-related breaches in healthcare.

article thumbnail

Weekly Update 238

Troy Hunt

"What a s**t week". I stand by that statement in the opening couple of minutes of the video and I write this now at midday on Saturday after literally falling asleep on the couch. The Facebook incident just dominated; everything from processing data to writing code to dozens of media interviews. And I ran a workshop over 4 half days. And had 2 lots of guests visiting.

IT 141
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Implementing Cybersecurity Best Practices

Data Breach Today

Andy Purdy, the chief security officer for Huawei Technologies USA who formerly worked on the White House staff and in the Department of Homeland Security, discusses cybersecurity best practices.

More Trending

article thumbnail

FDA's Kevin Fu on Threat Modeling for Medical Devices

Data Breach Today

More precise and pervasive cybersecurity threat modeling during manufacturers' development of medical devices - and also during the regulatory product review process - is critical for risk mitigation, says Kevin Fu, new acting director of medical device cybersecurity at the FDA.

article thumbnail

Cisco will not release updates to fix critical RCE flaw in EoF Business Routers

Security Affairs

Cisco announced it will not release security updates to address a critical security vulnerability affecting some of its Small Business routers. Cisco is urging customers that are using some of its Small Business routers to replace their devices because they will no longer receive security updates. According a security advisory published by the company, Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers are affected by Remote Command Execution vulnerability that resides in the Managem

Sales 126
article thumbnail

Death to 'Fluffy': Please Stop With the Pet Name Passwords

Data Breach Today

Pets, Sports Teams, Notable Dates and Family Member Names Predominate, Experts Warn Loving your pet and creating tough-to-crack passwords should remain two distinctly separate activities. Unfortunately, Britain's National Cyber Security Center reports that more than 1 in 6 Brits admit to using the name of a pet as their password. And the problem is global.

Passwords 290
article thumbnail

CISA releases post-compromise tool Aviary to review Microsoft 365

Security Affairs

CISA released a Splunk-based dashboard for post-compromise activity in Microsoft Azure Active Directory (AD), Office 365, and MS 365 environments. The Cybersecurity and Infrastructure Security Agency (CISA) has released a Splunk-based dashboard, dubbed Aviary , that could be used by administrators in the post-compromise analysis of Microsoft Azure Active Directory (AD), Office 365 (O365), and Microsoft 365 (M365) environments. “Aviary is a new dashboard that CISA and partners developed to

Cloud 101
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Role of Predictive KYC in Fighting Money Laundering

Data Breach Today

Two Experts Offer Fraud-Fighting Insights How can automation help to reduce money laundering fraud? Larry Gordon and Kathleen Gowin of the consultancy Endurance Advisory Partners describe how predictive KYC can help mitigate risks.

Risk 242
article thumbnail

Zerodium will pay $300K for WordPress RCE exploits

Security Affairs

Zero-day broker Zerodium announced that will triples payouts for remote code execution exploits for the popular WordPress content management system. Zero-day broker Zerodium has tripled the payouts for exploits for the WordPress content management system that could be used to achieve remote code execution. Zerodium announced via Twitter that is temporarily offering a $300,000 payout for this kind of exploit.

article thumbnail

US Blacklists 7 Chinese Supercomputer Entities

Data Breach Today

Commerce Department Cites National Security Concerns Citing national security concerns, the U.S. Commerce Department has placed seven Chinese supercomputer organizations on the Entity List, which effectively bars them from receiving supplies or components from U.S. companies.

Security 233
article thumbnail

Facebook Had Years to Fix Flaw That Leaked 500M Users’ Data

WIRED Threat Level

Software makers can’t catch every bug every time, but Facebook had ample warning about the privacy problems with its “contact import” feature.

Privacy 99
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Lazarus Group Targets Freight Logistics Firm

Data Breach Today

ESET Report Ties 'Vyveva' Backdoor to North Korean APT Group The Lazarus Group, a North Korean-linked APT group, has recently deployed a previously undocumented backdoor called "Vyveva" to target a freight logistics company in South Africa, according to ESET.

233
233
article thumbnail

623M Payment Cards Stolen from Cybercrime Forum

Threatpost

The database was subsequently leaked elsewhere, imperiling consumers from the U.S. and around the world.

Security 113
article thumbnail

Visa Describes New Skimming Attack Tactics

Data Breach Today

Cybercriminals Using Web Shells to Control Retailers' Servers Visa's Payment Fraud Disruption team reports that cybercriminals are increasingly using web shells to establish command and control over a retailers' servers during payment card skimming attacks.

Retail 222
article thumbnail

Adam Levin Discusses Facebook Data Leak on NPR

Adam Levin

Adam Levin spoke with NPR about the recent data archive of over 500 million Facebook accounts found on a hacking forum. “It’s serious when phone numbers are out there. The danger when you have phone numbers in particular is a universal identifier,” said Levin. Read the article here. The post Adam Levin Discusses Facebook Data Leak on NPR appeared first on Adam Levin.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Crisis Communications: How to Handle Breach Response

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of why transparent communication in the aftermath of a data breach pays off. Also featured: Mastercard on digital identity issues; building a more diverse and inclusive cybersecurity workforce.

article thumbnail

Women Are Facing an Economic Crisis & the Cybersecurity Industry Can Help

Dark Reading

Investing in women's cybersecurity careers can bring enormous benefits and help undo some of the significant economic damage wrought by the pandemic.

article thumbnail

John Mancini talks about joining the MER Conference and how he will bring value to attendees

IG Guru

The post John Mancini talks about joining the MER Conference and how he will bring value to attendees appeared first on IG GURU.

article thumbnail

Pwn2Own 2021: participants earned $1,2M of the $1.5M prize pool

Security Affairs

The Pwn2Own 2021 hacking competition was concluded, participants earned more than $1.2 million, the greatest total payout ever. The Pwn2Own 2021 hacking competition reached the end, participants earned more than $1.2 million which is more than ever paid out at this contest. White hat hackers demonstrated exploits for Safari, Chrome, Edge, Windows 10, Ubuntu, Microsoft Teams, Zoom, Parallels, Oracle VirtualBox, and Microsoft Exchange, for a total of 23 attempts.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Extremist Charged With Plot to Blow Up Amazon Data Centers

WIRED Threat Level

The FBI arrested the suspect in Texas after he purchased explosives from an undercover agent.

Security 104
article thumbnail

Network Detection & Response: The Next Frontier in Fighting the Human Problem

Threatpost

Justin Jett, director of audit and compliance for Plixer, discusses the transformation of network-traffic analytics and what it means for cybersecurity now.

article thumbnail

Unofficial Android App Store APKPure Infected With Malware

Dark Reading

The APKPure app store was infected with malware that can download Trojans to other Android devices, researchers report.

121
121
article thumbnail

DOJ: Creep Coach Finagles Nude Athlete Photos

Threatpost

Allegedly perv college coach charged with cyberstalking and extorting nudes from his female athletes.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

8 Security & Privacy Apps to Share With Family and Friends

Dark Reading

Mobile apps to recommend to the people in your life who want to improve their online security and privacy.

Privacy 96
article thumbnail

Delivering business value for insurance companies

Collibra

Recapping a discussion moderated by Stijn Christiaens and featuring insurance data experts from Deloitte UK . Insurance is a data-intensive business. Insurance companies need data to better assess risks and price policies competitively, but also profitably. They need data to better manage claims, ensuring customer satisfaction but also mitigating fraud.

article thumbnail

A statement on the death of HRH The Prince Philip, Duke of Edinburgh

CILIP

A statement on the death of HRH The Prince Philip, Duke of Edinburgh. CILIP would like to express our sincere condolences to our Patron, HM Queen on the passing of her husband, His Royal Highness, Philip, Duke of Edinburgh. The Duke of Edinburgh was a President of the Library Association between 1978-79 [TBC], a time which coincided with a period of growth and innovation in UK libraries.