Mon.Mar 16, 2020

article thumbnail

Nation-State Hackers Using COVID-19 Fears to Spread Malware

Data Breach Today

Researchers Find Healthcare Crisis Used As a Lure for Phishing Emails Nation-state hackers as well as cybercriminals are now attempting to use phishing emails with themes tied to the global COVID-19 pandemic to spread malware, according to recent security reports.

Phishing 280
article thumbnail

The Web’s Bot Containment Unit Needs Your Help

Krebs on Security

Anyone who’s seen the 1984 hit movie Ghostbusters likely recalls the pivotal scene where a government bureaucrat orders the shutdown of the ghost containment unit , effectively unleashing a pent-up phantom menace on New York City. Now, something similar is in danger of happening in cyberspace: Shadowserver.org , an all-volunteer nonprofit organization that works to help Internet service providers (ISPs) identify and quarantine malware infections and botnets, has lost its longtime primary s

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

COVID-19 Complication: Ransomware Keeps Hitting Healthcare

Data Breach Today

Cybercrime Continues Despite Pandemic Intensifying As the COVID-19 pandemic intensifies, public health efforts are being complicated by ransomware attacks continuing to hit healthcare facilities that are not only handling cases but also running frontline virus-testing labs.

article thumbnail

NEW TECH: Byos pushes ‘micro segmentation’ approach to cybersecurity down to device level

The Last Watchdog

Many companies take an old-school approach to bringing up the rear guard, if you will, when it comes to protecting IT assets. It’s called network segmentation. The idea is to divide the network up into segments, called subnetworks, to both optimize performance as well as strengthen security. Related: A use case for endpoint encryption At RSA 2020 in San Francisco recently, I learned about how something called “micro segmentation” is rapidly emerging as a viable security strategy.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Numerous Arrests in 2 SIM-Swapping Schemes

Data Breach Today

European Authorities Say Gangs Responsible for Millions in Thefts Europol, along with local police in Spain, Romania and Austria, arrested about two dozen alleged members of two criminal gangs that are accused of stealing millions in euros from bank accounts in several countries by using SIM swapping techniques to steal credentials and passwords.

Passwords 250

More Trending

article thumbnail

Baking Security Into DevOps

Data Breach Today

Checkmarx's Matt Rose on the Nuances of DevSecOps Many CISOs today prefer the "DevOps" label, because adding "sec" to it suggests it's a whole different process, says Matt Rose of Checkmarx.

Security 185
article thumbnail

Coronavirus and Data Protection: Europe’s Data Protection Authorities’ Views

HL Chronicle of Data Protection

Data protection authorities from around the world are stepping in to provide their input and guidance on the matter of data processing activities and the fight against the coronavirus. Hogan Lovells’ global Privacy and Cybersecurity team has compiled the guidance from various European authorities, which is available here. The different emphasis among the data protection authorities’ views – which can be categorized as restrictive, neutral or permissible – suggests that the right approach must l

GDPR 123
article thumbnail

SOC as a Service: Making the Case

Data Breach Today

Cysiv CEO Partha Panda Describes a New Strategy Triaging growing volumes of SOC telemetry is becoming increasingly untenable for security teams, says Cysiv CEO Partha Panda, who makes the case for SOC-as-a-Service offerings.

Security 175
article thumbnail

MonitorMinor, the outstanding stalkerware can track Gmail, WhatsApp, Instagram, and Facebook

Security Affairs

Security experts spotted a new stalkerware, dubbed MonitorMinor, that can track Gmail, WhatsApp, Instagram, and Facebook user activity. Security experts from Kaspersky Lab spotted a new stalkerware, dubbed MonitorMinor ( Monitor. AndroidOS. MonitorMinor. c), that can track Gmail, WhatsApp, Instagram, and Facebook user activity. Stalkerware is commercial monitoring software or spyware that is used for stalking, it is usually used to secretly spy on family members or coll e agues.

Access 112
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How Automated Workflows Boost Cybersecurity

Data Breach Today

ServiceNow CISO Ben de Bont Shares Lessons Automated workflows can help pre-emptively report cybersecurity risks to the board and allow for better qualitative approaches to interpreting data, says Ben de Bont, CISO of ServiceNow.

article thumbnail

Aerial Direct, the O2’s largest UK partner suffered a data breach

Security Affairs

Hackers have stolen O2 customers’ data from a database run by Aerial Direct , one of the largest UK partners of the telecommunications services provider. Hackers have stolen the data of O2 customers from a database operated by Aerial Direct, which is O2’s largest direct business partner in the UK and has more than 130,000 customers. The company provides IP telephony services and equipment, including mobile, fixed lines, as well as call, broadband, conferencing and hosting telecoms.

article thumbnail

Deriving Actionable Threat Intelligence

Data Breach Today

Neustar's Brian McCann Offers Insights Growing data sources and intel feeds are making it more challenging for security teams to find the signal in a very noisy landscape, says Neustar's Brian McCann.

Security 175
article thumbnail

Open Exchange Rates discloses a security breach

Security Affairs

Last week, Open Exchange Rates disclosed a data breach that exposed the personal information and hashed passwords for customers of its API service. Last week, the currency data provider Open Exchange Rates has disclosed a data breach that exposed the personal information and salted and hashed passwords for customers of its API service. Open Exchange Rates provides an API that allows its customers to obtain real-time and historical exchange rates for over 200 world currencies.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The DevSecOps Challenges

Data Breach Today

WhiteHat Security CTO Anthony Bettini Shares Latest Research As businesses face pressure to release software faster, security is unfortunately not keeping pace, says Anthony Bettini of WhiteHat Security, who reviews DevSecOps challenges.

Security 162
article thumbnail

TSA Admits Liquid Ban Is Security Theater

Schneier on Security

The TSA is allowing people to bring larger bottles of hand sanitizer with them on airplanes: Passengers will now be allowed to travel with containers of liquid hand sanitizer up to 12 ounces. However, the agency cautioned that the shift could mean slightly longer waits at checkpoint because the containers may have to be screened separately when going through security.

Security 145
article thumbnail

Experts warn of a new strain of ransomware, the PXJ Ransomware

Security Affairs

Experts warn of a new malware strain, dubbed PXJ Ransomware, that does share the same underlying code with existing ransomware families. Security experts from IBM X-Force have spotted a new strain of ransomware, dubbed PXJ Ransomware, that does share the same code with other known ransomware families. While PXJ performs typical ransomware functions, it does not appear to share the same underlying code with most known ransomware families.

article thumbnail

Microsoft Edge Shares Privacy-Busting Telemetry, Research Alleges

Threatpost

An academic study found Microsoft's Edge browser to be the least private, due to it sending device identifiers and web browsing pages to back-end servers.

Privacy 102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Enterprises are embracing edge computing

DXC Technology

The exponential growth of connected, embedded devices — the Internet of Things (IoT) — is forcing some enterprises to revamp their network architectures to avoid latency issues and continue to process a high volume of data with minimal delay. Factors contributing to the high adoption rate of IoT devices across industries “include rising demand for […].

IoT 94
article thumbnail

Most organizations have yet to fix CVE-2020-0688 Microsoft Exchange flaw

Security Affairs

Organizations are delaying in patching Microsoft Exchange Server flaw (CVE-2020-0688) that Microsoft fixed with February 2020 Patch Day updates. Organizations are delaying in patching Microsoft Exchange Server flaw ( CVE-2020-0688 ) that Microsoft fixed with February 2020 Patch Day updates. The CVE-2020-0688 flaw resides in the Exchange Control Panel (ECP) component, the root cause of the problem is that Exchange servers fail to properly create unique keys at install time.

article thumbnail

4 Ways Thinking 'Childishly' Can Empower Security Professionals

Dark Reading

Younger minds -- more agile and less worried by failure -- provide a useful model for cyber defenders to think more creatively.

Security 103
article thumbnail

Getting the most from Vendor Invoice Management on SAP S/4HANA

OpenText Information Management

Despite your best efforts to digitally transform your business, it’s always worth remembering that some parts of your organization may yet have made the transition to fully digital. Working with vendors and suppliers is an excellent example. Research from the Institute of Financial Operations found that 50% of invoices are still received by paper, 37% … The post Getting the most from Vendor Invoice Management on SAP S/4HANA appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Privacy in a Pandemic: What You Can (and Can't) Ask Employees

Dark Reading

Businesses struggle to strike a balance between workplace health and employees' privacy rights in the midst of a global health emergency.

Privacy 114
article thumbnail

Why trusted advise is vital in uncertain times

OpenText Information Management

There’s a danger that writing a blog focused on the current Coronavirus outbreak could be seen as a cynical marketing ploy. But I’m going to do it anyway as what we’re experiencing right now is unprecedented, and will have implications long after this outbreak is contained. Every day, more businesses and public institutions are facing … The post Why trusted advise is vital in uncertain times appeared first on OpenText Blogs.

article thumbnail

A Critical Internet Safeguard Is Running Out of Time

WIRED Threat Level

Shadowserver has helped keep the internet safe for 15 years. Unless it can raise funds fast, it's going to disappear.

IT 85
article thumbnail

What IG Pros Need to Know about the Coronavirus Outbreak via IG World

IG Guru

Check out an article I wrote for IG World regarding the Coronavirus for IG and Privacy professionals. The post What IG Pros Need to Know about the Coronavirus Outbreak via IG World appeared first on IG GURU.

Privacy 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

'Kill Chain': HBO's Election Security Doc Stresses Urgency

WIRED Threat Level

A new documentary makes crystal clear how little time remains to protect the 2020 election. .

article thumbnail

ForAllSecure's Response To COVID-19

ForAllSecure

COVID-19 is a global pandemic that affects everyone. We all need to work together, and I wanted to share with you some of the things ForAllSecure is doing. Our #1 priority is to protect the health and safety of our team, customers, communities, and the public. As of March 13, 2020 all ForAllSecure team members are working from home and practice social distancing until April 1st.

52
article thumbnail

VMware’s Tanzu can help plot a clear path to modernized applications

DXC Technology

For most enterprises, the digital journey feels like a rough cab ride through New York City at the height of construction season. In rush hour. The route from legacy estate to modern platform is filled with detours, road closures, emergency braking and many other surprises. And, everyone in the cab has a different opinion about […].

52