Thu.Oct 28, 2021

article thumbnail

GUEST ESSAY: Tapping Bitcoin’s security — to put a stop to ‘51% attacks’ of cryptocurrency exchanges

The Last Watchdog

Over the past five years, cryptocurrency exchanges have been the target of increasingly damaging “ 51% attacks ” resulting in the theft of over $30 million worth of cryptocurrency to date. Related: Wildland restores control of data to individuals. However, these attacks aren’t due to exchange security flaws; malicious actors are exploiting the underlying consensus protocols of blockchains themselves.

article thumbnail

PHI Stolen in Practice Management Firm's Ransomware Attack

Data Breach Today

Incident Is Among Latest Involving Healthcare Supply Chain Vendors A ransomware attack on a medical practice management services firm that included the theft of files containing patient information is among the latest security incidents involving similar third-party vendors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zales.com Leaked Customer Data, Just Like Sister Firms Jared, Kay Jewelers Did in 2018

Krebs on Security

In December 2018, bling vendor Signet Jewelers fixed a weakness in their Kay Jewelers and Jared websites that exposed the order information for all of their online customers. This week, Signet subsidiary Zales.com updated its website to remediate a nearly identical customer data exposure. Last week, KrebsOnSecurity heard from a reader who was browsing Zales.com and suddenly found they were looking at someone else’s order information on the website, including their name, billing address, sh

Phishing 240
article thumbnail

Lazarus Adds Supply Chain Attack to List of Capabilities

Data Breach Today

Group Uses MATA Framework to Target Defense Orgs, Researchers Say North Korean advanced persistent threat group Lazarus - aka Hidden Cobra - is developing supply chain attack capabilities using its multiplatform malware framework, MATA, for cyberespionage goals, according to researchers from Kaspersky.

IT 276
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

More Russian SVR Supply-Chain Attacks

Schneier on Security

Microsoft is reporting that the same attacker that was behind the SolarWinds breach — the Russian SVR, which Microsoft is calling Nobelium — is continuing with similar supply-chain attacks: Nobelium has been attempting to replicate the approach it has used in past attacks by targeting organizations integral to the global IT supply chain.

Cloud 120

More Trending

article thumbnail

German investigators identify crypto millionaire behind REvil operations

Security Affairs

German authorities have identified a Russian man named Nikolay K. who is suspected to be a prominent member of the REvil ransomware gang. REvil ransomware gang is one of the most successful ransomware operations, the group and its affiliated hit hundreds of organizations worldwide. On July 2, the gang hit the Kaseya cloud-based MSP platform impacting MSPs and their customers, it asked $70 million worth of Bitcoin for decrypting all impacted systems.

article thumbnail

Hackers Claim 400GB of Data Stolen From Thai Hotel Chain

Data Breach Today

Desorden Group Attacks Thailand's Central Group of Companies The Desorden hacker group, previously known for its exploits against computer giant Acer and a Singaporean employment agency, has now targeted Thai luxury hotel chain Centara Hotels & Resorts. The group claims to have stolen 400GB of data from the hotel chain's network.

IT 273
article thumbnail

Choosing a Managed Security Service: MDR, Firewalls & SIEM

eSecurity Planet

Many large enterprises struggle to stay on top of serious cyber threats like ransomware. For a small business, the challenge can seem overwhelming. Between the growing threats and a shortage of cybersecurity talent to defend against them, many businesses have turned to managed security service providers (MSSPs) for help, with services like managed SIEMs , managed firewalls and managed detection and response (MDR).

Security 111
article thumbnail

Microsoft found Shrootless bug in macOS that could bypass System Integrity Protection

Security Affairs

Microsoft finds a flaw in macOS, dubbed Shrootless ( CVE-2021-30892 ), that can allow attackers to bypass System Integrity Protection (SIP). Microsoft discovered a vulnerability in macOS, dubbed Shrootless ( CVE-2021-30892 ), that can allow attackers to bypass System Integrity Protection (SIP) and perform malicious activities, such as gaining root privileges and installing rootkits on vulnerable devices.

Security 112
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Fireside Chat: Earning Public Trust Amid Heightened Tech Regulation

Data Matters

On October 19, 2021, Sidley partner Alan Raul engaged in a fireside chat with Julie Brill, Corporate Vice President, Chief Privacy Officer, and Deputy General Counsel of Microsoft at the Reuters Events’ Legal Leaders 2021 Conference. The discussion covered topics such as how organizations can be equipped to comply with data regulations, preparing for a new wave of privacy and data protection regulations, and perspectives on global data protection regulation abroad and in the U.S.

Privacy 88
article thumbnail

Over 1 million WordPress sites affected by OptinMonster plugin flaws

Security Affairs

A vulnerability in the popular the OptinMonster plugin allows unauthorized API access and sensitive information disclosure. A high-severity vulnerability (CVE-2021-39341) in The OptinMonster plugin can allow unauthorized API access and sensitive information disclosure on roughly a million WordPress sites. The flaw was discovered by Wordfence researcher Chloe Chamberland on September 28, 2021, and the development team behind the plugin addressed it on October 7, 2021.

Access 111
article thumbnail

Spotlight: Your IoT Risk Is Bigger Than You Think. (And What To Do About It.)

The Security Ledger

In this Spotlight edition of the podcast, we’re joined by Curtis Simpson, the Chief Information Security Officer at Armis. Curtis and I discuss the growing cyber risks posed by Internet of Things devices within enterprise networks. IoT and OT (operation technology) deployments are growing and pose challenges to organizations that are still. Read the whole entry. » Click the icon below to listen.

IoT 98
article thumbnail

Suspected REvil Gang Insider Identified

Threatpost

German investigators have identified a deep-pocketed, big-spending Russian billionaire whom they suspect of being a core member of the REvil ransomware gang.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

AbstractEmu, a new Android malware with rooting capabilities

Security Affairs

AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security researchers at the Lookout Threat Labs have discovered a new Android malware, dubbed AbstractEmu , with rooting capabilities that is distributed on Google Play and prominent third-party stores (i.e. Amazon Appstore and the Samsung Galaxy Store).

article thumbnail

CrowdStrike vs Symantec: Top EDR Solutions Compared

eSecurity Planet

Buyers looking for an endpoint security solution often compare CrowdStrike and Symantec, and while both vendors made our top endpoint detection and response (EDR) product list , they’re very different security products that will likely appeal to buyers with different goals in mind. Here’s a look at both EDR products, how they compare, and their ideal use cases.

article thumbnail

All Sectors Are Now Prey as Cyber Threats Expand Targeting

Threatpost

Aamir Lakhani, security researcher at Fortinet, says no sector is off limits these days: It's time for everyone to strengthen the kill chain.

Security 101
article thumbnail

You've Just Been Ransomed. Now What?

Dark Reading

Six crucial steps executives and IT teams should be prepared to take immediately after a ransomware attack.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Grief Ransomware Targets NRA

Threatpost

Grief, a ransomware group with ties to Russia-based Evil Corp, claims to have stolen data from the gun-rights group and has posted files on its dark web site. .

article thumbnail

SEO Poisoning Used to Distribute Ransomware

Dark Reading

This tactic - used to distribute REvil ransomware and the SolarMarker backdoor - is part of a broader increase in such attacks in recent months, researchers say.

article thumbnail

Wslink, a previously undescribed loader for Windows binaries

Security Affairs

ESET researchers discovered a previously undescribed loader for Windows binaries, tracked as Wslink, that runs as a server and executes modules in memory. ESET researchers discovered Wslink , a previously undescribed loader for Windows binaries that, unlike similar loaders, runs as a server and executes modules in memory. The name Wslink comes from one of its DLLs.

article thumbnail

This Cybersecurity Awareness Month, Implement Multi-Factor Authentication

Rocket Software

The White House has proclaimed October Cybersecurity Awareness Month, promoting efforts by the Cybersecurity and Infrastructure Security Agency (CISA) to encourage the public to be “Cyber Smart” and stay safe online. As stories of malicious cyber actors, such as ransomware attacks, continue to make headlines and disrupt businesses across industries, the importance of cybersecurity cannot be overstated. .

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

3 Security Lessons Learned From the Kaseya Ransomware Attack

Dark Reading

Organizations can better prepare themselves and their customers for these attacks with some strategies to identify threats before they become a widespread issue.

article thumbnail

Crooks steal $130 million worth of cryptocurrency assets from Cream Finance

Security Affairs

Threat actors have stolen $130 million worth of cryptocurrency assets from the Cream Finance decentralized finance (DeFi) platform. C.R.E.A.M. Finance is a decentralized lending protocol for individuals, institutions and protocols to access financial services. It promises earnings to users who are passively holding ETH or wBTC. Threat actors have stolen $130 million worth of cryptocurrency assets from the decentralized finance (DeFi) platform.

article thumbnail

ARMA International Educational Foundation releases Peer Review Journal around IG Topics

IG Guru

The AIEF issues Peer Review Journal Volume 1 covering: Potential Risks that US Businesses Face with Collection and Retention of Employee Medical Data throughout the COVID-19 Pandemic “Never Waste a Crisis”: A Holistic Approach to Privacy, Transparency and Secrecy for Records Resilience The Importance of AI and Semantic Approaches to Information Retrieval for COVID-19 Literature […].

article thumbnail

US to Create Diplomatic Bureau to Lead Cybersecurity Policy

Dark Reading

As part of its modernization initiative, the Department of State will increase its IT budget by 50% and add a new bureau to lead cybersecurity and digital policy.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Trick or Treat: The Choice is Yours with Multifactor Authentication

Thales Cloud Protection & Licensing

Trick or Treat: The Choice is Yours with Multifactor Authentication. divya. Fri, 10/29/2021 - 05:29. Whether you want the ‘trick’ of a malevolent threat actor infiltrating your network by exploiting a compromised password or the ‘treat’ from the peace of mind associated with multifactor authentication, the choice is yours. Multifactor authentication requires users to take an extra step to verify who they are by providing two or more distinct categories of evidence.

article thumbnail

6 Ways to Rewrite the Impossible Job Description

Dark Reading

It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.

article thumbnail

The ‘low code revolution’ is improving service delivery in Public Sector

OpenText Information Management

In 2020, five years worth of digital adoption for citizens and businesses happened in about eight weeks. Government agencies worldwide were able to pivot to 100% digital services in a matter of days, a level of public-sector agility and innovation never seen before. As we emerge from the pandemic, how do governments build upon this … The post The ‘low code revolution’ is improving service delivery in Public Sector appeared first on OpenText Blogs.