Wed.Apr 08, 2020

article thumbnail

More Zero-Day Exploits For Sale: Report

Data Breach Today

APT Groups Are Buying Exploits Rather Than Developing Them, FireEye Says Zero-day exploits are increasingly a commodity that advanced persistent threat groups can purchase and use to wage attacks, according to a report from security firm FireEye. The report says the number of attacks leveraging such exploits grew last year.

Sales 349
article thumbnail

NASA warns of a significant increase in cyber attacks during Coronavirus outbreak

Security Affairs

This week, NASA sent out a memo to its personnel warning of a significant increase in the cyberattacks during the Coronavirus outbreak. NASA sent out a memo to its personnel warning of a significant increase in cyberattacks on the agency while its employees are in smart-working due to the Coronavirus outbreak. According to the Agency, roughly 75 percent of its employees are currently working from home.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Have Targeted Linux Servers for Years: Report

Data Breach Today

BlackBerry Researchers Say Servers at Data Centers Worldwide Hit For nearly a decade, five hacking groups with apparent links to the Chinese government have targeted vulnerable Linux servers that make up the backend IT infrastructure of thousands of companies and organizations around the world, according to a research report from BlackBerry.

article thumbnail

Admin Essentials: Simplifying Chrome deployments on macOS

Jamf

Starting with version 10.19 of Jamf Pro, macOS administrators can easily deploy the Chrome Browser Cloud Management enrollment token with just a few clicks. See how.

Cloud 119
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

NASA: At-Home Workers Targeted by Hackers

Data Breach Today

Space Agency CIO Notes Malicious Actors Taking Advantage of COVID-19 Crisis With the COVID-19 pandemic forcing federal government employees and contractors to work from home, NASA is seeing an increase in hacker attacks targeting its newly mobile workforce, the space agency's CIO reports.

More Trending

article thumbnail

Microsoft Exchange: 355,000 Servers Lack Critical Patch

Data Breach Today

Fix Released in February Only Installed on 18 Percent of Servers, Rapid7 Warns Patch or perish alert: Less than 20 percent of vulnerable Microsoft Exchange servers have received a fix for a serious flaw that Microsoft first disclosed nearly two months ago, security firm Rapid7 warns. It also found a "concerning number" of Exchange 2007 servers, which Microsoft stopped supporting in 2017.

Security 317
article thumbnail

Secure Together: cyber attacks against hospitals and how to protect your home Wi-Fi

IT Governance

As we enter the third week of the UK’s lockdown (yes, it has only been that long), things are starting to take their toll. Organisations are shrinking, with staff off sick or furloughed, their defences are feeling the strain of a dispersed workforce, and cyber criminals are pouncing on increasingly stressed employees. Perhaps the only thing keeping us going is the knowledge that we’re all in this together.

Security 108
article thumbnail

Australia Considers How to Approach Pandemic Contacts Tracing

Data Breach Today

Even in a Health Crisis, Experts Say Privacy Is Paramount Australia is investigating how it can leverage data to slow the spread of COVID-19. This raises myriad privacy and security questions, including whether the public would embrace such a system and how long it should be in place.

Privacy 293
article thumbnail

Announcing OpenText Content Services Cloud Editions (CE) 20.2

OpenText Information Management

OpenText™ Content Services solutions help connect content to digital business – removing friction in processes, improving employee productivity, and simplifying governance and compliance. Content services technology will play a central role in organizations as they strive to rebound from the current global crisis as more cohesive, more stable and more productive entities.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Panel Discussion: Cybersecurity and Privacy in the 'New Now'

Data Breach Today

Edna Conway, Michelle Dennedy and Wendy Nather on Securing the Intersection of Life and Work The COVID-19 pandemic has dramatically changed how we live and work - for now. But will some of these changes last beyond the crisis? If so, what impact can we expect on cybersecurity and privacy? Thought leaders Edna Conway of Microsoft, Michelle Dennedy of DrumWave and Wendy Nather of Cisco share their views.

Privacy 261
article thumbnail

Antiquated Policy Wording: The Problem with “Must”

ARMA International

This is the second article of a four-part series on drafting requirements in IM policies, looking at the problems of using the words “must,” “may,” and “should.”(Read Part 1 here.). In traditional policy wording, writers use “must” to indicate that a requirement is mandatory, for example: Part 1. Part 2. Part 3. Part 4. When the fire alarm rings, employees must exit the building.

article thumbnail

FBI: COVID-19-Themed Business Email Compromise Scams Surge

Data Breach Today

Fraudsters Keep Trying to Turn Pandemic to Their Advantage Fraudsters are taking advantage of the uncertainty over the global COVID-19 pandemic to ramp-up business email compromise scams designed to steal money, the FBI and security researchers warn.

Security 189
article thumbnail

RSA-250 Factored

Schneier on Security

RSA-250 has been factored. This computation was performed with the Number Field Sieve algorithm, using the open-source CADO-NFS software. The total computation time was roughly 2700 core-years, using Intel Xeon Gold 6130 CPUs as a reference (2.1GHz): RSA-250 sieving: 2450 physical core-years. RSA-250 matrix: 250 physical core-years. The computation involved tens of thousands of machines worldwide, and was completed in a few months.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Maze ransomware gang discloses data from drug testing firm HMR

Security Affairs

The drug testing firm Hammersmith Medicines Research LTD (HMR), which performs live trials of Coronavirus vaccines, discloses a data breach. Hammersmith Medicines Research LTD (HMR), a London-based company that carries out clinical trials for new medicines and that is on standby to perform live trials of Coronavirus vaccines, has suffered a data breach.

article thumbnail

‘Fake Fingerprints’ Bypass Scanners with 3D Printing

Threatpost

New research used 3D printing technology to bypass fingerprint scanners, and tested it against Apple, Samsung and Microsoft mobile products.

IT 117
article thumbnail

After Adopting COVID-19 Lures, Sophisticated Groups Target Remote Workers

Dark Reading

While coronavirus-themed emails and files have been used as a lure for weeks, attackers now are searching for ways to actively target VPNs and remote workers to take advantage of weaker security.

Security 139
article thumbnail

NSO CEO claims Facebook wanted NSO surveillance tool to spy on users

Security Affairs

A new shocking revelation comes from the disputed from NSO Group and Facebook, NSO CEO claims Facebook tried to buy an Apple spying software in 2017. Reading this post you could have a better idea of the value of your privacy. In October 2019, WhatsApp sued the Israeli surveillance firm NSO Group accusing it of carrying out malicious attacks against its users.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Stay Home with Rocket BlueZone Web

Rocket Software

Around the globe, companies have sent their employees home to prioritize their safety during the COVID-19 outbreak. For many organizations, this means a greater burden on their IT systems and connectivity from remote workstations, home computers and mobile devices. . At Rocket Software, we know that your legacy systems live at the heart of your IT infrastructure—but now your users may be further away.

Access 97
article thumbnail

WhatsApp new policy limits forwarding of viral messages

Security Affairs

WhatsApp implements limitations on message forwarding to curb the spread of misinformation about the Coronavirus pandemic. WhatsApp implements a new policy on message forwarding to curb the spread of misinformation about the Coronavirus pandemic. With COVID19 outbreak the number of fake news that is spreading through social networks and instant messaging apps is growing exponentially.

article thumbnail

PowerPoint ‘Weakness’ Opens Door to Malicious Mouse-Over Attack

Threatpost

Novel hack allows an attacker to create a mouse-over in a PowerPoint file that triggers the installation of malware.

Security 109
article thumbnail

Announcing Cloud Editions (CE) for The Resilient Organization

OpenText Information Management

The launch of OpenText™ Cloud Editions (CE), the most comprehensive cloud release in our history, marks a new era for how OpenText customers will use, manage, deploy and experience information management software solutions. This launch takes place against a backdrop of unprecedented change and disruption. Today, everything about our world is changing faster than ever … The post Announcing Cloud Editions (CE) for The Resilient Organization appeared first on OpenText Blogs.

Cloud 83
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

WhatsApp Axes COVID-19 Mass Message Forwarding

Threatpost

Amid rampant misinformation, users of the Facebook-owned messaging platform can no longer send coronavirus messages to more than one user at a time.

Cloud 95
article thumbnail

Attachment Issues: Email as Records Management via CMS Wire

IG Guru

A good article one could share with colleagues on the pitfalls of email and how to better organize email. The post Attachment Issues: Email as Records Management via CMS Wire appeared first on IG GURU.

CMS 82
article thumbnail

Supporting the essential energy industry

OpenText Information Management

It’s an understatement to say that the world is living through a time of uncertainty. COVID-19 has forced us into a new normal that feels anything but familiar. We are coping, learning to go without, and making the best of what we have. But there are some essentials that, even with all that we are … The post Supporting the essential energy industry appeared first on OpenText Blogs.

79
article thumbnail

ThreatList: Skype-Themed Apps Hide a Raft of Malware

Threatpost

Hundreds of thousands of malware files are disguised as well-known social conferencing and collaboration apps.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Announcing OpenText Business Network 20.2

OpenText Information Management

OpenText™ Business Network 20.2 introduces many exciting features and innovations that improve productivity, business performance, and company resilience. Resilience refers to the capacity to recover quickly from unforeseen events, and preparedness to minimize the impact and ensure business continuity from future events. Business Network plays a central role to ensure business continuity and future disaster … The post Announcing OpenText Business Network 20.2 appeared first on OpenText Blo

IoT 70
article thumbnail

Clever Cryptography Could Protect Privacy in Covid-19 Contact-Tracing Apps

WIRED Threat Level

Researchers are racing to achieve the benefits of location-tracking without the surveillance.

Privacy 100
article thumbnail

Announcing OpenText OT2 20.2

OpenText Information Management

As remote work becomes more of a necessity, the need to keep teams connected, communicating, and collaborating is critical for success. Mastering remote work is all about finding the right tools. OpenText™ Core Applications and Services offer simple and secure SaaS applications that help extend existing on- or off-cloud platform investments, simply and securely.

Cloud 70