Mon.May 11, 2020

article thumbnail

Botnet Watch: Anubis Mobile Malware Gets New Features

Data Breach Today

Powerful Platform Can Spot If Victim Is Looking at the Screen Anubis, one of the most potent Android botnets, apparently is getting a refresh a year after its source code was leaked, security researchers say. The changes could help fraudsters more closely monitor activity on hacked devices.

Security 338
article thumbnail

Ransomware Hit ATM Giant Diebold Nixdorf

Krebs on Security

Diebold Nixdorf , a major provider of automatic teller machines (ATMs) and payment technology to banks and retailers, recently suffered a ransomware attack that disrupted some operations. The company says the hackers never touched its ATMs or customer networks, and that the intrusion only affected its corporate network. Canton, Ohio-based Diebold [ NYSE: DBD ] is currently the largest ATM provider in the United States, with an estimated 35 percent of the cash machine market worldwide.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking Group Offers Another 27 Million Records for Sale: Report

Data Breach Today

Shiny Hunters Claim to Have Data From Four Additional Breaches After offering three large databases of compromised user data for sale on the darnket last week, a hacking group known as Shiny Hunters now is trying to sell four additional databases of information apparently gathered from data breaches, security researchers say.

Sales 319
article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

Long before COVID-19, some notable behind-the-scenes forces were in motion to elevate cybersecurity to a much higher level. Related: How the Middle East has advanced mobile security regulations Over the past couple of decades, meaningful initiatives to improve online privacy and security, for both companies and consumers, incrementally gained traction in the tech sector and among key regulatory agencies across Europe, the Middle East and North America.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Pitney Bowes Battles Second Ransomware Attack

Data Breach Today

Mailing Equipment Manufacturer Suffered Another Attack Last October After suffering a ransomware attack last October that left several systems inaccessible, mailing equipment manufacturer Pitney Bowes reports that it recently blocked another ransomware attack before any data was encrypted and says there's "no evidence of further unauthorized access to our IT systems.

More Trending

article thumbnail

FTC Assessing Whether Its Health Data Breach Rule Is Stale

Data Breach Today

Commission Is Seeking Comments About Potential Changes to Notification Requirements The Federal Trade Commission is assessing whether to make changes to a seldom-used, decade-old health data breach notification rule for certain technology vendors that do not fall under the umbrella of HIPAA.

article thumbnail

ATM vendor Diebold Nixdorf suffered a Ransomware attack

Security Affairs

ATM maker Diebold Nixdorf discloses a ransomware attack, the good news is that the infection caused only “a limited IT systems outage.”. Diebold Nixdorf, one of the major automatic teller machines (ATMs) maker suffered a ransomware attack that caused only “a limited IT systems outage.” The company discloses the security breach but pointed out that the infection did not impact its ATMs or customer networks.

article thumbnail

The Fraud Implications of Ecommerce Surge During Pandemic

Data Breach Today

Jordan McKee of 451 Research Discusses Card Payment Trends The surge in ecommerce as a result of the COVID-19 pandemic means more payment card transactions - and more card fraud, says Jordan McKee of 451 Research, who discusses the latest trends.

213
213
article thumbnail

STAMINA, a new approach to malware detection by Microsoft, Intel

Security Affairs

Microsoft and Intel have devised a new approach to malware detection, dubbed STAMINA, that involves deep learning and the representation of malware as images. STAtic Malware-as-Image Network Analysis (STAMINA) is a new approach to malware detection proposed by Microsoft and Intel. The study is based on a previous work of Intel’s researchers on static malware classification through deep transfer learning, its deliverable is then applied to a real-world dataset provided by Microsoft that allowed t

Paper 93
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Future of Cloud Security

Data Breach Today

Forcepoint's Homayun Yaqub Previews New Virtual Roundtable Series What are some best practices for moving network security from the datacenter to the cloud? And what are the essentials of Secure Access Service Edge frameworks, and how can they be implemented? These are among the questions to be discussed in a new series of virtual roundtables hosted by Forcepoint and Homayun Yaqub.

Cloud 191
article thumbnail

Experts disclose security flaws in Oracle’s iPlanet Web Server

Security Affairs

Researchers discovered a set of issues impacting Oracle’s iPlanet Web Server that could result in sensitive data exposure and limited injection attacks. Researchers discovered two security flaws impacting Oracle’s iPlanet Web Server, tracked as CVE-2020-9315 and CVE-2020-9314, that could cause sensitive data exposure and limited injection attacks.

article thumbnail

Remote Workforce Security: The Role of 'Zero Trust'

Data Breach Today

Kevin Schwarz of Zscaler discusses the security implications of the "new normal" of employees working from home, including the role of a "zero trust" strategy.

Security 165
article thumbnail

Another California Data Privacy Law

Schneier on Security

The California Consumer Privacy Act is a lesson in missed opportunities. It was passed in haste, to stop a ballot initiative that would have been even more restrictive: In September 2017, Alastair Mactaggart and Mary Ross proposed a statewide ballot initiative entitled the "California Consumer Privacy Act." Ballot initiatives are a process under California law in which private citizens can propose legislation directly to voters, and pursuant to which such legislation can be enacted through voter

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The 'Death' of the Office

Data Breach Today

The modern office is a no longer relevant as a result of the work-from-home surge, says Nathan Howe of Zscaler, who discusses the implications for data security.

Security 147
article thumbnail

Sphinx Malware Returns to Riddle U.S. Targets

Threatpost

The banking trojan has upgraded and is seeing a resurgence on the back of coronavirus stimulus payment themes.

Security 103
article thumbnail

COVID-19 – Privacy and Cybersecurity: An Action Plan For Business

Data Matters

As the COVID-19 pandemic evolves, companies should not lose sight of the privacy, data protection and cybersecurity implications of the new and sudden digital reality. This Action Plan sets out some key issues and recommendations to consider as your business manages this rapidly developing dynamic and considers protocols to support the workforce and mitigate risk in a transition back to work.

Privacy 74
article thumbnail

Millions of Thunderbolt-Equipped Devices Open to ‘ThunderSpy’ Attack

Threatpost

If an attacker can get his hands on a Thunderbolt-equipped device for five minutes, he can launch a new data-stealing attack called "Thunderspy.".

Access 85
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Q&A Podcast with President of OpenText US Public Sector Karen Terrell

OpenText Information Management

In April 2020, OpenText™ announced the establishment of a new US Public Sector group within our organization. This group brings together selling teams across the product portfolio into one operational business unit, which will be led by industry veteran Karen Terrell, who joins as President of OpenText US Public Sector. “Karen Terrell is a world-class … The post Q&A Podcast with President of OpenText US Public Sector Karen Terrell appeared first on OpenText Blogs.

article thumbnail

Sodinokibi ransomware uses MS API to encrypt open and locked files

Security Affairs

Researchers warn of a new feature implemented in the Sodinokibi ransomware, the threat can now encrypt open and locked files. The Sodinokibi ransomware (REvil) continues to evolve, operators implemented a new feature that allows the malware to encrypt victim’s files, even if they are opened and locked by another process. Many applications lock files to prevent that they could be modified by two processes at the same time.

article thumbnail

Modeling your business processes to new ways of working

OpenText Information Management

The COVID-19 pandemic has dictated new measures for business standards, forcing businesses into flux due to social distancing and quarantine restrictions. This new way of working is significantly impacting workplaces and workforces globally, effecting production, distribution, delivery, and sales. This cause-effect relationship has now been propelled to the forefront, effectively changing current business strategies, business … The post Modeling your business processes to new ways of worki

Sales 68
article thumbnail

Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’

Threatpost

The infostealer has gone above and beyond in its new anti-analysis and obfuscation tactics.

IT 94
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Federal court launches snap investigation of its asylum seeker data breach

The Guardian Data Protection

Senior lawyer to examine how names of vulnerable people were published online The federal court has launched a snap investigation of how it potentially broke the law an estimated 400 times by revealing the names of asylum seekers on a public website. John McMillan, a senior lawyer, former commonwealth ombudsman, privacy commissioner and inspector general of intelligence, is conducting a review into how the names of some of the most vulnerable people to come before the court were published on the

article thumbnail

VMware is going to fix recent Salt issues in vROps

Security Affairs

VMware is going to address vulnerabilities impacting the vRealize Operations Manager (vROps) product, including two recently disclosed Salt issues. Recently, researchers from F-Secure disclosed a number of vulnerabilities in the “Salt” framework, including two issues that have been exploited by attackers to take over Salt installations. The two flaws, tracked as CVE-2020-11651 and CVE-2020-11652, are a directory traversal issue and an authentication bypass vulnerability respectively.

article thumbnail

Rule of Thumb: USB Killers Pose Real Threat

Dark Reading

They look just like a USB thumb drive, but instead of storing data, they can be used to destroy it and the device the data is saved on.

IT 101
article thumbnail

Legendary Help: Ensuring positive customer experiences amid a global pandemic

Rocket Software

Throughout the COVID-19 pandemic, hospitality has been one of the hardest hit industries in terms of lost jobs and revenue. With borders closing and stay-at-home orders in place, airlines were forced to suspend or reduce services and hotels experienced the highest number of job losses in the U.S. Overnight, the industry came to a standstill, forcing businesses to reconsider how they manage customer services and how they plan to move forward after the pandemic.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Thunderbolt Vulnerabilities Could Threaten Millions of PCs

Dark Reading

Attackers with physical access to targeted machines could exploit these flaws to access and copy data within minutes, researchers say.

Access 76
article thumbnail

CNIL Updates Data Protection Guidance for Employers in the Context of Lifting COVID-19 Containment Measures

Hunton Privacy

On May 7, 2020, the French Data Protection Authority (the “CNIL”) updated its previous guidance for employers relating to the processing of employee and visitor personal data in the context of the COVID-19 outbreak, in particular, in the context of lifting containment measures (the “Updated Guidance”). Some employers may consider implementing systematic body temperature checks at the entrance to their premises.

article thumbnail

Researchers Analyze Oracle WebLogic Flaw Under Attack

Dark Reading

Trend Micro researchers explain how attackers bypassed the patch for a deserialization vulnerability in the Oracle WebLogic Server.

72