Fri.Sep 11, 2020

article thumbnail

Linux Malware Targets VoIP Networks to Steal Metadata

Data Breach Today

'CDRThief' Malware Appears Designed for Espionage or Fraud A recently uncovered Linux malware variant dubbed "CDRThief" is targeting VoIP networks to steal phone metadata, such as caller IP addresses, ESET reports. The malware appears to be designed for cyberespionage or fraud.

Metadata 332
article thumbnail

Adequacy

Data Protector

In data protection law, transfers of personal data must be safeguarded by written contracts between the parties. If the personal data is transferred from the EU to a country which the European Commission has not been recognised as having adequate data protection standards, special clauses, known as SCCs are usually inserted in these contracts. In July 2020, a decision by the European Court of Justice made it virtually impossible for companies to determine whether the SCCs must be supplemented by

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Operators Behind ProLocker Ransomware Seek 'Big Game'

Data Breach Today

Group-IB: Attackers Now Using Qbot Trojan and Demand Huge Ransoms Since March, the operators behind ProLocker ransomware have focused on targeting large enterprise networks with ransomware demands sometimes exceeding $1 million, the security firm Group-IB reports. The gang has recently started to use the Qbot banking Trojan.

article thumbnail

Threat actors target WordPress sites using vulnerable File Manager install

Security Affairs

Experts reported threat actors are increasingly targeting a recently addressed vulnerability in the WordPress plugin File Manager. Researchers from WordPress security company Defiant observed a surge in the number of attacks targeting a recently addressed vulnerability in the WordPress plugin File Manager. In early September, experts reported that hackers were actively exploiting a critical remote code execution vulnerability in the File Manager WordPress plugin that could be exploited by unau

Passwords 119
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ransomware Gangs Find Fresh Ways to Make Victims Pay

Data Breach Today

The latest edition of the ISMG Security Report analyzes how criminals keep finding new ways to make ransomware victims pay. Also featured: Preventing digital currency counterfeits; a proposed health data privacy framework.

More Trending

article thumbnail

DOJ Says Russian Went Beyond Election Disinformation

Data Breach Today

Faces Wire Fraud Charge in Connection With Stolen Funds A Russian national who is allegedly part of an ongoing disinformation campaign targeting the upcoming U.S. election faces a charge of conspiracy to commit wire fraud, according to the U.S. Justice Department.

261
261
article thumbnail

APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins

Threatpost

The Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targeting mainly election-related organizations.

Cloud 115
article thumbnail

Zeppelin Ransomware Floats Back Into View

Data Breach Today

Updated Trojan Downloader Helps Avoid Detection After a six-month hiatus, the Zeppelin ransomware variant returned in late August, according to Juniper Threats Labs. The malware now uses an updated Trojan downloader to better hide its activities from security tools.

article thumbnail

It’s No ‘Giggle’: Managing Expectations for Vulnerability Disclosure

Threatpost

Vulnerability-disclosure policies (VDPs), if done right, can help provide clarity and clear guidelines to both bug-hunters and vendors when it comes to going public with security flaws.

Security 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tally of Those Affected by Blackbaud Hack Soars

Data Breach Today

Reports of Breaches, Including One Affecting 1 Million, Continue to Mount The number of individuals affected by the May ransomware attack on cloud-based software vendor Blackbaud continues to soar. And breach reports tied to the incident now total over 170, according to one estimate.

article thumbnail

Procurement Goals: We Don’t Need Any Toner

Ascent Innovations

Procurement Goals: We Don’t Need Any Toner. A former coworker and good buddy of mine is a Purchasing Manager for a mid-size manufacturing company. He always had a lot on his plate and more often than not, he would greet fellow colleagues to his office with “I can’t take it no mo’!”, “Please. Leave. Now.” or “I don’t want your _”. I leave you to fill in the blank.

Mining 98
article thumbnail

Bug-Reporting Blues: The Vulnerability Disclosure Challenge

Data Breach Today

Daniel Cuthbert Analyzes Frequent Coordinated Disclosure Hurdles Facing Researchers Independent bug hunters who find flaws in products and services often struggle to hand off their vulnerability report to someone in a position to get it fixed, says longtime security researcher Daniel Cuthbert. He describes steps organizations must take to be able to receive - and act on - bug reports.

Security 185
article thumbnail

3 Secure Moments: A Tranquil Trio of Security Haiku

Dark Reading

Placid poems to quiet the infosec pro's harried mind. (Or placid, by infosec standards.

Security 138
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Remembering 9/11 Attacks – A Moment of Silence

IG Guru

On 9/11/2001 the attacks on the World Trade Centers began. Let us never forget. The post Remembering 9/11 Attacks – A Moment of Silence appeared first on IG GURU.

98
article thumbnail

Great news, now you can protect your Zoom account with 2FA

Security Affairs

Zoom has implemented two-factor authentication (2FA) to protect all user accounts against security breaches and other cyber attacks. Zoom has announced finally implemented the two-factor authentication (2FA) to protect all user accounts from unauthorized accesses. This is a great news due to the spike in the popularity of the communication software during the ongoing COVID-19 pandemic.

article thumbnail

The Best Privacy-Friendly Alternatives to Google Maps

WIRED Threat Level

Google Maps is arguably the easiest mapping service to use, but that doesn't mean it's the most secure.

Privacy 116
article thumbnail

WordPress Plugin Flaw Allows Attackers to Forge Emails

Threatpost

The high-severity flaw in the Email Subscribers & Newsletters plugin by Icegram affects more than 100,000 WordPress websites.

Security 102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly Update 208

Troy Hunt

The highlight of my week was absolutely getting the Shelly 1 units behind a couple of my light switches working as I'd always dreamed. It just opens up so many automation possibilities that I'm really excited about what I might do in the future with them now. When I get the place to a standard I'm happy with, I'll definitely do a good walkthrough and show how it all works.

article thumbnail

Spear-Phishers Leverage Office 365 Ecosystem to Validate Stolen Creds in Real Time

Dark Reading

New attack technique uses Office 365 APIs to cross-check credentials against Azure Active Directory as victim types them in.

135
135
article thumbnail

New Podcast Series Focuses on the Careers of Women Leaders in Information Governance

ARMA International

Launched this July, The Women Leaders in Information Governance podcast series features the career stories of successful women in the IG profession. Lynn Molfetta , Information Governance Strategist | MC Bernstein Data and Katie Tall , Marketing Manager | Nyxeia are the creative force behind and builders of the series. Women leaders in IG in their own right, Molfetta and Tall designed the series to “inspire other women in similar fields to keep moving in a trajectory that shatters the glass ceil

article thumbnail

APT Groups Set Sights on Linux Targets: Inside the Trend

Dark Reading

Researchers see more advanced attack groups creating tools and platforms to target Linux-based devices.

138
138
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to select the best digital fax provider in 2020

OpenText Information Management

Fax has been the secure communications lifeblood of organizations across industries for decades, but the technology has evolved far beyond paper-driven machines. What is digital fax? Today’s digital fax solutions send documents from computers, mobile devices, and multifunction printers. Staff who receive a digital fax will have it delivered direct to their inbox, increasing security. … The post How to select the best digital fax provider in 2020 appeared first on OpenText Blogs.

Paper 62
article thumbnail

Ransomware Hits US District Court in Louisiana

Dark Reading

The ransomware attack has exposed internal documents from the court and knocked its website offline.

article thumbnail

New Health Apps Section on HHS.gov/HIPAA via OCR Listserv

IG Guru

On September 2nd, 2020, the OCR launched a new feature on HHS.gov, titled Health Apps. This new webpage takes the place of OCR’s previous Health App Developer Portal, and is available at [link] The new webpage highlights OCR’s guidance on when and how the Health Insurance Portability and Accountability Act (HIPAA) regulations apply to mobile health applications, […].

article thumbnail

Fraud Prevention During the Pandemic

Dark Reading

When the economy is disrupted, fraud goes up, so let's not ignore the lessons we can learn from previous downturns.

79
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Micro Focus is A1 for Ease of Doing Business with…helping to rock the Net Promoter®

Micro Focus

How do we Measure easy to do business with? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are doing against the competition. This strategy means we can understand how we are performing with a high degree of statistical accuracy using a highly repeatable and scientific method. There are a number. View Article.

52
article thumbnail

Why Does Data Accuracy Matter?

Import.IO

September 23, 1999 is a day that will live in data accuracy infamy. It was on that date that the $125M NASA Mars Climate Orbiter lost communication with mission control as it approached its operating orbit around the red planet. Engineers quickly surmised that the spacecraft burned up in the. The post Why Does Data Accuracy Matter? appeared first on Import.io.

article thumbnail

Rocket.Build 2020: Virtual Event Expands Possibilities

Rocket Software

Rocket.Build is an annual hackathon event that is meant to engage Rocketeers, partners, customers, and the community to create real-world applicable solutions. For me, the event even predates my knowledge of Rocket Software. I participated in the community build a few years ago, and it’s what introduced me to the company. Now that I’m a Rocketeer, I find the event increasingly valuable.

IT 52