Fri.Sep 11, 2020

article thumbnail

Linux Malware Targets VoIP Networks to Steal Metadata

Data Breach Today

'CDRThief' Malware Appears Designed for Espionage or Fraud A recently uncovered Linux malware variant dubbed "CDRThief" is targeting VoIP networks to steal phone metadata, such as caller IP addresses, ESET reports. The malware appears to be designed for cyberespionage or fraud.

Metadata 330
article thumbnail

Adequacy

Data Protector

In data protection law, transfers of personal data must be safeguarded by written contracts between the parties. If the personal data is transferred from the EU to a country which the European Commission has not been recognised as having adequate data protection standards, special clauses, known as SCCs are usually inserted in these contracts. In July 2020, a decision by the European Court of Justice made it virtually impossible for companies to determine whether the SCCs must be supplemented by

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Election Hack Attacks Traced to Russia, China, Iran

Data Breach Today

Microsoft: Democratic and Republican Campaigns Targeted; Most Attacks Blocked Russian, Chinese and Iranian hackers are targeting organizations and individuals associated with the Republican and Democratic U.S. presidential campaigns, Microsoft reports, noting that the majority of the attacks appear to have been blocked.

284
284
article thumbnail

Threat actors target WordPress sites using vulnerable File Manager install

Security Affairs

Experts reported threat actors are increasingly targeting a recently addressed vulnerability in the WordPress plugin File Manager. Researchers from WordPress security company Defiant observed a surge in the number of attacks targeting a recently addressed vulnerability in the WordPress plugin File Manager. In early September, experts reported that hackers were actively exploiting a critical remote code execution vulnerability in the File Manager WordPress plugin that could be exploited by unau

Passwords 121
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Operators Behind ProLocker Ransomware Seek 'Big Game'

Data Breach Today

Group-IB: Attackers Now Using Qbot Trojan and Demand Huge Ransoms Since March, the operators behind ProLocker ransomware have focused on targeting large enterprise networks with ransomware demands sometimes exceeding $1 million, the security firm Group-IB reports. The gang has recently started to use the Qbot banking Trojan.

More Trending

article thumbnail

Ransomware Gangs Find Fresh Ways to Make Victims Pay

Data Breach Today

The latest edition of the ISMG Security Report analyzes how criminals keep finding new ways to make ransomware victims pay. Also featured: Preventing digital currency counterfeits; a proposed health data privacy framework.

article thumbnail

Office 365 Phishing Attack Leverages Real-Time Active Directory Validation

Threatpost

Attackers check the victims' Office 365 credentials in real time as they are typed into the phishing landing page, by using authentication APIs.

Phishing 122
article thumbnail

DOJ Says Russian Went Beyond Election Disinformation

Data Breach Today

Faces Wire Fraud Charge in Connection With Stolen Funds A Russian national who is allegedly part of an ongoing disinformation campaign targeting the upcoming U.S. election faces a charge of conspiracy to commit wire fraud, according to the U.S. Justice Department.

260
260
article thumbnail

APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins

Threatpost

The Russia-linked threat group is harvesting credentials for Microsoft's cloud offering, and targeting mainly election-related organizations.

Cloud 115
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Zeppelin Ransomware Floats Back Into View

Data Breach Today

Updated Trojan Downloader Helps Avoid Detection After a six-month hiatus, the Zeppelin ransomware variant returned in late August, according to Juniper Threats Labs. The malware now uses an updated Trojan downloader to better hide its activities from security tools.

article thumbnail

It’s No ‘Giggle’: Managing Expectations for Vulnerability Disclosure

Threatpost

Vulnerability-disclosure policies (VDPs), if done right, can help provide clarity and clear guidelines to both bug-hunters and vendors when it comes to going public with security flaws.

Security 100
article thumbnail

Tally of Those Affected by Blackbaud Hack Soars

Data Breach Today

Reports of Breaches, Including One Affecting 1 Million, Continue to Mount The number of individuals affected by the May ransomware attack on cloud-based software vendor Blackbaud continues to soar. And breach reports tied to the incident now total over 170, according to one estimate.

article thumbnail

Procurement Goals: We Don’t Need Any Toner

Ascent Innovations

Procurement Goals: We Don’t Need Any Toner. A former coworker and good buddy of mine is a Purchasing Manager for a mid-size manufacturing company. He always had a lot on his plate and more often than not, he would greet fellow colleagues to his office with “I can’t take it no mo’!”, “Please. Leave. Now.” or “I don’t want your _”. I leave you to fill in the blank.

Mining 98
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Bug-Reporting Blues: The Vulnerability Disclosure Challenge

Data Breach Today

Daniel Cuthbert Analyzes Frequent Coordinated Disclosure Hurdles Facing Researchers Independent bug hunters who find flaws in products and services often struggle to hand off their vulnerability report to someone in a position to get it fixed, says longtime security researcher Daniel Cuthbert. He describes steps organizations must take to be able to receive - and act on - bug reports.

Security 182
article thumbnail

3 Secure Moments: A Tranquil Trio of Security Haiku

Dark Reading

Placid poems to quiet the infosec pro's harried mind. (Or placid, by infosec standards.

Security 138
article thumbnail

Remembering 9/11 Attacks – A Moment of Silence

IG Guru

On 9/11/2001 the attacks on the World Trade Centers began. Let us never forget. The post Remembering 9/11 Attacks – A Moment of Silence appeared first on IG GURU.

98
article thumbnail

Weekly Update 208

Troy Hunt

The highlight of my week was absolutely getting the Shelly 1 units behind a couple of my light switches working as I'd always dreamed. It just opens up so many automation possibilities that I'm really excited about what I might do in the future with them now. When I get the place to a standard I'm happy with, I'll definitely do a good walkthrough and show how it all works.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

WordPress Plugin Flaw Allows Attackers to Forge Emails

Threatpost

The high-severity flaw in the Email Subscribers & Newsletters plugin by Icegram affects more than 100,000 WordPress websites.

Security 102
article thumbnail

The Best Privacy-Friendly Alternatives to Google Maps

WIRED Threat Level

Google Maps is arguably the easiest mapping service to use, but that doesn't mean it's the most secure.

Privacy 112
article thumbnail

Spear-Phishers Leverage Office 365 Ecosystem to Validate Stolen Creds in Real Time

Dark Reading

New attack technique uses Office 365 APIs to cross-check credentials against Azure Active Directory as victim types them in.

135
135
article thumbnail

Great news, now you can protect your Zoom account with 2FA

Security Affairs

Zoom has implemented two-factor authentication (2FA) to protect all user accounts against security breaches and other cyber attacks. Zoom has announced finally implemented the two-factor authentication (2FA) to protect all user accounts from unauthorized accesses. This is a great news due to the spike in the popularity of the communication software during the ongoing COVID-19 pandemic.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

APT Groups Set Sights on Linux Targets: Inside the Trend

Dark Reading

Researchers see more advanced attack groups creating tools and platforms to target Linux-based devices.

138
138
article thumbnail

New Podcast Series Focuses on the Careers of Women Leaders in Information Governance

ARMA International

Launched this July, The Women Leaders in Information Governance podcast series features the career stories of successful women in the IG profession. Lynn Molfetta , Information Governance Strategist | MC Bernstein Data and Katie Tall , Marketing Manager | Nyxeia are the creative force behind and builders of the series. Women leaders in IG in their own right, Molfetta and Tall designed the series to “inspire other women in similar fields to keep moving in a trajectory that shatters the glass ceil

article thumbnail

Ransomware Hits US District Court in Louisiana

Dark Reading

The ransomware attack has exposed internal documents from the court and knocked its website offline.

article thumbnail

How to select the best digital fax provider in 2020

OpenText Information Management

Fax has been the secure communications lifeblood of organizations across industries for decades, but the technology has evolved far beyond paper-driven machines. What is digital fax? Today’s digital fax solutions send documents from computers, mobile devices, and multifunction printers. Staff who receive a digital fax will have it delivered direct to their inbox, increasing security. … The post How to select the best digital fax provider in 2020 appeared first on OpenText Blogs.

Paper 62
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Fraud Prevention During the Pandemic

Dark Reading

When the economy is disrupted, fraud goes up, so let's not ignore the lessons we can learn from previous downturns.

79
article thumbnail

New Health Apps Section on HHS.gov/HIPAA via OCR Listserv

IG Guru

On September 2nd, 2020, the OCR launched a new feature on HHS.gov, titled Health Apps. This new webpage takes the place of OCR’s previous Health App Developer Portal, and is available at [link] The new webpage highlights OCR’s guidance on when and how the Health Insurance Portability and Accountability Act (HIPAA) regulations apply to mobile health applications, […].

article thumbnail

Micro Focus is A1 for Ease of Doing Business with…helping to rock the Net Promoter®

Micro Focus

How do we Measure easy to do business with? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are doing against the competition. This strategy means we can understand how we are performing with a high degree of statistical accuracy using a highly repeatable and scientific method. There are a number. View Article.

52