Fri.Oct 02, 2020

article thumbnail

Attacks Aimed at Disrupting the Trickbot Botnet

Krebs on Security

Over the past 10 days, someone has been launching a series of coordinated attacks designed to disrupt Trickbot , an enormous collection of more than two million malware-infected Windows PCs that are constantly being harvested for financial data and are often used as the entry point for deploying ransomware within compromised organizations. A text snippet from one of the bogus Trickbot configuration updates.

article thumbnail

Thousands of Exchange Servers Still Lack Critical Patch

Data Breach Today

Rapid7 Researcher Calls Upatched Microsoft Servers 'Dangerous as Hell' Eight months after Microsoft issued a critical security update fixing a remote code execution flaw in Exchange Server, more than half of these mail servers in use remain vulnerable to exploits, according to the security firm Rapid7.

Security 298
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

My (data) fine is enormous

Data Protector

I am he as you are he as you are me and we are all together See how they stun the world and my mum, see how they fine I'm crying Sitting in the courthouse, waiting for the man to come Covid mask and goggles, stupid bloody Tuesday Man, you been a naughty boy, you set your cookies wrong I am the bad man, I spammed some good men My fine is enormous, goo goo g'joob Mister lead prosecutor sitting Pretty little lawyers in a row See how they drone “he should have known,” see how they fine I'm crying, I

156
156
article thumbnail

Treasury Dept. Warns Against Facilitating Ransom Payments

Data Breach Today

Banks, Cyber Insurers, Others Warned Against Playing a Role A Treasury Department advisory offers a reminder that financial institutions, cyber insurance firms and others that facilitate a ransom payment after a ransomware attack could face federal penalties. But the warning isn't necessarily a sign of a looming enforcement effort, some cybersecurity experts say.

Insurance 290
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hacking Grindr Accounts with Copy and Paste

Troy Hunt

Sexuality, relationships and online dating are all rather personal things. They're aspects of our lives that many people choose to keep private or at the very least, share only with people of our choosing. Grindr is "The World's Largest Social Networking App for Gay, Bi, Trans, and Queer People" which for many people, makes it particularly sensitive.

Passwords 145

More Trending

article thumbnail

U.S. Department of the Treasury Issues Advisory Warning that Ransomware Payments May Violate OFAC Sanctions

Hunton Privacy

On October 1, 2020, the U.S. Department of the Treasury’s Office of Foreign Assets Control (“OFAC”) issued an advisory alerting companies of potential sanctions risks related to facilitating ransomware payments. The five-page advisory states that ransomware victims who pay ransom amounts, and third-party companies that negotiate or pay ransom on their behalf, “not only encourage future ransomware payment demands but also may risk violating OFAC regulations.”.

article thumbnail

'InterPlanetary Storm' Botnet Infecting Mac, Android Devices

Data Breach Today

Researchers Describe How Malware Is Targeting Broader Range of Devices A recently updated version of the "InterPlanetary Storm" botnet is now infecting Mac and Android devices as well as those running Windows and Linux, researchers at Barracuda Networks say.

264
264
article thumbnail

COVID-19 and Acedia

Schneier on Security

Note: This isn’t my usual essay topic. Still, I want to put it on my blog. Six months into the pandemic with no end in sight, many of us have been feeling a sense of unease that goes beyond anxiety or distress. It’s a nameless feeling that somehow makes it hard to go on with even the nice things we regularly do. What’s blocking our everyday routines is not the anxiety of lockdown adjustments, or the worries about ourselves and our loved ones — real though those worries ar

Education 139
article thumbnail

Unable to Throw the Book at Snowden, US Grabs Royalties

Data Breach Today

$5.2 Million Judgment Sees NDA Violations Get Added to Snowden's 'Permanent Record' Death via a thousand paper cuts? The U.S. government hasn't been able to arrange a domestic court date for whistleblower Edward Snowden, but via the courts, it's successfully been awarded $5.2 million in his book royalties and revenue from speaking engagements.

Paper 246
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Strangest Election Scenario Runs Through Georgia

WIRED Threat Level

There’s a small but real possibility that we won’t know which party controls the Senate until 2021, thanks to a special election and a unique state requirement.

Security 140
article thumbnail

XDSpy APT remained undetected since at least 2011

Security Affairs

Researchers from ESET uncovered the activity of a new APT group, tracked as XDSpy, that has been active since at least 2011. XDSpy is the name used by ESET researchers to track a nation-state actor that has been active since at least 2011. The APT group, recently discovered by ESET, targeted government and private companies in Belarus, Moldova, Russia, Serbia, and Ukraine, including militaries and Ministries of Foreign Affairs.

Military 130
article thumbnail

Weekly Update 211

Troy Hunt

This week there's a lot of connected things: connected shoes, connected garage camera and connected GoPro. And then there's Scott's Grindr account. Awkward. Actually, since recording this weekly update the details of the issue have now been released so I'll talk about that in more detail next week. This week there's all the above and, on a more personal note, my relationship with Charlotte.

Phishing 119
article thumbnail

Running a resilient EIM platform

OpenText Information Management

Information is key for businesses to operate and succeed, making it imperative that the Enterprise Informant Management platforms they rely on are robust, reliable, and high performing. Over the last 23 years, I’ve been involved with designing and running many mission critical systems for corporate IT and the software vendor side across roles in Architecture, … The post Running a resilient EIM platform appeared first on OpenText Blogs.

IT 111
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Years-Long ‘SilentFade’ Attack Drained Facebook Victims of $4M

Threatpost

Facebook detailed an ad-fraud cyberattack that's been ongoing since 2016, stealing Facebook credentials and browser cookies.

Security 128
article thumbnail

Name That Toon: Castle in the Sky

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

117
117
article thumbnail

European Commission to Issue New Standard Contractual Clauses by End of 2020

Data Matters

In the wake of the recent Court of Justice of the European Union’s decision in Schrems II , the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs met in early September to discuss the long-awaited revision of Standard Contractual Clauses ( SCCs ). During the meeting, Commissioner for Justice Didier Reynders expressed hope that revised SCCs would be finalised by the end of 2020.

Privacy 92
article thumbnail

Researchers Adapt AI With Aim to Identify Anonymous Authors

Dark Reading

At Black Hat Asia, artificial intelligence and cybersecurity researchers use neural networks to attempt to identify authors, but accuracy is still wanting.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

IPStorm botnet evolves to infect Android, Linux, and Mac devices

Security Affairs

Researchers from Intezer reported that the IPStorm botnet has evolved to infect other operating systems, including Android, Linux, and Mac devices. The IPStorm botnet was first uncovered in May 2019 while targeting Windows systems, not experts from Intezer reported that the bot evolved to infect other platforms, including Android, Linux, and Mac devices.

Honeypots 125
article thumbnail

Researchers Mixed on Sanctions for Ransomware Negotiators

Threatpost

Financial institutions, cyber-insurance firms, and security firms have all been put on notice by the U.S. Department of the Treasury.

article thumbnail

Why “Legacy” Shouldn’t Be a Bad Word

Rocket Software

I used to avoid the word “legacy” to describe the stalwart IBM Z, IBM i and other platforms that have long been in their golden years. I called them “exotic” systems, as though that made them more dramatic, like a special type of coffee bean. “Legacy” felt negative. . I searched for a different word. Something that would capture the truth of these systems: Historical – that felt just as dated.

article thumbnail

Egregor Ransomware Threatens ‘Mass-Media’ Release of Corporate Data

Threatpost

The newly discovered ransomware is hitting companies worldwide, including the GEFCO global logistics company.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Biometric Data Collection Demands Scrutiny of Privacy Law

Dark Reading

An IT lawyer digs into the implications of collecting biometric data, why it can't be anonymized, and what nations are doing about it.

article thumbnail

305 CVEs and Counting: Bug-Hunting Stories From a Security Engineer

Threatpost

Larry Cashdollar, senior security response engineer at Akamai, talks about the craziest stories he's faced, reporting CVEs since 1994.

article thumbnail

Free Webinar: Thinking of Advancing Your Career in Records Management? by Zasio on Oct 15th @ 9am MT

IG Guru

The post Free Webinar: Thinking of Advancing Your Career in Records Management? by Zasio on Oct 15th @ 9am MT appeared first on IG GURU.

article thumbnail

LatAm Banking Trojans Collaborate in Never-Before-Seen Effort

Threatpost

Eleven different malware families are coordinating on distribution, features, geo-targeting and more.

Security 105
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Modern data collection imperatives in today’s remote reality

OpenText Information Management

Modern data collection for eDiscovery has always been demanding. Today, the challenges are exacerbated by a number of trends, including an increasingly remote workforce. By the end of 2021, the percent of employees that will be working remotely is forecast to grow to 25% to 30%. While remote activities associated with data collection are nothing … The post Modern data collection imperatives in today’s remote reality appeared first on OpenText Blogs.

article thumbnail

Facebook Tightens Restrictions on Election Ads

Adam Levin

Facebook has announced that it will place greater restrictions on advertisements for social and political issues ahead of the upcoming U.S. presidential election. The company announced the new restrictions on its corporate blog earlier this week, which prohibit the following content: Ads discouraging participation in the voting process. Ads seeking to delegitimize lawful voting practices as fraudulent, illegal, or corrupt.

Risk 62
article thumbnail

The seven critical requirements for modern data collection

OpenText Information Management

In an earlier blog, I discussed the trends necessitating a modern approach to data collections to support early case assessment, investigations and eDiscovery: an increasingly remote workforce, new sources of electronically stored information (ESI), including ephemeral data, and a rise in regulatory compliance mandates and litigation, to name a few.