Wed.Oct 14, 2020

article thumbnail

Norway Alleges Russia Orchestrated Parliament Email Hack

Data Breach Today

Foreign Minister: 'It Is Our Assessment That Russia Is Behind This Activity' Norway this week accused Russia of hacking the email system of the country's parliament, known as the Storting, in September. Russia calls the accusation "unacceptable.

IT 237
article thumbnail

Google researcher found BleedingTooth flaws in Linux Bluetooth

Security Affairs

Google security researcher discovered Bluetooth vulnerabilities (BleedingTooth) in the Linux kernel that could allow zero-click attacks. Andy Nguyen, a Google security researcher, has found Bluetooth vulnerabilities, referred to as BleedingTooth, in the Linux kernel that could be exploited by attackers to run arbitrary code or access sensitive information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More BEC Criminal Gangs Are Based in US

Data Breach Today

Agari: US Now Second to Nigeria for Business Email Compromise Fraudsters Business email compromise scams continue to proliferate around the globe, with the U.S. now second only to Nigeria as a home base for the cybercriminal organizations waging the campaigns, according to a study by the security firm Agari.

Security 301
article thumbnail

The G7 expresses its concern over ransomware attacks

Security Affairs

G7 Finance ministers expressed concern on Tuesday over the rise in ransomware attacks during the Covid-19 pandemic, including some involving cryptocurrencies. Finance ministers from the G7 industrialized countries expressed concern on Tuesday over the rise in malicious cyberattacks, especially ransomware attacks, in the midst of the Covid-19 pandemic.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cybersecurity Advice for the COVID-19 Era

Data Breach Today

CISA Adviser Joshua Corman Discusses Essential Steps Many healthcare organizations have under-resourced security teams, putting them at higher risk for cyber incidents during the COVID-19 pandemic that could result in patient harm, warns cybersecurity expert Joshua Corman.

More Trending

article thumbnail

New York Calls for Federal Regulation of Social Media

Data Breach Today

State Report Blames Twitter's Lack of Security for July Hack A report by New York state investigators calls for Twitter and other social media companies to implement greater cybersecurity measures and advocates greater federal regulatory oversight of social media companies to help prevent the misuse of their platforms.

article thumbnail

What's Really Happening in Infosec Hiring Now?

Dark Reading

As the pandemic continues, security teams still need help they can't get. But the "skills shortage" is only part of the story.

Security 125
article thumbnail

Talos experts disclosed unpatched DoS flaws in Allen-Bradley adapter

Security Affairs

Cisco Talos found several remotely exploitable denial-of-service (DoS) vulnerabilities in a Rockwell Automation industrial automation product. A researcher from Cisco Talos released technical details of several remotely exploitable denial-of-service (DoS) vulnerabilities in an industrial automation product made by Rockwell Automation. The product affected by the flaw is the Allen-Bradley 1794-AENT Flex I/O series B adapter, the issue resides in the Ethernet/IP request path port/data/logical segm

article thumbnail

Travelex, Other Orgs Face DDoS Threats as Extortion Campaign Rages On

Threatpost

Organizations worldwide – including Travelex – have been sent letters threatening to launch DDoS attacks on their network unless a $230K ransom is paid.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cyberspace Solarium Commission (CSC) report deserves more attention

IG Guru

Check out the report the commission made in March of 2020 and their website here. The post Cyberspace Solarium Commission (CSC) report deserves more attention appeared first on IG GURU.

article thumbnail

NIST Quantum Cryptography Program Nears Completion

Dark Reading

The National Institute of Standards and Technology's first post-quantum cryptography standard will address key issues, approaches, an arms race, and the technology's uncertain future.

102
102
article thumbnail

Critical SonicWall VPN Portal Bug Allows DoS, Worming RCE

Threatpost

The CVE-2020-5135 stack-based buffer overflow security vulnerability is trivial to exploit, without logging in.

Security 122
article thumbnail

The big box project – saving money with an inactive records strategy

TAB OnRecord

Inactive records may not be the first place companies look for cost savings, but the right records strategy can deliver a significant impact on the bottom line. Read More. The post The big box project – saving money with an inactive records strategy appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

BEC Attacks: Nigeria No Longer the Epicenter as Losses Top $26B

Threatpost

BEC fraudsters now have bases of operation across at least 39 counties and are responsible for $26 billion in losses annually -- and growing.

Security 105
article thumbnail

Assuring Business Continuity by Reducing Malware Dwell Time

Dark Reading

Here's how CISOs and IT security operations teams can best address key challenges to network monitoring that could increase malware dwell time.

Security 104
article thumbnail

Intel Adds Memory Encryption, Firmware Security to Ice Lake Chips

Threatpost

Intel's addition of memory encryption to its upcoming 3rd generation Xeon Scalable processors matches AMD's Secure Memory Encryption (SME) feature.

article thumbnail

London Borough of Hackney Investigates 'Serious' Cyberattack

Dark Reading

London's Hackney Council says some services may be slow or unavailable as it looks into a cyberattack affecting services and IT systems.

IT 104
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cybercriminals Steal Nearly 1TB of Data from Miami-Based International Tech Firm

Threatpost

Databases of sensitive, financial and personally identifiable info and documents from Intcomex were leaked on Russian-language hacker forum after a ransomware attack.

article thumbnail

A Trickbot Assault Shows US Military Hackers' Growing Reach

WIRED Threat Level

Despite the operation's short-term effects, it sets new precedents for the scope of Cyber Command's mission.

Military 106
article thumbnail

Intel's Ice Lake Beefs Up CPU Security for Cloud Workloads

Dark Reading

The third-generation Xeon processors build in hardware security features to provide extra protection to data in transit, at rest, and in use.

Cloud 126
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’ll be speaking at Cyber Week Online , October 19-21, 2020. I’ll be speaking at the IEEE Symposium on Technology and Society virtual conference, November 12-15, 2020. I’ll be keynoting the 2020 Conference on Cyber Norms on November 12, 2020. I’m speaking at the (ISC)² Security Congress 2020 , November 16, 2020.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Silent Librarian Goes Back to School with Global Research-Stealing Effort

Threatpost

The Iranian hacker group is targeting universities in 12 countries.

Libraries 119
article thumbnail

California Amends Privacy Laws Again: CCPA Health Information Amendment and Employee/B2B Exemption Signed into Law; Vetoes for Genetic Privacy and Social Media Parental Consent Bills

Data Matters

California’s Governor Gavin Newsom recently signed into law two bills to amend the California Consumer Privacy Act (“CCPA”). He also vetoed two other consumer privacy bills based on concerns about potential conflicts with existing state and federal law. Collectively, these four bills represented the most significant privacy legislation that came out of the California Legislature’s 2019-20 term, which came to a close on September 30th.

B2B 68
article thumbnail

Google, Intel Warn on ‘Zero-Click’ Kernel Bug in Linux-Based IoT Devices

Threatpost

Intel and Google are urging users to update the Linux kernel to version 5.9 or later.

IoT 107
article thumbnail

2020 Workshop on Economics of Information Security

Schneier on Security

The Workshop on Economics of Information Security will be online this year. Register here.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Zoom Announces Rollout of End-to-End Encryption

Dark Reading

Phase 1 removes Zoom servers from the key generation and distribution processes.

article thumbnail

FIN11 Cybercrime Gang Shifts Tactics to Double-Extortion Ransomware

Threatpost

The Clop ransomware has become a tool of choice for the financially motivated group.

article thumbnail

Victory at Yorktown

Unwritten Record

On the morning of October 19th, 1781, British troops along with their allies marched out of Yorktown, Virginia with flags furled to surrender to combined American and French forces. The siege and surrender at Yorktown proved to be the decisive blow to British hopes of regaining control of the American colonies. To celebrate the anniversary of the surrender, the National Archives Motion Picture Department would like to share a film by the National Park Service, recreating the official surrender