Fri.Jan 29, 2021

article thumbnail

Phishing Kit Can Change Lures and Text

Data Breach Today

Researchers: 'LogoKit' Found on 700 Domains Researchers at the security firm RiskIQ have discovered a phishing kit they call "LogoKit" that fraudsters can use to easily change lures, logos and text in real time to help trick victims into opening up messages and clicking on malicious links.

Phishing 359
article thumbnail

The Taxman Cometh for ID Theft Victims

Krebs on Security

The unprecedented volume of unemployment insurance fraud witnessed in 2020 hasn’t abated, although news coverage of the issue has largely been pushed off the front pages by other events. But the ID theft problem is coming to the fore once again: Countless Americans will soon be receiving notices from state regulators saying they owe thousands of dollars in taxes on benefits they never received last year.

Insurance 290
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lebanese Hacking Group Targeting Telcos and ISPs

Data Breach Today

Researchers: Lebanese Cedar's Campaigns Expand Beyond Middle East An APT group known as Lebanese Cedar has launched a cyberespionage campaign targeting telecommunication companies and ISPs, according to the Israeli security firm ClearSky, which says the attacks have spread beyond the Middle East to the U.S. and Europe.

Security 347
article thumbnail

Domain for programming website Perl.com hijacked

Security Affairs

Threat actors took over the domain name perl.com and pointed it to an IP address associated with malware campaigns. Attackers have taken over the official domain name of The Perl Foundation perl.com and pointed it to an IP address associated with malware campaigns. Users are recommended to avoid visiting the domain. The domain Perl.com was created in 1994 and was the official website for the Perl programming language, it is registered with the registrar key-systems(.)net. “The perl.com dom

Sales 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analysis: Emotet and Netwalker Takedowns

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of this week’s police takedowns of Emotet and Netwalker cybercrime operations. Also featured: Updates on passwordless authentication and the use of deception technology.

More Trending

article thumbnail

OIG: VA Workers Hid ‘Big Data’ Project Privacy, Security Risks

Data Breach Today

Report on Canceled VA Project Offers Governance Lessons for Others The Department of Veterans Affairs’ watchdog agency alleges that two VA employees “concealed” and “mispresented” the cybersecurity and privacy risks of an ambitious "big data" project that would have analyzed 22 million veterans’ health records dating back two decades.

Big data 311
article thumbnail

Microsoft: North Korea-linked Zinc APT targets security experts

Security Affairs

Microsoft, like Google TAG, observed a cyber espionage campaign aimed at vulnerability researchers that attributed to North Korea-linked Zinc APT group. Researchers from Microsoft monitored a cyber espionage campaign aimed at vulnerability researchers and attributed the attacks to North Korea-linked Zinc APT group. “In recent months, Microsoft has detected cyberattacks targeting security researchers by an actor we track as ZINC.

Security 105
article thumbnail

Microsoft Offers Details on Hack of Vulnerability Researchers

Data Breach Today

North Korean APT Group Apparently Involved Microsoft researchers say that a North Korean hacking group that the company calls "Zinc" - which is better known as the Lazarus Group or Hidden Cobra - likely was responsible for targeting vulnerability researchers in an attempt to steal information via a backdoor.

279
279
article thumbnail

Lawmakers Take Aim at Insidious Digital ‘Dark Patterns’

WIRED Threat Level

A new California law prohibits efforts to trick consumers into handing over data or money. A bill in Washington state copies the language.

Security 119
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CNIL Fines a Data Controller and Its Processor 225,000 Euros for Security Violation in Connection with Credential Stuffing

Hunton Privacy

On January 27, 2021, the French Data Protection Authority (the “CNIL”) announced (in French) that it imposed a fine of €150,000 on a data controller, and a fine of €75,000 on its data processor, for failure to implement adequate security measures to protect customers’ personal data against credential stuffing attacks on the website of the data controller.

article thumbnail

Industrial Gear at Risk from Fuji Code-Execution Bugs

Threatpost

Fuji Electric’s Tellus Lite V-Simulator and V-Server Lite can allow attackers to take advantage of operational technology (OT)-IT convergence on factory floors, at utility plants and more.

Risk 101
article thumbnail

Celebrating Safer Internet Day is ‘Together for a Better Internet’

Micro Focus

Micro Focus is delighted to support Safer Internet Day on 9 February 2021, a global initiative to create a safer internet for all, with particular focus on children and young adults. This year’s theme for Safer Internet Day is ‘Together for a Better Internet’ – and together with our employees, Micro Focus is taking this. View Article.

98
article thumbnail

Including Hackers in NATO Wargames

Schneier on Security

This essay makes the point that actual computer hackers would be a useful addition to NATO wargames: The international information security community is filled with smart people who are not in a military structure, many of whom would be excited to pose as independent actors in any upcoming wargames. Including them would increase the reality of the game and the skills of the soldiers building and training on these networks.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FBI Encounters: Reporting an Insider Security Incident to the Feds

Dark Reading

Most insider incidents don't get reported to the FBI due to fear of debilitating business disruptions, public embarrassment, and screeching vans skidding into the parking lot to confiscate servers. But is that reality?

Security 135
article thumbnail

WordPress Pop-Up Builder Plugin Flaw Plagues 200K Sites

Threatpost

The flaw could have let attackers send out custom newsletters and delete newsletter subscribers from 200,000 affected websites.

Security 103
article thumbnail

Ransomware Payoffs Surge by 311% to Nearly $350 Million

Dark Reading

Payments to ransomware gangs using cryptocurrency more than quadrupled in 2020, with less than 200 cryptocurrency wallets receiving 80% of funds.

article thumbnail

This Encrypted Gun Registry Might Bridge a Partisan Divide

WIRED Threat Level

Researchers from Brown University have developed a system that could keep track of firearms while preserving privacy.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cloud Security Startup Armo Emerges from Stealth with $4.5M

Dark Reading

Armo's platform was developed to protect cloud-native workloads and provide DevOps teams with greater visibility and control.

Cloud 101
article thumbnail

Inspiring students to imagine their future careers

Micro Focus

Under Pressure For too long, there has been tremendous reliance on parents, schools and government to capture children’s imaginations – to help them imagine their future careers. Every child – regardless of their academic or cultural background – has potential to build a rewarding and meaningful career, where they can help shape the world and. View Article.

article thumbnail

Apple iOS 14 Thwarts iMessage Attacks With BlastDoor System

Threatpost

Apple has made structural improvements in iOS 14 to block message-based, zero-click exploits.

Security 115
article thumbnail

How intelligent forms automation can help replace legacy applications

OpenText Information Management

In 2020, organizations moved from mostly in-office employees to hybrid working models and full remote working. As part of this transition, some organizations are discovering that their legacy applications are no longer on supported or performant platforms. What those applications need is a digital refresh to ensure that they are performing well, reliable, and most … The post How intelligent forms automation can help replace legacy applications appeared first on OpenText Blogs.

75
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft 365 Becomes Haven for BEC Innovation

Threatpost

Two new phishing tactics use the platform's automated responses to evade email filters.

Phishing 113
article thumbnail

New iMessage Security Features

Schneier on Security

Apple has added added security features to mitigate the risk of zero-click iMessage attacks. Apple did not document the changes but Groß said he fiddled around with the newest iOS 14 and found that Apple shipped a “significant refactoring of iMessage processing” that severely cripples the usual ways exploits are chained together for zero-click attacks.

Security 106
article thumbnail

Lazarus Affiliate ‘ZINC’ Blamed for Campaign Against Security Researcher

Threatpost

New details emerge of how North Korean-linked APT won trust of experts and exploited Visual Studio to infect systems with ‘Comebacker’ malware.

article thumbnail

ICO Confirms UK Firms May Rely on Public Interest Derogation for SEC Transfers

Hunton Privacy

On January 19, 2021, the UK Information Commissioner’s Office (“ICO”) published its analysis of the application of the UK General Data Protection Regulation (the “UK GDPR”) to transfers from UK-based firms or branches that are registered, required to be registered or otherwise regulated by the U.S. Securities and Exchange Commission (“SEC”). Such firms or branches include investment advisers, securities-based swap dealers and other market participants.

GDPR 79
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Is the Web Supply Chain Next in Line for State-Sponsored Attacks?

Dark Reading

Attackers go after the weak links first, and the Web supply chain provides an abundance of weak links to target.

97
article thumbnail

Digitalization in procurement

OpenText Information Management

A recent blog on ‘The resilient Procurement organization’ described the benefits of using OpenText™ Extended ECM for SAP® Solutions in a procurement situation. As a recent study shows, the digitalization of procurement is well underway, but by far not complete. Let’s look at this from a typical Purchase to Pay (P2P) related task – the … The post Digitalization in procurement appeared first on OpenText Blogs.

ECM 64
article thumbnail

Experts addressed flaws in Popup Builder WordPress plugin

Security Affairs

Multiple issues in WordPress ‘Popup Builder’ Plugin could be exploited by hackers to perform various malicious actions on affected websites. Developers behind the “Popup Builder – Responsive WordPress Pop up – Subscription & Newsletter” WordPress plugin have recently addressed multiple vulnerabilities that can be exploited to perform various malicious actions on affected websites.