Fri.Feb 12, 2021

article thumbnail

SAP Commerce Product Has Vulnerability

Data Breach Today

Company Issues Patch, Remediation Advice SAP has issued a patch and remediation advice for a critical remote code execution vulnerability in its SAP Commerce product that could, if exploited, disrupt the entire system.

IT 342
article thumbnail

Florida Water Plant Hack: Leaked Credentials Found in Breach Database

Threatpost

Researchers discovered credentials for the Oldsmar water treatment facility in the massive compilation of data from breaches posted just days before the attack.

130
130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Notification of Breach Affecting 219,000 Delayed

Data Breach Today

Nebraska Medicine/UNMC Now Contacting Patients Impacted by September 2020 Breach Nebraska Medicine/UNMC has just begun notifying 219,000 individuals of a hacking incident that was discovered last September. The lag between breach discovery and notification illustrates the difficulties organizations often face in incident response, security experts say.

Security 311
article thumbnail

Yandex security team caught admin selling access to users’ inboxes

Security Affairs

Russian internet and search company Yandex discloses a data breach, a system administrator was selling access to thousands of user mailboxes. Russian search engine and internet provider Yandex discloses a data breach, the company revealed that one of its system administrators was caught selling access to 4,887 user email accounts. The security incident was discovered during a routine screening by its internal security team, an internal investigation is still ongoing. “An internal investiga

Access 124
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Siemens Patches 21 Vulnerabilities in 2 Tools

Data Breach Today

Flaws, If Exploited, Could Enable Remote Control, Data Exfiltration Siemens has mitigated 21 vulnerabilities in two of its virtualization software tools that, if exploited, could enable attackers to gain remote control, exfiltrate data or cause systems to crash. It's urging customers to shift to updated versions of the software that fix the flaws.

IT 305

More Trending

article thumbnail

Water Treatment Hack Prompts Warning From CISA

Data Breach Today

Agency Offers Critical Infrastructure Security Reminders Following the hacking of a Florida water treatment plant, CISA is warning the operators of other plants to be on the lookout for hackers who exploit remote access software and outdated operating systems - and to take risk mitigation steps. The advice applies to other organizations as well, some security experts say.

Risk 273
article thumbnail

Singtel Suffers Zero-Day Cyberattack, Damage Unknown

Threatpost

The Tier 1 telecom giant was caught up in a coordinated, wide-ranging attack using unpatched security bugs in the Accellion legacy file-transfer platform.

Security 125
article thumbnail

PayPal Mitigates XSS Vulnerability

Data Breach Today

Patch Issued After Vulnerability Found in an Endpoint Used for Currency Conversion PayPal has patched a cross-site scripting - or XSS - vulnerability found by a bug-bounty hunter in its currency conversion endpoint which, if exploited, could enable malicious JavaScript injection.

IT 267
article thumbnail

Attack against Florida Water Treatment Facility

Schneier on Security

A water treatment plant in Oldsmar, Florida, was attacked last Friday. The attacker took control of one of the systems, and increased the amount of sodium hydroxide — that’s lye — by a factor of 100. This could have been fatal to people living downstream, if an alert operator hadn’t noticed the change and reversed it. We don’t know who is behind this attack.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

2 More Breaches Tied to Accellion File Transfer Appliance

Data Breach Today

Latest Victims: Telecom Company Singtel and Australian Medical Research Institute QIMR Berghofer Two more breaches have been tied to the vulnerable 20-year-old Accellion File Transfer Appliance. The latest victims are Singapore telecom company Singtel and Australian medical research institute QIMR Berghofer.

264
264
article thumbnail

Documenting and Managing Governance, Risk and Compliance with Business Process

erwin

Managing an organization’s governance, risk and compliance (GRC) via its enterprise and business architectures means managing them against business processes (BP). Shockingly, a lot of organizations, even today, manage this through, either homemade tools or documents, checklists, Excel files, custom-made databases and so on and so forth. The three main reasons organizations tend to still operate in this manual and disparate way comes down to three reasons: Cost.

article thumbnail

Roses are Red, Romance Scammers Increasingly Make You Blue

Data Breach Today

Lockdown Has Led to a Surge in Fraudster Romeos Operating Remotely, Police Warn The ongoing lockdown may be complicating Cupid's arrows. But as another Valentine's Day rolls around, authorities are warning that romance scammers - and other types of fraudsters - are alive and well and have been increasingly preying on unsuspecting victims around the world.

232
232
article thumbnail

Karshare – bringing the sharing economy to cars

Information Matters

The costs of car ownership, both to vehicle owners and the environment, are substantial. Most cars sit idle in driveways, on streets and in car parks for the vast majority Read more. The post Karshare – bringing the sharing economy to cars appeared first on Information Matters.

98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Pro-India APT Group Deploys Android Spyware

Data Breach Today

SunBird and HornBill Malicious Apps Mainly Target Users in South Asia Researchers at the security firm Lookout have identified two new Android spyware tools used for cyberespionage campaigns in South Asia which they say are linked to "Confucius," an pro-India advanced persistent threat group.

Security 179
article thumbnail

Yandex Data Breach Exposes 4K+ Email Accounts

Threatpost

In a security notice, Yandex said an employee had been providing unauthorized access to users’ email accounts “for personal gain.”.

article thumbnail

Analysis: Implications of Water Treatment Plant Hack

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the critical security issues raised by the hacking of a Florida city water treatment plant. Also featured: The CISO of the World Health Organization discusses supply chain security; hackers steal celebrities' cryptocurrency.

Security 162
article thumbnail

Lampion trojan disseminated in Portugal using COVID-19 template

Security Affairs

The fresh release of the Latin American Lampion trojan was updated with a new C2 address. Lampion trojan disseminated in Portugal using COVID-19 template. In the last few days, a new release of the Latin American Lampion trojan was released in Portugal using a template related to COVID-19. This trojan has been distributed in Portugal in different ways, but this time the pandemic situation and the ongoing vaccination process is the reason behind this campaign to drop the beast in the wild.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

‘Annoyingly Believable’ Tax Scam Targets Mobile Users

Threatpost

A well-crafted SMS phishing effort is harvesting personal data and credit-card details under the guise of offering tax refunds.

article thumbnail

The “P” in Telegram stands for Privacy

Security Affairs

Security expert Dhiraj Mishra analyzed the popular instant messaging app Telegram and identified some failures in terms of handling the users’ data. Summary: While understanding the implementation of various security and privacy measures in Telegram, I identified that telegram fails again in terms of handling the users data. My initial study started with understanding how self-destructing messages work in the secret chats option, telegram says that “ The clock starts ticking the mom

Privacy 94
article thumbnail

Water Utility Hack Could Inspire More Intruders

Dark Reading

If past cyberattacks are any indication, success begets imitation. In the wake of last week's hack of Florida water utility, other water utilities and users of remote desktop software would be wise to shore up defenses, experts say.

124
124
article thumbnail

Managed SIEM: A Faster Way to Great Security

eSecurity Planet

Staying on top of cybersecurity threats can be overwhelming, and finding security tools that can help can be a daunting task too. For some companies, turning over the problem to a managed security services provider (MSSP) is an attractive solution. Managed Security Information and Event Management (SIEM) systems are a good way to accomplish that. SIEM systems offer a centralized view of IT security, ingesting log and event data from a wide range of security tools, hardware and applications, and

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

mHealth Apps Expose Millions to Cyberattacks

Threatpost

Researcher testing of 30 mobile health apps for clinicians found that all of them had vulnerable APIs.

Cloud 111
article thumbnail

Microsoft warns of the rise of web shell attacks

Security Affairs

Researchers from Microsoft are warning that the number of monthly web shell attacks has doubled since last year. Microsoft reported that the number of monthly web shell attacks has almost doubled since last year, its experts observed an average of 140,000 of these software installs on servers on a monthly basis, while in 2020 they were 77,000. “One year ago, we reported the steady increase in the use of web shells in attacks worldwide.

article thumbnail

Will Virginia Be the Second State to Enact Major Privacy Legislation?

Hunton Privacy

On February 5, 2021, the state Senate of Virginia voted unanimously to approve Senate Bill 1392 , titled the Consumer Data Protection Act, after the House of Delegates approved an identical House bill by an 89-9 vote. Each bill likely will be heard in committee next week by the opposite chamber, which provides additional opportunities to make amendments.

Privacy 68
article thumbnail

You've Got Cloud Security All Wrong: Managing Identity in a Cloud World

Dark Reading

In a hybrid and multicloud world, identity is the new perimeter and a critical attack surface for bad actors.

Cloud 120
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

TIM’s Red Team Research (RTR) discovered a critical zero-day vulnerability in IBM InfoSphere Information Server

Security Affairs

Researchers at TIM’s Red Team Research discovered a zero-day vulnerability in IBM InfoSphere Information Server. Today, TIM’s Red Team Research led by Massimiliano Brolli, discovered a new critical vulnerability in IBM InfoSphere Information Server. The flaw has not addressed by IBM, because the product version 8.5.0.0 is in End-of-life. Today, TIM’s Red Team Research led by Massimiliano Brolli, discovered a new critical vulnerability in IBM InfoSphere Information Server.

article thumbnail

Ubamarket, using data to improve the shopping experience

Information Matters

Ubamarket has announced the completion of an oversubscribed £800k investment as part of a £2.9 million raise. The investment will be used to develop it’s white label retail app, Ubamarket Read more. The post Ubamarket, using data to improve the shopping experience appeared first on Information Matters.

Retail 52
article thumbnail

The Netherlands: 440,000 EUR fine for hospital re. unauthorised access to medical records

DLA Piper Privacy Matters

The Dutch Data Protection Authority ( Autoriteit Persoonsgegevens , “ Dutch DPA ”) has published its decision to impose an administrative fine of EUR 440,000 on Amsterdam hospital OLVG due to the lack of sufficient measures to prevent access to medical records by unauthorised personnel. After complaints, the Dutch DPA conducted an investigation, and carried out an audit of the hospital’s information system and investigated, among others, security aspects such as authentication and verification

Access 126