Wed.Apr 14, 2021

article thumbnail

Senators Push for Changes in Wake of SolarWinds Attack

Data Breach Today

Intelligence Hearing Focuses on Need for Federal Breach Notification Law, Fixing 'Blind Spots' The SolarWinds supply chain attack that led to follow-on attacks on nine government agencies and 100 companies points to the need for a federal law requiring prompt breach notification, several senators said at a Wednesday hearing.

article thumbnail

The FBI Is Now Securing Networks Without Their Owners’ Permission

Schneier on Security

In January, we learned about a Chinese espionage campaign that exploited four zero-days in Microsoft Exchange. One of the characteristics of the campaign, in the later days when the Chinese probably realized that the vulnerabilities would soon be fixed, was to install a web shell in compromised networks that would give them subsequent remote access.

Security 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sweden: Russians Behind Sports Confederation Hack

Data Breach Today

But Nation Won't Pursue Legal Action in the Case The Russian state-sponsored group Fancy Bear was responsible for breaches at the Swedish Sports Confederation that resulted in hackers accessing sensitive athlete information, including doping test results, according to the Swedish Prosecution Authority. But Sweden will not pursue legal action in the case.

Access 274
article thumbnail

For the second time in a week, a Google Chromium zero-day released online

Security Affairs

For the second time in a week, a Chromium zero-day remote code execution exploit code has been released on Twitter, multiple browsers impacted. A new Chromium zero-day remote code execution exploit has been released on Twitter this week, kile the previous one that affects current versions of Google Chrome, Microsoft Edge, and likely other Chromium-based browsers.

Security 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FBI Removing Web Shells From Infected Exchange Servers

Data Breach Today

Remediation Effort at Organizations in at Least 8 States May Be First of Its Kind in the US In an unprecedented action, the FBI is removing web shells from on-premises Microsoft Exchange servers at organizations in at least eight states that were infected in a wave of attacks earlier this year. Security experts offer an analysis of the bold move that the FBI took without notifying the organizations.

Security 274

More Trending

article thumbnail

Developing an Effective Incident Response Plan

Data Breach Today

CrowdStrike’s Mark Goudie on Why Plans Must Be Tailor-Made and Frequently Tested An incidence response plan is worthless unless it's customized to meet an organization's needs and tested on a regular basis, says Mark Goudie, regional director services, APJ, at CrowdStrike.

IT 260
article thumbnail

FBI silently removed web shells planted on Microsoft Exchange servers in the US

Security Affairs

FBI log into web shells that hackers installed on Microsoft Exchange email servers across the US and removed the malicious code used by threat actors. A US judge granted the FBI the power to log into web shells that were injected by nation-state hackers on Microsoft Exchange servers across the US and remove the malware, announced the US Department of Justice. “Authorities have executed a court-authorized operation to copy and remove malicious web shells from hundreds of vulnerable computer

Access 108
article thumbnail

State of the Marketplace: A Conversation With Dave DeWalt

Data Breach Today

Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.

article thumbnail

Ransomware Attack Creates Cheese Shortages in Netherlands

Threatpost

Not a Gouda situation: An attack on a logistics firm is suspected to be related to Microsoft Exchange server flaw.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Defining Synthetic ID Fraud: How It Helps With Mitigation

Data Breach Today

Fed Releases a Definition That Could Make It Easier to Identify Red Flags Now that the Federal Reserve has issued a definition for synthetic ID fraud, fraud-fighting efforts likely will improve because it will be easier to identify red flags, some security experts say.

IT 199
article thumbnail

The CISO Life is Half as Good

Dark Reading

Lora Vaughn was at a crossroads -- and that was before mandated pandemic lockdowns came into play. Here's her story of how life got sweeter after she stepped away from the CISO job.

106
106
article thumbnail

How Fraudsters Nearly Stole $17.5 Million via PPE Fraud

Data Breach Today

4 Dutch and Nigerian Suspects Accused of Scamming German Health Authority Interpol says Dutch and Nigerian suspects created a cloned version of a legitimate personal protective equipment provider's website to trick a German health authority seeking face masks. The case is a reminder that a "sophisticated" scheme need not require extreme technical sophistication to succeed.

196
196
article thumbnail

WhatsApp flaws could have allowed hackers to remotely hack mobile devices

Security Affairs

WhatsApp addressed two security vulnerabilities in its app for Android that could have been exploited to remotely hack the victim’s device. WhatsApp recently addressed two security vulnerabilities in its app for Android that could have been exploited by remote attackers to execute malicious code on a target device and potentially eavesdrop on communications.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Phishing Campaign Targeting COVID Vaccine 'Cold Chain' Expands

Data Breach Today

Updated Report From IBM Provides New Details Cybercriminals, likely backed by nation-states, are expanding global spear-phishing campaigns targeting the COVID-19 vaccine "cold chain" in an attempt to steal credentials so they can gain "privileged insight" into sensitive information, the IBM Security X-Force says in an updated report.

Phishing 184
article thumbnail

Schrems II moves the goalposts – better data discovery can help

Thales Cloud Protection & Licensing

Schrems II moves the goalposts – better data discovery can help. sparsh. Thu, 04/15/2021 - 05:17. Just when you thought that you had a working solution compliant with General Data Protection Regulation (GDPR), for sharing data between EU and non-EU countries as part of your regular business communications, the Schrems II ruling appears out of nowhere and moves the goalposts!

GDPR 90
article thumbnail

The FBI Takes a Drastic Step to Fight China’s Hacking Spree

WIRED Threat Level

The agency's approach to protecting vulnerable victims of the recent Hafnium attack manages to be at once controversial and refreshingly restrained.

article thumbnail

Security Bug Allows Attackers to Brick Kubernetes Clusters

Threatpost

The vulnerability is triggered when a cloud container pulls a malicious image from a registry.

Cloud 116
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The world generated 64.2 zettabytes of data last year – but where did it all go? via Data Center News

IG Guru

Check out the article here. The post The world generated 64.2 zettabytes of data last year – but where did it all go? via Data Center News appeared first on IG GURU.

IT 78
article thumbnail

100,000 Google Sites Used to Install SolarMarket RAT

Threatpost

Search-engine optimization (SEO) tactics direct users searching for common business forms such as invoices, receipts or other templates to hacker-controlled Google-hosted domains.

article thumbnail

The Biggest Security Threats to the US Are the Hardest to Define

WIRED Threat Level

In a Senate briefing, the heads of the major intelligence agencies warned the public about dangers that offer no easy solutions.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m keynoting the (all-virtual) RSA Conference 2021 , May 17-20, 2021. I’m keynoting the 5th International Symposium on Cyber Security Cryptology and Machine Learning (via Zoom), July 8-9, 2021. I’ll be speaking at an Informa event on September 14, 2021. Details to come. The list is maintained on this page.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

FBI Operation Remotely Removes Web Shells From Exchange Servers

Dark Reading

A court order authorized the FBI to remove malicious Web shells from hundreds of vulnerable machines running on-premise Exchange Server.

101
101
article thumbnail

A Post-Data Privacy World and Data-Rights Management

Threatpost

Joseph Carson, chief security scientist at Thycotic, discusses the death of data privacy and what comes next.

article thumbnail

Collibra expands integration touchpoints with Google Cloud

Collibra

Collibra and Google Cloud provide solutions that naturally complement each other. Together, the two companies help customers maximize value from their enterprise data, promoting agile data operations, helping to derive innovative business insights, while ensuring those insights can be trusted and relevant policies are complied with. . This established partnership is being further strengthened by a new set of integrations that bring their cloud data platforms closer together and drive greater val

Cloud 59
article thumbnail

Microsoft Has Busy April Patch Tuesday with Zero-Days, Exchange Fixes

Threatpost

Microsoft fixes 110 vulnerabilities, with 19 classified as critical and another flaw under active attack.

80
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Dependency Problems Increase for Open Source Components

Dark Reading

The number of components in the average application rose 77% over two years. No wonder, then, that 84% of codebases have at least one vulnerability.

57
article thumbnail

FBI Clears ProxyLogon Web Shells from Hundreds of Orgs

Threatpost

In a veritable cyber-SWAT action, the Feds remotely removed the infections without warning businesses beforehand.

article thumbnail

The Updates Must Go Through

Adam Shostack

On Monday, the Department of Justice announced that it had cleaned malware (“webshells”) off of hundreds of infected mail systems running Microsoft Exchange. Microsoft has been trying to get folks to apply critical security patches to address a problem that’s being actively exploited. A few minutes ago, I posted a screencapture of Microsoft’s autoupdater going haywire on my Mac.