Wed.Apr 14, 2021

FBI Removing Web Shells From Infected Exchange Servers

Data Breach Today

Remediation Effort at Organizations in at Least 8 States May Be First of Its Kind in the US In an unprecedented action, the FBI is removing web shells from on-premises Microsoft Exchange servers at organizations in at least eight states that were infected in a wave of attacks earlier this year.

The FBI Is Now Securing Networks Without Their Owners’ Permission

Schneier on Security

In January, we learned about a Chinese espionage campaign that exploited four zero-days in Microsoft Exchange.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Senators Push for Changes in Wake of SolarWinds Attack

Data Breach Today

Intelligence Hearing Focuses on Need for Federal Breach Notification Law, Fixing 'Blind Spots' The SolarWinds supply chain attack that led to follow-on attacks on nine government agencies and 100 companies points to the need for a federal law requiring prompt breach notification, several senators said at a Wednesday hearing.

For the second time in a week, a Google Chromium zero-day released online

Security Affairs

For the second time in a week, a Chromium zero-day remote code execution exploit code has been released on Twitter, multiple browsers impacted.

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

Defining Synthetic ID Fraud: How It Helps With Mitigation

Data Breach Today

Fed Releases a Definition That Could Make It Easier to Identify Red Flags Now that the Federal Reserve has issued a definition for synthetic ID fraud, fraud-fighting efforts likely will improve because it will be easier to identify red flags, some security experts say

IT 176

More Trending

Phishing Campaign Targeting COVID Vaccine 'Cold Chain' Expands

Data Breach Today

Updated Report From IBM Provides New Details Cybercriminals, likely backed by nation-states, are expanding global spear-phishing campaigns targeting the COVID-19 vaccine "cold chain" in an attempt to steal credentials so they can gain "privileged insight" into sensitive information, the IBM Security X-Force says in an updated report.

Bolstering Our Nation's Defenses Against Cybersecurity Attacks

Dark Reading

Shawn Henry, former Executive Assistant Director of the FBI and current CrowdStrike president of services and CSO, shares the top three cybersecurity priorities that the Biden administration needs to address

Sweden: Russians Behind Sports Confederation Hack

Data Breach Today

But Nation Won't Pursue Legal Action in the Case The Russian state-sponsored group Fancy Bear was responsible for breaches at the Swedish Sports Confederation that resulted in hackers accessing sensitive athlete information, including doping test results, according to the Swedish Prosecution Authority.

Access 169

WhatsApp flaws could have allowed hackers to remotely hack mobile devices

Security Affairs

WhatsApp addressed two security vulnerabilities in its app for Android that could have been exploited to remotely hack the victim’s device.

Insights on Choosing an Identity Verification Solution Provider

Sort through today’s crowded identity verification solutions landscape with our guide, designed to help you choose the right provider based on your unique needs.

How Fraudsters Nearly Stole $17.5 Million via PPE Fraud

Data Breach Today

4 Dutch and Nigerian Suspects Accused of Scamming German Health Authority Interpol says Dutch and Nigerian suspects created a cloned version of a legitimate personal protective equipment provider's website to trick a German health authority seeking face masks.

160
160

The CISO Life is Half as Good

Dark Reading

Lora Vaughn was at a crossroads -- and that was before mandated pandemic lockdowns came into play. Here's her story of how life got sweeter after she stepped away from the CISO job

92

Developing an Effective Incident Response Plan

Data Breach Today

CrowdStrike’s Mark Goudie on Why Plans Must Be Tailor-Made and Frequently Tested An incidence response plan is worthless unless it's customized to meet an organization's needs and tested on a regular basis, says Mark Goudie, regional director services, APJ, at CrowdStrike

IT 160

FBI Operation Remotely Removes Web Shells From Exchange Servers

Dark Reading

A court order authorized the FBI to remove malicious Web shells from hundreds of vulnerable machines running on-premise Exchange Server

88

Cassandra Data Modeling Guide to Best Practices

Are you a developer, database architect, or database administrator that's new to Cassandra but have been tasked with developing a Cassandra schema design? Learn the basic rules to keep in mind when designing your schema for Cassandra.

State of the Marketplace: A Conversation With Dave DeWalt

Data Breach Today

Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes

The FBI Takes a Drastic Step to Fight China’s Hacking Spree

WIRED Threat Level

The agency's approach to protecting vulnerable victims of the recent Hafnium attack manages to be at once controversial and refreshingly restrained. Security Security / Cyberattacks and Hacks

FireEye: 650 new threat groups were tracked in 2020

Security Affairs

FireEye published its M-Trend 2021 report based on the data collected during the investigation, 650 new threat groups were tracked in 2020. FireEye published its annual report, titled M-Trend 2021, which is based on the data collected during the investigation on security incidents it managed.

Ransomware Attack Creates Cheese Shortages in Netherlands

Threatpost

Not a Gouda situation: An attack on a logistics firm is suspected to be related to Microsoft Exchange server flaw. Hacks Malware Vulnerabilities

Use It, Save It, Or Lose It: Spring Cleaning for Information Governance

Speaker: Speakers Michelle Kirk of Georgia Pacific, Darla White of Sanofi, & Scott McVeigh of Onna

As an organization’s most valuable asset, data should be cared for and integrated, managed, archived, and deleted as appropriate. Join Onna, Georgia Pacific, and Sanofi for this on-demand webinar as they discuss proactive, practical steps for kicking off your organization's own digital cleanup.

15% of Brits use their pet’s name as a password

IT Governance

A strong, unique password is one of the simplest ways we can thwart cyber criminals, but millions of us are making basic mistakes, according to an NCSC (National Cyber Security Centre) survey.

Security Bug Allows Attackers to Brick Kubernetes Clusters

Threatpost

The vulnerability is triggered when a cloud container pulls a malicious image from a registry. Cloud Security Vulnerabilities

Dependency Problems Increase for Open Source Components

Dark Reading

The number of components in the average application rose 77% over two years. No wonder, then, that 84% of codebases have at least one vulnerability

66

The Biggest Security Threats to the US Are the Hardest to Define

WIRED Threat Level

In a Senate briefing, the heads of the major intelligence agencies warned the public about dangers that offer no easy solutions. Security Security / National Security

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

Thycotic & Centrify Merge to Form Cloud Identity Security Firm

Dark Reading

The combined entity will expand on both companies' privileged access management tools and expects to debut a new brand this year

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m keynoting the (all-virtual) RSA Conference 2021 , May 17-20, 2021. I’m keynoting the 5th International Symposium on Cyber Security Cryptology and Machine Learning (via Zoom), July 8-9, 2021.

CISA Urges Caution for Security Researchers Targeted in Attack Campaign

Dark Reading

The agency urges researchers to take precautions amid an ongoing targeted threat campaign

A Post-Data Privacy World and Data-Rights Management

Threatpost

Joseph Carson, chief security scientist at Thycotic, discusses the death of data privacy and what comes next. Government InfoSec Insider Privacy

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Registration Open For InfoCon2021

IG Guru

REGISTER HERE. The post Registration Open For InfoCon2021 appeared first on IG GURU. ARMA Education IG News Information Governance Sponsored Webinar Conference InfoCon2021

Microsoft Has Busy April Patch Tuesday with Zero-Days, Exchange Fixes

Threatpost

Microsoft fixes 110 vulnerabilities, with 19 classified as critical and another flaw under active attack. Vulnerabilities

79

The world generated 64.2 zettabytes of data last year – but where did it all go? via Data Center News

IG Guru

Check out the article here. The post The world generated 64.2 zettabytes of data last year – but where did it all go? via Data Center News appeared first on IG GURU. Cloud IG News Information Governance Risk News Storage Data Center News IDC Zettabytes

IT 55