Tue.May 11, 2021

article thumbnail

Tulsa City Officials Report Ransomware Attack

Data Breach Today

City Shuts Down Websites, Systems Tulsa city officials shut down systems and websites after a Sunday ransomware attack, making it impossible for residents to gain online access to many services.

article thumbnail

Microsoft Patch Tuesday, May 2021 Edition

Krebs on Security

Microsoft today released fixes to plug at least 55 security holes in its Windows operating systems and other software. Four of these weaknesses can be exploited by malware and malcontents to seize complete, remote control over vulnerable systems without any help from users. On deck this month are patches to quash a wormable flaw, a creepy wireless bug, and yet another reason to call for the death of Microsoft’s Internet Explorer (IE) web browser.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Nixes Cybersecurity as Point Against 'Right to Repair'

Data Breach Today

Agency Found No Evidence Independent Repairs Increase Data Security Risks The FTC rejected arguments from major technology companies and trade groups that independent repair shops increase risks to data security. That could help propel the "right to repair" movement, which contends manufacturers use anticompetitive tactics to lock consumers and independent repairers out.

article thumbnail

RSAC insights: SolarWinds hack illustrates why software builds need scrutiny — at deployment

The Last Watchdog

By patiently slipping past the best cybersecurity systems money can buy and evading detection for 16 months, the perpetrators of the SolarWinds hack reminded us just how much heavy lifting still needs to get done to make digital commerce as secure as it needs to be. Related: DHS launches 60-day cybersecurity sprints. Obviously, one change for the better would be if software developers and security analysts paid much closer attention to the new and updated coding packages being assembled and depl

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Alerts: Avaddon Ransomware Attacks Increasing

Data Breach Today

FBI and Australian Officials Describe the Threat Attackers are using Avaddon ransomware to target diverse organizations in the U.S., Australia and elsewhere, according to the FBI and the Australian Cyber Security Center. Among the recent victims was a service provider to Australian telecommunications company Telstra.

More Trending

article thumbnail

DarkSide's Pipeline Ransomware Hit: Strictly Business?

Data Breach Today

Affiliate-Driven Ransomware-as-a-Service Operations Keep Generating Big Profits "It's not personal. It's strictly business." That line from "The Godfather" encapsulates the mindset of criminals who extort businesses using ransomware and other tools: Their imperative is profits, no matter any disruption they might cause to critical services, such as those provided by Colonial Pipeline.

article thumbnail

Hackers Leverage Adobe Zero-Day Bug Impacting Acrobat Reader

Threatpost

A patch for Adobe Acrobat, the world’s leading PDF reader, fixes a vulnerability under active attack affecting both Windows and macOS systems that could lead to arbitrary code execution.

137
137
article thumbnail

CISA Awaits Technical Details on Colonial Pipeline Attack

Data Breach Today

Acting CISA Director Tells Lawmakers FBI, Not Company, Alerted Agency CISA is still awaiting more technical details from Colonial Pipeline about the Friday ransomware attack that forced it to shut down its operations, Brandon Wales, the agency's acting director, told a Senate committee that's probing the attack and other cybersecurity incidents.

article thumbnail

Critical Infrastructure Under Attack

Dark Reading

Several recent cyber incidents targeting critical infrastructure prove that no open society is immune to attacks by cybercriminals. The recent shutdown of key US energy pipeline marks just the tip of the iceberg.

136
136
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Assessing Whether a Nation-State Had a Role in Pipeline Attack

Data Breach Today

Tom Kellerman of VMware Carbon Black shares his opinions about whether a nation-state was behind the recent ransomware attack on Colonial Pipeline and what the U.S. government should do to prevent other cyberattacks.

article thumbnail

Norwegian DPA Issues 2.5M EUR Preliminary Fine for U.S. Company Utilizing Web-Tracking IDs

Hunton Privacy

On May 2, 2021, the Norwegian data protection authority, Datatilsynet, notified Disqus Inc. (“Disqus”), a U.S. company owned by Zeta Global, of its intention to issue a fine of 25 million Norwegian Krone (approximately 2.5 million Euros). The preliminary fine was issued for failure to comply with the General Data Protection Regulation’s (“GDPR”) accountability, lawfulness and transparency requirements, primarily due to Disqus’ tracking of website visitors.

GDPR 129
article thumbnail

Colonial Pipeline: 'A Global Day of Reckoning'

Data Breach Today

Ex-Federal CISO Gregory Touhill on Defending Critical Infrastructure Gregory Touhill, the retired Air Force general and former federal CISO under President Obama, minces no words when he describes the Colonial Pipeline ransomware attack as a "global day of reckoning" for critical infrastructure protection.

article thumbnail

FBI and Australia ACSC agencies warn of ongoing Avaddon ransomware attacks

Security Affairs

The FBI and Australian Australian Cyber Security Centre (ACSC) warn of an ongoing Avaddon ransomware campaign targeting organizations worldwide. The Federal Bureau of Investigation (FBI) and the Australian Cyber Security Centre (ACSC) are warning of an ongoing Avaddon ransomware campaign targeting organizations worldwide in multiple industries, including government, finance, energy, manufacturing, and healthcare.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The strategic value of low-code development

OpenText Information Management

With organizations continuing to push toward digital transformation, the developers and business analysts within these businesses hold the key to accelerate this evolution. Under pressure to help deliver more engaging customer experiences and optimize operations, they’re discovering that low-code development practices—which simplify or remove manual coding from software development—are proving to be the future of … The post The strategic value of low-code development appeared first on Open

article thumbnail

DarkSide Wanted Money, Not Disruption from Colonial Pipeline Attack

Threatpost

Statement by the ransomware gang suggests that the incident that crippled a major U.S. oil pipeline may not have exactly gone to plan for overseas threat actors.

article thumbnail

Hackers target Windows users exploiting a Zero-Day in Reader

Security Affairs

Adobe confirmed that a zero-day vulnerability affecting Adobe Reader for Windows has been exploited in the wild in limited attacks. Adobe security updates for May 2021 address at least 43 CVEs in Experience Manager, InDesign, Illustrator, InCopy, Adobe Genuine Service, Acrobat and Reader, Magento, Creative Cloud Desktop, Media Encoder, Medium, and Animate.

Cloud 119
article thumbnail

A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm

Dark Reading

Trinity Cyber takes a new spin on some traditional network-security techniques, but can its approach catch on widely?

Security 135
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Researcher hacked Apple AirTag two weeks after its launch

Security Affairs

Apple AirTag has been launched less than two weeks ago, but a security researcher already claims to have hacked them. . The Apple AirTag has been available for just a couple of weeks and hacking community is already working on it to demonstrate that how to compromise it. “The German security researcher Stack Smashing tweeted today ( via The 8-bit ) that he was able to “break into the microcontroller of the AirTag” and modified elements of the item tracker software.” reported the

IT 118
article thumbnail

AI Security Risk Assessment Tool

Schneier on Security

Microsoft researchers just released an open-source automation tool for security testing AI systems: “ Counterfit.” Details on their blog.

Risk 121
article thumbnail

Google open sources cosign tool for verifying containers

Security Affairs

Google has released a new open-source tool called cosign that could allow administrators to sign and verify the container images. Google has released a new open-source tool called cosign that allows to sign, verify container images, it was developed to make signatures invisible infrastructure. Cosign supports: Hardware and KMS signing Bring-your-own PKI Our free OIDC PKI (Fulcio) Built-in binary transparency and timestamping service (Rekor).

Cloud 110
article thumbnail

‘Urgent and aggressive’ action required as ransomware crisis deepens

IT Governance

Regular readers of this blog will have seen us lament the growing number of ransomware attacks in the past year. Our Q1 2021 review of data breaches found that almost one in three publicly disclosed security incidents was a ransomware attack, and in April alone, we discovered 53 cases. And that’s just the tip of the iceberg; there are plenty of organisations who fall victim and don’t disclose the damage.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Apple was aware that XcodeGhost impacted 128 Million iOS Users in 2015

Security Affairs

Court documents revealed that the infamous XcodeGhost malware, which has been active since 2015, infected 128 million iOS users. Documents provided in a court case that sees Epic Games v. Apple Inc. revealed that the XcodeGhost malware impacted 128 million iOS users. Epic Games filed a lawsuit against Apple in a California court over its violation of terms of contract for the use of the App Store after the IT giant removed some games, including Fortnite, from the official App Store.

Passwords 109
article thumbnail

Shifting Threats in a Changed World: Edge, IoT and Vaccine Fraud

Threatpost

Aamir Lakhani, researcher at FortiGuard Labs, discusses leading-edge threats related to edge access/browsers/IoT, and the COVID-19 vaccine, as a way of getting into larger organizations.

IoT 93
article thumbnail

Application Attacks Spike as Criminals Target Remote Workers

Dark Reading

Application-specific and Web application attacks made up 67% of all attacks in 2020 as criminal strategies shifted in the pandemic.

110
110
article thumbnail

Fake Chrome App Anchors Rapidly Worming ‘Smish’ Cyberattack

Threatpost

An ingenious attack on Android devices self-propagates, with the potential for a range of damage.

Security 120
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

3 Cybersecurity Myths to Bust

Dark Reading

Deeply rooted cybersecurity misconceptions are poisoning our ability to understand and defend against attacks.

article thumbnail

GitHub Prepares to Move Beyond Passwords

Threatpost

GitHub adds support for FIDO2 security keys for Git over SSH to fend off account hijacking and further its plan to stick a fork in the security bane of passwords.

article thumbnail

Adobe Issues Patch for Acrobat Zero-Day

Dark Reading

The vulnerability is being exploited in limited attacks against Adobe Reader users on Windows.

144
144