Wed.May 26, 2021

article thumbnail

VMware Urges Rapid Patching for Serious vCenter Server Bug

Data Breach Today

Attackers Could Exploit 'Critical' Flaw to Remotely Execute Arbitrary Code VMware is warning all vCenter Server administrators to patch their software to fix both a serious vulnerability that could be used to execute arbitrary code, as well as a separate authentication flaw. Experts warn that these and other recent flaws are likely to be targeted by ransomware gangs.

article thumbnail

GUEST ESSAY: ‘World password day’ reminds us to embrace password security best practices

The Last Watchdog

We celebrated World Password Day on May 6, 2021. Related: Credential stuffing fuels account takeovers. Did you know that this unconventional celebration got its start in 2013, and that it’s now an official holiday on the annual calendar? Every year, the first Thursday in May serves as a reminder for us to take control of our personal password strategies.

Passwords 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nearly 50,000 IPs Compromised in Kubernetes Clusters

Data Breach Today

Trend Micro: Cryptojacking Group TeamTNT Targets Clusters in Wormlike Attack Researchers at Trend Micro say that about 50,000 IPs have been compromised across multiple Kubernetes clusters in a wormlike attack by the cloud-focused cryptojacking group TeamTNT.

Cloud 289
article thumbnail

French police seized dark web marketplace Le Monde Parallèle

Security Affairs

Last week, French authorities have seized the dark web marketplace Le Monde Parallèle, it is another success of national police in the fight against cybercrime. French authorities seized the dark web marketplace Le Monde Parallèle, the operation is another success of national police in the fight against cybercrime activity in the dark web. It is the third large French-speaking platform seized by the local police after Black Hand in 2018 and French Deep Web Market in 2019.

Sales 139
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How the Hydra Darknet Market Broke the $1 Billion Barrier

Data Breach Today

Research Report Describes Marketplace's Evolving Tactics The Hydra darknet marketplace, which initially focused on narcotics sales, now also offers stolen credit cards, SIM cards, VPN access and cryptocurrency laundering services, with annual sales exceeding $1 billion, according to a new research report, which explains the market's tactics.

Marketing 289

More Trending

article thumbnail

Quantum Computing: Assessing the Risks

Data Breach Today

William Dixon of World Economic Forum on Improving Infrastructure To unlock the value of quantum computing, two systemic risks - tech governance and cybersecurity - need to be overcome, says William Dixon of the World Economic Forum.

Risk 261
article thumbnail

A Peek Inside the Underground Ransomware Economy

Threatpost

Threat hunters weigh in on how the business of ransomware, the complex relationships between cybercriminals, and how they work together and hawk their wares on the Dark Web.

article thumbnail

Federal Agencies Struggling With Supply Chain Security

Data Breach Today

After SolarWinds Attack, Agencies Are Not Making Security Upgrades, GAO Reports More than five months after the SolarWinds supply chain attack came to light, federal agencies continue to struggle with supply chain security, according to a top GAO official who testified before a House committee.

Security 191
article thumbnail

Belgium Interior Ministry said it was hit by a sophisticated cyber attack

Security Affairs

The Belgian interior ministry was targeted by a “sophisticated” cyber attack, a spokesman told RTBF public television on Tuesday. The Belgian interior ministry was hit by a “sophisticated” cyber-espionage attack, the news was confirmed by a spokesman to RTBF public television on Tuesday. The Federal Public Service Interior’s communications director, Olivier Maerens, confirmed that the attackers were not able to breach the server of the ministry, this means that thre

IT 116
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Data Breach Response Essentials for the Ransomware Age

Data Breach Today

Craig A. Hoffman Shares Takeaways From 1,250 Incidents Probed by BakerHostetler Network intrusion displaced phishing as the leading hack-attack tactic last year, while ransomware continued to surge as the pandemic complicated incident response efforts, says BakerHostetler's Craig A. Hoffman, who describes trends from the 1,250 incidents his firm helped manage.

article thumbnail

DLA Piper Global Vaccine Guide

DLA Piper Privacy Matters

As the scientific response to the COVID-19 pandemic develops, many employers are considering what their approach should be to the issues around vaccination for their workforce, with a view to accelerating a return to some kind of normality. This is an area where law, guidance and best practice is likely to develop rapidly and there is no one-size-fits-all solution, particularly for multinational employers.

Risk 114
article thumbnail

Google discovered a new variant of Rowhammer attack dubbed Half-Double

Security Affairs

Google experts discovered a new variant of Rowhammer attack against RAM memory cards that bypasses all current defenses. Google researchers discovered a new variant of Rowhammer attacks, dubbed “Half-Double,” that allows bypassing all current defenses. In 2015, security researchers at Google’s Project Zero team demonstrated how to hijack the Intel-compatible PCs running Linux by exploiting the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-acc

article thumbnail

How Are Cyber Insurance Companies Assessing Ransomware Risk?

Dark Reading

From limiting claims payments to tying payments to policyholders' actions, the cyber insurance industry is in "a very dynamic place right now," says Corvus Insurance CEO Phil Edmundson.

Insurance 134
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

EU citizens win right to access personal data held by Home Office

The Guardian Data Protection

Appeal court ruling means people denied settled status or immigration visas can see records used in the case EU citizens have won the right to get full access to records about them held by the Home Office or any other body after a legal battle by campaigners. Three judges at the court of appeal unanimously overturned an earlier high court decision that their case had no legal merit and ruled the Data Protection Act 2018 (DPA) unlawfully denied them access to their data through an “immigration ex

article thumbnail

‘Privateer’ Threat Actors Emerge from Cybercrime Swamp

Threatpost

‘Privateers’ aren’t necessarily state-sponsored, but they have some form of government protection while promoting their own financially-motivated criminal agenda, according to Cisco Talos.

article thumbnail

Bug Bounties and the Cobra Effect

Dark Reading

Are bug bounty programs allowing software companies to skirt their responsibility to make better, more secure products from the get-go?

Security 101
article thumbnail

VMware Sounds Ransomware Alarm Over Critical Severity Bug

Threatpost

VMware’s virtualization management platform, vCenter Server, has a critical severity bug the company is urging customers to patch “as soon as possible”.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

SCCs, Adequacy, and Guidance: Latest Updates on International Data Transfers

Data Matters

The next few weeks will likely be very busy for companies on the GDPR international data transfer front as there have been a number of key European developments over the last few days including: New Standard Contractual Clauses : The European Commission’s Article 93 Committee (made up of representatives from EU Member States) approved the new Standard Contractual Clauses ( SCCs ) on May 19, 2021 and it is understood that the new SCCs may be published in June.

article thumbnail

BazaLoader Masquerades as Movie-Streaming Service

Threatpost

The website for “BravoMovies” features fake movie posters and a FAQ with a rigged Excel spreadsheet for “cancelling” the service, but all it downloads is malware.

IT 92
article thumbnail

Forrester and Accenture on Schrems II and the Security of International Data Flows

Thales Cloud Protection & Licensing

Forrester and Accenture on Schrems II and the Security of International Data Flows. madhav. Thu, 05/27/2021 - 06:30. In July of 2020 the Court of Justice of the European Union issued the Schrems II decision, which invalidated the EU-U.S. Privacy Shield Framework. Privacy Shield was the framework used by more than 5,000 registered U.S. companies to conduct transatlantic data flows in compliance with the GDPR.

article thumbnail

PDF Feature ‘Certified’ Widely Vulnerable to Attack

Threatpost

Researchers found flaws most of the ‘popular’ PDF applications tested.

106
106
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Discovers New Rowhammer Attack Technique

Dark Reading

Researchers publish the details of a new Rowhammer vulnerability called "Half-Double" that exploits increasingly smaller DRAM chips.

83
article thumbnail

Preparing for a virtual desktop world

DXC Technology

The new age of the remote employee is upon us. Close to half the workforce in the U.S. never worked from home before the worldwide healthcare crisis, Statista reports. Today, 44% work from home five days a week. Companies had to scramble to adapt their services and systems so that business could continue. Now, they […]. The post Preparing for a virtual desktop world appeared first on DXC Blogs.

Cloud 59
article thumbnail

Orange: Your Leaky Security is Coming from Inside the House!

Dark Reading

SPONSORED: Your home WiFi router may be screaming fast, but it's also a major point of vulnerability in this work-from-home era, says Charl van der Walt, head of security research at Orange Cyberdefense. And while Zero Trust offers some relief, he offers up some how-to advice to ensure it's properly deployed.

article thumbnail

As Chips Shrink, Rowhammer Attacks Get Harder to Stop

WIRED Threat Level

A full fix for the “Half-Double” technique will require rethinking how memory semiconductors are designed.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Review: Practical Security Architecture

Adam Shostack

There’s an insightful comment , “Everybody has a testing environment. Some people are lucky enough enough to have a totally separate environment to run production in.” Similarly, everybody has both enterprise and product architecture. Some people are lucky enough to be able to design them. I have to say that because “architecture” is much maligned for being heavyweight, disconnected, and irrelevant in today’s world of Dev-Opsy CI/CD moving fast and breaking th

article thumbnail

You’ve Secured Your Computer, but What About Your Business Printer?

OneHub

You know all about the cybersecurity threats associated with your computer and know the importance of secure cloud storage for your business, but did you know your company printers are equally vulnerable? Business printers are an often overlooked security risk that can cause major business disruptions, financial losses, and data breaches. . In 2020, cybersecurity experts from CyberNews hacked 28,000 business printers.

article thumbnail

Deepfake deception: the emerging threat of deepfake attacks

Privacy and Cybersecurity Law

One of the fastest evolving technologies today is that of deepfakes. The term “deepfakes” is taken from deep learning, and refers to synthesised and/or superimposed images and videos created by artificial intelligence (AI) using existing images and videos. The technology has seen a meteoric rise in use as the AI technology that underpins it has continued to develop.