Wed.Jun 02, 2021

article thumbnail

FireEye to Separate from Mandiant Solutions

Data Breach Today

FireEye to Sell Product Line, Name to Private Equity FireEye announced on Wednesday the sale of its product line and name to Symphony Technology Group, a private equity group based in Palo Alto, for $1.2 billion. The deal means FireEye will be separated from Mandiant Solutions, its forensics unit that's often called upon after a data breach.

Sales 333
article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

The amount of data in the world topped an astounding 59 zetabytes in 2020, much of it pooling in data lakes. Related: The importance of basic research. We’ve barely scratched the surface of applying artificial intelligence and advanced data analytics to the raw data collecting in these gargantuan cloud-storage structures erected by Amazon, Microsoft and Google.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers Describe Antivirus Flaws

Data Breach Today

Vulnerabilities Could Have Enabled Malware Installation Vulnerabilities in some antivirus software could have enabled attackers to install malware and deactivate anti-ransomware protection to take over software controls, academic researchers say.

article thumbnail

The DarkSide Ransomware Gang

Schneier on Security

The New York Times has a long story on the DarkSide ransomware gang. A glimpse into DarkSide’s secret communications in the months leading up to the Colonial Pipeline attack reveals a criminal operation on the rise, pulling in millions of dollars in ransom payments each month. DarkSide offers what is known as “ransomware as a service,” in which a malware developer charges a user fee to so-called affiliates like Woris, who may not have the technical skills to actually create ran

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Uninstall Now: Critical WordPress Plug-In Flaw Exploited

Data Breach Today

Fancy Product Designer Flaw Allows Remote Code Execution Hackers are exploiting a critical zero-day flaw in the WordPress plug-in Fancy Product Designer, which allows remote code execution, the Wordfence Threat Intelligence team at Defiant Inc. says. Because a patch has not yet been released, the team urges users to immediately uninstall the vulnerable plug-in.

274
274

More Trending

article thumbnail

Encrypted EncroChat Network: Police Arrest More Suspects

Data Breach Today

'Industrial-Scale Cocaine Lab' Seizure Traces to Users of Defunct EncroChat Service Former customers of the now-defunct encrypted communications service EncroChat, which was infiltrated by police last year, continue to get busted, including members of a crime syndicate that operated "an industrial-scale cocaine laboratory" in the Netherlands, Europol says.

article thumbnail

Critical 0day in the Fancy Product Designer WordPress plugin actively exploited

Security Affairs

A critical zero-day vulnerability in the Fancy Product Designer WordPress plugin exposes more than 17,000 websites to attacks. Researchers from the Wordfence team at WordPress security company Defiant warn that a critical zero-day vulnerability, tracked as CVE-2021-24370, in the Fancy Product Designer WordPress plugin is actively exploited in the wild.

Security 121
article thumbnail

White House Puts Russia on Notice Over JBS Ransomware Hit

Data Breach Today

In Wake of Colonial Pipeline Attack, Ransomware as Unrestrained as Ever, Experts Say After the ransomware attack against meat-processing giant JBS, the White House says it has contacted Russia, putting it on notice that "responsible states do not harbor ransomware criminals." Experts say that despite the chaos caused by the Colonial Pipeline hit, the pace of ransomware attacks hasn't slowed.

article thumbnail

A View from Inside a Deception

Dark Reading

Pen-testing today's threat deception technology is not for the faint-hearted. Do modern deception tools truly frustrate adversaries, and are they ready for the enterprise SOC?

114
114
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Health Data for Millions Deleted From Cloud Bucket

Data Breach Today

Benefits Administrator Says AWS S3 Bucket Was Breached 20/20 Hearing Care Network, a vision and hearing benefits administrator, is notifying nearly 3.3 million individuals that their personal and health information contained in an Amazon Web Services cloud storage bucket was accessed or downloaded - and then deleted - by an "unknown" actor.

Cloud 232
article thumbnail

AMT Games data breach: Millions of Users’ Messages, Account IDs, and IP Addresses Exposed

Security Affairs

WizCase’s security team discovered an unsecured ElasticSearch server owned by AMT Games which exposed 1.47 TB of data. This leak exposed users’ email addresses, IP addresses, Facebook data, and more to potential attack. The leaked data numbers in the millions and was accessible to anyone who possessed the link. There was no need for a password or login credentials to access the information, and the data was not encrypted.

article thumbnail

Microsoft 365: Most Common Threat Vectors & Defensive Tips

Dark Reading

Security pros discuss the most typical ways attackers leverage Microsoft 365 and share their guidance for defenders.

Security 125
article thumbnail

Database, source code allegedly related to bulletproof hosting, once Parler’s service provider, up for sale on hacker forum

Security Affairs

Group-IB discovered a database allegedly belonging to a bulletproof hosting provider DDoS-Guard posted for sale on a cybercrime forum. Group-IB , a global threat hunting and adversary-centric cyber intelligence company specializing in investigating and preventing hi-tech cybercrimes, has discovered a database allegedly belonging to a bulletproof hosting provider DDoS-Guard posted for sale on a cybercrime forum on May 26.

Sales 101
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

SaaS and being Socially Responsible

Micro Focus

SaaS (a.k.a. cloud computing) is the future. We know this to be true since SaaS is an increasingly common delivery model for business applications. However, as well as examining how SaaS can drive business transformation, it is equally important to consider how SaaS relates to social responsibility. Environmental considerations are becoming more important to everyone.

Cloud 96
article thumbnail

Podcast: The State of Ransomware

Threatpost

In this Threatpost podcast, Fortinet’s top researcher sketches out the ransom landscape, with takeaways from the DarkSide attack on Colonial Pipeline.

article thumbnail

Is Your Adversary James Bond or Mr. Bean?

Dark Reading

Especially with nation-state attacks, its critical to assess whether you're up against jet fighter strength or a bumbler who tries to pick locks.

IT 100
article thumbnail

Effective Adoption of SASE in 2021

Threatpost

In this Threatpost podcast, Forcepoint’s SASE and Zero Trust director describes how the pandemic jump-started SASE adoption.

Cloud 106
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cyber Defense Magazine – June 2021 has arrived. Enjoy it!

Security Affairs

Cyber Defense Magazine June 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 129 pages of excellent content. Cyber Defense Magazine June 2021. 129 PAGES. GRAB THIS VERSION TO HELP FUND OUR OPERATIONS: CLICK HERE FOR PDF DOWLOAD Here’s our online flipbook & MOBILE version: CLICK HERE FOR FLIPBOOK Here’s our online Yumpu version: CLICK HERE FOR YUMPU.

IT 81
article thumbnail

DoJ Charges Rhode Island Woman in Phishing Scheme Against Politicians

Threatpost

Diana Lebeau allegedly tried to trick candidates for public office and related individuals into giving up account credentials by impersonating trusted associates and the Microsoft security team.

article thumbnail

Phishing Emails Remain in User Inboxes Over 3 Days Before They're Removed

Dark Reading

Most malicious emails get blocked, but the ones that get through linger around dangerously long, a new study shows.

Phishing 106
article thumbnail

NYDFS settles cybersecurity regulation matter for $1.8 million

Data Protection Report

On May 13, 2021, the New York Department of Financial Services (NYDFS) announced a $1.8 million settlement with two related insurance companies, relating to violations of two different requirements of the NYDFS cybersecurity regulation during the period 2018 to 2019. NYDFS Cybersecurity Regulation. Readers may recall that NYDFS’ cybersecurity regulation went into effect in March of 2017.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft Buys ReFirm Labs to Drive IoT Security Efforts

Dark Reading

The acquisition will bring ReFirm's firmware analysis capabilities alongside Microsoft's Azure Defender for IoT to boost device security.

IoT 97
article thumbnail

Banking Attacks Surge Along with Post-COVID Economy

Threatpost

FinTech fraud spikes 159 percent in Q1 2021 along with stimulus spending.

article thumbnail

Encryption Helps Companies Avoid Breach Notifications

Dark Reading

With nearly twice as many firms suffering a breach compared with the previous year, limiting the damage becomes more important, a survey finds.

article thumbnail

Clinical Laboratory Pays $25,000 to Settle Potential HIPAA Security Rule Violations via OCR Listserv

IG Guru

May 25, 2021 Clinical Laboratory Pays $25,000 to Settle Potential HIPAA Security Rule Violations Peachstate Health Management, LLC, doing business as AEON Clinical Laboratories (Peachstate), has agreed to pay $25,000 to the Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) and to implement a corrective action plan to […].

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FireEye Sells Products Business to Symphony Group for $1.2B

Dark Reading

The transaction will include the FireEye brand name; the business that remains will be called Mandiant Solutions.

95
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. How did he get started and what’s next? In this episode, LiveOverflow talks about his six years of producing engaging YouTube content and what the rise of social media influencers might mean for traditional conferences like Black Hat.

article thumbnail

Wordpress Discloses Critical Zero-day in Fancy Product Designer Plugin

Dark Reading

The plugin under active attack has been installed on more than 17,000 websites, Wordpress reports.

92