Tue.Jul 13, 2021

article thumbnail

SolarWinds Issues Patches in Wake of Zero-Day Attacks

Data Breach Today

Flaw in Serv-U File-Transfer Software Unconnected to Orion Supply-Chain Attack Attackers have been actively exploiting a zero-day flaw in SolarWinds' Serv-U Managed File Transfer Server and Serv-U Secured FTP software, the security software vendor warns. SolarWinds has released patched versions that mitigate the flaw, discovered by Microsoft, and is urging users to update.

Security 363
article thumbnail

Microsoft Patch Tuesday, July 2021 Edition

Krebs on Security

Microsoft today released updates to patch at least 116 security holes in its Windows operating systems and related software. At least four of the vulnerabilities addressed today are under active attack, according to Microsoft. Thirteen of the security bugs quashed in this month’s release earned Microsoft’s most-dire “critical” rating, meaning they can be exploited by malware or miscreants to seize remote control over a vulnerable system without any help from users.

Security 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2 State Cybersecurity, Data Privacy Laws Enacted

Data Breach Today

Connecticut Law Provides Security Incentives; Colorado Measure Addresses Consumers' Privacy Two states have recently taken steps to bolster cybersecurity and data privacy protections. Connecticut has enacted a law designed to give certain legal protections to businesses that adhere to cybersecurity frameworks. And a new data privacy law in Colorado allows individuals to opt out of data collection.

article thumbnail

How Are Remote Work and New Technologies Impacting Information Management?

AIIM

The shift to remote work has significantly impacted how organizations manage information. We sat down recently with Adam Storch, Vice President of Business Solutions, Micro Strategies, to discuss the effect advancing technology and the move to hybrid workplaces have had on information management. How are businesses using artificial intelligence (AI) to automate the processing and categorization of incoming information?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

REvil's Infrastructure Goes Offline

Data Breach Today

Researchers Question Why the Ransomware Gang's Sites Went Dark The REvil, aka Sodinokibi, ransomware gang's infrastructure, including its darknet sites, were offline Tuesday, numerous security specialists report. The reason for the sudden disappearance is far from clear.

More Trending

article thumbnail

Supply Chain Ransomware Breach Affects 1.2 Million

Data Breach Today

Practicefirst Apparently Paid a Ransom A supply chain ransomware attack affecting more than 1.2 million individuals is among the largest health data breaches reported to federal regulators so far this year.

article thumbnail

Email Spoofing: What to Know in 2021

eSecurity Planet

Email spoofing is a common tactic hackers use in phishing and social engineering attacks. Spoofing trends tend to increase around popular shopping holidays in the U.S., including Black Friday and Amazon Prime Day , and the recent LinkedIn data scrape has already led to an uptick in spoofing attempts. With these threats in mind, it’s important to understand how spoofing works and what you can do to protect yourself, your employees, and your business from falling victim to a spoofing attack.

Phishing 132
article thumbnail

Espionage Campaign Using Updated Variant of Bandook Spyware

Data Breach Today

Venezuelan Organizations Are Prime Targets Researchers at the security firm ESET have uncovered an ongoing espionage campaign using an updated variant of Bandook spyware to target corporate networks in Venezuela and other nations in Latin America.

Security 284
article thumbnail

Enterprises Altering Their Supply Chain Defenses on Heels of Latest Breaches

Dark Reading

More than half of enterprises surveyed for Dark Reading's State of Malware Threats report indicate they are making at least a few changes to their supply chain security defenses following recent attacks on software vendors such as SolarWinds.

Security 125
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Moving Forward With Identity-Centric Security

Data Breach Today

Richard Bird of Ping Identity discusses IAM solutions and "zero trust" for the new world in which identity is the perimeter.

Security 261
article thumbnail

SolarWinds Issues Hotfix for Zero-Day Flaw Under Active Attack

Threatpost

Microsoft alerted the company to a security vulnerability in its Serv-U Managed File Transfer and Secure FTP products that a cyberattacker is using to target a “limited” amount of customers.

Security 115
article thumbnail

The infrastructure and websites used by REvil ransomware gang are not reachable

Security Affairs

The infrastructure and leak sites used by the REvil ransomware gang for its operations went offline last night. Starting last night, the infrastructure and the websites used by the REvil ransomware gang were mysteriously unreachable, BleepingComputer first reported. “The REvil ransomware operation, aka Sodinokibi, operates through numerous clear web and dark web sites used as ransom negotiation sites, ransomware data leak sites, and backend infrastructure.” reported BleepingComputer.

article thumbnail

Why 91% of enterprises are looking for new integration solutions

OpenText Information Management

Earlier this year, OpenText and IDG surveyed enterprises with more than 1,000 employees on ERP integration, including insights on their current system landscape, integration requirements, key challenges, and future plans. The responses covered companies in the United States and Europe, ranging across 19 different industries, but despite this diversity a vast majority of them pointed … The post Why 91% of enterprises are looking for new integration solutions appeared first on OpenText Blogs

B2B 110
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ModiPwn flaw in Modicon PLCs bypasses security mechanisms

Security Affairs

ModiPwn flaw (CVE-2021-22779) in some of Schneider Electric’s Modicon PLCs can allow attackers to bypass authentication mechanisms and take over the device. Researchers at IoT security firm Armis discovered an authentication bypass vulnerability, tracked as CVE-2021-22779 and dubbed ModiPwn, that affects some of Schneider Electric ’s Modicon PLCs. The flaw can be exploited by an unauthenticated attacker who has network access to the targeted PLC to take full control over the PLC the vulnerable

article thumbnail

UK: Lloyd v Google LLC – data protection class action claims

DLA Piper Privacy Matters

Followers of Privacy Matters will be familiar with the case of Lloyd v Google LLC , which raises important issues as to the recoverability of compensation for breaches of data protection law, and is likely to be pivotal to the mass claims landscape in the UK. The case went before the UK’s Supreme Court in April 2021 and Judgment is anticipated in Autumn 2021.

Privacy 105
article thumbnail

Microsoft Crushes 116 Bugs, Three Actively Exploited

Threatpost

Microsoft tackles 12 critical bugs, part of its July 2021 Patch Tuesday roundup, capping a ‘PrintNightmare’ month of headaches for system admins.

IT 115
article thumbnail

More to love in the NEW Jamf Nation

Jamf

For 10 years, Jamf Nation has connected Apple administrators around the world and through the seemingly limitless knowledge of its members, the community continues to provide resources that help more organizations succeed with Apple. And it’s getting even better!

IT 98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Data breaches and cyber attacks quarterly review: Q2 2021

IT Governance

Welcome to our second quarterly review of security incidents for 2021, in which we take a closer look at the information gathered in our monthly list of cyber attacks and data breaches. In this blog, we provide an overview of the security landscape in the past three months, and look at key statistics and observations. This includes year-on-year comparisons in the number of publicly disclosed incidents, a review of the most breaches sectors and a running total of incidents for the year.

article thumbnail

Unpatched Critical RCE Bug Allows Industrial, Utility Takeovers

Threatpost

The 'ModiPwn' bug lays open production lines, sensors, conveyor belts, elevators, HVACs and more that use Schneider Electric PLCs.

116
116
article thumbnail

Zasio Analyst, Rick Surber, contributes to US record-keeping requirements in the second edition of the book, Leitfaden Information Governance: Organisationen Erfolgreich Digitalisieren (Information Governance Guide: Successfully Digitizing Organizations).

IG Guru

Check out the post on LinkedIn here. The post Zasio Analyst, Rick Surber, contributes to US record-keeping requirements in the second edition of the book, Leitfaden Information Governance: Organisationen Erfolgreich Digitalisieren (Information Governance Guide: Successfully Digitizing Organizations). appeared first on IG GURU.

article thumbnail

Is Remote Desktop Protocol Secure? It Can Be

Threatpost

Matt Dunn, associate managing director in Kroll's Cyber Risk practice, discusses options for securing RDP, which differ significantly in terms of effectiveness.

Security 102
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Phishing Campaign Targets Individuals of Interest to Iran

Dark Reading

TA453 group spoofed two scholars at University of London to try and gain access to email inboxes belonging to journalists, think tank personnel, academics, and others, security vendor says.

Phishing 100
article thumbnail

American retailer Guess discloses data breach after ransomware attack

Security Affairs

American clothing brand and retailer Guess discloses a data breach after the February ransomware attack and is notifying the affected customers. In February, American fashion brand Guess was hit by a ransomware attack, now the company is disclosing a data breach and is notifying affected customers. The attack was likely carried out by the DarkSide ransomware gang that in April listed Guess on their data leak site claiming to have stolen over 200 GB of files.

Retail 93
article thumbnail

Cuba’s Social Media Blackout Reflects an Alarming New Normal

WIRED Threat Level

In response to mass protests, the country has been blocking social media and communication platforms since Sunday—an increasingly common action worldwide.

article thumbnail

Social media partially disrupted in Cuba amid anti-government protests

Security Affairs

NetBlocks reported partial disruption to social media and messaging platforms in Cuba from 12 July 2021 shortly after Cubans went to the streets to protest the government. Security experts from NetBlocks are observing partial disruption to social media and messaging platforms in Cuba from 12 July 2021 shortly after Cubans went to the streets to protest the government.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

‘Charming Kitten’ APT Siphons Intel From Mid-East Scholars

Threatpost

Professors, journalists and think-tank personnel, beware strangers bearing webinars: It’s the focus of a particularly sophisticated, and chatty, phishing campaign.

article thumbnail

The Trouble With Automated Cybersecurity Defenses

Dark Reading

While there's enormous promise in AI-powered tools and machine learning, they are very much a double-edged sword.

article thumbnail

New CISA Director Confirmed, White House Gains Cyber-Director

Threatpost

Jen Easterly, former NSA official and Morgan Stanley vet, will take up the lead at CISA as the ransomware scourge rages on.