Thu.Oct 21, 2021

article thumbnail

Diversity, Equity and Inclusion Challenges in Cybersecurity

Data Breach Today

(ISC)2 Report: Fixing Underrepresentation of People of Color and Women in Cyber In a report published earlier this week, (ISC)² - the international non-profit association that certifies cybersecurity professionals - says minority security practitioners, including people of color and women, are underrepresented in the field and offers practical steps to address the issues.

article thumbnail

National AI Strategy: The UK Government Publishes Its Artificial Intelligence Strategy for the Next Decade

Data Matters

On 22 September 2021, the UK Government (the “ Government ”) published its Artificial Intelligence (“ AI ”) strategy. The paper outlines the Government’s plan to make Britain a “global superpower” in the AI arena, and sets out an agenda to build the most “pro-innovation regulatory environment in the world”. This post highlights some of the key elements from the UK AI strategy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware: Average Ransom Payment Stays Steady at $140,000

Data Breach Today

Big Game Hunting Is Out and 'Mid Game Hunting' Is In, Coveware Warns When a business, government agency or other organization hit by ransomware opted to pay a ransom to its attacker in Q3, the average payment was $140,000, reports ransomware incident response firm Coveware. It says the attack landscape has seen some notable shifts since the Colonial Pipeline attack.

article thumbnail

Problems with Multifactor Authentication

Schneier on Security

Roger Grimes on why multifactor authentication isn’t a panacea : The first time I heard of this issue was from a Midwest CEO. His organization had been hit by ransomware to the tune of $10M. Operationally, they were still recovering nearly a year later. And, embarrassingly, it was his most trusted VP who let the attackers in. It turns out that the VP had approved over 10 different push-based messages for logins that he was not involved in.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hacker Claims Details of 45 Million Argentinians Stolen

Data Breach Today

@AnibalLeaks Says Entire Database for Sale on Hacking Forum A cybercriminal known as cfk on popular hacking forums and @AnibalLeaks on Twitter claims to have stolen a database consisting of 45 million records of Argentina's National Registry of Persons, or ReNaPer. The government denies that there has been unauthorized entry into its systems.

Sales 290

More Trending

article thumbnail

Dental Alliance Reports Vendor Breach Affecting 170K

Data Breach Today

Multiple Breach Reports for Phishing Incident Reflect Notification Complexities The Professional Dental Alliance is notifying more than 170,000 individuals in about a dozen states of a phishing breach involving an affiliated vendor that provides nonclinical management services to dental practices owned by PDA. Why is breach notification so complicated?

Phishing 280
article thumbnail

A flaw in WinRAR could lead to remote code execution

Security Affairs

A vulnerability in the WinRAR is a trialware file archiver utility for Windows could be exploited by a remote attacker to hack a system. Positive Technologies researcher Igor Sak-Sakovskiy discovered a remote code execution vulnerability, tracked as CVE-2021-35052, in the popular WinRAR trialware file archiver utility for Windows. The vulnerability affects the trial version of the utility, the vulnerable version is 5.70. “This vulnerability allows an attacker to intercept and modify reques

Archiving 116
article thumbnail

4 Bulletproof Hosting Provider Admins Getting Sentenced

Data Breach Today

Bulletproof Hosting Service Supported Zeus, SpyEye and Citadel Malware, Says FBI Four extradited Eastern European men have pleaded guilty in U.S. court to one count of conspiring to serve as administrators of a bulletproof hosting service that facilitated online attacks using the Zeus, SpyEye and Citadel Trojans and the Blackhole exploit kit, says the U.S.

173
173
article thumbnail

Evil Corp rebrands their ransomware, this time is the Macaw Locker

Security Affairs

Evil Corp cybercrime gang is using a new ransomware called Macaw Locker to evade US sanctions that prevent victims from paying the ransom. Evil Corp has launched a new ransomware called Macaw Locker to evade US sanctions that prevent victims from making ransom payments. Bleeping Computer, citing Emsisoft CTO Fabian Wosar, reported that the Macaw Locker ransomware is the latest rebrand of Evil Corp.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Building cyber security careers

IT Governance

The need for experienced and qualified cyber security professionals is a highlight of Cybersecurity Career Awareness Week , led by NICE (National Initiative for Cybersecurity Education). This campaign is part of Cybersecurity Awareness Month 2021 , which is focused on empowering individuals and organisations to “own their role in protecting their part of cyberspace”.

Security 111
article thumbnail

DOJ Announces New Cyber-Fraud Initiative and Intent to Utilize False Claims Act to Spur Compliance

Hunton Privacy

On October 6, 2021, Deputy Attorney General Lisa Monaco announced the launch of the new Civil Cyber-Fraud Initiative. Led by the Department of Justice (“DOJ”) Civil Division’s Commercial Litigation Branch, Fraud Section, the initiative will seek to “utilize the False Claims Act (“FCA”) to pursue cybersecurity related fraud by government contractors and grant recipients.”.

article thumbnail

45 million Brits were targeted by scam calls and texts this summer

IT Governance

Almost 45 million people in the UK were targeted by scam phone calls or texts in the past three months, according to the telecoms regulator Ofcom. Landline users are the most likely to fall victim, with elderly people especially vulnerable. The survey found that 61% of people aged 75 and over had received phone-based phishing attacks (known as ‘vishing’) over their landline.

article thumbnail

Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion

The Security Ledger

Brian Trzupek of DigiCert joins Paul to talk about the findings of a recent State of PKI Automation survey and the challenges of managing fast-growing population of tens of thousands of PKI certificates. The post Spotlight: Automation Beckons as DevOps, IoT Drive PKI Explosion appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen.

IoT 98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gigabyte Allegedly Hit by AvosLocker Ransomware

Threatpost

If AvosLocker stole Gigabyte's master keys, threat actors could force hardware to download fake drivers or BIOS updates in a supply-chain attack a la SolarWinds.

article thumbnail

Administrators of bulletproof hosting sentenced to prison in the US

Security Affairs

The United States Department of Justice sentenced two individuals that were providing bulletproof hosting to various malware operations. The United States Department of Justice sentenced to prison two individuals involved in providing bulletproof hosting to various malware operations, including Citadel , SpyEye, Zeus, and the Blackhole exploit kit. The two individuals, Aleksandr Skorodumov (33) of Lithuania, and Pavel Stassi (30) of Estonia, administrated the bulletproof hosting service between

article thumbnail

Ransomware Sinks Teeth into Candy-Corn Maker Ahead of Halloween

Threatpost

Chicago-based Ferrara acknowledged an Oct. 9 attack that encrypted some systems and disrupted production.

article thumbnail

US Bureau of Industry and Security bans export of hacking tools to authoritarian regimes

Security Affairs

The Commerce Department’s Bureau of Industry and Security (BIS) would ban U.S. firms from selling hacking tools to authoritarian regimes. The Commerce Department’s Bureau of Industry and Security (BIS) would introduce a new export control rule aimed at banning the export or resale of hacking tools to authoritarian regimes. The rule announced by the BIS tightens export controls on technology that could be used by adversaries to conduct malicious cyber activities and surveillance of pr

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Macs Still Targeted Mostly With Adware, Less With Malware

Dark Reading

The top 10 categories of digital threats on macOS are all adware programs, with only a sliver of the share of victims affected by actual malware, according to an IT management firm.

IT 114
article thumbnail

TA551 Shifts Tactics to Install Sliver Red-Teaming Tool

Threatpost

A new email campaign from the threat group uses the attack-simulation framework in a likely leadup to ransomware deployment.

article thumbnail

Microsoft Launches Security Program for Nonprofits

Dark Reading

A new set of security tools is built to assess risk, provide monitoring and notification if an attack occurs, and train IT pros and users.

article thumbnail

Learn Data Analytics Online in 24 Weeks via Michigan State University

IG Guru

Check out more about this program here. The post Learn Data Analytics Online in 24 Weeks via Michigan State University appeared first on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How Psychology Can Save Your Cybersecurity Awareness Training Program

Dark Reading

Understanding human psychology, how it works, and how to introduce its concepts into cybersecurity awareness training can make a huge difference to your organization.

article thumbnail

All your Macs are belong to us: The story of CVE-2021-30657

Jamf

Join security researcher Patrick Wardle, Founder, Objective-See, and Jaron Bradley, Detections Lead, Jamf, as they perform an in-depth dive into CVE-2021-30657, the vulnerability in macOS that allowed attackers to bypass GateKeeper earlier this year.

article thumbnail

The Discoverability of IoT Devices

eDiscovery Daily

What are IoT Devices. The Internet has transformed the way we conduct daily chores. Simple objects such as fridges, watches, doorbells, and washing machines can now be connected to secure networks. This technology is quick, efficient, and the perfect replacement for manual tasks. Whenever the user is within range and connected to WiFi, IoT devices can be used to turn on the lights, preheat the oven, and more.

IoT 74
article thumbnail

U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts Warn

Threatpost

Meanwhile, Zerodium's quest to buy VPN exploits is problematic, researchers said.

Sales 99
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New report by Gartner evaluates OpenText Content Services Platforms

OpenText Information Management

OpenText™ is pleased to announce we have been named a Leader in the 2021 Gartner® Magic Quadrant™ for Content Services Platforms. “Gartner de?nes content services platforms (CSPs) as the foundational component in an organization for the management and use of content. CSPs provide a way for employees to retrieve and work with content in a … The post New report by Gartner evaluates OpenText Content Services Platforms appeared first on OpenText Blogs.

article thumbnail

Google Buckles Down on Android Enterprise Security

Dark Reading

The launch of Android 12 brings several new default security features, along with new security efforts for Android Enterprise.

article thumbnail

iPad management: How to activate cellular data plans with Jamf solutions

Jamf

During this session with Larry Stegall, Field sales Engineer II, Jamf, participants will see how Jamf Pro and Jamf School can be leveraged to activate their cellular iPads. In addition, the audience will also see workflows that can be used to change carriers remotely.

Sales 52