Fri.Oct 29, 2021

article thumbnail

Enterprise Backups Are Becoming Targets for Cybercriminals

Data Breach Today

VMware’s Tom Kellermann on Defending Against Ransomware Attacks In ransomware attacks, cybercriminals attack through the backups because they know that security practitioners rely on backups to save themselves after a ransomware attack. Therefore, it is essential to have multiple backups, says Tom Kellermann, head of cybersecurity strategy at VMware.

article thumbnail

Google Chrome is Abused to Deliver Malware as ‘Legit’ Win 10 App

Threatpost

Malware delivered via a compromised website on Chrome browsers can bypass User Account Controls to infect systems and steal sensitive data, such as credentials and cryptocurrency.

128
128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Launches Cybersecurity Recruitment Campaign

Data Breach Today

Company Aims to Fill 250,000-Worker Shortfall in Cybersecurity Microsoft launched a four-year campaign on Thursday with community colleges in the U.S. aimed at recruiting hundreds of thousands of people into the field of cybersecurity. The goal is to fill an expected shortfall of 250,000 workers in cybersecurity, which Microsoft says means rising risk.

article thumbnail

ESET found a variant of the Hive ransomware that encrypts Linux and FreeBSD

Security Affairs

The Hive ransomware operators have developed a new variant of their malware that can encrypt Linux and FreeBSD. ESET researchers discovered a new Hive ransomware variant that was specifically developed to encrypt Linux and FreeBSD. Researchers at the cybersecurity firm believe that the new encryptors are still under development. Both variants are written in Golang, but the strings, package names and function names have been obfuscated.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

WordPress Plug-In Bugs Put 1 Million-Plus Sites At Risk

Data Breach Today

Exploitation May Have Exposed REST-API Endpoints on Sites, Researchers Say OptinMonster, a WordPress plug-in used in more than 1 million websites for sales campaign creation, was vulnerable to high-severity bugs, according to Wordfence researchers. An updated version of the plug-in has patched the flaws.

Risk 261

More Trending

article thumbnail

Ransomware Gangs Are Not Infallible

Data Breach Today

The latest ISMG Security Report features the fallibility of ransomware gangs and why victims should always seek help from a reputable response firm, law enforcement or other qualified expert. Also featured: Data protection advice and why the remote work model might make securing data easier.

article thumbnail

SolarMarker Attackers Use SEO Poisoning to Push Malicious Code

eSecurity Planet

Cybercriminals leveraging the SolarMarker.NET-based backdoor are using a technique called SEO poisoning to drive malicious payloads into victims’ systems so they can gain access to the credentials and data within. According to researchers at Menlo Security, the SolarMarker campaign is one of two such efforts they’ve seen in recent months using SEO poisoning to deceive users and get them to download the malicious payload into their systems.

article thumbnail

ISMG Editors: Solving the Ransomware Problem Together

Data Breach Today

Also: Increasing Diversity and Inclusion in Cybersecurity Four ISMG editors discuss important cybersecurity issues, including law enforcement authorities' disruption of ransomware gang REvil's operations, how to collaborate as an industry to fight the surge in ransomware attacks hitting businesses, and increasing diversity and inclusion in the workplace.

article thumbnail

Police arrested 12 individuals involved in 1800 ransomware attacks worldwide

Security Affairs

Europol and Norwegian Police arrested 12 individuals over ransomware attacks on organizations worldwide, including critical infrastructure operators. A joint operation conducted by Europol, the Norwegian Police and other authorities led to the arrest of 12 individuals over ransomware attacks on organizations worldwide, including critical infrastructure operators.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Healthcare System Phishing Breach Affects 209,000

Data Breach Today

Academic Medical Center Says Access to Email Accounts Lasted Months Massachusetts-based UMass Memorial Health is the latest large healthcare network to report an email phishing incident that potentially compromised hundreds of thousands of individuals' protected health information. The unauthorized email access lasted about seven months.

Phishing 258
article thumbnail

NSA and CISA explained how to prevent and detect lateral movement in 5G networks via cloud systems

Security Affairs

The US NSA and CISA published a security advisory to warn about threat actors compromising 5G networks via cloud infrastructure. The US National Security Agency and the US Cybersecurity Infrastructure and Security Agency have published a security advisory to warn of attacks on 5G networks through the hijacking of a provider’s cloud resources. The report is part of a four-part series that was built on the ESF Potential Threat Vectors to 5G Infrastructure white paper that was released by the US ag

Cloud 101
article thumbnail

Federal CISO DeRusha Named Deputy National Cyber Director

Data Breach Today

Director Chris Inglis Also Outlines Vision for NCD Office, Level of Accountability National Cyber Director Chris Inglis on Thursday announced that Federal CISO Chris DeRusha will concurrently serve as his deputy at the newly created office. Inglis, a Senate-confirmed top adviser to the president, also released a "statement of strategic intent" outlining his own official duties.

254
254
article thumbnail

An Apparent Ransomware Hack Puts the NRA in a Bind

WIRED Threat Level

The group behind the reported attack is under sanctions from the US Treasury, which means a payout could come with penalties for the victim.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Countries Team Up to Issue Video Teleconference Guidance

Data Breach Today

After Consulting With VTC Providers, Authorities Recommend End-to-End Encryption Six national data protection and privacy authorities – from Australia, Canada, Gibraltar, Hong Kong SAR, China and Switzerland - have joined with the U.K. information Commissioner’s Office to issue guidance to video teleconferencing companies on privacy, calling for end-to-end encryption.

article thumbnail

Papua New Guinea ‘s finance ministry was hit by a ransomware

Security Affairs

A ransomware attack hit Papua New Guinea ‘s finance ministry and disrupted government payments and operations. Government officials confirmed that Papua New Guinea’s finance ministry was hit by a ransomware attack that disrupted government payments and operations. The ransomware infected the Department of Finance’s Integrated Financial Management System a week ago, said the finance minister and acting treasurer, John Pundari.

article thumbnail

Is my phone listening to me? We ask the expert

The Guardian Data Protection

Data protection advocate Mariano delli Santi on whether we should worry about targeted advertising We all believe in at least one conspiracy theory. Well, a little bit. That’s according to a Norwegian professor who recently argued that conspiratorial thinking spans everything from 5G theories to believing the referee really is against your team. Mine?

Mining 92
article thumbnail

Finding the Right Approach to Cloud Security Posture Management (CSPM)

Dark Reading

Cloud security is maturing — it has to. New strategies are surfacing to respond to new problems. Dr. Mike Lloyd, RedSeal's CTO, reviews one of the latest: CSPM.

Cloud 88
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

MER Conference 2022 Early Bird Registration Opens November 1!

IG Guru

New Year. New Experience. New Ways to Re-IMAGINE Information Governance. Meeting in-person at the JW Marriott in Indianapolisis just the beginning. The MER Conference program is designed to help inspire you to reimagine the future of IG—as well as provide you with tools to better impact your organization’s business objectives, NOW. Stay tuned for details […].

article thumbnail

Snyk Agrees to Acquire CloudSkiff, Creators of driftctl

Dark Reading

New capabilities allow Snyk Infrastructure as Code customers to more effectively detect infrastructure drift.

103
103
article thumbnail

Weekly Update 267

Troy Hunt

Now this office is starting to look good! New wallpaper is in and brackets for the shelf are ready, just waiting for it to be made and fitted now. Oh - I mentioned a sound absorbing material that'll go up the wall in front of me and the ceiling - here's what'll it'll look like: During yesterday's weekly update vid I mentioned some sound absorbing material was going into my office.

IT 78
article thumbnail

Cybercriminals Take Aim at Connected Car Infrastructure

Dark Reading

While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the crosshairs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Is empathy drowning in a sea of data?

OpenText Information Management

The idea of the family doctor has passed into history. In fact, fewer and fewer Americans have a primary care provider. Yet empathy is, and must always remain, a central pillar of healthcare. As patient experiences increasingly move from the personal to the digital, how can we ensure there is real empathy between provider and … The post Is empathy drowning in a sea of data?

70
article thumbnail

APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm

Dark Reading

A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.

article thumbnail

Micro Focus Post-Sales: Supported

Micro Focus

I am Dr. James D. Borderick, and I look after the Competitive Benchmark research for Micro Focus, which I have been doing for over five years. I wish to share some very interesting statistics with our followers regarding satisfaction with Post-Sales Support. How do we measure Post-Sales Support? Micro Focus uses double-blind competitive benchmarking to gauge.

Sales 66
article thumbnail

Enterprises Allocating More IT Dollars on Cybersecurity

Dark Reading

Enterprises are allocating more IT dollars towards implementing a multilayered approach to securing data and applications against new threats, data shows.

IT 85
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cybersecurity Awareness Month: Q&A with Mischel Kwon, CEO of W@tchtower

Collibra

This Cybersecurity Awareness Month we’re delighted to share a special fireside chat with Mischel Kwon. Mischel is the founder and CEO of W@tchtower and a veteran of the IT and security world. Before founding her own security operations management company, she built the first Justice Security Operations Center (JSOC) while serving as the Deputy Director for IT Security Staff at the United States Department of Justice and served as the Director of US-CERT.

article thumbnail

Cybercriminals Take Aim at Connected Car Infrastructure

Dark Reading

While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the crosshairs.

article thumbnail

Customers Can Pursue Negligence Claims Directly Against Vendor

Data Protection Report

On October 19, 2021, a federal trial court in South Carolina ruled that a group of consumers could proceed with common law negligence and gross negligence claims directly against their organizations’ vendor that had been the victim of a security breach—instead of suing the organizations of which they were customers. In re Blackbaud, Inc. Customer Data Breach Litigation , Case No.: 3:20-mn-02972-JMC, MDL No. 2972 (D.S.C.