Wed.Nov 03, 2021

article thumbnail

Legal Holds in Slack: Should You Collect Data to Preserve It or Preserve in Place?

Hanzo Learning Center

A head-to-head match—and the winner is ….

IT 98
article thumbnail

MY TAKE: lastwatchdog.com receives recognition as a Top 10 cybersecurity webzine in 2021

The Last Watchdog

Last Watchdog’s mission is to foster useful understanding about emerging cybersecurity and privacy exposures. Related article: The road to a Pulitzer. While I no longer concern myself with seeking professional recognition for doing this, it’s, of course, always terrific to receive peer validation that we’re steering a good course. That’s why I’m thrilled to point out that Last Watchdog has been recognized, once again, as a trusted source of information on cybersecurity and privacy topics.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Directs Federal Agencies to Patch Known Vulnerabilities

Data Breach Today

BOD 22-01 Imposes Strict Deadlines for Remediation of Publicly Known Exploits The U.S. Cybersecurity and Infrastructure Security Agency on Wednesday issued a new directive - BOD 22-01 - requiring federal civilian agencies to patch vulnerabilities known to be actively exploited in the wild.

article thumbnail

The U.K. Labour Party discloses a data breach

Security Affairs

The U.K. Labour Party discloses a data breach after a ransomware attack hit a service provider that is managing its data. The U.K. Labour Party discloses a data breach after a service provider that manages its data was hit by a ransomware attack. The party notified relevant authorities and members that some of their information was impacted by the security breach.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

BlackMatter Claims to Shut Ops; Experts Suspect Rebranding

Data Breach Today

Criminal Group Announced News on Russian Site, Says Malware Research Organization vx-underground Ransomware-as-a-service provider BlackMatter has ceased operations due to pressure from local authorities, malware research organization vx-underground says, citing an announcement made by the gang on a Russian underground site.

More Trending

article thumbnail

FBI Warns of Ransomware Actors Leveraging M&A Data

Data Breach Today

Bad Actors Learn Victim Firms' Public, Nonpublic Data Before Attack to Increase Impact The Federal Bureau of Investigation has issued a notification warning to private sector companies, especially those listed or in the process of being listed on stock exchanges, to be aware of ransomware actors using their undisclosed merger and acquisition data for extortion.

article thumbnail

BlackMatter ransomware gang is shutting down due to pressure from law enforcement

Security Affairs

The BlackMatter ransomware gang announced it is going to shut down its operation due to pressure from law enforcement. The BlackMatter ransomware group has announced it is shutting down its operation due to the pressure from local authorities. The announcement was published on the Ransomware-as-a-Service portal operated by the group used by the network of affiliates of the gang.

article thumbnail

Ransomware Incidents Among Largest Breaches on Federal Tally

Data Breach Today

Analysis of Latest Health Data Breaches on the HHS OCR 'Wall of Shame' Ransomware incidents are becoming a major cause of health data breaches affecting millions of individuals that have been reported so far in 2021, according to the latest additions to the federal tally. What else is topping the list?

article thumbnail

Cybercrime underground flooded with offers for initial access to shipping and logistics orgs

Security Affairs

Experts warn of the availability in the cybercrime underground of offers for initial access to networks of players in global supply chains. Researchers from threat intelligence firm Intel 471 published an analysis of current cybercrime underground trends online, warning that initial access brokers are offering credentials or other forms of access to shipping and logistics organizations. .

Access 117
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Using Fake Student Accounts to Shill Brands

Schneier on Security

It turns out that it’s surprisingly easy to create a fake Harvard student and get a harvard.edu email account. Scammers are using that prestigious domain name to shill brands : Basically, it appears that anyone with $300 to spare can ­– or could, depending on whether Harvard successfully shuts down the practice — advertise nearly anything they wanted on Harvard.edu, in posts that borrow the university’s domain and prestige while making no mention of the fact that it in reality

Access 107
article thumbnail

Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting

The Security Ledger

We talk with Casey Ellis, founder and CTO of BugCrowd about how the market for software bugs has changed since the first bug bounty programs emerged nearly 20 years ago, and what’s hot in bug hunting in 2021. The post Episode 229: BugCrowd’s Casey Ellis On What’s Hot In Bug Hunting appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen.

IoT 98
article thumbnail

Powering small-business insurance services with Jamf

Jamf

Next Insurance provides small businesses around the world with insurance plans tailored to their needs. With the help of Jamf and Wediggit, the company makes rapid and easy Mac deployment part of the onboarding process, yielding more efficient workflows for employees who then pass the benefit along to customers.

article thumbnail

Predicting the Next OWASP API Security Top 10

Threatpost

API security risk has dramatically evolved in the last two years. Jason Kent, Hacker-in-Residence at Cequence Security, discusses the top API security concerns today and how to address them.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cyber Defense Magazine – November 2021 has arrived. Enjoy it!

Security Affairs

Cyber Defense Magazine September 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with 155 pages of excellent content. The Cyber Defense eMagazine for November 2021 We’ve, all of us, been through two trying years with Covid-19 – but, together, we’ve made it. There is no right or left, only up and down. We, Americans, and all of Humanity, are in this together.

IT 92
article thumbnail

How to Avoid Another Let's Encrypt-Like Meltdown

Dark Reading

Experts weigh in on steps network and security administrators need to take before the next time a root certificate expires.

article thumbnail

‘Tortilla’ Wraps Exchange Servers in ProxyShell Attacks

Threatpost

The Microsoft Exchange ProxyShell vulnerabilities are being exploited yet again for ransomware, this time with Babuk from the new "Tortilla" threat actor.

article thumbnail

5 MITRE ATT&CK Tactics Most Frequently Detected by Cisco Secure Firewalls

Dark Reading

Cisco Security examines the most frequently encountered MITRE ATT&CK tactics and techniques.

Security 122
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Thales at GITEX 2021 – An Exciting Time With Exciting News

Thales Cloud Protection & Licensing

Thales at GITEX 2021 – An Exciting Time With Exciting News. divya. Wed, 11/03/2021 - 07:29. One of the first post-pandemic large-scale, in-person events recently took place in Dubai. The GITEX 2021 conference was met with high attendance along with safety protocols, and it lived up to its usual innovative expectations. If you are unfamiliar GITEX, it is an acronym for Gulf Information Technology Exhibition.

article thumbnail

Researchers Scan the Web to Uncover Malware Infections

Dark Reading

Dozens of companies and universities regularly scan the Internet to gather data on connected devices, but some firms are looking deeper to uncover the extent of detectable malware infections.

119
119
article thumbnail

Report: BlackMatter Ransomware Gang Goes Dark, Again

Threatpost

The former DarkSide cybercriminal group will shut down due to increased pressure from authorities, who may have nabbed a key team member.

article thumbnail

Risk Quantification: A Powerful Tool in Your Cyberthreat Defense Arsenal

Dark Reading

Three ways that understanding your cyber-risk in real dollars can help your organization survive the threat of ransomware and other attacks.

Risk 90
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Amazon releases free cybersecurity awareness training via About Amazon

IG Guru

Check out the link here. The post Amazon releases free cybersecurity awareness training via About Amazon appeared first on IG GURU.

article thumbnail

CISA Issues New Directive for Patching Known Exploited Vulnerabilities

Dark Reading

The goal is to reduce civilian federal agency exposure to attacks that threat actors are actively using in campaigns, agency says.

100
100
article thumbnail

Mekotio Banking Trojan Resurges with Tweaked Code, Stealthy Campaign

Threatpost

The banker, aka Metamorfo, is roaring back after Spanish police arrested more than a dozen gang members.

80
article thumbnail

Is Sandboxing Dead?

Dark Reading

Organizations should start to evaluate other security measures to replace or complement the once-venerable security sandbox.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

San Jose State University – School of Information hosting an online open house on November 10th, 2021

IG Guru

Access the signup form here. The post San Jose State University – School of Information hosting an online open house on November 10th, 2021 appeared first on IG GURU.

Access 62
article thumbnail

US Blacklists Israeli Firms NSO Group and Candiru

Dark Reading

The US Commerce Department has also added Russia's Positive Technologies and Singapore's Computer Security Initiative Consultancy.

article thumbnail

New Zealand educators excel with Jamf and Apple

Jamf

Te Akau ki Papamoa Primary School, recognized as an Apple Distinguished School, uses its fleet of iPads to seamlessly extend the classroom experience and build connections with landscape and heritage.