Thu.Aug 04, 2022

article thumbnail

Cisco addressed critical flaws in Small Business VPN routers

Security Affairs

Cisco fixes critical remote code execution vulnerability, tracked as CVE-2022-20842, impacting Small Business VPN routers. Cisco addressed a critical security vulnerability, tracked as CVE-2022-20842, impacting Small Business VPN routers. The flaw resides in the web-based management interface of several Small Business VPN routers, including Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers.

Security 121
article thumbnail

Scammers Sent Uber to Take Elderly Lady to the Bank

Krebs on Security

Email scammers sent an Uber to the home of an 80-year-old woman who responded to a well-timed email scam, in a bid to make sure she went to the bank and wired money to the fraudsters. In this case, the woman figured out she was being scammed before embarking for the bank, but her story is a chilling reminder of how far crooks will go these days to rip people off.

Passwords 280
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

More Mobile Devices, More Problems, Security Survey Finds

Data Breach Today

Verizon Business Finds That Companies Still Struggle to Secure Employee Devices The era of pandemic-induced telework is also the era of higher reliance on mobile devices for sensitive workplace information - meaning we're likewise living in the age of fretful chief information security officers, a new survey concludes. "Companies are still struggling" to secure mobile devices.

Security 264
article thumbnail

High-Severity Bug in Kaspersky VPN Client Opens Door to PC Takeover

Dark Reading

The CVE-2022-27535 local privilege-escalation security vulnerability in the security software threatens remote and work-from-home users.

Security 145
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Neuro Practice Tells 363,000 That PHI Was Posted on Dark Web

Data Breach Today

Ransomware Incident Knocked Out Computer Network, Email and Phones An Indiana-based neurology practice is notifying nearly 363,000 individuals that their sensitive information was compromised in a recent ransomware attack - and that some of the data was made available on the dark web. Russian ransomware group Hive has been implicated.

More Trending

article thumbnail

Seed Phrase Compromise May Have Caused Solana Wallets Drain

Data Breach Today

'No Evidence' That Solana Protocol of Cryptography Compromised Solana identified a common thread in the million-dollar cyberattack on its hot wallets. The exploit might come down to wallet recovery passcodes stored in plaintext on a centralized server. There is "no evidence" that the Solana protocol or its cryptography were compromised.

IT 244
article thumbnail

IT Governance Podcast Episode 5: Facebook, Twitter, VW, Digital Protection and Information Bill

IT Governance

This week, we discuss a malware campaign targeting Facebook Business users, a breach apparently affecting 5.4 million Twitter users, a €1.1 million GDPR fine for Volkswagen, the new Digital Protection and Information Bill, and why it’s so important to maintain your cyber security through a recession. Now available on Spotify , Amazon Music , Apple Podcasts and SoundCloud.

article thumbnail

Ransomware: What We Know and What We Don't Know

Data Breach Today

This edition of the ISMG Security Report analyzes the latest ransomware trends from the European Union Agency for Cybersecurity, findings from the first-ever Cyber Safety Review Board on the Log4j incident, and how security and privacy leaders are harmonizing new U.S. privacy laws.

article thumbnail

Cyberattackers Increasingly Target Cloud IAM as a Weak Link

Dark Reading

At Black Hat USA, Igal Gofman plans to address how machine identities in the cloud and the explosion of SaaS apps are creating risks for IAM, amid escalating attention from attackers.

Cloud 99
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Pro-China Disinformation Campaign Traced to PR Firm

Data Breach Today

'Positive Energy' Op Targets North America, Europe, the Middle East and Asia Researchers from cybersecurity firm Mandiant say they've discovered a network of inauthentic news sites transmitting Chinese propaganda apparently all under the control of Shanghai Haixun Technology Co., a Chinese PR firm that advertises "positive energy packages.

article thumbnail

LinkedIn Continues its Reign as the Most-Impersonated Brand in Phishing Attacks

KnowBe4

As cybercriminals look for novel and effective ways to gain entrance to a victim network, LinkedIn is proving to be fruitful enough to keep the attention of phishing scammers.

article thumbnail

Iranian Group Likely Behind Albanian Government Attack

Data Breach Today

Group Published Ransomware Execution Video on Website A cyberattack that temporarily paralyzed Albania's pivot to digital government likely came from Iranian hackers. The attack occurred just days before members of the Mujahedin-e-Khalq, a group dedicated to overthrow of the Islamic Republic of Iran, were set to host a two-day conference.

article thumbnail

The Myth of Protection Online — and What Comes Next

Dark Reading

It's a myth that consuming and processing alerts qualifies as security. Today's technology allows better detection and prevention, rather than accepting the low bar for protection set by ingrained incident response reactions.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

India Government Withdraws Data Protection Bill

Data Breach Today

Unexpected Revocation Comes After Years of Tech Industry Criticism The government of India withdrew a long-anticipated personal data protection bill from Parliament.

article thumbnail

Unauthenticated RCE can allow hacking DrayTek Vigor routers without user interaction

Security Affairs

A critical flaw in multiple models of DrayTek Vigor routers can allow unauthenticated, remote attackers to fully compromise affected devices. Tens of router models from Taiwanese SOHO manufacturer DrayTek are affected by a critical, unauthenticated, remote code execution vulnerability, tracked as CVE-2022-32548, that can be exploited to fully compromise a vulnerable device and gain unauthorized access to the broader network.

article thumbnail

The Ransomware Files, Ep. 10: Dr. Ransomware, Part 2

Data Breach Today

Is a practicing cardiologist living in Venezuela also a ransomware mastermind? U.S. prosecutors claim Moises Luis Zagala Gonzalez is a cybercriminal polymath. But Zagala's wife says he is innocent and there's a reason for his predicament. "The Ransomware Files" podcast looks at the evidence.

article thumbnail

India: Government withdraws long-awaited Personal Data Protection Bill

DLA Piper Privacy Matters

On 3 August, the Indian Central Government withdrew the Personal Data Protection Bill, 2019 ( PDP Bill ). The PDP Bill, which has drawn criticism from both privacy advocates and industry stakeholders, was first published in 2018 and was to be India’s first law on the protection of personal data. A government notice stated that the decision came following a review by the Joint Parliamentary Committee ( JPC ) and its subsequent report published in December 2021, which suggested a long list of amen

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Ransomware Attack Downtime Costs in the U.S. Rise to Nearly $160 Billion

KnowBe4

New data based on tracked, publicly-confirmed ransomware attacks shows that downtime – and the associated cost – is increasing at an alarming rate as nearly half of attacks see a ransom paid.

article thumbnail

New Woody RAT used in attacks aimed at Russian entities

Security Affairs

An unknown threat actor is targeting Russian organizations with a new remote access trojan called Woody RAT. Malwarebytes researchers observed an unknown threat actor targeting Russian organizations with a new remote access trojan called Woody RAT. The attackers were delivering the malware using archive files and Microsoft Office documents exploiting the Follina Windows flaw ( CVE-2022-30190 ).

article thumbnail

Open Redirects Exploited for Phishing

KnowBe4

Attackers are exploiting open redirects to distribute links to credential-harvesting sites, according to Roger Kay at INKY. The attackers are exploiting vulnerable American Express and Snapchat domains to launch the attacks. American Express has since fixed the vulnerability, but Snapchat’s domain remains unpatched.

article thumbnail

Amazon, IBM Move Swiftly on Post-Quantum Cryptographic Algorithms Selected by NIST

Dark Reading

A month after the algorithms were revealed, some companies have already begun incorporating the future standards into their products and services.

93
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

KnowBe4 Wins Multiple Summer 2022 "Best of" Awards From TrustRadius

KnowBe4

KnowBe4 is proud to be recognized by TrustRadius with the Summer Best of Awards in three categories for the Security Awareness Training software category.

article thumbnail

Massive China-Linked Disinformation Campaign Taps PR Firm for Help

Dark Reading

A global network of inauthentic news sites present themselves as independent news outlets, offering content favoring China's government and articles critical of the US.

article thumbnail

Introducing secure print controls for pharmaceutical manufacturers

OpenText Information Management

Government agencies around the world, including the US Food and Drug Administration (FDA), use current Good Manufacturing Practices (cGMP) as the primary way to ensure pharmaceutical quality. Implementing cGMP protects life sciences companies and consumers by helping to reduce losses and waste, avoid recalls and fines, while assuring each batch produced meets quality standards so … The post Introducing secure print controls for pharmaceutical manufacturers appeared first on OpenText Blogs.

article thumbnail

Time to Patch VMware Products Against a Critical New Vulnerability

Dark Reading

A dangerous VMware authentication-bypass bug could give threat actors administrative access over virtual machines.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Make smarter decisions with customer insights and analytics

OpenText Information Management

In a constantly evolving landscape, how can businesses stay ahead? The future of customer experience depends on data. One of the best ways to stand out from the crowd is to know your customers – mining insights from their behaviors to improve the overall journey. Get closer to your customers with multi-channel interaction analytics in … The post Make smarter decisions with customer insights and analytics appeared first on OpenText Blogs.

article thumbnail

How Email Security Is Evolving

Dark Reading

Securing email communication has never been more critical for organizations, and it has never been more challenging to do so. Attack volumes have increased and become more sophisticated.

article thumbnail

How to overcome the #1 supply chain challenge in 2022: Collaboration 

OpenText Information Management

Pandemic-induced disruption up-ended supply chains and value chains far and wide, as core processes failed under the weight of material shortages, logistics problems and even the remedies to increase resilience. Supply chain industries tend to be less further along in their digital journeys than other industries and have a greater incidence of manual, disjointed processes … The post How to overcome the #1 supply chain challenge in 2022: Collaboration appeared first on OpenText Blogs.

58