Thu.May 25, 2023

article thumbnail

OAuth Flaw Exposed Social Media Logins to Account Takeover

Data Breach Today

Now-Fixed Expo Framework API Vulnerability Posed Credential, Identity Theft Risks A new OAuth-related vulnerability in an open-source application development framework could expose Facebook, Google, Apple and Twitter users to account takeover, personal data leakage, identity theft, financial fraud and unauthorized actions on other online platforms, security researchers said.

article thumbnail

RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints

The Last Watchdog

The inadequacy of siloed security solutions is well-documented. Related: Taking a security-first path The good news is that next-gen security platforms designed to unify on-prem and cloud threat detection and remediation are, indeed, coalescing. At RSA Conference 2023 I visited with Elias Terman , CMO, and Sudarsan Kannan , Director of Product Management, from Uptycs , a Walthan, Mass.

Cloud 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mass Exploitation of Zyxel Network Appliances Underway

Data Breach Today

Mirai Botnet Targets Now-Patched Zyxel Flaw Versions of the Mirai botnet are targeting a vulnerability present in numerous Zyxel network devices. Zyxel patched the vulnerability in April but it's not clear how many users have applied the fix. Security experts warn the flaw appears to be exploited at a massive scale.

Security 162
article thumbnail

Information Management in Brazil

AIIM

I was in Brazil recently to keynote the Information Show in Sao Paulo. Traveling to and speaking at Information Management conferences is endlessly fascinating. One might think that, except for language and location, Brazilian information management professional would be similar to their counterparts in North America and Europe, and in some regards, they are, but the differences can be surprising.

ECM 104
article thumbnail

Beware of Pixels & Trackers: A Client-Side Security Report

At the beginning of 2023, concern grew over pixels and trackers, which load into the browser as a part of the software supply chain, being used by data harvesting platforms to collect user data. The data is then transferred to the servers of the companies owning the pixels/trackers as a part of their advertising and marketing business. Aggressive data harvesting practices increase the likelihood and/or actual transfer of sensitive data, which may cause unintended consequences, including expensiv

article thumbnail

Mitigating OT Security Risks: Focusing on Solutions, not Products

Data Breach Today

Michelle Balderson of OTORIO on How OT Security Is Now Perceived as a Business Risk OT security is being discussed in the board room as attackers adopt the use of AI and automation. Many organizations never fully implement the frameworks that define OT security maturity, and we need holistic solutions and platform approaches that address the operator's needs.

Risk 147

More Trending

article thumbnail

German Prosecutors Indict FinFisher Spyware Executives

Data Breach Today

Executives Accused of Selling Tool to Turkish Intel Via a Bulgarian Front Company German prosecutors on Monday indicted four executives of insolvent commercial spyware firm FinFisher for illegally exporting their hacking tool to Turkey. The indictment comes as a European Parliament committee concluded an investigation of bloc members' use of commercial spyware.

130
130
article thumbnail

Russia's War in Ukraine Shows Cyberattacks Can Be War Crimes

Dark Reading

Ukraine's head of cybersecurity Victor Zhora says the world needs "efficient legal instruments to confront cyber terrorism.

article thumbnail

Iranian Hackers Deploy New Ransomware Against Israeli Firms

Data Breach Today

Researchers Discover Moneybird Ransomware Strain, Warn of Growing Sophistication Security researchers discovered an Iran-linked APT group carrying out a new chain of ransomware attacks against Israeli organizations. Check Point said attackers surprisingly carried out most of the activity manually over RDP but warned they are growing better at coding malware and using tools.

article thumbnail

Google Cloud Bug Allows Server Takeover From CloudSQL Service

Dark Reading

Researchers could access sensitive data and steal secrets by exploiting a vulnerability in GCP's security layer, eventually running rampant in the environment.

Cloud 124
article thumbnail

Why You Need to Use Case Studies in Sales and Marketing (and How to Start Now)

Case studies are proof of successful client relations and a verifiable product or service. They persuade buyers by highlighting your customers' experiences with your company and its solution. In sales, case studies are crucial pieces of content that can be tailored to prospects' pain points and used throughout the buyer's journey. In marketing, case studies are versatile assets for generating business, providing reusable elements for ad and social media content, website material, and marketing c

article thumbnail

Breach Roundup: Patch Barracuda ESG Appliances ASAP

Data Breach Today

Also: Franklin Templeton, Teen DraftKings Hacker, Black Basta Claims Rheinmetall In the days between May 19 and May 25, the spotlight was on flaws in Barracuda Networks Email Security Gateway appliances, another GoAnywhere data breach that affected Franklin Templeton Canada and an American teenager out on bail and facing federal charges for hacking DraftKings accounts.

article thumbnail

On the Poisoning of LLMs

Schneier on Security

Interesting essay on the poisoning of LLMs—ChatGPT in particular: Given that we’ve known about model poisoning for years, and given the strong incentives the black-hat SEO crowd has to manipulate results, it’s entirely possible that bad actors have been poisoning ChatGPT for months. We don’t know because OpenAI doesn’t talk about their processes, how they validate the prompts they use for training, how they vet their training data set, or how they fine-tune ChatGPT.

Paper 112
article thumbnail

Cryptohack Roundup: Tornado Cash Hack

Data Breach Today

Also: Tornado Cash Lawsuit Heats Up, Inferno Drainer, Trezor and Celer Between May 19 and 25, a hacker took control of Tornado Cash and stole $1 million, plaintiffs in a Coinbase-bankrolled lawsuit pressed for summary judgment, attackers used crypto phishing as a service to steal $6 million, Trezor hot wallet was found to possibly be buggy and Celer patched a bug.

Phishing 130
article thumbnail

Lazarus Group Striking Vulnerable Windows IIS Web Servers

Dark Reading

The infamous North Korean APT group is using Log4Shell, the 3CX supply chain attack, and other known vectors to breach Microsoft Web servers.

128
128
article thumbnail

Apache Cassandra® NoSQL for the Relational DBA

Unleash the power of NoSQL with "Apache Cassandra® NoSQL for the Relational DBA." Learn from Lewis DiFelice, an experienced Professional Services Consultant at Instaclustr, as he shares his journey transitioning from SQL to managing a 40-node Cassandra cluster. Gain insights into Cassandra's architecture, configuration strategies, and best practices.

article thumbnail

AHA Tells HHS to 'Amend or Suspend' Web Tracking Guidance

Data Breach Today

Group Calls IP Addresses Under HIPAA 'Too Broad,' Posing Hardships on Hospitals The American Hospital Association is urging federal regulators to back off from recent guidance that treats patient IP addresses as protected health information, saying that the new rules would "reduce public access to credible health information" and create hardships for doctors and hospitals.

Access 130
article thumbnail

IBM Consulting unveils Center of Excellence for generative AI

IBM Big Data Hub

IBM Consulting has established a Center of Excellence for generative AI. It stands alongside IBM Consulting’s existing global AI and Automation practice, which includes 21,000 data and AI consultants who have conducted over 40,000 enterprise client engagements. The Center of Excellence (CoE) already has more than 1,000 consultants with specialized generative AI expertise that are engaging with a global set of clients to drive productivity in IT operations and core business processes like H

article thumbnail

Recipe For Disaster: The Year Tony Roma Married My Mom

Information Governance Perspectives

In T he Bastard of Beverly Hills , I tell a crazy story about the time my mother was married to restaurateur Tony Roma, and though it’s true to the best of my recollection, people shouldn’t get the wrong impression about him. Tony was a fine man. He was driven, charismatic, funny, and, like me, a bit of a romantic. You can read more about exactly what happened between us in the book, but the bottom line is that the chef didn’t deserve the hell I put him through during the short

IT 105
article thumbnail

Perception Point Report Finds That Advanced Phishing Attacks Grew by 356% in 2022

Dark Reading

Perception Point's 2023 Annual Report: Cybersecurity Trends & Insights' analyzes the most prevalent cyberattack trends amidst today's complex threat landscape, identifying an overall increase of 87% in the total number of attacks over the course of last year.

Phishing 113
article thumbnail

Finding The Application Modernization Strategy That Is Right For Your Business

As a business leader, you know it's important to update your apps, but it can be tough to figure out the best approach. This whitepaper helps you in upgrading your current applications using modernization strategies without any business disruptions.

article thumbnail

Withholding Single Sign-On from SaaS Customers is Bad for Business and Security

Lenny Zeltser

Despite years of public shaming by security professionals , some SaaS vendors only offer Single Sign-On (SSO) in high-end "enterprise" product tiers. By withholding this capability from smaller organizations, they put customers' security at risk. Moreover, they base a pricing strategy on a weak signal and miss an opportunity to lower their own security risk.

Security 100
article thumbnail

CISO Criminalization, Vague Cyber Disclosure Rules Create Angst for Security Teams

Dark Reading

in the wake of the ex-Uber CISO verdict, CISOs ask for clearer rules and less uncertainty in managing disclosures, amid jail-time fears.

Security 116
article thumbnail

Zyxel firewall and VPN devices affected by critical flaws

Security Affairs

Zyxel fixed two critical flaws in multiple firewall and VPN products that can lead to remote code execution or cause a DoS condition. Zyxel addressed two critical buffer overflow vulnerabilities, tracked as CVE-2023-33009 and CVE-2023-33010 , that affect several of its firewall and VPN products. A remote, unauthenticated attacker can can trigger the flaws to cause a denial-of-service (DoS) condition and remote code execution on vulnerable devices.

article thumbnail

'Volt Typhoon' Breaks Fresh Ground for China-Backed Cyber Campaigns

Dark Reading

This is the first incident where a threat actor from the country appears to be laying the groundwork for disruptive attacks in the future, researchers say.

105
105
article thumbnail

From Hadoop to Data Lakehouse

Getting off of Hadoop is a critical objective for organizations, with data executives well aware of the significant benefits of doing so. The problem is, there are few options available that minimize the risk to the business during the migration process and that’s one of the reasons why many organizations are still using Hadoop today. By migrating to the data lakehouse, you can get immediate benefits from day one using Dremio’s phased migration approach.

article thumbnail

D-Link fixes two critical flaws in D-View 8 network management suite

Security Affairs

D-Link fixed two critical flaws in its D-View 8 network management suite that could lead to authentication bypass and arbitrary code execution. D-Link has addressed two critical vulnerabilities (CVSS score: 9.8) in its D-View 8 network management suite that could be exploited by remote attackers to bypass authentication and execute arbitrary code. The D-View network management suite allows customers to monitor performance, configure devices, and manage the network in an efficient way.

article thumbnail

Verizon Sends New Smishing Warning

KnowBe4

Verizon has renewed its warnings to customers about the threat of smishing, a social engineering approach that relies upon texts as opposed to other communication channels like the email used in phishing. The smishing problem may be smaller than the phishing problem, or the robocall nuisance, but it represents a comparable threat that organizations should address in their risk management process.

article thumbnail

Red Hat Tackles Software Supply Chain Security

Dark Reading

The new Red Hat Trusted Software Supply Chain services help developers take a secure-by-design approach to build, deploy, and monitor software.

Security 105
article thumbnail

The industry observes OpenText

OpenText Information Management

It’s been a busy 2023 so far for OpenText. The first few months of the year have featured a major acquisition, significant technology innovations, new accolades and exciting in-person and virtual events. One important measure of this activity is how we are being discussed and described by the wider industry. In case you missed some … The post The industry observes OpenText appeared first on OpenText Blogs.

IT 92
article thumbnail

Finding The Application Modernization Strategy That Is Right For Your Business

As a business leader, you know it's important to update your apps, but it can be tough to figure out the best approach. This whitepaper helps you in upgrading your current applications using modernization strategies without any business disruptions.

article thumbnail

Netflix's Password-Sharing Ban Offers Security Upsides

Dark Reading

The streaming giant is looking to bolster flagging subscription growth and profits, but security researchers say the move offers a perfect opportunity to encourage better password hygiene and account safety.

Passwords 104
article thumbnail

North Korea-linked Lazarus APT targets Microsoft IIS servers to deploy malware

Security Affairs

North Korea-linked APT group Lazarus actor has been targeting vulnerable Microsoft IIS servers to deploy malware. AhnLab Security Emergency response Center (ASEC) researchers reported that the Lazarus APT Group is targeting vulnerable versions of Microsoft IIS servers in a recent wave of malware-based attacks. Once discovered a vulnerable ISS server, the attackers leverage the DLL side-loading ( T1574.002 ) technique to execute a malicious DLL (msvcr100.dll) that they have placed in the same fol

article thumbnail

'Operation Magalenha' Attacks Gives Window Into Brazil's Cybercrime Ecosystem

Dark Reading

A campaign against customers of Portuguese banks uses a capable financial malware strain dubbed PeepingTitle, written in the Delphi programming language.

104
104