Tue.May 05, 2020

article thumbnail

Alert: APT Groups Targeting COVID-19 Researchers

Data Breach Today

'Password-Spraying' Campaigns Aimed at Stealing Research Data, US and UK Authorities Warn Authorities in the U.S. and U.K. are warning medical institutions, pharmaceutical companies, universities and others about "password-spraying campaigns" by advance persistent threat groups seeking to steal COVID-19 research data. Security experts outline defensive steps that organizations can take.

article thumbnail

Kaiji, a new Linux malware targets IoT devices in the wild

Security Affairs

Security researchers spotted a new piece of DDoS bot dubbed Kaiji that is targeting IoT devices via SSH brute-force attacks. Last week, the popular security researcher MalwareMustDie and the experts at Intezer Labs spotted a new piece of malware dubbed Kaiji, that is targeting IoT devices via SSH brute-force attacks. The malicious code was designed to target Linux-based servers and Internet of Things (IoT) devices and use them as part of a DDoS botnet.

IoT 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FINRA Warns of Phishing Emails Targeting Members

Data Breach Today

Campaign Designed to Harvest Credentials of Financial Industry Regulatory Authority Members The Financial Industry Regulatory Authority, a private organization that helps self-regulate brokerage firms and exchange markets in the U.S., warns that a "widespread, ongoing" phishing campaign is targeting its members.

Phishing 202
article thumbnail

GoDaddy discloses a data breach, web hosting account credentials exposed

Security Affairs

GoDaddy has been notifying its customers of a data breach, threat actors might have compromised their web hosting account credentials. GoDaddy has been notifying its customers of a data breach, attackers might have compromised users’ web hosting account credentials. Headquartered in Scottsdale, Arizona, the Internet domain registrar and web hosting company claims to have over 19 million customers worldwide.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Data Breach Today

Terminology Shift Announced by Britain's National Cyber Security Center Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list.

More Trending

article thumbnail

Malspam Campaigns Attempt to Install Remoted Access Trojans

Data Breach Today

Microsoft: Emails With COVID-19 Themes Targeting US, South Korea Several malicious spam campaigns using COVID-19 as a lure are attempting to install the Remcos remote access Trojan on victims' devices, according to Microsoft.

Access 176
article thumbnail

New Webinars Coming Soon – Disposition 101 and Managing Email

The Texas Record

Does the word “Disposition” terrify you? When you hear the word “Disposition,” do you tilt your head like a confused puppy? Well, you’re not alone! Because disposition can be daunting task – I’m looking at you, Mr. and Mrs. Permanent Until Not Permanent – we have decided to give our local governments and state agencies a new and improved webinar talking about nothing but disposition!

article thumbnail

2020 Cyber Threats, Trends and Attacks

Data Breach Today

What You Don't See Now, Can Hurt You Later

227
227
article thumbnail

CAM4 adult cam site leaked 11M database records including emails, private chats

Security Affairs

The popular adult live streaming website CAM4 exposed over 7TB of personally identifiable information (PII) of members and users. The popular adult live streaming website CAM4 exposed over 10.88 billion database records containing a total of 7TB of personally identifiable information (PII) of its members and users. The data leak is the result of the accidental exposure of an Elasticsearch cluster managed by the company, the records date back to March 16, 2020.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google Android RCE Bug Allows Attacker Full Device Access

Threatpost

The vulnerability is one of 39 affecting various aspects of the mobile OS that the company fixed in a security update this week.

Access 118
article thumbnail

UK racing to improve contact-tracing app's privacy safeguards

The Guardian Data Protection

Worries public will not use app after security specialists and MPs raise concerns Coronavirus – latest updates See all our coronavirus coverage NHS officials are racing to introduce greater privacy safeguards for the contact-tracing app at the centre of the government’s lockdown exit strategy amid mounting concern from security experts, MPs and users.

Privacy 95
article thumbnail

Adult Cam CAM4 Site Exposed 10.88 Billion User Records

WIRED Threat Level

CAM4 has taken the server offline, but not before it leaked 7TB of user data.

IT 138
article thumbnail

Catches of the month: Phishing scams for May 2020

IT Governance

Coronavirus continues to dominate the cyber security landscape (and pretty much every other part of our lives), with cyber criminals cashing in on the disruption. Whether you’re forced to work from home, out of work or otherwise preoccupied by the stress and discomfort of lockdown, we are all more susceptible to phishing emails than ever before. The good news is that the NCSC (National Cyber Security Centre) has taken down more than 2,000 coronavirus-related since the pandemic began , and has cr

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

GoDaddy Hack Breaches Hosting Account Credentials

Threatpost

The domain registrar giant said that the breach started in October 2019.

Passwords 134
article thumbnail

Malware in Google Apps

Schneier on Security

Interesting story of malware hidden in Google Apps. This particular campaign is tied to the government of Vietnam. At a remote virtual version of its annual Security Analyst Summit, researchers from the Russian security firm Kaspersky today plan to present research about a hacking campaign they call PhantomLance, in which spies hid malware in the Play Store to target users in Vietnam, Bangladesh, Indonesia, and India.

Phishing 115
article thumbnail

Unpacking the AWS strategic collaboration announcement

OpenText Information Management

Last week OpenText™ announced an important new partnership with Amazon Web Services (AWS). The AWS partnership is the final piece we needed to complete our “OpenText Anywhere” strategy and commitment to support customer choice in the cloud, extending the OpenText Cloud and our Information Management (IM) solutions into the leading public cloud environments of Google … The post Unpacking the AWS strategic collaboration announcement appeared first on OpenText Blogs.

Cloud 73
article thumbnail

Boeing and the bending of its own curve

RFID Global Solution, Inc.

Seattle was the first major metro area in the US affected by COVID-19. As a community, it has taken to heart what Governor Jay Inslee and influential locals have been advising regarding protecting the public and the workforce. In order to bend the curve, social distancing policies are being adhered to with incredible vigilance, not … Boeing and the bending of its own curve Read More ».

IT 72
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

HHS Announces Exercise of Enforcement Discretion for Entities Engaged in COVID-19 Relief Efforts

Data Matters

Since COVID-19 was declared a pandemic, the U.S. Department of Health and Human Services (“HHS”) and its Office for Civil Rights (“OCR”) have taken a variety of steps to relax HIPAA restrictions particularly pertinent to the COVID-19 response. First, as covered in an earlier posting , HHS took action to waive penalties and assure companies that it would exercise enforcement discretion with respect to the Privacy Rule’s application to telehealth services and certain limited communication activiti

Privacy 68
article thumbnail

Attackers Adapt Techniques to Pandemic Reality

Dark Reading

Over the past several months, threat actors have quickly shifted their tactics to take advantage of interest in the coronavirus, two studies find.

85
article thumbnail

Data governance for data privacy

Collibra

Every business journal has displayed hyperbolic headlines or similar that proclaims, “The Future Is Digital,” “Technology Has Taken Over Our Lives,” or “Data Is the New Oil.” All these grand statements seemed like exaggerations at the time, but Covid-19 has made these hyperboles a reality. Amazon and Instacart are our new neighborhood grocery stores; we sign onto Zoom or Skype when we crave social interactions or “go” to work.

article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

By Patrick Van Eecke and Anne-Gabrielle Haie. Vehicles, drivers and passengers are becoming more and more connected, generating increasing amounts of data. The latest evolution of digital technologies, such as robotics, Internet of Things, Artificial Intelligence, high-performance computers and powerful communication networks leads self-driving cars out of an imaginary world and into our daily lives.

Privacy 69
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Let your data work for you with Jamf and Splunk

Jamf

See how you can build better and more informational reporting dashboards with Jamf and Splunk.

96
article thumbnail

Microsoft Challenges Security Researchers to Hack Azure Sphere

Dark Reading

Participants can earn up to $100,000 for finding severe flaws in Microsoft's Linux-based Azure Sphere IoT operating system.

IoT 113
article thumbnail

Ghost Blogging Platform Hacked To Mine Cryptocurrency

Adam Levin

Hackers successfully breached the servers of a popular blogging platform and used them to mine cryptocurrency. Ghost, a Singapore-based blogging platform with 2,000,000 installations and 750,000 active users, announced that hackers had breached their systems. . “The mining attempt… quickly overloaded most of our systems which alerted us to the issue immediately,” the company announced May 3, adding that “[t]here is no direct evidence that private customer data, passwords or oth

Mining 64
article thumbnail

New Kaiji Botnet Targets IoT, Linux Devices

Threatpost

The botnet uses SSH brute-force attacks to infect devices and uses a custom implant written in the Go Language.

IoT 83
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Malicious Use of AI Poses a Real Cybersecurity Threat

Dark Reading

We should prepare for a future in which artificially intelligent cyberattacks become more common.

article thumbnail

Spear-Phishing Attack Spoofs EE To Target Executives

Threatpost

Researchers say spear-phishing emails purporting to be from telecom giant EE are being sent to top corporate execs.

article thumbnail

Now Available: Biometric Data — Power, Promise and Privacy Challenges (Panel Discussion Materials)

HL Chronicle of Data Protection

On February 26, Hogan Lovells Partner Bret Cohen participated in a panel discussion about the privacy and security concerns with biometric data at the RSA Conference, along with Alexandra Ross, Director and Global Privacy and Data Security Counsel at Autodesk, and Natalia Belaya, Director of Security Assurance and Compliance at Autodesk. With the use and collection of biometric data becoming more ubiquitous in our digital society, this discussion dove into the privacy and cybersecurity legal lan

Privacy 59