Mon.Jan 11, 2021

article thumbnail

Ubiquiti: Change Your Password, Enable 2FA

Krebs on Security

Ubiquiti , a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders, security cameras and access control systems, is urging customers to change their passwords and enable multi-factor authentication. The company says an incident at a third-party cloud provider may have exposed customer account information and credentials used to remotely manage Ubiquiti gear.

Passwords 332
article thumbnail

Defining and Refining Next-Gen AML

Data Breach Today

David Stewart of SAS on the Tools and Technologies Deployed to Fight Financial Crimes As the financial payments landscape shifts, and as fraudsters employ new technologies and techniques, institutions are deploying a next generation of anti-money laundering defenses. David Stewart of SAS defines next-gen AML and how to embrace it.

IT 326
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Changes in WhatsApp’s Privacy Policy

Schneier on Security

If you’re a WhatsApp user, pay attention to the changes in the privacy policy that you’re being forced to agree with. In 2016, WhatsApp gave users a one-time ability to opt out of having account data turned over to Facebook. Now, an updated privacy policy is changing that. Come next month, users will no longer have that choice. Some of the data that WhatsApp collects includes: User phone numbers.

Privacy 128
article thumbnail

Reserve Bank of New Zealand Investigates Data Breach

Data Breach Today

Hackers Gained Network Access Through Accellion File-Sharing Service The Reserve Bank of New Zealand disclosed Sunday that hackers infiltrated its network after compromising its file-sharing system from Accellion. The nation's central bank says the attack may have exposed commercial and consumer information, and other Accellion customers also had systems compromised.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Connecting the dots between SolarWinds and Russia-linked Turla APT

Security Affairs

Experts have found some similarities between the Sunburst backdoor used in the SolarWinds supply chain attack and Turla’s backdoor Kazuar. Security experts from Kaspersky have identified multiple similarities between the Sunburst malware used in the SolarWinds supply chain attack and the Kazuar backdoor that has been employed in cyber espionage campaigns conducted by Russia-linked APT group Turla.

Security 120

More Trending

article thumbnail

Ubiquiti discloses a data breach

Security Affairs

American technology company Ubiquiti Networks is disclosed a data breach and is notifying its customers via email. American technology vendor Ubiquiti Networks suffered a data breach and is sending out notification emails to its customers asking them to change their passwords and enable 2FA for their accounts. Ubiquiti, which makes a range of IoT gear (routers, locks, Web cams, NVRs) & has a cloud solution for managing those, just told customers to reset passwords/enable 2FA after discoverin

article thumbnail

Capitol Riot: Self-Surveillance Feeds Investigation

Data Breach Today

Archiving, Crowdsourcing and Facial Recognition Help Identify Suspects for FBI Investigators probing the violent storming of the U.S. Capitol by a mob on Wednesday have been seeking images and help in identifying suspects. The FBI, which is leading the investigation, has a range of investigative tools and technologies to help, including facial recognition software.

Archiving 282
article thumbnail

Researcher Builds Parler Archive Amid Amazon Suspension

Threatpost

A researcher scraped and archived public Parler posts before the conservative social networking service was taken down by Amazon, Apple and Google.

Archiving 119
article thumbnail

Paging System Leak Affects Thousands of Patients

Data Breach Today

Data From Communications With Paramedics Posted Online A recent data leak involving a paging system used by paramedics in the Australian state of Tasmania is the latest reminder of the security risks posed by the legacy systems still in use in the healthcare sector.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Millions of Social Profiles Leaked by Chinese Data-Scrapers

Threatpost

A cloud misconfig by SocialArks exposed 318 million records gleaned from Facebook, Instagram and LinkedIn.

Cloud 140
article thumbnail

Why Compliance Teams Need a Dashboard

Data Breach Today

Compliance Expert Discusses Leveraging Data Analytics Adam Turteltaub, chief engagement and strategy officer at the Society of Corporate Compliance and Ethics, says compliance teams should create a dashboard of data that will help keep track of actions taken by staff members who are working remotely.

article thumbnail

Source code for malware that targets Qiui Cellmate device was leaked online

Security Affairs

The source code for the ChastityLock ransomware that was used in attacks aimed at the users of the Qiui Cellmate adult toy is now publicly available. Recently a family of ransomware was observed targeting the users of the Bluetooth-controlled Qiui Cellmate chastity device. Qiui Cellmate made the headlines in October when the researchers at Pen Test Partners published a report that provides details about security vulnerabilities affecting them.

IoT 105
article thumbnail

FBI Issues Alert on Growing Egregor Ransomware Threat

Data Breach Today

Bureau and Security Experts Warn About Gang's Effective Extortion Model The FBI has issued a warning about the growing threat from the operators behind the Egregor ransomware variant and other cybercriminal gangs affiliated with the group. Since September, the crypto-locking malware has been associated with nearly 100 attacks worldwide.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The SolarWinds Hackers Shared Tricks With a Russian Spy Group

WIRED Threat Level

Security researchers have found links between the attackers and Turla, a sophisticated team suspected of operating out of Moscow’s FSB intelligence agency.

Security 102
article thumbnail

Securing the New 'Branch Office'

Data Breach Today

The "remote workforce" of 2020 is gone. Now we're talking about the new, permanent "branch office" - and it comes with its own unique set of cybersecurity concerns, says Derek Manky of FortiGuard Labs. He discusses new social engineering trends and how to respond.

Security 162
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

Authors: Raf Schoefs , Simon Verschaeve , Laetitia Mouton. On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”). As part of its new EU Cybersecurity Strategy , launched on the same day, the European Commission proposes new rules that would bring more sectors and services under the

article thumbnail

New Tool Sheds Light on AppleScript-Obfuscated Malware

Dark Reading

The AEVT decompiler helped researchers analyze a cryptominer campaign that used AppleScript for obfuscation and will help reverse engineers focused on other Mac OS malware.

91
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Aliens and UFOs: A Final Frontier for Social Engineers

Threatpost

The release of a CIA archive on UFOs is exactly the kind of headline-making event that phishing and scam actors long for.

Archiving 100
article thumbnail

SolarWinds Hack Lessons Learned: Finding the Next Supply Chain Attack

Dark Reading

The SolarWinds supply chain compromise won't be the last of its kind. Vendors and enterprises alike must learn and refine their detection efforts to find the next such attack.

IT 103
article thumbnail

SolarWinds Hack Potentially Linked to Turla APT

Threatpost

Researchers have spotted notable code overlap between the Sunburst backdoor and a known Turla weapon.

article thumbnail

When It Comes To Security Tools, More Isn't More

Dark Reading

Organizations that focus on optimizing their tools, cutting down on tool sprawl, and taking a strategic approach to transitioning to the cloud are poised for success.

IT 102
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Experts found gained access to the Git Repositories of the United Nations

Security Affairs

Researchers obtained gained access to the Git Repositories belonging to the United Nations, exposing staff records and credentials. The research group Sakura Samurai was able to access the repositories of the United Nations as part of the Vulnerability Disclosure Program and a Hall of Fame operated by the organization. The group, composed of Jackson Henry, Nick Sahler, John Jackson , and Aubrey Cottle, has identified an endpoint that exposed Git Credentials.

Access 71
article thumbnail

Are you ready to discover greatness?

OpenText Information Management

This blog is authored by Lou Blatt, SVP & CMO, OpenText, and James McGourlay, EVP, Customer Operations, OpenText This year at OpenText™ World, we announced our new OpenText Voyager program, a reimagining of how OpenText supports, trains, engages with, and communicates to our customers, partners, and employees. What is an OpenText Voyager? An innovator, and … The post Are you ready to discover greatness?

article thumbnail

Intel's New vPro Processors Aim to Help Defend Against Ransomware

Dark Reading

The newest Intel Core vPro mobile platform gives PC hardware a direct role in detecting ransomware attacks.

article thumbnail

NAGARA Webinar Recap: AOTUS Discusses the Presidential Records Act, Bureau of Indian Affairs Records, digitization, and how NARA will provide access to facilities post COVID-19

IG Guru

The discussion with AOTUS David Ferriero this past December was informative and noteworthy. Special thanks to Meg Phillips for also assisting with answers to questions. Below is the Q&A from the webinar: Q: Given COVID-19 is there any consideration to postponing the “all-digital” mandate deadline as posted in OMB M-19-21? A: We have no plans […].

Access 61
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Researchers Test UN’s Cybersecurity, Find Data on 100k

The Security Ledger

Independent security researchers testing the security of the United Nations were able to compromise public-facing servers and a cloud-based development account for the U.N. and lift data on more than 100,000 staff and employees, according to a report released Monday. The post Researchers Test UN’s Cybersecurity, Find Data on 100k appeared first. Read the whole entry. » Related Stories Podcast Episode 189: AppSec for Pandemic Times, A Conversation with GitLab Security VP Jonathan Hunt Episod

article thumbnail

INSPIRE 20 Podcast: Meet Morag Lucey of Televerde

Micro Focus

It’s back, the INSPIRE 20 podcast returns today with Morag Lucey, CEO of Televerde, a company built on second chances. This forward thinking organization helps businesses accelerate their sales pipelines with a team of female sales professionals—half of whom sit behind prison walls. It is a powerful story of delivering great results to clients and. View Article.

Sales 52
article thumbnail

Oxbotica raises £35m for its autonomous vehicle platform

Information Matters

Oxbotica, developer of a software platform for autonomous vehicles has raised $47m (£35m) in a Series B round to accelerate its rollout across a range of industries. Investors in this Read more. The post Oxbotica raises £35m for its autonomous vehicle platform appeared first on Information Matters - Data-Driven Innovation in the UK.

IT 52