Fri.May 07, 2021

article thumbnail

CISA Alert Describes FiveHands Ransomware Threat

Data Breach Today

Agency Offers In-Depth Analysis, Risk Mitigation Advice The Cybersecurity and Infrastructure Security Agency has issued an alert providing more details on the threat posed by FiveHands ransomware attacks and offering risk mitigation tips.

article thumbnail

Investment Scammer John Davies Reinvents Himself?

Krebs on Security

John Bernard , a pseudonym used by a convicted thief and con artist named John Clifton Davies who’s fleeced dozens of technology startups out of an estimated $30 million, appears to have reinvented himself again after being exposed in a recent investigative series published here. Sources tell KrebsOnSecurity that Davies/Bernard is now posing as John Cavendish and head of a new “private office” called Hempton Business Management LLP.

Sales 250
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Patched Android Chip Flaw Could Have Enabled Spying

Data Breach Today

Check Point Report Describes Flaw's Technical Details A severe vulnerability in a system on certain Qualcomm chips, which has been patched, potentially could have enabled attackers to remotely control Android smartphones, access users' text messages and listen in on conversations, according to a new report from Check Point Software Technologies.

Access 292
article thumbnail

19 petabytes of data exposed across 29,000+ unprotected databases

Security Affairs

CyberNews researchers found more than 29,000 unprotected databases worldwide that are still publicly accessible, leaving close to 19,000 terabytes of data exposed to anyone, including threat actors. Most organizations use databases to store sensitive information. This includes passwords, usernames, document scans, health records, bank account and credit card details, as well as other essential data, all easily searchable and conveniently stored in one place.

Passwords 140
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

DNS Flaw Can Be Exploited for DDoS Attacks

Data Breach Today

Researchers Release Open-Source Detection Tool Security researchers have uncovered a flaw dubbed TsuNAME in DNS resolver software that attackers could used to carry out distributed denial-of-service attacks against authoritative DNS servers. Google and Cisco have resolved the issue in their DNS servers.

Security 274

More Trending

article thumbnail

'Panda Stealer' Targets Cryptocurrency Wallets

Data Breach Today

Malware Spread Through Spam Email Campaign Researchers at Trend Micro have uncovered a new cryptocurrency stealer variant that uses a fileless approach in its global spam email distribution campaign to evade detection.

IT 222
article thumbnail

VMware addresses critical RCE in vRealize Business for Cloud

Security Affairs

VMware has fixed a new critical RCE flaw in VMware vRealize Business for Cloud that was reported by sanctioned Russian firm Positive Technologies. VMware has addressed a critical remote code execution vulnerability, tracked as CVE-2021-21984 , in VMware vRealize Business for Cloud. vRealize Business for Cloud is an automated cloud business management solution that allows customers to perform cost analysis, consumption metering, cloud comparison, and planning, delivering the cost visibility and

Cloud 127
article thumbnail

ISMG Editors Discuss Cryptocurrency Regulations and More

Data Breach Today

Panel Also Tackles Critical Ransomware Issues Four editors at Information Security Media Group discuss timely cybersecurity issues, including a call for cryptocurrency regulation and the impact of hospital ransomware attacks.

article thumbnail

Russia-linked APT29 group changes TTPs following April advisories

Security Affairs

The UK and US cybersecurity agencies have published a report detailing techniques used by Russia-linked cyberespionage group known APT29 (aka Cozy Bear). Today, UK NCSC and CISA-FBI-NSA cybersecurity agencies published a joint security advisory that warns organizations to patch systems immediately to mitigate the risk of attacks conducted by Russia-linked SVR group (aka APT29 , Cozy Bear , and The Dukes )).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Can Evidence Collected by Cellebrite's Tools Be Trusted?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of whether courts can trust evidence collected by Cellebrite's mobile device forensic tools. Also featured: Report shows attackers' dwell times plummeting; a call for partnership with law enforcement.

Security 189
article thumbnail

Connecting the Bots – Hancitor fuels Cuba Ransomware Operations

Security Affairs

The Cuba Ransomware gang has partnered with the crooks behind the Hancitor malware in attacks aimed at corporate networks. The Hancitor downloader has been around for quite some time already. It is known since at least 2016 for dropping Pony and Vawtrak. As a loader, it has been used to download other malware families, such as Ficker stealer and NetSupport RAT , to compromised hosts.

article thumbnail

Hybrid Work Means SASE: Rethinking Traditional Network and Security Architecture

Data Breach Today

Having a VPN Isn't Enough Anymore

Security 326
article thumbnail

80% of Net Neutrality Comments to FCC Were Fudged

Threatpost

NY's AG: Millions of fake comments – in favor and against – came from a secret broadband-funded campaign or from a 19-year-old's fake identities.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Why Visibility Is Critical for Reducing Endpoint Security Complexity

Data Breach Today

See Beyond Endpoints to Stay Secure From Increasing Threats

Security 244
article thumbnail

4 reasons why technology is vital—during and after ‘unprecedented’ times

OpenText Information Management

Organizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations around the world adapted to the disruption caused by the global pandemic, the importance of information—and having the right technology to securely connect employees to the information they need, when they need it—became increasingly clear.

Security 113
article thumbnail

Thailand postpones the implementation of the data protection act until 1 June 2022

DLA Piper Privacy Matters

By: Samata Masagee , Komson Suntheeraporn , Nahsinee Luengrattanakorn , Thawalkorn Pattanachote. The Personal Data Protection Act B.E. 2562 (2019) (PDPA) came into effect since 28 May 2019 with most provisions scheduled to take full effect on 27 May 2020. Previously, the enforcement of the PDPA for 22 types of businesses listed here 1 has been postponed to 31 May 2021.

article thumbnail

[Full-Disclosure] HideezKey 2 FAIL: How a good idea turns into a SPF (Security Product Failure)

Security Affairs

HideezKey- This is a deep-dive into a nice concept for a security token & password manager that turned into a horrible product due to lack of proper R&D and Threat Modeling. Prologue: After my first success in bypassing APPROTECT readout protection of the NRF52-based Slok smartlock with #PocketGlitcher (i.e. video below), I started looking around for more interesting and concerning (from a security point of view) NRF52-based products.

Security 102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

iPhone Hack Allegedly Used to Spy on China’s Uyghurs

Threatpost

U.S. intelligence said that the Chaos iPhone remote takeover exploit was used against the minority ethnic group before Apple could patch the problem.

Security 101
article thumbnail

Possible attacks on the TCP/IP protocol stack and countermeasures

Security Affairs

Let’s look at what types of threats each layer of the TCP/IP protocol stack may be susceptible to. The task of a computer security system is to safeguard the information transmitted over the network and to adequately preserve the data stored in it. Excluding in this discussion threats due to natural disasters, we can classify the man-made risk, to which an information system is subject, into intentional threats or unintentional threats due to negligence or inexperience.

article thumbnail

Records and Information Management 4th Edition by Dr. William Saffady now available

IG Guru

Check out the link to Amazon here. The post Records and Information Management 4th Edition by Dr. William Saffady now available appeared first on IG GURU.

article thumbnail

The Edge Pro Quote: Password Empowerment

Dark Reading

Despite being a pain in the neck, passwords may hold a psychological purpose that security pros should take into account.

Passwords 108
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Streamlining your macOS upgrade process

Jamf

See how you can perform automatic in-place upgrades to macOS Big Sur with minimal user interaction and authenticated FileVault reboots.

article thumbnail

FBI, NSA, CISA & NCSC Issue Joint Advisory on Russian SVR Activity

Dark Reading

The report provides additional details on tactics of Russia's Foreign Intelligence Service following public attribution of the group to last year's SolarWinds attack.

93
article thumbnail

Twitter's Tip Jar Privacy Fiasco Was Entirely Avoidable

WIRED Threat Level

Sending its users to PayPal has created all sorts of problems that Twitter should have caught ahead of time.

Privacy 93
article thumbnail

How North Korean APT Kimsuky Is Evolving Its Tactics

Dark Reading

Researchers find differences in Kimsuky's operations that lead them to divide the APT into two groups: CloudDragon and KimDragon.

IT 95
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Transforming the grid: Four key benefits of an effective cloud strategy for utilities

CGI

Transforming the grid: Four key benefits of an effective cloud strategy for utilities. For many years, we have heard about the benefits of moving key enterprise applications to the cloud. The story goes: cloud providers can pass along cost savings, leveraging massive scaled infrastructure, such as servers and database storage, shared across multiple clients. dharini.s@cgi.com.

Cloud 52
article thumbnail

11 Reasons Why You Sorta Love Passwords

Dark Reading

We asked you to tell the truth about why you secretly love passwords. From the heartfelt to the hilarious, here's what you had to say.

article thumbnail

Your Guide to Collaboration That Empowers Your Team

OneHub

Collaboration is an essential tool for an organization’s success. It’s also one of the most difficult to master. Many company executives have gone to great lengths to foster workplace collaboration, from open-plan offices to extravagant team-building retreats. . Judging by the responses to a recent survey, these efforts haven’t been successful.