Sat.Mar 27, 2021

article thumbnail

German Parliament Sustains Another Attack

Data Breach Today

Members of Parliament Targeted by Spear Phishing, German Media Reports Several members of the German parliament, The Bundestag, and political activists in the country were targeted using a spear-phishing campaign, German newsmagazine der Spiegel reported Friday. This is second such incident, following the 2015 parliament hack.

Phishing 346
article thumbnail

Apple released out-of-band updates for a new Zero?Day actively exploited

Security Affairs

Apple has released new out-of-band updates for iOS, iPadOS, macOS and watchOS to address another zero?day flaw, tracked CVE-2021-1879 , actively exploited. Apple has released a new set of out-of-band patches for iOS, iPadOS, macOS and watchOS to address a critical zero-day vulnerability, tracked as CVE-2021-1879, that is being actively exploited in the wild.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Senators Raise Concerns About Energy Dept. Cybersecurity

Data Breach Today

Concern Rises as DOE Continues to Investigate SolarWinds Attack's Impact Eleven U.S. senators are raising concerns about the Department of Energy's cybersecurity readiness as the department continues to investigate a breach related to the SolarWinds supply chain attack.

article thumbnail

Experts spotted a new advanced Android spyware posing as “System Update”

Security Affairs

Researchers spotted a sophisticated Android spyware that implements exfiltration capabilities and surveillance features, including recording audio and phone calls. Experts from security firm Zimperium have spotted a new sophisticated Android spyware that masquerades itself as a System Update application. The malware is able to collect system data, messages, images and take over the infected Android devices, it could allow operators to record audio and phone calls, take photos, review browser his

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How Old Breaches Fuel New Identity Crimes

Data Breach Today

Jim Van Dyke and Al Pascual of Sontiq Describe Criminals' Use of Breached Data Identity crimes are up, but data breaches are down. What does this mean for risk mitigation strategies? Jim Van Dyke and Al Pascual of Sontiq offer an analysis.

article thumbnail

Hackers Hosed by Google Were a Counterterrorism Operation

WIRED Threat Level

Plus: Fox News gets sued for its election coverage (again), a record ransomware attack, and more of the week’s top security news.