Mon.Aug 02, 2021

article thumbnail

NSA Reminder: Beware of Public Wi-Fi

Data Breach Today

Agency Emphasizes Value of VPNs, Other Security Steps Teleworking U.S. national security employees are putting sensitive data at risk if they use public Wi-Fi networks without using a virtual private network to encrypt the traffic, the National Security Agency notes in a new advisory.

article thumbnail

The European Space Agency Launches Hackable Satellite

Schneier on Security

Of course this is hackable: A sophisticated telecommunications satellite that can be completely repurposed while in space has launched. […]. Because the satellite can be reprogrammed in orbit, it can respond to changing demands during its lifetime. […]. The satellite can detect and characterise any rogue emissions, enabling it to respond dynamically to accidental interference or intentional jamming.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zoom Agrees to Settle Security Lawsuit for $85 Million

Data Breach Today

Case Stems From Concerns About 'Zoom Bombing' and Other Issues Cloud video conferencing provider Zoom has agreed to settle a consolidated class action federal lawsuit for $85 million as well as reform its security and data privacy practices.

article thumbnail

Do You Trust Your Smart TV?

Security Affairs

Did you ever stop to think that the office smart TV used for company presentations, Zoom meetings, and other work-related activities may not be so trustworthy? In our latest video, we demonstrate an attack scenario that can occur within any organization – hacking a smart TV. The video shows an insider plugging a USB Rubber Ducky into a smart TV in a company meeting room.

Access 125
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Vendor-Related PHI Breach Reports Keep Rolling In

Data Breach Today

Clients of Health Insurer, Consultancy Among Those Affected Several recent health data breaches involving vendors - including more reports related to the Accellion file transfer appliance hack - show that managing vendor security risks remains a difficult ongoing challenge in the healthcare sector.

Insurance 317

More Trending

article thumbnail

BlackMatter Ransomware Appears to Be Spawn of DarkSide

Data Breach Today

The 'Darkside Rebrand' Signals the Return of More Supposedly Defunct Ransomware The new BlackMatter ransomware operation claimed to have incorporated "the best features of DarkSide, REvil and LockBit." Now, a security expert who obtained a BlackMatter decryptor reports that code similarities suggest "that we are dealing with a Darkside rebrand here.

article thumbnail

WordPress Download Manager Plugin was affected by two flaws

Security Affairs

An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under specific configurations. Researchers from Wordfence team discovered a vulnerability, tracked as CVE-2021-34639, affecting the WordPress Download Manager plugin that could allow attackers to execute arbitrary code under specific configurations.

IT 123
article thumbnail

Ransomware Attackers Eying 'Pure Data-Leakage Model'

Data Breach Today

Facing Intense Scrutiny, Attackers Retool, Says Cybercrime Researcher Bob McArdle A funny thing happened on the way to the nonstop ransomware payday: Some groups hit the wrong targets - Ireland's health system, a major U.S. fuel pipeline - resulting in the U.S. moving to much more aggressively disrupt their business model, says Bob McArdle, director of cybercrime research at Trend Micro.

article thumbnail

More evidence suggests that DarkSide and BlackMatter are the same group

Security Affairs

Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. BleepingComputer found evidence that after the clamorous Colonia Pipeline attack, the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. The experts analyzed encryption algorithms in a decryptor used by BlackMatter, which is actively attacking corporate entities.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FatalRAT Exploits Telegram to Deliver Malicious Links

Data Breach Today

AT&T Alien Labs: RAT Uses Defense Evasion Techniques A remote access Trojan is being distributed via download links for software or media articles on Telegram channels, according to researchers at AT&T Alien Labs.

Access 182
article thumbnail

‘PwnedPiper’: Devastating Bugs in >80% of Hospital Pneumatics

Threatpost

Podcast: Blood samples aren’t martinis. You can’t shake them. But bugs in pneumatic control systems could lead to that, RCE or ransomware.

article thumbnail

PwnedPiper flaws in PTS systems affect 80% of major US hospitals

Security Affairs

Cybersecurity researchers disclosed multiple flaws, dubbed PwnedPiper , that left a widely-used pneumatic tube system (PTS) vulnerable to attacks. Researchers from cybersecurity Armis disclosed a set of nine vulnerabilities collectively tracked as PwnedPiper that could be exploited to carry out multiple attacks against a widely-used pneumatic tube system (PTS).

article thumbnail

The InfoGov World IG Survey closes soon

IG Guru

We want your valuable insights. Strategic partners InfoGov World Media, Hyland, Ricoh, Iron Mountain, Electronic Discovery Reference Model (EDRM), Certified Information Governance Officers Association (CIGOA), and Institute for Information Governance invite you to participate in a global information governance (IG) survey. Please participate soon! The survey closes at midnight on August 2.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Normal Demands New Security Leadership Structure

Dark Reading

At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.

Security 128
article thumbnail

ANNOUNCING PUBLICATION OF The Sedona Conference Commentary on Ephemeral Messaging

IG Guru

The Sedona Conference and its Working Group 6 on International Electronic Information Management, Discovery, and Disclosure (WG6) are pleased to announce that The Sedona Conference Commentary on Ephemeral Messaging (“Commentary”) has been published. The Commentary defines the nature and scope of ephemeral messaging and provides a detailed sketch of the tension and competing demands facing organizations – particularly organizations […].

IT 98
article thumbnail

New Connecticut Breach Notification Requirements and Cybersecurity Safe Harbor Effective October 2021

Hunton Privacy

Connecticut recently passed two cybersecurity laws that will become effective on October 1, 2021. The newly passed laws modify Connecticut’s existing breach notification requirements and establish a safe harbor for businesses that create and maintain a written cybersecurity program that complies with applicable state or federal law or industry-recognized security frameworks.

article thumbnail

Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System

Dark Reading

"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows.

116
116
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Chipotle Emails Serve Up Phishing Lures

Threatpost

Mass email distribution service compromise mirrors earlier Nobelium attacks.

Phishing 108
article thumbnail

Hospitals Still Use Pneumatic Tubes—and They Can Be Hacked

WIRED Threat Level

The tech may seem antiquated, but it poses very modern cybersecurity problems.

article thumbnail

Securing the Expanding Network Perimeter

Adapture

Remote work, public cloud, SASE – Cloudflare, Cisco (Balancing Security, Performance, and Cost). Securing a company-wide network is imperative for any organization. Hackers have more opportunities than ever to break through network perimeters and steal valuable information. The reality is that the perimeter is vanishing due to continued expansion for organizations of all sizes.

article thumbnail

Just ‘duet’

Jamf

Jamf recently welcomed internationally celebrated children’s author, artist and education champion Peter H. Reynolds to share his latest book collaboration with Yusef/Cat Stevens: Peace Train.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Opportunity for Comment: FY 2022-2026 Draft Strategic Plan

National Archives Records Express

The National Archives and Records Administration has posted its new draft Strategic Plan and is inviting feedback from staff, public and government customers, stakeholders, and colleagues in the archival, historical, and records management communities. The draft plan reaffirms our current Mission, Vision, Values, Transformational Outcomes, and Strategic Goals ( see Strategic Plan (FY 2018–FY 2022 ).

article thumbnail

Putting the patient first: technological innovation in healthcare

Jamf

Technology has become essential in the world of healthcare, both for clinicians and patients. The need to provide secure access to patients, streamline workflows for clinicians and reduce the burden on all parties is no longer a desire -- it is a necessity. This roundtable of experts in the Benelux region discussed the situation.

Access 52
article thumbnail

Register now: Archive-It Virtual Partner Meeting on September 29

Archive-It

by the Archive-It team. Early registration is now open for the annual Archive-It Partner Meeting, to be held online on Wednesday, September 29. You can learn more about the annual gathering of web archiving peers and claim your digital seat here on our homepage. . Registration is free and open to all, but space is limited, so please let us know if we can hold a spot for you!

article thumbnail

Black Hat insights: The retooling of SOAR to fit as the automation core protecting evolving networks

The Last Watchdog

In less than a decade, SOAR — security orchestration, automation and response — has rapidly matured into an engrained component of the security technology stack in many enterprises. Related: Equipping SOCs for the long haul. SOAR has done much since it entered the cybersecurity lexicon to relieve the cybersecurity skills shortage. SOAR leverages automation and machine learning to correlate telemetry flooding in from multiple security systems.

Cloud 203
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Investing in Internal Documentation Saves Your Company Money

OneHub

When budgets get tight, cutting unnecessary costs is a standard strategy to maintain a successful business. While the big expenses tend to get the most attention — finding cost-effective employee benefits, buying supplies in bulk, cutting out catering for staff meetings — sometimes it’s the smaller details that can have the most impact. Internal documentation is one of those minor details that are rarely at the top of anyone’s money-saving list, but it definitely deserves a spot.

Access 59
article thumbnail

List of data breaches and cyber attacks in July 2021 – 34 million records breached

IT Governance

We found 86 security incidents in July 2021, which accounted for 33,727,641 breached records. Those figures bring the annual running total of security incidents to 815 and the total number of breached records to 3,980,757,735. As always, you can find the full list of incidents below, with those affecting UK organisations listed in bold. And don’t forget to subscribe to our Weekly Round-up to receive the latest industry news and advice.