Tue.Mar 10, 2020

article thumbnail

PwndLocker: Free Decryptor Frees Crypto-Locked Data

Data Breach Today

Ransomware Debuted in Late 2019; Gang's Ransom Demands Have Hit $660,000 in Bitcoins Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.

article thumbnail

FBI Arrests Alleged Owner of Deer.io, a Top Broker of Stolen Accounts

Krebs on Security

FBI officials last week arrested a Russian computer security researcher on suspicion of operating deer.io , a vast marketplace for buying and selling stolen account credentials for thousands of popular online services and stores. Kirill V. Firsov was arrested Mar. 7 after arriving at New York’s John F. Kennedy Airport, according to court documents unsealed Monday.

Sales 289
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Sector Faces Reckoning After Coronavirus Hits

Data Breach Today

Wall Street Suffers Worst Loss in 12 Years; White House Floats Stimulus Package Wall Street has been hit by the twin threats of the new coronavirus as well as oil prices plummeting, with the Dow dropping 2,000 points on Monday for its worst day in 12 years. Amidst fears that a recession could tank the global economy, some experts still see upsides for the cybersecurity sector.

article thumbnail

Microsoft Patch Tuesday, March 2020 Edition

Krebs on Security

Microsoft Corp. today released updates to plug more than 100 security holes in its various Windows operating systems and associated software. If you (ab)use Windows, please take a moment to read this post, backup your system(s), and patch your PCs. All told , this patch batch addresses at least 115 security flaws. Twenty-six of those earned Microsoft’s most-dire “critical” rating, meaning malware or miscreants could exploit them to gain complete, remote control over vulnerable

Security 245
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

2020 Predictions: Targeted Ransomware and 5G Vulnerabilities

Data Breach Today

WatchGuard's Corey Nachreiner on Threat Report's Top 3 Predictions New ransomware variants are targeting managed service and cloud service providers: This is one of the predictions made by WatchGuard Technologies for 2020. CTO Corey Nachreiner discusses the top three predictions.

More Trending

article thumbnail

Coronavirus Fears Lead to New Wave of Phishing, Malware

Data Breach Today

European Central Bank Among Those Issuing Warnings As COVID-19 spreads, cybercriminals are sending more phishing emails that use the health emergency as a lure, according to security researchers. The European Central Bank is among those issuing warnings.

Phishing 244
article thumbnail

Microsoft accidentally reveals Wormable Win SMBv3 CVE-2020-0796 Flaw

Security Affairs

Today Microsoft accidentally leaked info about a new wormable vulnerability (CVE-2020-0796) in the Microsoft Server Message Block (SMB) protocol. Today Microsoft accidentally leaked info on a security update for a wormable vulnerability in the Microsoft Server Message Block (SMB) protocol. The issue, tracked as CVE-2020-0796 , is pre- remote code execution vulnerability that resides in the Server Message Block 3.0 (SMBv3) network communication protocol, the IT giant will not address the issue a

article thumbnail

Coronavirus: The Public Health Cybersecurity Issues

Data Breach Today

Among the many cybersecurity and privacy risks involving the fast evolving global coronavirus outbreak are potential concerns related to the development of a vaccine, says public health risk management expert Stanley Mierzwa of Kean University in Union, New Jersey.

article thumbnail

What’s a Legacy System Replacement Project? A Non-Technical User's Guide to Starting the Conversation

AIIM

“Legacy” is a term we see a lot in the IT world; in reference to software and hardware, it describes a system that has been superseded by improved technology. It’s easy to identify these systems with one simple question: “Have our business needs outgrown this system?”. If you answered yes, it’s likely you’re in need of a legacy system replacement project - a project to replace the outdated system with a new system that can better suit the needs of the business.

IT 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Threat Intelligence Feeds Are Evolving

Data Breach Today

Rob Cataldo of Kaspersky Discusses Bringing Context to Threat Intelligence Threat intelligence feeds are evolving, but Rob Cataldo of Kaspersky North America says it's important to put all this data into context to create better enterprise security.

Security 191
article thumbnail

Hackers use hackers spreading tainted hacking tools in long-running campaign

Security Affairs

Who is hacking the hackers? Experts from Cybereason a mysterious hackers group is targeting other hackers by spreading tainted hacking tools. Experts from security firm Cybereason warn of a mysterious group of hackers that are distributing trojanized hacking tools on an almost daily basis for the past years. These hacking tools are used by fellow hackers that appear to be the targets of the group.

IT 117
article thumbnail

Simplifying Device Retirement and Refresh

Jamf

Organizations that build a strategic process around technology refreshes provide the best possible experience for their users — and take advantage of Apple devices’ high resale values.

113
113
article thumbnail

Microsoft warns of Human-Operated Ransomware as a growing threat to businesses

Security Affairs

Microsoft is warning of human-operated ransomware, this kind of attack against businesses is becoming popular in the cybercrime ecosystem. Human-operated ransomware is a technique usually employed in nation-state attacks that is becoming very popular in the cybercrime ecosystem. In human-operated ransomware attack scenario, attackers use stolen credentials, exploit misconfiguration and vulnerabilities to access target networks, attempt to escalate privileges and move laterally, and deliver malwa

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Keys to Hiring Cybersecurity Pros When Certification Can't Help

Dark Reading

There just aren't enough certified cybersecurity pros to go around -- and there likely never will be enough. So how do you fill out your cybersecurity team? Executives and hiring managers share their top tips on recognizing solid candidates.

article thumbnail

FBI arrested a Russian citizen suspected to be the mastermind of Deer.io

Security Affairs

The FBI announced the arrest of a Russian national that is suspected to be the mastermind behind Deer.io, a Shopify-like platform. The FBI arrested Kirill Victorovich Firsov, the alleged main operator behind Deer.io which is a Shopify-like platform that has been hosting hundreds of online shops used for the sale of hacked accounts and stolen user data.

Sales 110
article thumbnail

CIA Dirty Laundry Aired

Schneier on Security

Joshua Schulte, the CIA employee standing trial for leaking the Wikileaks Vault 7 CIA hacking tools, maintains his innocence. And during the trial, a lot of shoddy security and sysadmin practices are coming out : All this raises a question, though: just how bad is the CIA's security that it wasn't able to keep Schulte out, even accounting for the fact that he is a hacking and computer specialist?

Passwords 129
article thumbnail

Researchers Develop New Side-Channel Attacks on Intel CPUs

Dark Reading

Load Value Injection (LVI) takes advantage of speculative execution processes just like Meltdown and Spectre, say security researchers from Bitdefender and several universities.

Security 106
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The rise of cyber security product sprawl

DXC Technology

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one job – resist malware, scan for vulnerabilities, encrypt data, detect intrusions, etc. — very well. But over time the number of tools in the security practitioner’s toolbox grew […].

article thumbnail

7 ways to boost user adoption

OpenText Information Management

Change management is hardly a new concept, but it all too rarely receives equal billing to technology management. In many cases, change and IT teams work separately — or worse, the importance of change management is overlooked and there is simply no change support being planned. Even when adoption measures are designed, they often focus … The post 7 ways to boost user adoption appeared first on OpenText Blogs.

IT 74
article thumbnail

Digital Transformation. What do the Analysts think?

Micro Focus

This week, Micro Focus released a whitepaper in conjunction with IDC on the topic of digital transformation (DX). IDC compiled information for this study from hundreds of interviews, and their annual survey of tens of thousands of IT and business decision makers, making them a top authority on digitally transforming the enterprise. Here are a. View Article.

article thumbnail

3 Tips to Stay Secure When You Lose an Employee

Dark Reading

Whether they leave for a better job or get fired, and whether they mean to cause problems or do so out of ignorance, ex-workers can pose a threat to your company.

Security 107
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft disrupted US-Based Infrastructure of the Necurs botnet

Security Affairs

Microsoft announced that it took over the US-based infrastructure used by the infamous Necurs spam botnet that infected millions of computers. Microsoft announced to have taken over the US-based infrastructure used by the Necurs botnet. The IT giant explained that success is the result of a coordinated legal and technical joint effort to disrupt the Necurs botnet , which has infected more than nine million computers globally.

article thumbnail

Most Medical Imaging Devices Run Outdated Operating Systems

WIRED Threat Level

The end of Windows 7 support has hit health care extra hard, leaving several machines vulnerable.

article thumbnail

Spear-Phishing Attack Lures Victims With ‘HIV Results’

Threatpost

Attackers are purporting to send victims HIV test results - but in reality are convincing them to download the Koadic RAT.

article thumbnail

The Ongoing Battle Over How ESI is Produced: eDiscovery Trends, Part Two

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars. Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Mobile Collection: It’s Not Just for iPhones Anymore.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Despite Coronavirus, Washington Isn't Worried About Its Primary

WIRED Threat Level

The state conducts its elections almost entirely by mail. The rest of the country should pay attention. .

IT 89
article thumbnail

High-Severity Flaws Plague Intel Graphics Drivers

Threatpost

Intel patched six high-severity flaws in its graphics drivers, as well as other vulnerabilities in its NUC firmware, and a load value injection vulnerability that could allow attackers to steal sensitive data.

IT 61
article thumbnail

What Should I Do About Vulnerabilities Without Fixes?

Dark Reading

With better tools that identify potential threats even before developers address them, a new problem has arisen.

80