Thu.Sep 24, 2020

article thumbnail

Police Crack SMS Phishing Operation

Data Breach Today

Two Men Accused of Sending Messages to Obtain Personal, Bank Information Australian police say they've broken up a sophisticated SMS phishing scheme designed to collect personal details and bank login credentials. It's a rare success in the fight against unsolicited text messages.

Phishing 336
article thumbnail

Microsoft: Attackers Exploiting ‘ZeroLogon’ Windows Flaw

Krebs on Security

Microsoft warned on Wednesday that malicious hackers are exploiting a particularly dangerous flaw in Windows Server systems that could be used to give attackers the keys to the kingdom inside a vulnerable corporate network. Microsoft’s warning comes just days after the U.S. Department of Homeland Security issued an emergency directive instructing all federal agencies to patch the vulnerability by Sept. 21 at the latest.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Unveils Updated Guide to Privacy, Security Controls

Data Breach Today

Guidelines Describe How to Use 'Next Generation' of Controls The U.S. National Institute of Standards and Technology this week released a long-awaited guidance update, Special Publication 800-53 Revision 5, describing "next-generation security and privacy controls" and how to use them.

Privacy 279
article thumbnail

Small business cyber security: the ultimate guide

IT Governance

If you’re an SME, cyber security might feel seem impossibly complex and filled with endless pitfalls. Although it’s true that there’s a lot at stake – with ineffective security measures potentially threatening your productivity, your bank accounts, and your employees’ and third parties’ personal data – the path to effective security needn’t be difficult.

Security 131
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Drop Everything and Secure Remote Workforce, Gartner Warns

Data Breach Today

10 Top Near-Term Security Projects Start With Revisiting Security for Remote Workers Revisiting remote workforce security defenses, simplifying cloud access controls and pursuing risk-based vulnerability management and passwordless authentication are among the 10 security projects that all organizations should consider for this year and next, according to advisory firm Gartner.

Security 220

More Trending

article thumbnail

Blackbaud Ransomware Breach Victims, Lawsuits Pile Up

Data Breach Today

More Entities Reporting Breaches Tied to Attack; Millions Affected As the tally of reported heath data breaches related to the May ransomware attack on Blackbaud continues to climb, so do the number of lawsuits filed against the cloud-based fundraising software vendor.

article thumbnail

Microsoft, Italy and the Netherlands agencies warn of EMOTET campaigns

Security Affairs

Experts worldwide warn about a surge in the Emotet activity, this time the alerts are from Microsoft, Italy and the Netherlands agencies. Two weeks ago, cybersecurity agencies across Asia and Europe warned of Emotet spam campaigns targeting businesses in France, Japan, and New Zealand. The French national cyber-security agency published an alert to warn of a significant increase of Emotet attacks targeting the private sector and public administration entities in France.

Passwords 127
article thumbnail

Lessons to Learn From Shopify Data Breach

Data Breach Today

Security Experts Call for 'Zero Trust' Approach, Enhanced IAM Shopify's announcement this week that two employees inappropriately accessed transactional data from 200 of the merchants that use its e-commerce platform demonstrates the importance of taking a "zero trust" approach to security and improving identity and access management capabilities, security experts say.

article thumbnail

Alien Android Banking Trojan Sidesteps 2FA

Threatpost

A new 'fork' of the Cerberus banking trojan, called Alien, targets victims' credentials from more than 200 mobile apps, including Bank of America and Microsoft Outlook.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Instagram RCE gave hackers remote access to your device

Security Affairs

Facebook has addressed a critical vulnerability in Instagram that could lead to remote code execution and turn the smartphone into a spying device. Facebook has fixed a critical remote code execution vulnerability in Instagram that could lead to the hijack of smartphone cameras, microphones, and more. . The vulnerability, tracked as CVE-2020-1895 , was discovered by Check Point, it is a heap overflow issue that resides in Instagram’s image processing and received a CVSS score of 7.8. R

Access 116
article thumbnail

Victims of Blackbaud ransomware attack to take legal action

IT Governance

Students and staff at the University of Cumbria who were affected by the ransomware attack on Blackbaud are preparing to take legal action against the software provider. Blackbaud, which provides education administration, fundraising and financial management support, was attacked earlier this year, with cyber criminals accessing victims’: Names; Dates of birth; Addresses; Phone numbers; Email addresses; Donation history; and Events that individuals attended.

article thumbnail

Iranian Government Hacking Android

Schneier on Security

The New York Times wrote about a still-unreleased report from Chckpoint and the Miaan Group: The reports, which were reviewed by The New York Times in advance of their release, say that the hackers have successfully infiltrated what were thought to be secure mobile phones and computers belonging to the targets, overcoming obstacles created by encrypted applications such as Telegram and, according to Miaan, even gaining access to information on WhatsApp.

article thumbnail

How small organisations can fast-track ISO 27001 implementation

IT Governance

Small businesses are increasingly understanding the importance of ISO 27001 , the international information security standard, but many struggle to find the resources to commit to an implementation project. If you’re among those, our ISO 27001 Online FastTrack Consultancy – Micro Organisations is the ideal solution. Our team of experts will have you ready for accredited certification in just three months and for a one-off fee.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A Tip From a Kid Helped Uncover a Slew of Scam Apps

WIRED Threat Level

After a girl reported a suspicious TikTok profile, researchers detected aggressive adware in apps that had been downloaded 2.4 million times.

Security 103
article thumbnail

Critical Instagram Flaw Could Let Attackers Spy on Victims

Dark Reading

A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.

107
107
article thumbnail

Alien Android banking Trojan, the powerful successor of the Cerberus malware

Security Affairs

Security researchers spotted a new strain of Android malware, dubbed Alien, that implements multiple features allowing it to steal credentials from 226 apps. Researchers from ThreatFabric have discovered and analyzed a new strain of Android malware, tracked as Alien, that implements multiple features allowing it to steal credentials from 226 applications.

Sales 89
article thumbnail

Malware Attacks Declined But Became More Evasive in Q2

Dark Reading

Most of the malware used in attacks last quarter were designed to evade signature-based detection tools, WatchGuard says.

104
104
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Twitter Survived Its Biggest Hack—and Plans to Stop the Next One

WIRED Threat Level

On July 15, Twitter melted down. On Election Day, that's not an option.

IT 119
article thumbnail

Solving the Problem With Security Standards

Dark Reading

More explicit threat models can make security better and open the door to real and needed innovation.

Security 107
article thumbnail

Facebook Busts Russian Disinfo Networks as US Election Looms

WIRED Threat Level

The campaigns primarily targeted countries outside the US. But the same mechanisms could be used in “hack and leak” operations like those that roiled the 2016 campaign.

article thumbnail

4 ways enterprises benefit from private wireless

DXC Technology

Mobile devices such as smartphones, laptops, tablets, and augmented-reality (AR) headsets have made wireless networking essential to enterprise business. So too has the proliferation of networked devices – the Internet of things (IoT) – many of which rely exclusively on wireless networks to transmit valuable customer and operational data. But as the sheer number of […].

IoT 70
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Feds Hit with Successful Cyberattack, Data Stolen

Threatpost

The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit.

article thumbnail

Top Zero Trust Security Solutions

eSecurity Planet

With solutions targeting access control and microsegmentation, security vendors are turning zero trust from a concept into products.

article thumbnail

Bluetooth Security Weaknesses Pile Up, While Patching Remains Problematic

Dark Reading

Turns out, creating wireless ecosystems for a vast number of different architectures, configurations, and use cases is hard.

article thumbnail

Free Apple iPhone 12? Chatbot Scam Spreads Via Texts

Threatpost

Convincing SMS messages tell victims that they've been selected for a pre-release trial for the soon-to-be-launched device.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft Warns of Attackers Now Exploiting 'Zerologon' Flaw

Dark Reading

The Security Intelligence team at Microsoft is tracking newly waged exploits in the wild.

Security 100
article thumbnail

Forrester study finds cloud security fears unfounded

OpenText Information Management

This blog is co-authored by Alison Clarke and Sandi Nelson. Organizations with major on-premises investments understandably have concerns about a wholesale shift to cloud content management. But instead of standing still and letting the competition pass them by, Forrester recommends phased and flexible migration strategies. To explore how and why (or why not) enterprises are … The post Forrester study finds cloud security fears unfounded appeared first on OpenText Blogs.

Cloud 63
article thumbnail

Jamf Protect Series: Securely welcoming macOS into your business

Jamf

More and more businesses are relying on Mac for the needs of their employees. Learn how you can bring macOS on board while maintaining the security of your fleet.