Mon.Oct 19, 2020

article thumbnail

Expert Tips to Keep WordPress Safe

Dark Reading

The most widely used content management system on the Web relies heavily on plug-ins and add-on software -- and that requires rigorous security measures at every level.

Security 130
article thumbnail

6 Russians Indicted for NotPeyta Campaign, Other Attacks

Data Breach Today

DOJ: Russian GRU Officers Targeted 2018 Olympics, French Elections and More The U.S. Justice Department unsealed indictments against six Russian military officers on Monday, alleging that they carried out a series of major hacking operations, including deploying NotPetya ransomware - causing over $10 billion in damages - and attacking the 2018 Olympics.

Military 306
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks. Related: Welcome to the CyberXchange Marketplace In the U.S. alone, in fact, there are more than 5,000 cybersecurity vendors. For organizations looking to improve their security posture, this is causing confusion and vendor fatigue, especially for companies that don’t have a full time Chief Information Security Officer.

article thumbnail

Sensitive Voicemail Transcripts Exposed

Data Breach Today

Researcher Finds Unsecure Elasticsearch Database Cluster Accessible via the Internet A security researcher recently discovered an unsecure Elasticsearch database cluster exposed on the internet that contained transcripts of sensitive voicemail messages, including some for medical clinics and financial service companies.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cognitive Technologies White Paper

National Archives Records Express

This post is written by Sharmila Bhatia and Markus Most. We are pleased to announce the release of a white paper on the records management implications of: Internet of Things (IoT) Robotic Process Automation (RPA) Machine Learning (ML) Artificial Intelligence (AI). This white paper provides a basic description of each of these technologies, examples of their various applications, and enabling factors supporting the technologies.

Paper 133

More Trending

article thumbnail

Fooling self-driving cars by displaying virtual objects

Security Affairs

Researchers from the Ben-Gurion University of the Negev demonstrated how to fool self-driving cars by displaying virtual objects. A group of researchers from the Ben-Gurion University of the Negev demonstrated that it is possible to fool self-driving cars by displaying virtual objects (phantoms). The experts define as phantom a depthless visual object used to deceive ADASs and cause these systems to perceive it as real.

Paper 132
article thumbnail

'Active Threat' Warning: Patch Serious SharePoint Flaw Now

Data Breach Today

SharePoint Remains Top Hacker Target, UK's National Cyber Security Center Warns Security experts are urging organizations to patch a newly revealed serious flaw in Microsoft SharePoint as quickly as possible because proof-of-concept exploit code is already available. The U.K.'s National Cyber Security Center warns that hackers frequently target fresh SharePoint flaws.

Security 232
article thumbnail

Hackers claim to have compromised 50,000 home cameras and posted footage online

Security Affairs

A hacker collective claims to have hacked over 50,000 home security cameras and published their footage online, some of them on adult sites. A group of hackers claims to have compromised over 50,000 home security cameras and published their private footage online. Some footages were published on adult sites, experts reported that crooks are offering lifetime access to the entire collection for US$150.

IoT 130
article thumbnail

FCC Wants More Information on Threat Posed by China Unicom

Data Breach Today

Asks Justice Department to Spell Out National Security Threat The FCC is asking the Justice Department and other executive branch agencies if China Unicom's operations within the U.S. pose a significant enough national security threat to merit revoking the company's business license.

Security 165
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

US Indicts Sandworm, Russia's Most Destructive Cyberwar Unit

WIRED Threat Level

The Department of Justice has named and charged six men for allegedly carrying out many of the most costly cyberattacks in history.

Security 139
article thumbnail

Building an Effective Ransomware Mitigation Strategy

Data Breach Today

Crowdstrike's Jennifer Ayers on Understanding the Indicators of Attacks To mitigate the risks posed by ransomware attacks, enterprises need to move from file-based security to a behavior-based approach, says Jennifer Ayers, vice president of the OverWatch division of Crowdstrike.

article thumbnail

Alexander Vinnik, the popular cyber criminal goes on trial in Paris

Security Affairs

The Russian citizen Alexander Vinnik goes on trial in Paris for having defrauded nearly 200 victims across the world of 135 million euros using ransomware. The Russian man Alexander Vinnik goes on trial in Paris for having defrauded nearly 200 victims across the world of 135M euros using ransomware. Alexander Vinnik allegedly headed the Bitcoin exchange BTC-e, he is charged with different hacking crimes in Russia, France, and the United States.

article thumbnail

7 Tips for Choosing Security Metrics That Matter

Dark Reading

Experts weigh in on picking metrics that demonstrate how the security team is handling operational efficiency and reducing risk.

Security 124
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

GravityRAT malware also targets Android and macOS

Security Affairs

Researchers spotted new variants of the Windows GravityRAT spyware that now can also infect Android and macOS devices. Researchers from Kaspersky Lab have spotted new variants of the GravityRAT malware that now can be also used to infect Android and macOS devices. GravityRAT is a malware strain known for checking the CPU temperature of Windows computers to avoid being executed in sandboxes and virtual machines.

article thumbnail

Chart: The Pandemic Reprioritizes Security Projects

Dark Reading

Responses among IT and security pros reflect concern over vulnerabilities incurred by workers accessing the enterprise network from poorly protected home networks.

Security 105
article thumbnail

The forum of the popular Albion Online game was hacked

Security Affairs

Albion Online game maker discloses a data breach, hackers gained access to the company forum database by exploiting a known vulnerability. Albion Online (AO) is a free medieval fantasy MMORPG developed by Sandbox Interactive, a studio based in Berlin, Germany. A threat actor has breached the forum of Albion Online and stole usernames and password hashes from its database.

article thumbnail

Microsoft: Most-Imitated Brand for Phishing Emails

Threatpost

The shift to remote working spurred Microsoft and Amazon to the top of the heap for cybercriminals to use as lures in the third quarter.

Phishing 117
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

INSPIRE 20 – mark my words! The importance of diverse tech innovation

Micro Focus

UKBlackTech All I can say about this week’s episode is WOW, Mark Martin, what an episode! Mark, a computer science teacher and founder of UKBlackTech, joins us this week to talk about representation, diversity, and how the Black Lives Matter movement has acted as a catalyst for the tech industry. Mark, who holds an MBE. View Article.

98
article thumbnail

Rapper Scams $1.2M in COVID-19 Relief, Gloats with ‘EDD’ Video

Threatpost

"Nuke Bizzle" faces 22 years in prison after brazenly bragging about an identity-theft campaign in his music video, "EDD.".

Insurance 117
article thumbnail

Trickbot, Phishing, Ransomware & Elections

Dark Reading

The botnet has taken some hits lately, but that doesn't mean the threat is over. Here are some steps you can take to keep it from your door.

Phishing 108
article thumbnail

Ryuk Ransomware Gang Uses Zerologon Bug for Lightning-Fast Attack

Threatpost

Researchers said the group was able to move from initial phish to full domain-wide encryption in just five hours.

Phishing 115
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

NSS Labs Shuttered

Dark Reading

The testing firm's website says it has 'ceased operations' as of Oct. 15.

IT 143
article thumbnail

Microsoft Exchange, Outlook Under Siege By APTs

Threatpost

A new threat report shows that APTs are switching up their tactics when exploiting Microsoft services like Exchange and OWA, in order to avoid detection.

Cloud 97
article thumbnail

French Highest Court Rejects Temporary Suspension of France’s Health Data Hub; Calls for Additional Guarantees Following Schrems II

Hunton Privacy

On October 13, 2020, France’s highest administrative court (the “ Conseil d’État ”) issued a summary judgment that rejected a request for the suspension of France’s centralized health data platform, Health Data Hub (the “HDH”), currently hosted by Microsoft. However, the Conseil d’État recognized that there is a risk of U.S. intelligence services requesting the data and called for additional guarantees under the control of the French data protection authority (the “CNIL”).

article thumbnail

Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns

Dark Reading

US Department of Justice charges members of Sandworm/APT28 for BlackEnergy, NotPetya, Olympic Destroyer, and other major attacks.

Military 109
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

GravityRAT Comes Back to Earth with Android, macOS Spyware

Threatpost

The espionage tool masquerades as legitimate applications and robs victims blind of their data.

Access 100
article thumbnail

A New Risk Vector: The Enterprise of Things

Dark Reading

Billions of devices -- including security cameras, smart TVs, and manufacturing equipment -- are largely unmanaged and increase an organization's risk.

Risk 93
article thumbnail

FileTrail Acquires OmniRIM Physical Records Management Software from Access

IG Guru

OmniRIM customers to receive continued support and upgrade path to FileTrail GPS Records Manager AUSTIN, Texas, October 13, 2020 — FileTrail, a leader in modern records management and information governance software, and Access, the largest privately held information management company, today announced that FileTrail has acquired OmniRIM Physical Records Management software from Access.