Tue.Feb 16, 2021

article thumbnail

Microsoft Patches 12-Year-Old Vulnerability

Data Breach Today

Flaw Was Present in Microsoft Defender Since 2009, SentinelOne Finds Microsoft has patched a 12-year-old vulnerability in Microsoft Defender that, if exploited, could enable nonadministrative users to escalate privilege in the application. The patch was made after security firm SentinelOne recently notified Microsoft about the flaw.

Security 345
article thumbnail

[Podcast] Remote Working - Start Small, Grow Big

AIIM

The workplace in 2021 will demand a different set of skills. Now more than ever, organizations need to embrace disruption as a springboard for competitive advantage and adopt new ways of working that invigorate organizational performance. The needed capabilities include the ability to leverage remote work as an advantage, increase information agility, and drive business growth despite these challenging times.

Cloud 156
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

France Ties 3-Year Hacking Campaign to Russia's Sandworm

Data Breach Today

Unpatched, Open-Source Versions of Centreon IT Monitoring Tool Hacked, CERT-FR Says French cybersecurity authorities are warning that widely used, open-source IT monitoring software called Centreon appears to have been hit by Russian hackers. But unlike the SolarWinds supply chain attack, in this campaign, attackers appear to have hacked outdated, unpatched versions of the software.

article thumbnail

Controlling Smart Lights Using Dumb Switches with Shelly and Home Assistant

Troy Hunt

As I progressively make my house smarter and smarter , I find I keep butting against the intersection of where smart stuff meets dump stuff. Take light globes, for example, the simplest circuit you can imagine. Pass a current through it, light goes on. Kill the current, light goes off. We worked that out back in the 19th century and everything was fine. until now.

IoT 139
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

South Korea Claims North Korea Tried Hacking Pfizer

Data Breach Today

Reported Attempt at Stealing COVID-19 Data Comes in Wake of Global Warnings South Korean intelligence officials allege that North Korean hackers attempted to steal COVID-19 vaccine and treatment data by hacking the U.S. pharmaceutical firm Pfizer.

More Trending

article thumbnail

Bloomberg's Supermicro Follow-Up: Still No Chip

Data Breach Today

New Story Is Scant on Proof That China Implanted Chips on Motherboards Bloomberg has stood firm on its controversial story from two years ago asserting that China implanted a tiny chip on motherboards made by Supermicro. But rather than proving its contention in a follow-up, it may have inflicted more reputational damage upon itself.

IT 246
article thumbnail

Telegram flaw could have allowed access to users secret chats

Security Affairs

Experts at Shielder disclosed a flaw in the Telegram app that could have exposed users’ secret messages, photos, and videos to remote attackers. Researchers at cyber security firm Shielder discovered a critical flaw affecting iOS, Android, and macOS versions of the instant messaging app Telegram. The experts discovered that sending a sticker to a Telegram user could have exposed his secret chats, photos, and videos to remote attackers.

Access 114
article thumbnail

NZ Reserve Bank Issues Update on Accellion Breach

Data Breach Today

Bank Identifies Files That Were Removed The Reserve Bank of New Zealand issued an update on the data breach it sustained in December 2020, saying it has identified the records that were compromised and offering a timeline of the incident.

article thumbnail

Microsoft Pulls Bad Windows Update After Patch Tuesday Headaches

Threatpost

Microsoft released a new servicing stack update (KB5001078) after an older one caused problems for Windows users installing Patch Tuesday security updates.

Security 113
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Critical Success Factors to Widespread Deployment of IoT. madhav. Tue, 02/16/2021 - 16:33. Digital technology and connected IoT devices have proliferated across industries and into our daily lives. Electric grid utilities are deploying smart meters to better correspond to consumers energy demands while lowering costs. Connected medical devices, such as insulin infusion pumps and pacemakers, are assisting doctors to treat and help even the most remote patients.

IoT 96
article thumbnail

Malicious Barcode Scanner App

Schneier on Security

Interesting story about a barcode scanner app that has been pushing malware on to Android phones. The app is called Barcode Scanner. It’s been around since 2017 and is owned by the Ukrainian company Lavabird Ldt. But a December 2020 update included some new features: However, a rash of malicious activity was recently traced back to the app. Users began noticing something weird going on with their phones: their default browsers kept getting hijacked and redirected to random advertisements,

IT 100
article thumbnail

Ransomware Protection in 2021

eSecurity Planet

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security pros than the threat of ransomware. A ransomware attack is about as bad as a cyber attack can get. It can shut down your business – in the case of healthcare organizations that can be life-threatening for patients – damage your reputation with customers and employees, and invite further attacks as cybercriminals view your organization as an easy mark.

article thumbnail

A new Bluetooth overlay skimmer block chip-based transactions

Security Affairs

Experts discovered a new Bluetooth overlay skimmer that interferes with the ability of the terminal to read chip-based cards, forcing the use of the stripe. The popular investigator Brian Krebs reported the discovery of a new Bluetooth overlay skimmer that interfered with the terminal’s ability to read chip-based cards, forcing the use of the magnetic stripe.

Retail 104
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DDoS Attacks Wane in Q4 Amid Cryptomining Resurgence

Threatpost

The volume of attacks fell 31 percent in the last part of 2020, as Bitcoin values skyrocketed. But there were still several notable trends, such as a rise in Linux botnets.

article thumbnail

Belgium: ePrivacy proposal in progress: Council agrees on its position to start off ‘trilogue’ negotiations

DLA Piper Privacy Matters

Authors: Heidi Waem , Alizée Stappers and Simon Verschaeve. With the ultimate purpose of enacting specific rules regarding electronic communications, the ePrivacy Regulation aims, in particular, to replace the 2002 ePrivacy Directive, detail and complement the GDPR’s general rules, and implement important changes in areas such as metadata processing on end-user devices and obtaining cookie consent from website users.

article thumbnail

Unpatched Android App with 1 Billion Downloads Threatens Spying, Malware

Threatpost

Attackers can exploit SHAREit permissions to execute malicious code through vulnerabilities that remain unpatched three months after app makers were informed.

article thumbnail

Popular SHAREit app is affected by severe flaws yet to be fixed

Security Affairs

Multiple vulnerabilities in the popular file-sharing app SHAREit have yet, to be addressed, experts from Trend Micro warned. SHAREit is a popular file-sharing Android app with more than one billion downloads, experts from Trend Micro discovered multiple unpatched vulnerabilities in its code. The vulnerabilities impact the Android version of SHAREit , a mobile app that allows users to share files with friends or between personal devices.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Complaint Blasts TikTok’s ‘Misleading’ Privacy Policies

Threatpost

TikTok is again in hot water for how the popular video-sharing app collects and shares data - particularly from its underage userbase.

Privacy 91
article thumbnail

Black History Month 2021: Time to Talk Diversity and Cybersecurity

Dark Reading

In an industry that consistently needs new ideas, it's essential to have individuals who think, speak, and act in diverse ways.

article thumbnail

How to Avoid Phishing Emails and Scams

WIRED Threat Level

It's is a bigger threat than ever. Here are some ways you can defend yourself.

Phishing 111
article thumbnail

Firms Patch Greater Number of Systems, but Still Slowly

Dark Reading

Fewer systems have flaws; however, the time to remediate vulnerabilities stays flat, and many issues targeted by in-the-wild malware remain open to attack.

84
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Misconfigured Baby Monitors Allow Unauthorized Viewing

Threatpost

Hundreds of thousands of individuals are potentially affected by this vulnerability.

IoT 99
article thumbnail

Compromised Credentials Show That Abuse Happens in Multiple Phases

Dark Reading

The third stage, when threat actors rush to use stolen usernames and password pairs in credential-stuffing attacks, is the most damaging for organizations, F5 says.

Passwords 105
article thumbnail

3 signs you should submit to the 2021 Collibra Excellence Awards

Collibra

In 2018, we started a new tradition at Collibra: every year, we honor data leaders and teams who are helping their organizations unlock the value of data and create meaningful, measurable results by collaborating with Collibra. . In recent years, we’ve honored teams and leaders from T-Mobile, Credit Suisse, Deloitte, Lloyds Banking, Dell, Walmart, American Express, BNP Paribas Fortis, and more in four categories.

article thumbnail

Under Attack: Hosting & Internet Service Providers

Dark Reading

The digital universe depends on always-on IT networks and services, so ISPs and hosting providers have become favorite targets for cyberattacks.

IT 82
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Let’s Encrypt Gears Up to Replace 200M Certificates a Day

Threatpost

The open CA prepares for ‘worst scenarios’ with new fiber, servers, cryptographic signing and more.

article thumbnail

Fighting Fileless Malware, Part 3: Mitigations

Dark Reading

Attackers can dodge the countermeasures you employ against fileless malware. So how do you mitigate the damage?

110
110
article thumbnail

2034, Part IV: The Spratly Islands Ambush

WIRED Threat Level

“In a thousand years America won’t be remembered as a country, but simply as a fleeting moment.”.