Tue.Mar 02, 2021

Ransomware Attack's Economic Impact: $67 Million

Data Breach Today

Universal Health Services' Financial Statement Spells Out the Effects In an eye-opening look at the cost burden of a ransomware attack, Universal Health Services reports that an incident last September had a $67 million economic impact - citing, for example, the need to divert patients to competing facilities for urgent care.

Microsoft: Chinese Cyberspies Used 4 Exchange Server Flaws to Plunder Emails

Krebs on Security

Microsoft Corp. today released software updates to plug four security holes that attackers have been using to plunder email communications at companies that use its Exchange Server products.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Report Sizes Up How AI Poses a Security Threat

Data Breach Today

Commission Makes Recommendations on Developing Technologies, Countering Threats The U.S.

Payroll/HR Giant PrismHR Hit by Ransomware?

Krebs on Security

PrismHR , a company that sells technology used by other firms to help more than 80,000 small businesses manage payroll, benefits, and human resources, has suffered what appears to be an ongoing ransomware attack that is disrupting many of its services. Hopkinton, Mass.-based

Cassandra Data Modeling Guide to Best Practices

Are you a developer, database architect, or database administrator that's new to Cassandra but have been tasked with developing a Cassandra schema design? Learn the basic rules to keep in mind when designing your schema for Cassandra.

Cryptocurrency Firm Tether Refuses to Pay Ransom to Hackers

Data Breach Today

Hackers Threatened to Leak Sensitive Data The cryptocurrency company Tether has refused to pay a ransom of 500 bitcoins ($24 million) after hackers threatened to leak sensitive data if the company failed to pay

176
176

More Trending

Hackers Use Search Engine Optimization to Deliver Malware

Data Breach Today

GootLoader Campaign Spreads Ransomware, Trojans A new malware loader dubbed "GootLoader" is using search engine optimization techniques to spread ransomware, Trojans and other malware, the security firm Sophos reports

Attacker Expands Use of Malicious SEO Techniques to Distribute Malware

Dark Reading

The operators of REvil and Gootkit have begun using a tried and tested technique to distribute additional malware, Sophos says

102
102

India Fights Against Malware Targeting Power Supply

Data Breach Today

Recorded Future Says China-Sponsored Groups Involved State-sponsored groups in China appear to be targeting India’s power supply by dropping malware into systems, according to online digital threat analysis company Recorded Future. The Indian government says it has taken steps to mitigate the risks

Risk 151

Microsoft Fixes Exchange Server Zero-Days Exploited in Active Attacks

Dark Reading

Microsoft fixes multiple Exchange Server vulnerabilities being weaponized in attacks from a group it believes operates out of China

IT 101

Use It, Save It, Or Lose It: Spring Cleaning for Information Governance

Speaker: Speakers Michelle Kirk of Georgia Pacific, Darla White of Sanofi, & Scott McVeigh of Onna

As an organization’s most valuable asset, data should be cared for and integrated, managed, archived, and deleted as appropriate. Join Onna, Georgia Pacific, and Sanofi for this on-demand webinar as they discuss proactive, practical steps for kicking off your organization's own digital cleanup.

Mysterious Macintosh Malware

Schneier on Security

This is weird : Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute.

Policy Group Calls for Public-Private Cyber-Defense Program

Dark Reading

The proposed National Cyber Response Network would link federal agencies, companies, and local governments, allowing collaboration during a cyberattack

What Did I Just Read? A Conversation With the Authors of '2034'

WIRED Threat Level

Elliot Ackerman and Admiral James Stavridis discuss their inspirations, personal experiences, and what keeps them up at night. Security Security / National Security

4 Ways Health Centers Can Stop the Spread of Cyberattacks

Dark Reading

Health centers must shift the perception of cyberattacks from potential risk to real threat in order to take the first step toward a safer, healthier security posture

Risk 98

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

French multinational dairy Lactalis hit by a cyber attack

Security Affairs

French multinational dairy products corporation Lactalis discloses cyberattack, but claimed that had no evidence of a data breach. France-based dairy giant Lactalis announced that it was hit by a cyber attack, but claimed that it had found no evidence of a data breach.

Name That Edge Toon: In Hot Water

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card

79

Distributor of Asian food JFC International hit by Ransomware

Security Affairs

JFC International, a major wholesaler and distributor of Asian food products in the United States, was hit by ransomware. JFC International, a major distributor and wholesaler of Asian food products, announced it has recently suffered a ransomware attack.

'ObliqueRAT' Now Hides Behind Images on Compromised Websites

Dark Reading

Transparent Tribe' has switched its tactics for distributing the remote access Trojan, researchers found

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

Four zero-days in Microsoft Exchange actively exploited in the wild

Security Affairs

Microsoft released emergency out-of-band security updates for all supported Microsoft Exchange versions that fix four zero-day flaws.

Twitch's First Transparency Report Is Here—and Long Overdue

WIRED Threat Level

The decade-old streaming platform has for the first time detailed its efforts to safeguard its user base in one place. Security Security / Security News

IT 71

Google fixes Critical Remote Code Execution issue in Android System component

Security Affairs

Google addressed 37 vulnerabilities with the release of the Android security updates for March 2021, including a critical flaw in the System component.

2034, Part VI: Crossing the Red Line

WIRED Threat Level

“Eventually, the Americans would find them. But by then it would be too late.”. Backchannel Security Security / National Security

IT 70

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Alleged China-linked APT41 group targets Indian critical infrastructures

Security Affairs

Recorded Future researchers uncovered a campaign conducted by Chinese APT41 group targeting critical infrastructure in India. Security researchers at Recorded Future have spotted a suspected Chinese APT actor targeting critical infrastructure operators in India.

Microsoft Ignite Brings Security & Compliance Updates

Dark Reading

Microsoft announces support for data loss prevention in Google Chrome, co-authoring of protected files, and more at Ignite 2021

Protecting your most valuable content

OpenText Information Management

It’s never been easier to share your information and collaborate — and likewise, it has never been riskier, costlier, and more embarrassing to experience a data leak.

IT 65

Why Cloud Security Risks Have Shifted to Identities and Entitlements

Dark Reading

Traditional security tools focus on the network perimeter, leaving user and service accounts vulnerable to hackers

Risk 69

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Pwn20wnd released the unc0ver v 6.0 jailbreaking tool

Security Affairs

The popular jailbreaking tool called “unc0ver” now supports iOS 14.3 and earlier releases, and is able to unlock almost every iPhone device. Pwn20wnd, the author of the jailbreaking tool “ unc0ver ,” has updated their software to support iOS 14.3 and earlier releases.

Virginia Becomes the Second U.S. State to Enact Major Privacy Legislation

Hunton Privacy

On March 2, 2021, Virginia’s Governor, Ralph Northam, signed the Consumer Data Protection Act into law without any further amendments. In addition to California, Virginia is now the second state to enact major privacy legislation of general applicability in the U.S.

2020 Life Sciences predictions are now 2021 priorities

OpenText Information Management

COVID-19 continues to be a double-edged sword for Life Sciences companies, highlighting areas of improvement to maintain business agility, while showcasing the surprising speed with which organizations can move.

63