Tue.Mar 09, 2021

article thumbnail

Why Does EternalBlue-Targeting WannaCry Remain at Large?

Data Breach Today

'The Most Widely Successful Wormable Malware Becomes Almost a Permanent Hangover' Nearly four years after the WannaCry ransomware hit the world, targeting the EternalBlue vulnerability in Microsoft SMB version 1, security firms say the malware continues to be a top threat detected in the wild by endpoint security products. Why won't WannaCry just die?

article thumbnail

Microsoft Patch Tuesday, March 2021 Edition

Krebs on Security

On the off chance you were looking for more security to-dos from Microsoft today…the company released software updates to plug more than 82 security flaws in Windows and other supported software. Ten of these earned Microsoft’s “critical” rating, meaning they can be exploited by malware or miscreants with little or no help from users.

Security 303
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Banking Authority Sustains Exchange Server Hack

Data Breach Today

Agency Is the Latest Victim of Attacks Exploiting Newly Exposed Flaws A Microsoft Exchange Server at the European Banking Authority, a regulatory agency of the European Union, was hacked. But the agency says there are no indications of data exfiltration.

350
350
article thumbnail

What is Metadata and Why is it Important?

AIIM

Information needs context, and we need to provide that context in a way that doesn't burden users but instead supports them. This means we need to take full advantage of recognition and analytics technologies to streamline and automate how we develop that context. One such tool is Metadata. Metadata offers significant benefits in terms of understanding information in new ways and in being able to leverage that intelligence to drive innovation and the customer experience.

Metadata 227
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Bill Would Allow Americans to Sue Foreign Hackers

Data Breach Today

Proposal Comes as SolarWinds, Microsoft Exchange Hacks Are Investigated Legislation introduced in the House would allow U.S. citizens to file lawsuits against foreign governments - and employees and agents of those countries - to hold them liable if a cybersecurity incident causes damages. But one legal expert says such a law could do more harm than good.

More Trending

article thumbnail

Researchers Describe a Second, Separate SolarWinds Attack

Data Breach Today

This Attack, With Apparent Ties to China, Distinct From Russian Cyberespionage Effort Russian hackers apparently weren't the only ones targeting SolarWinds customers. An attack last year by the Spiral hacking group, believed to be based in China, against one organization used malware that targeted a vulnerability in SolarWinds' Orion software, according to the Secureworks Counter Threat Unit.

294
294
article thumbnail

Microsoft releases ProxyLogon patches for unsupported Microsoft Exchange versions

Security Affairs

Microsoft released ProxyLogon security updates for Microsoft Exchange servers running vulnerable unsupported Cumulative Update versions. On March 2nd, Microsoft has released emergency out-of-band security updates that address four zero-day issues (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) in all supported Microsoft Exchange versions that are actively exploited in the wild.

Access 130
article thumbnail

Espionage Is Goal of Iranian Phishing Campaign

Data Breach Today

Researchers: Hackers Exploit Remote Admin Tools Hackers with suspected ties to Iran are continuing to wage a cyberespionage campaign against government agencies, academia and tourism organizations based in the Middle East and nearby, according to a report by Trend Micro.

Phishing 270
article thumbnail

Another French hospital hit by a ransomware attack

Security Affairs

A ransomware attack hit the Oloron-Sainte-Marie hospital in southwest France, it is the third such attack in the last month. A ransomware attack paralyzed the systems at the Oloron-Sainte-Marie hospital in southwest France. The incident took place on Monday, the ransomware gang is demanding the payment of a ransom of $50,000 worth of Bitcoin. The infection was first discovered by Rémi Rivière, an engineer in charge of all the installations, on March 8 afternoon.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ZLoader Malware Hidden in Encrypted Excel File

Data Breach Today

Researchers Describe Sophisticated Phishing Campaign A new phishing campaign distributes ZLoader malware using advanced delivery techniques that demonstrate sophisticated understanding of Microsoft Office document formats and techniques, the security firm Forcepoint X-Labs reports.

article thumbnail

Dark Web Markets for Stolen Data See Banner Sales

Threatpost

Despite an explosion in the sheer amount of stolen data available on the Dark Web, the value of personal information is holding steady, according to the 2021 Dark Web price index from Privacy Affairs. That leaves these thriving dirty data dealers in a familiar predicament — they need to lock down their growing businesses for […].

Sales 107
article thumbnail

Apple fixes CVE-2021-1844 RCE that affects iOS, macOS, watchOS, and Safari

Security Affairs

Apple released out-of-band patches to address a remote code execution, tracked as CVE-2021-1844, that affect iOS, macOS, watchOS, and Safari web browser. Apple has released out-of-band security patches to address a critical iOS, macOS, watchOS, and Safari web browser to address a security flaw tracked as CVE-2021-1844. The vulnerability was discovered by Clément Lecigne of Google’s Threat Analysis Group and Alison Huffman of Microsoft Browser Vulnerability Research.

Security 105
article thumbnail

Apple’s Device Location-Tracking System Could Expose User Identities

Threatpost

Researchers have identified two vulnerabilities in the company’s crowd-sourced Offline Finding technology that could jeopardize its promise of privacy.

Privacy 108
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A Dirty Little Secret About Our Future Together

Information Governance Perspectives

May I share a dirty little secret that my spouse and I discovered over the past year? We realize it may be shocking and indecent to some, but it's true—. The post A Dirty Little Secret About Our Future Together appeared first on Rafael Moscatel.

IT 98
article thumbnail

Apple Plugs Severe WebKit Remote Code-Execution Hole

Threatpost

Apple pushed out security updates for a memory-corruption bug to devices running on iOS, macOS, watchOS and for Safari.

Security 116
article thumbnail

SUPERNOVA backdoor that emerged after SolarWinds hack is likely linked to Chinese actors

Security Affairs

Supernova malware clues link Chinese threat group Spiral to SolarWinds server hacks. Supernova malware spotted on compromised SolarWinds Orion installs exposed on the Internets is likely linked to a China-linked espionage group. Researchers at Secureworks’ counter threat unit (CTU) were investigating the exploit of SolarWinds servers to deploy the Supernova web shell when collected evidence that linked the malicious activity to a China-linked cyber espionage group tracked as Spiral.

article thumbnail

Google Play Harbors Malware-Laced Apps Delivering Spy Trojans

Threatpost

A never-before-seen malware-dropper, Clast82, fetches the AlienBot and MRAT malware in a savvy Google Play campaign aimed at Android users.

Privacy 101
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Highlighting inspiring women in tech in 2021

OpenText Information Management

Equity, diversity and inclusion are critical for the success of OpenText, the technology industry and society as a whole. With the adverse effects the global pandemic has had on women’s careers—according to McKinsey, women’s jobs are 1.8 times more vulnerable to this crisis than men’s jobs—the commitment to challenging gender bias and advancing equity, diversity … The post Highlighting inspiring women in tech in 2021 appeared first on OpenText Blogs.

79
article thumbnail

Microsoft Patch Tuesday Updates Fix 14 Critical Bugs

Threatpost

Microsoft's regularly scheduled March Patch Tuesday updates address 89 CVEs overall.

Security 126
article thumbnail

COVID-19 Contact-Tracing Apps Signal Broader Mobile App Security Concerns

Dark Reading

The rapid launch of contract-tracing apps to control COVID-19's spread opened the door to multiple security and privacy vulnerabilities.

article thumbnail

Adobe Critical Code-Execution Flaws Plague Windows Users

Threatpost

The critical flaws exist in Adobe Framemaker, Connect and the Creative Cloud desktop application for Windows.

Cloud 91
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft Pushes Patches for Older Versions of Exchange Server

Dark Reading

Additional patches arrive as CISA issues an alert urging all organizations to immediately patch the Microsoft Exchange vulnerabilities.

94
article thumbnail

Why Companies Fall Short in Digital Recordkeeping via Above The Law

IG Guru

As remote work continues to add to the myriad challenges involving compliance and eDiscovery, our friends at Pagefreezer present a detailed rundown of processes that will meet the moment. The post Why Companies Fall Short in Digital Recordkeeping via Above The Law appeared first on IG GURU.

article thumbnail

Microsoft Patch Tuesday Fixes 82 CVEs, Internet Explorer Zero-Day

Dark Reading

The monthly rollout follows last week's emergency Microsoft Exchange Server patch covering seven CVEs, four of which are under attack.

122
122
article thumbnail

Bolinda UK Ltd and CILIP join forces to activate Libraries Week 2021

CILIP

Bolinda UK Ltd and CILIP join forces to activate Libraries Week 2021. CILIP is pleased to announce that Bolinda UK Ltd , the creators of BorrowBox , has joined forces with CILIP as a supporter for Libraries Week 2021 alongside Nielsen Book. Libraries Week is a celebration of the nation?s much-loved libraries with a focus this year on celebrating how libraries support active and engaged communities.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Leaked Development Secrets a Major Issue for Repositories

Dark Reading

Every day, more than 5,000 private keys, database connection strings, certificates, and passwords are leaked to GitHub repositories, putting applications at risk.

article thumbnail

Syxsense Secure Product Review

eSecurity Planet

Syxsense Secure is an all-in-one endpoint security platform that centralizes vulnerability scanning, EDR, and patch management tools. It provides visibility into the activity of every endpoint device within your organization’s network so you can prevent, identify, and mitigate threats before they can cause any damage. Although Syxsense does not list any straightforward pricing information on their website, you can contact their sales team for a personalized quote or start with a 14-day fre

article thumbnail

Linux Foundation Debuts Sigstore Project for Software Signing

Dark Reading

Sigstore aims to improve the open source software supply chain by simplifying the process of cryptographic software signing.

93