Mon.Mar 15, 2021

article thumbnail

Over 400 Cyberattacks at US Public Schools in 2020

Data Breach Today

Experts Say Increase Owes to Lack of Funding, Virtual Learning U.S. public schools faced a record number of cyber incidents in 2020, with over 400 attacks reported. This led to a spike in school cancellations, as IT staff members struggled to get systems back online while dealing with the COVID-19 pandemic, reports the K-12 Cybersecurity Resource Center.

article thumbnail

WeLeakInfo Leaked Customer Payment Info

Krebs on Security

A little over a year ago, the FBI and law enforcement partners overseas seized WeLeakInfo[.]com , a wildly popular service that sold access to more than 12 billion usernames and passwords stolen from thousands of hacked websites. In an ironic turn of events, a lapsed domain registration tied to WeLeakInfo let someone plunder and publish account data on 24,000 customers who paid to access the service with a credit card.

Passwords 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cryptophone Service Crackdown: Feds Indict Sky Global CEO

Data Breach Today

Canadian Charged With Running 'Illicit Secret Communications Network' U.S. authorities have extended the crackdown on the Sky ECC cryptophone service by charging the CEO of parent company Sky Global and its alleged main distributor - both Canadians - with running an "illicit secret communications network" for criminals and hiding profits via shell companies and cryptocurrency.

article thumbnail

GUEST ESSAY: How and why ‘pen testing’ will continue to play a key role in cybersecurity

The Last Watchdog

When we look at society today, we can see that we are moving further and further ahead with technology. Numerous advancements are being made at an extremely fast pace with no sign of slowing down. In fact, there is evidence that technology grows exponentially fast. Since we are quickly putting out large technologies, security risks always come with this.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

U.K. Set to Boost Cybersecurity Operations

Data Breach Today

PM Boris Johnson Expected to Present National Security Review on Tuesday Ahead of presenting a long-term review of national security strategy in Parliament on Tuesday, U.K. prime minister Boris Johnson issued a statement calling for a boost to the country’s capacity to conduct cyberattacks on foreign adversaries.

More Trending

article thumbnail

Hacking Incidents, Vendor Breaches Keep Surging

Data Breach Today

Analysis of Health Data Breach Trends So Far in 2021 Hacking incidents - including ransomware attacks, phishing scams and episodes involving vendors - are still the dominant culprits in major health data breaches being reported to federal regulators so far this year. Why?

article thumbnail

Google fixes the third actively exploited Chrome 0-Day since January

Security Affairs

Google has addressed a new zero-day flaw in its Chrome browser that has been actively exploited in the wild, the second one within a month. Google has fixed a new actively exploited zero-day in its Chrome browser, this is the second zero-day issue addressed by the IT giant within a month. The flaw, tracked as CVE-2021-21193, is a use after free vulnerability in the Blink rendering engine.

Libraries 125
article thumbnail

Exchange Hacks: How Will the Biden Administration Respond?

Data Breach Today

As White House Readies SolarWinds Response, This New Crisis Burns As the Biden administration makes final preparations to respond to the attacks against SolarWinds, it's been confronted by a second major cyberthreat: the hacking of Microsoft Exchange servers throughout the U.S. The response to this incident, however, will likely be much different.

IT 233
article thumbnail

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

Security Affairs

A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on vulnerable Microsoft Exchange servers. A security researcher has released a new proof-of-concept exploit that could be adapted to install web shells on Microsoft Exchange servers vulnerable ProxyLogon issues. Since the disclosure of the flaw, security experts observed a surge in the attacks against Microsoft Exchange mailservers worldwide.

Military 115
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google Warns Mac, Windows Users of Chrome Zero-Day Flaw

Threatpost

The use-after-free vulnerability is the third Google Chrome zero-day flaw to be disclosed in three months.

144
144
article thumbnail

US DoJ indicted the CEO of Sky Global encrypted chat platform

Security Affairs

The CEO of the encrypted communications firm Sky Global has been indicted in the US on charges of facilitating international drug trafficking. The head of the Canada-based company Sky Global that provides encrypted communications, Jean-Francois Eap, has been indicted in the US on charges of facilitating international drug trafficking. The Justice Department indicted Jean-Francois Eap and Thomas Herdman, a former high-level distributor of Sky Global devices. “A federal grand jury today retu

article thumbnail

Cyberattacks See Fundamental Changes, A Year into COVID-19

Threatpost

A year after COVID-19 was officially determined to be a pandemic, the methods and tactics used by cybercriminals have drastically changed.

Cloud 119
article thumbnail

NCSC is not aware of ransomware attacks compromising UK orgs through Microsoft Exchange bugs

Security Affairs

The UK’s National Cyber Security Centre (NCSC) urges UK organizations to install the patches for the recently disclosed vulnerabilities in Microsoft Exchange. The UK’s National Cyber Security Centre is urging UK organizations to install security patches for their Microsoft Exchange installs. The UK agency revealed to have helped UK organisations to secure their installs, around 2,100 vulnerable Microsoft Exchange servers.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cybersecurity Bug-Hunting Sparks Enterprise Confidence

Threatpost

A survey from Intel shows that most organizations prefer tech providers to have proactive security, but few meet security expectations.

article thumbnail

DDoS's Evolution Doesn't Require a Security Evolution

Dark Reading

They may have grown in sophistication, with more widespread consequences, yet today's distributed denial-of-service attacks can still be fought with conventional tools.

Security 118
article thumbnail

New Technique Reveals Centuries of Secrets in Locked Letters via The New York Times

IG Guru

M.I.T. researchers have devised a virtual-reality technique that lets them read old letters that were mailed not in envelopes but in the writing paper itself after being folded into elaborate enclosures. The post New Technique Reveals Centuries of Secrets in Locked Letters via The New York Times appeared first on IG GURU.

Paper 82
article thumbnail

Top SolarWinds Alternatives

eSecurity Planet

In light of the recent SolarWinds hack, many businesses are wondering which network monitoring tools are safe to use. Hackers are becoming more sophisticated in their attacks, and cybersecurity threats have increased significantly in the last year. Your network security is of the utmost importance, so your monitoring software should be equipped with the right features to make sure you stay protected.

Cloud 82
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to Choose the Right Cybersecurity Framework

Dark Reading

Cybersecurity frameworks can help reduce your risk of supply chain attacks and increase your competitive advantage.

article thumbnail

How to Implement Microsegmentation

eSecurity Planet

In an era where the network edge faces the highest traffic, organizations rush to add more robust security yet hesitate to take on the long-term endeavor known as microsegmentation. Microsegmentation is about identifying your organization’s most valuable network segments, establishing strict communication policies, and becoming the master of your network flows.

article thumbnail

Buffalo Public Schools Cancel Classes Due to Ransomware

Dark Reading

The FBI is investigating the March 12 attack that disrupted the school system's phased reopening this week.

article thumbnail

First Cultural Heritage Studies course receives CILIP accreditation

CILIP

First Cultural Heritage Studies course receives CILIP accreditation. CILIP is delighted to announce that the Bachelor of Arts Cultural Heritage Studies, Libraries, Archives and Museums course at the University of Aberystwyth has become the first of its kind to receive CILIP accreditation, recognising that it provides solid preparation for professional practice and a suitable base for anybody entering the cultural heritage sector.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CISA Updates Microsoft Exchange Advisory to Include China Chopper

Dark Reading

US officials warn organizations of China Chopper Web shells as new data sheds light on how the Exchange Server exploits have grown.

99
article thumbnail

Happy (Belated) Pi Day!

Adam Shostack

For pi day, we celebrated with a set of pies – a British style bacon and liver pie, a chicken pot pie, and a cherry pie. The bacon and liver pie, with roasted carrot and shallot, was intended as a joke and came out well enough that we’ll make it again. The cherry pie, with dried cherry and prosciutto, was also good as a sauce-free design.

IT 52
article thumbnail

Verkada Breach Demonstrates Danger of Overprivileged Users

Dark Reading

In re-evaluating supply chains, companies should classify vendors with super admin privileges to devices or backdoors as a significant threat.

106
106
article thumbnail

Microfilm Destruction Tips

The Texas Record

Image from Wikimedia Commons. Are you looking to streamline your microfilm destruction methods? Do you already have a system in place? In any case, you might find these pointers below helpful to incorporate into your organization’s practices. Step 1 : Make sure you have procedures in place. Will the destruction be done in-house, or will you hire an outside vendor?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Name That Toon: Something Seems Afoul

Dark Reading

Dark Reading's March cartoon caption contest is here, along with a few new feathered friends.

87
article thumbnail

New Work Anywhere checklist available

Jamf

Jamf offers a new white paper filled with sound advice, best practices and the best way to go about ensuring that your employees can work anywhere safely and productively.

Paper 52
article thumbnail

Lookout Acquires SASE Cloud Provider CipherCloud

Dark Reading

Deal signals a focus on the cloud for mobile security firm.

Cloud 57