Mon.Jul 12, 2021

article thumbnail

Microsoft to Acquire RiskIQ

Data Breach Today

Company Will Join Microsoft's Cloud and AI Division Microsoft announced Monday a definitive agreement to buy RiskIQ, an attack surface management and threat intelligence firm. Last month, Microsoft acquired the firmware analysis company ReFirm Labs.

Cloud 328
article thumbnail

Threat actors scrape 600 million LinkedIn profiles and are selling the data online – again

Security Affairs

Researchers from Cyber News Team have spotted threat actors offering for sale 600 million LinkedIn profiles scraped from the platform, again. Original post: [link]. For the third time in the past four months, LinkedIn seems to have experienced another massive data scrape conducted by a malicious actor. Once again, an archive of data collected from hundreds of millions of LinkedIn user profiles surfaced on a hacker forum, where it’s currently being sold for an undisclosed sum.

Archiving 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kaseya Says Software Fully Patched After Ransomware Attack

Data Breach Today

Updates for On-Premises Software Released; SaaS Servers Being Restarted Software developer Kaseya has released patches for its remote monitoring and management software, which had been exploited by REvil ransomware attackers to infect up to 1,500 organizations. The patches mitigate the final three vulnerabilities out of seven that researchers first reported to Kaseya in early April.

article thumbnail

Startup Sees File System as Key to Security

eSecurity Planet

While many cybersecurity vendors approach zero trust from the perspective of microsegmentation , shrinking the network as much as possible, one startup thinks security needs to be as close to the data as possible and is thus focused on data storage. Maryland-based RackTop Systems boasts a Department of Defense (DoD) pedigree, giving its founders a vantage point into the challenges that high-security environments face.

Security 121
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Prosecutors: Insider Trading Tips Sold on Darknet Sites

Data Breach Today

Indictment Alleges Apostolos 'The Bull' Trovias Sold Variety of Corporate Financial Data A 30-year-old Greek national has been indicted on charges of selling insider trading tips and other proprietary financial data on darknet sites. Apostolos "The Bull" Trovias faces securities fraud and money laundering charges.

Security 306

More Trending

article thumbnail

Yearlong Phishing Campaign Targets Energy Firms

Data Breach Today

Oil and Gas Industry Yet Again a Victim of Agent Tesla Malware A campaign that uses remote access Trojans and malware-as-a-service infrastructure for cyberespionage purposes has been targeting large international energy companies for at least a year, according to cybersecurity company Intezer.

Phishing 264
article thumbnail

BIOPASS malware abuses OBS Studio to spy on victims

Security Affairs

Researchers spotted a new malware, dubbed BIOPASS, that sniffs victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio. Researchers from Trend Micro spotted a new malware, dubbed BIOPASS, that sniffs the victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio. Threat actors behind the new malware planted a malicious JavaScript code on support chat pages of Chinese gambling-related sites to redirect visitors to pages offering the malicious ins

Cloud 118
article thumbnail

New 'Ransomwhere' Site Tracks Ransom Payments

Data Breach Today

Website Uses Crowdsourced Data to Track Payments to Ransomware Gangs A white-hat hacker has created a crowdsourced website, Ransomwhere, dedicated to tracking payments made to ransomware gangs to help create a better understanding of the cybercriminal ecosystem.

article thumbnail

Analysis of the FBI’s Anom Phone

Schneier on Security

Motherboard got its hands on one of those Anom phones that were really FBI honeypots. The details are interesting.

Honeypots 141
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Magecart hackers hide stolen credit card data into images and bogus CSS files

Security Affairs

Magecart hackers continuously improve their exfiltration techniques to evade detection, they are hiding stolen credit card data into images. Magecart hackers have devised a new technique to obfuscating the malware within comment blocks and hide stolen credit card data into images evading detection. Hacker groups under the Magecart umbrella continue to target e-stores to steal payment card data with software skimmers.

Marketing 108
article thumbnail

Critical RCE Vulnerability in ForgeRock OpenAM Under Active Attack

Threatpost

The attacks are enabled by a now-patched vulnerability in ForgeRock's Access Management, a popular platform that front-ends web apps and remote-access setups.

Access 109
article thumbnail

NYDFS Issues Ransomware Guidance Outlining Expected Security Controls

Hunton Privacy

On June 30, 2021, the New York State Department of Financial Services (“NYDFS,” the “Department”) issued guidance to all New York state regulated entities on ransomware (the “Guidance”), identifying controls it expects regulated companies to implement whenever possible. To help prevent successful ransomware attacks, the Department outlines a playbook of known cybersecurity countermeasures and controls.

article thumbnail

Kaseya Patches Zero-Days Used in REvil Attacks

Threatpost

The security update addresses three VSA vulnerabilities used by the ransomware gang to launch a worldwide supply-chain attack on MSPs and their customers.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Updated device security guidance from the UK’s National Cyber Security Centre

Jamf

NCSC has recently re-branded and re-launched its Device Guidance and Mobile Device Guidance. These settings are far more cost- and time-effective for organisations of all sizes to implement via Mobile Device Management (MDM).

MDM 98
article thumbnail

ARMA Seats its 2021-2022 Board of Directors

IG Guru

The ARMA Board of Directors seated its new president, president-elect, and directors today, as the association’s 2021-22 fiscal year begins. Click here for the full news article. The post ARMA Seats its 2021-2022 Board of Directors appeared first on IG GURU.

IT 98
article thumbnail

Microsoft Confirms Acquisition of RiskIQ

Dark Reading

RiskIQ's technology helps businesses assess their security across the Microsoft cloud, Amazon Web Services, other clouds, and on-premises.

Cloud 142
article thumbnail

A third of Britons fear TikTok would share data with Chinese state

The Guardian Data Protection

Video-sharing app’s reputation problem isn’t holding back its phenomenal growth, says author Almost a third of Britons are concerned that TikTok might share their personal data with the Chinese government, according to a book on the social network, despite the app’s popularity across the nation. And a third of Britons aged between 18 and 34, the key demographic for the app, are more than just worried: they believe TikTok would hand over their data on request from China.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

WordPress File Management Plugin Riddled with Critical Bugs

Threatpost

The bugs allow a range of attacks on websites, including deleting blog pages and remote code execution.

Security 112
article thumbnail

Kaseya Releases Security Patch as Companies Continue to Recover

Dark Reading

Estimates indicate the number of affected companies could grow, while Kaseya faces renewed scrutiny as former employees reportedly criticize its lack of focus on security.

Security 113
article thumbnail

e-Records 2021 Call for Presentations

The Texas Record

The annual e-Records conference is online again this year! The conference is the afternoon of Wednesday, November 17 and the morning of Thursday, November 18. Our theme is Accelerating Towards the Texas of Tomorrow. This event is organized by the Texas State Library and Archives Commission (TSLAC) and co-sponsored with the Texas Department of Information Resources (DIR) to promote electronic records management in Texas government.

article thumbnail

SolarWinds Discloses Zero-Day Under Active Attack

Dark Reading

The company confirms this is a new vulnerability that is not related to the supply chain attack discovered in December 2020.

100
100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

BIOPASS RAT Uses Live Streaming Steal Victims’ Data

Threatpost

The malware has targeted Chinese gambling sites with fake app installers.

Security 111
article thumbnail

The Everyday IT Tools That Can Offer ‘God Mode’ to Hackers

WIRED Threat Level

Attackers are increasingly attuned to the power and potential of remote management software.

IT 101
article thumbnail

Join us for our ‘Jamf’ Sessions this Summer

Jamf

Jamf announces a series of #JamfEd summer learning opportunities for educators

Education 105
article thumbnail

EDI vs API? It’s a False Debate

OpenText Information Management

According to EFT, 55 percent of supply chain executives considered web service APIs as an alternative to EDI. But we should know better by now than try to write off electronic data interchange (EDI) again. This isn’t about replacement. It is, as always, about integration.

IT 64
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

AI and Cybersecurity: Making Sense of the Confusion

Dark Reading

Artificial intelligence is a maturing area in cybersecurity, but there are different concerns depending on whether you're a defender or an attacker.

article thumbnail

Kaseya releases patches for flaws exploited in massive ransomware supply-chain attack

Security Affairs

Kaseya has released a security update to address the VSA zero-day vulnerabilities exploited by REvil gang in the massive ransomware supply chain attack. Software vendor Kaseya has released a security update to fix the zero-day vulnerabilities in its VSA software that were exploited by the REvil ransomware gang in the massive ransomware supply chain attack.

article thumbnail

Compliance and Customer Experience for Age Verification

HID Global

Compliance and Customer Experience for Age Verification. Anonymous (not verified). Mon, 07/12/2021 - 09:19.