Wed.Jul 14, 2021

article thumbnail

FCC Finalizes Plan to Rip and Replace Chinese Telecom Gear

Data Breach Today

Commission Says Huawei, ZTE Are National Security Threats The FCC has finalized a $1.9 billion plan that will help smaller, rural telecommunications carriers pay to rip and replace technology from the Chinese firms Huawei and ZTE. The commission says using the gear poses a threat to U.S. national security.

Security 320
article thumbnail

Google: four zero-day flaws have been exploited in the wild

Security Affairs

Google security experts revealed that Russia-linked APT group targeted LinkedIn users with Safari zero-day. Security researchers from Google Threat Analysis Group (TAG) and Google Project Zero revealed that four zero-day vulnerabilities have been exploited in the wild earlier this year. The four security flaws were discovered earlier this year and affect Google Chrome, Internet Explorer, and WebKit browser engine.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Emergency Directive: Patch 'PrintNightmare' Flaw

Data Breach Today

Agency Warns Microsoft Print Spooler Service Flaw Exploit Could Lead to Full System Compromise In an emergency directive, the U.S. Cybersecurity and Infrastructure Security Agency calls on federal agencies to immediately implement a patch to address the "PrintNightmare" Windows Print Spooler service flaw and disable the service on servers on Microsoft Active Directory domain controllers.

article thumbnail

China Taking Control of Zero-Day Exploits

Schneier on Security

China is making sure that all newly discovered zero-day exploits are disclosed to the government. Under the new rules, anyone in China who finds a vulnerability must tell the government, which will decide what repairs to make. No information can be given to “overseas organizations or individuals” other than the product’s manufacturer.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Dermatology Clinic Chain Breach Affects 2.4 Million

Data Breach Today

Incident Reportedly Involved 'Cuba' Ransomware Forefront Dermatology S.C, a Wisconsin-based dermatology practice with affiliated offices in 21 states plus Washington, D.C., is notifying 2.4 million patients, employees and clinicians of a recent hacking incident. The attack apparently involved a ransomware strain known as "Cuba.

More Trending

article thumbnail

Constant Ransomware Business Refinements Boosting Profits

Data Breach Today

Former Head of GCHQ Highlights Need for Getting Basics Right, Plus Government Action Ransomware-wielding criminals continue to find innovative new ways to extort victims, develop technically and sidestep skills shortages by delivering ransomware as a service, said Robert Hannigan, the former head of U.K. intelligence agency GCHQ, in his Infosecurity Europe 2021 virtual keynote speech.

article thumbnail

Updated Joker Malware Floods into Android Apps

Threatpost

The Joker premium billing-fraud malware is back on Google Play in a fresh onslaught, with an updated bag of tricks to evade scanners.

Security 138
article thumbnail

Iranian APT Gang Phishes Middle East Experts

Data Breach Today

Proofpoint Describes Campaign That Uses Conference as a Lure The Iranian advanced persistent threat group TA453 has been conducting a series of spear-phishing attacks in an attempt to steal sensitive information from scholars who study the Middle East, according to Proofpoint.

Phishing 274
article thumbnail

Windows Hello Bypass Fools Biometrics Safeguards in PCs

Threatpost

A Windows security bug would allow an attacker to fool a USB camera used in the biometric facial-recognition aspect of the system.

Security 121
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Malware Exploits Livestream App

Data Breach Today

'BioPass' Targets Chinese Gambling Companies' Clients Newly uncovered malware dubbed "BioPass" is targeting clients of Chinese online gambling companies, Trend Micro says. The malware exploits popular livestreaming and video recording app Open Broadcaster Software Studio.

259
259
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at Norbert Wiener in the 21st Century , a virtual conference hosted by The IEEE Society on Social Implications of Technology (SSIT), July 23-25, 2021. I’m speaking at DEFCON 29 , August 5-8, 2021. I’m speaking (via Internet) at SHIFT Business Festival in Finland, August 25-26, 2021.

102
102
article thumbnail

Using XDR to Detect Ransomware, Supply Chain Attacks

Data Breach Today

Gartner's Peter Firstbrook Analyzes Detection Methods Extended detection and response, or XDR, can play an important role in improving the detection of ransomware and supply chain attacks, says Peter Firstbrook of Gartner.

article thumbnail

How Apple technology is enabling your employees in the modern workplace

Jamf

With no immediate way back to a pre-pandemic workplace, future ways of working are based in hybrid models, offering flexibility. But what does this mean for your business, employees and future technology?

98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

China-linked LuminousMoth APT targets entities from Southeast Asia

Security Affairs

LuminousMoth: Kaspersky uncovered an ongoing and large-scale APT campaign that targeted government entities in Southeast Asia, including Myanmar and the Philippines. Kaspersky experts uncovered an ongoing and large-scale cyber espionage campaign, tracked as LuminousMoth, aimed at government entities from Southeast Asia, including Myanmar and the Philippines government entities.

article thumbnail

Self-Crowned Bitcoin Inventor Wins Lawsuit Over Whitepaper Copyright Claim via Decrypt

IG Guru

Check out the article here. The post Self-Crowned Bitcoin Inventor Wins Lawsuit Over Whitepaper Copyright Claim via Decrypt appeared first on IG GURU.

Risk 98
article thumbnail

Linux-Focused Cryptojacking Gang Tracked to Romania

Threatpost

The gang is using a new brute-forcer – “Diicot brute” – to crack passwords on Linux-based machines with weak passwords.

Passwords 110
article thumbnail

10 Mistakes Companies Make in Their Ransomware Responses

Dark Reading

Hit by ransomware? These missteps can take a bad scenario and make it even worse

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cryptominer Farm Rigged with 3,800 PS4s Busted in Ukraine

Threatpost

Ukrainian cops seize PlayStation 4 consoles, graphics cards, processors and more in cryptomining sting involving alleged electricity theft.

97
article thumbnail

Targeted Attack Activity Heightens Need for Orgs. to Patch New SolarWinds Flaw

Dark Reading

A China-based threat actor -- previously observed targeting US defense industrial base organizations and software companies -- is exploiting the bug in SolarWinds' Serv-U software, Microsoft says.

85
article thumbnail

Trickbot Malware Rebounds with Virtual-Desktop Espionage Module

Threatpost

The attackers have spruced up the 'vncDll' module used for spying on targets and stealing data.

Privacy 114
article thumbnail

WhatsApp Has a Secure Fix for One of Its Biggest Drawbacks

WIRED Threat Level

Starting with a beta that launches today, you'll no longer have to route all of your messages through your smartphone.

IT 94
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Apps Built Better: Why DevSecOps is Your Security Team’s Silver Bullet

Threatpost

Phil Richards, vice president and CSO at Ivanti, explains how organizations can design DevOps processes and systems to thwart cyberattacks.

article thumbnail

Google to Bring HTTPS-First Mode to Chrome Browser

Dark Reading

Beginning in M94, Chrome will offer HTTPS-First Mode, which will attempt to upgrade all page loads to HTTPS.

103
103
article thumbnail

Making sustainability a differentiator in global trade finance (part 3)

CGI

Making sustainability a differentiator in global trade finance (part 3). This CGI blog post discusses making sustainability a differentiator in global trade finance. pooja.cs@cgi.com. Wed, 07/14/2021 - 23:38.

52
article thumbnail

SonicWall: 'Imminent' Ransomware Attack Targets Older Products

Dark Reading

The attack exploits a known vulnerability that was fixed in new versions of firmware released this year.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Hacker Mind Podcast: Hacking Communities

ForAllSecure

As we head to Hacker Summer Camp, how should we rebuild our infosec communities to be more inclusive and diverse? Jack Daniel offers his unique voice. As one of the founders of BSides and as a community advocate for Tenable, Jack provides guidance on how we can re-emerge and successfully amplify and support people of different ethnicities, faiths, and genders within our infosec communities without being patronizing.

Mining 52
article thumbnail

Did the Cybersecurity Workforce Gap Distract Us From the Leak?

Dark Reading

Cyber games can play a critical role in re-engaging our workforce and addressing the employee retention crisis.

article thumbnail

Messy Metadata: More Challenges With Collecting Data From Google Workspace

Hanzo Learning Center

Knowledge workers may never go back to the office as we once knew it. But, now that companies and their employees have learned how well working from home can work—both for maintaining productivity and workers' quality of life—remote work is unquestionably here to stay.