Wed.Feb 02, 2022

article thumbnail

Experts warn of a spike in APT35 activity and a possible link to Memento ransomware op

Security Affairs

The Cybereason Nocturnus Team reported a spike in the activity of the Iran-linked APT group APT35 (aka Phosphorus or Charming Kitten). The Cybereason Nocturnus Team observed a spike in the activity of the Iran-linked APT group APT35 (aka ‘ Charming Kitten ‘, ‘ Phosphorus ‘, Newscaster , and Ajax Security Team). The Phosphorus group made the headlines in 2014 when experts at iSight issued a report describing the most elaborate net-based spying campaign organized by Iranian hackers using social me

article thumbnail

North Korea Hacked Him. So He Took Down Its Internet

WIRED Threat Level

Disappointed with the lack of US response to the Hermit Kingdom's attacks against US security researchers, one hacker took matters into his own hands.

IT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thousands of Data Center Management Apps Exposed to Internet

eSecurity Planet

Tens of thousands of applications that are critical to the operations of data centers around the globe are exposed to the internet, with many secured with default factory passwords, posing a significant cyber risk to enterprises worldwide. Researchers with cybersecurity firm Cyble this week said that along with the public-facing data center infrastructure management (DCIM) software, they also found intelligent monitoring devices, thermal cooling management and power monitors for racks vulnerable

Passwords 113
article thumbnail

Colorado AG Publishes Guidance on Data Security Practices and Announces Upcoming Rulemaking Under the Colorado Privacy Act

Hunton Privacy

On January 28, 2022, in celebration of Data Privacy Day, the Colorado Attorney General’s Office issued prepared remarks from Colorado Attorney General Phil Weiser and published guidance on data security best practices. In his remarks, Attorney General Weiser highlighted the importance of protecting data security and outlined his office’s plans for implementing the Colorado Privacy Act (“CPA”), which takes effect July 1, 2023.

Privacy 102
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Managing Detections is Not the Same as Stopping Breaches

Dark Reading

Enterprises interested in managed detection and response (MDR) services to monitor endpoints and workloads should make sure the providers have rock-solid expertise in detecting and responding to threats.

100
100

More Trending

article thumbnail

UK: International data transfer agreement and addendum laid before Parliament

DLA Piper Privacy Matters

Following the ICO’s public consultation , launched in August last year, the final version of the international data transfer agreement ( IDTA ), as well as the international data transfer addendum to the European Commission’s standard contractual clauses for international data transfers ( Addendum ), has been laid before Parliament. The IDTA aims to address the UK’s regulatory position, following exit from the EU, in relation to the Schrems II decision of the CJEU and the need to refresh the (le

article thumbnail

FBI confirms it obtained NSO’s Pegasus spyware

The Guardian Data Protection

Bureau says sophisticated hacking tool was never used in support of any investigation The FBI has confirmed that it obtained NSO Group’s powerful Pegasus spyware, suggesting that it bought access to the Israeli surveillance tool to “stay abreast of emerging technologies and tradecraft”. In a statement released to the Guardian, the bureau said it had procured a “limited licence” to access Pegasus for “product testing and evaluation only”, and suggested that its evaluation of the tool partly relat

IT 97
article thumbnail

Researcher found an Information Disclosure in the Brave browser

Security Affairs

Security researcher discovered an Information Disclosure vulnerability in Brave browser and reported it through the HackerOne platform. Security researcher Kirtikumar Anandrao Ramchandani discovered an Information Disclosure vulnerability in the Brave Browser and reported it to the company through the HackerOne platform. The researcher discovered that when the browser is used with Tor it could leak the referer. “Brave browser has a function of New Private Window with Tor.

article thumbnail

Finding Vulnerabilities in Open Source Projects

Schneier on Security

The Open Source Security Foundation announced $10 million in funding from a pool of tech and financial companies, including $5 million from Microsoft and Google, to find vulnerabilities in open source projects: The “Alpha” side will emphasize vulnerability testing by hand in the most popular open-source projects, developing close working relationships with a handful of the top 200 projects for testing each year. “Omega” will look more at the broader landscape of open sour

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ESET releases fixes for local privilege escalation bug in Windows Applications

Security Affairs

Antivirus firm ESET addressed a local privilege escalation vulnerability, tracked CVE-2021-37852, impacting its Windows clients. Antivirus firm ESET released security patches to address a high severity local privilege escalation vulnerability, tracked CVE-2021-37852, impacting its Windows clients. An attacker can exploit the vulnerability to misuse the AMSI scanning feature to elevate privileges in specific scenarios. “According to the report, submitted by the Zero Day Initiative (ZDI), an

article thumbnail

TikTok's Roland Cloutier: How CISOs Can Foster a Culture of Security & Transparency

Dark Reading

The social media platform's global security chief boils it down to being consistent, keeping it fun, and demonstrating the impact of choices.

article thumbnail

Trend Micro fixed 2 flaws in Hybrid Cloud Security products

Security Affairs

Trend Micro recently addressed two high-severity flaws affecting some of its hybrid cloud security products. Trend Micro released security updates to fix two high-severity vulnerabilities, tracked as CVE-2022-23119 and CVE-2022-23120 , affecting some of its hybrid cloud security products. The vulnerabilities affect Deep Security and Cloud One workload security solutions.

Cloud 94
article thumbnail

Tens of Thousands of Websites Vulnerable to RCE Flaw in WordPress Plug-in

Dark Reading

Now-patched issue in Essential Addons for Elementor gives attackers a way to carry out local file inclusion attacks, researchers say.

99
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Supply-Chain Security Is Not a Problem…It’s a Predicament

Threatpost

Despite what security vendors might say, there is no way to comprehensively solve our supply-chain security challenges, posits JupiterOne CISO Sounil Yu. We can only manage them.

article thumbnail

Webinar: The Supply Chain Security Gap: Impacts on Connected and Embedded Device Manufacturers via Embedded Computing Design on February 9th, 2022 at 2pm Eastern

IG Guru

REGISTER HERE FEATURED PRESENTERS Dr. Larry Ponemon Chairman and Founder, Ponemon InstituteDr. Larry Ponemon is the Chairman and Founder of the Ponemon Institute and is considered a pioneer in privacy auditing and the Responsible Information Management or RIM framework. Dr. Ponemon was appointed to the Advisory Committee for Online…Full Profile Rich Nass Executive Vice-President, Brand […].

article thumbnail

How Microsoft and Thales Offer Enhanced Security and Compliance for Microsoft Office 365

Thales Cloud Protection & Licensing

How Microsoft and Thales Offer Enhanced Security and Compliance for Microsoft Office 365. madhav. Thu, 02/03/2022 - 04:49. At the 2021 Thales Cloud Security Summit, I caught up with Benjy Levin, Program Manager, Microsoft, to discuss enhanced security and compliance for Microsoft Office 365 using Double Key Encryption (DKE) with Thales external keys and hardware security modules (HSMs).

article thumbnail

Out-of-Control Cybercrime Will Cause More Real-World Harm

WIRED Threat Level

Ransomware and online attacks can cause deadly real-world harm. Governments need to raise their game in response.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Thousands of Malicious npm Packages Threaten Web Apps

Threatpost

Attackers increasingly are using malicious JavaScript packages to steal data, engage in cryptojacking and unleash botnets, offering a wide supply-chain attack surface for threat actors.

Cloud 72
article thumbnail

8 Security Dinosaurs and What Filled Their Footprints

Dark Reading

Security technology has to evolve as new threats emerge and defenses improve. Here is a look back at the old breeds that are dying out.

article thumbnail

Welcome to the Burner Phone Olympics

WIRED Threat Level

China’s Winter Games are overshadowed by human rights problems and overreaching state surveillance.

article thumbnail

The Real-World Impact of the Global Cybersecurity Workforce Gap on Cyber Defenders

Dark Reading

The effect is nuanced — and fundamental to cyber defense for organizations and nations.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Stopping Remote Access Trojans (RATs) in their tracks with OpenText MDR

OpenText Information Management

In 2012, we saw the first release of the Adwind malware family which were Java-based remote access tools (RATs) called “Frutas”. Since then, it has been rebranded several times with names such as Adwind, UnReCoM, Alien Spy, JSocket, JBifrost, UnknownRat, and JConnectPro. The OpenTextTM MDR has seen infections from the Adwind RAT family as recently … The post Stopping Remote Access Trojans (RATs) in their tracks with OpenText MDR appeared first on OpenText Blogs.

Access 62
article thumbnail

If My Organization Is Mostly in the Cloud, Do I Need a Firewall?

Dark Reading

A firewall is still a valuable part of the IT security stack, but businesses need to consider all their attack surfaces.

Cloud 84
article thumbnail

Charming Kitten Sharpens Its Claws with PowerShell Backdoor

Threatpost

The notorious Iranian APT is fortifying its arsenal with new malicious tools and evasion tactics and may even be behind the Memento ransomware.

IT 69
article thumbnail

Why Security Pros Are Frustrated With Cloud Security

Dark Reading

As companies shift more operations to the cloud, a shortfall in security talent and too much security data wastes more than half of the time spent on security issues, a survey finds.

Cloud 93
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

KP Snacks Left with Crumbs After Ransomware Attack

Threatpost

The Conti gang strikes again, disrupting the nom-merchant's supply chain and threatening empty supermarket shelves lasting for weeks.

article thumbnail

Cato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk

Dark Reading

CASB Cato converges a full CASB into its global SASE platform to defend enterprises against data breach and cloud-delivered threats.

Cloud 73
article thumbnail

IBM ranked #1 for AI lifecycle software market share in IDC report

IBM Big Data Hub

Today, industry leaders remain laser-focused on expanding their digital advantage to increase agility, innovation and resiliency, all while setting their sights on developing future revenue streams. Artificial intelligence (AI) is an essential instrument for reshaping businesses both now and in the future, with three in four organizations deploying or ramping up their AI efforts, according to Morning Consult’s April 2021 research.