Thu.Jun 16, 2022

article thumbnail

Follina, Other Flaws Fixed in Final Microsoft Patch Tuesday

Data Breach Today

3 Critical RCE Exploits Plus Actively Exploited Zero-Day Fixed The last monthly rollout of security flaws fixed by Microsoft includes a fix for Follina, a zero-day exploit launched via malicious Office documents and spotted by researchers in hacking campaigns. In the future, Microsoft will do rolling, automatic updates instead of the monthly Patch Tuesday.

Security 237
article thumbnail

What is a Cyberattack? Types and Defenses

eSecurity Planet

A cyberattack is any action taken by a cyber criminal in an attempt to illegally gain control of a computer, device, network, or system with malicious intent. Cyber criminals may damage, destroy, steal, encrypt, expose, or leak data as well as cause harm to a system. Cyberattacks are on the rise, with cyber criminal trends and techniques becoming increasingly sophisticated and creative.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Highlights of RSA Conference 2022

Data Breach Today

The latest edition of the ISMG Security Report includes highlights and observations from RSA Conference 2022, including a key message from RSA CEO Rohit Ghai. It also discusses the value of automation and the Cybersecurity and Infrastructure Security Agency's mission to grow cyber talent.

article thumbnail

Attacking the Performance of Machine Learning Systems

Schneier on Security

Interesting research: “ Sponge Examples: Energy-Latency Attacks on Neural Networks “: Abstract: The high energy costs of neural network training and inference led to the use of acceleration hardware such as GPUs and TPUs. While such devices enable us to train large-scale neural networks in datacenters and deploy them on edge devices, their designers’ focus so far is on average-case performance.

Paper 122
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Cyber Risk Quantification: The Quest for Transparency

Data Breach Today

BitSight's Stephen Boyer Says Regulations Are Driving Better Board-Level Awareness How can companies make their cybersecurity posture more transparent to stakeholders? That's a question being asked by both boards of directors and potential investors, says Stephen Boyer, founder and CTO of BitSight. He discusses the impact of new regulations and guidance from agencies.

Risk 245

More Trending

article thumbnail

Safeguarding the Enterprise Across Multiple Public Clouds

Data Breach Today

Microsoft's Abbas Kudrati and HCL's Upendra Singh on Zero Trust and Cloud Security Organizations have created significant security challenges by rapidly migrating applications, data and workloads to multiple public clouds over the course of the COVID-19 pandemic, according to Abbas Kudrati of Microsoft and Upendra Singh of HCL.

Cloud 245
article thumbnail

Channel 4 Under Fire Over “Emergency News” Stunt to Promote Cyber Attack Drama

IT Governance

Channel 4 has faced heavy criticism after broadcasting a fake emergency news message warning that the UK is about to be hit by a catastrophic cyber attack. The message was filmed at what appeared to be GCHQ – the UK government’s intelligence and security headquarters – and informed viewers that Britain’s energy and water supplies could be cut off by an imminent attack.

Military 111
article thumbnail

What's Needed for Firms to Bring SASE and Zero Trust to Life

Data Breach Today

Juniper's Kate Adam on the Challenges and Opportunities for SASE and Zero Trust Implementing modern architectures such as zero trust and secure access service edge remains an issue for many organizations. This challenge is further amplified by the shortage of skilled cybersecurity personnel, says Kate Adam, senior director of enterprise product marketing at Juniper Networks.

Marketing 245
article thumbnail

BlackCat Ransomware affiliates target unpatched Microsoft Exchange servers

Security Affairs

The BlackCat ransomware gang is targeting unpatched Exchange servers to compromise target networks, Microsoft warns. Microsoft researchers have observed BlackCat ransomware gang targeting unpatched Exchange servers to compromise organizations worldwide. The compromise of Exchange servers allows threat actors to access the target networks, perform internal reconnaissance and lateral movement activities, and steal sensitive documents before encrypting them. “For example, while the common ent

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

2 Vendors at Center of Breaches Affecting 3 Million

Data Breach Today

Wide Impact on Clients by Clinical Guidance Firm, EMR Vendor Incidents Two business associates are at the center of recently reported health data breaches affecting a total of more than 3 million individuals and counting, spotlighting again the security and privacy risks posed by vendors to healthcare entities and their patients' information.

article thumbnail

FTC Seeks Public Comment on Modernizing Its Digital Deception Guidance

Hunton Privacy

On June 3, 2022, the Federal Trade Commission announced it is seeking public comment on its 2013 guidance, “.com Disclosures: How to Make Effective Disclosures in Digital Advertising ” (the “Guidance”). The FTC indicated that it is updating the Guidance to better protect consumers against online deceptive practices, particularly because some companies have interpreted the current version of Guidance to “justify practices that mislead consumers online.

IT 107
article thumbnail

Cloudflare Mitigates Record HTTPS DDoS Attack

Data Breach Today

26 Million Requests Per Second Attack Targets Cloudflare Customer Website Cloudflare says it detected and mitigated "the largest HTTPS DDoS attack on record." The 26 million requests per second DDoS attack likely originated from hacked virtual machines and servers kept by cloud computing hosts and was likely exacerbated by computationally intensive encrypted web traffic.

article thumbnail

Police Linked to Hacking Campaign to Frame Indian Activists

WIRED Threat Level

New details connect police in India to a plot to plant evidence on victims' computers that led to their arrest.

Security 129
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

The Importance of Business-Critical Application Security

Data Breach Today

Onapsis CEO Mariano Nunez on the Challenges Enterprises Face Securing Applications Business-critical applications, the crown jewels of the modern enterprise, are increasingly targeted due to their significant value, and many organizations are struggling to secure them. These systems must be properly deployed, monitored and maintained, says Onapsis CEO Mariano Nunez.

Security 231
article thumbnail

Anna Collard, SVP Content Strategy & Evangelist, KnowBe4 Africa Has Been Acknowledged as a Global Influencer in Cyber

KnowBe4

IFSEC Global recently acknowledged our very own Anna Collard as a IFSEC Global Influencer in Security for 2022 ! She was one of the few nominated by a panel of highly respected judges, and can be found in the 'Cybersecurity Professionals' section.

article thumbnail

Why Implementing Security Technology Is Such a Challenge

Data Breach Today

Amol Kulkarni of CrowdStrike on Why Companies Must Focus More on Runtime Protection Organizations are struggling to implement all the security technology they've purchased and ensure they are protected across the most important areas of risk and posture, according to Amol Kulkarni, chief product and engineering officer at CrowdStrike.

Security 130
article thumbnail

Cisco fixed a critical Bypass Authentication flaw in Cisco ESA and Secure Email and Web Manager

Security Affairs

Cisco addressed a critical bypass authentication flaw in Cisco Email Security Appliance (ESA) and Secure Email and Web Manager. Cisco addressed a critical bypass authentication vulnerability affecting Email Security Appliance (ESA) and Secure Email and Web Manager. The flaw, tracked as CVE-2022-20798 (CVSS score 9.8), can be exploited by an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of a vulnerable device.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

CISOs Gain False Confidence in the Calm After the Storm of the Pandemic

Dark Reading

While CISOs may feel more confident in their security posture emerging from the pandemic, new research suggests that doesn't mean organizations are better prepared for large-scale attacks.

article thumbnail

Malicious apps continue to spread through the Google Play Store

Security Affairs

Researchers at antivirus firm Dr. Web discovered malware in the Google Play Store that was downloaded two million times. An investigation conducted by the antivirus firm Dr. Web in May resulted in the discovery of multiple adware and information-stealing malware on the official Google Play Store. However, the experts warn that info-stealing Trojans are the most dangerous threats for Android users, they could be used to steal sensitive data such as login credentials and authorization for multiple

article thumbnail

Internet Explorer Now Retired but Still an Attacker Target

Dark Reading

Though the once-popular browser is officially now history as far as Microsoft support goes, adversaries won't stop attacking it, security experts say.

article thumbnail

ALPHV/BlackCat ransomware gang starts publishing victims’ data on the clear web

Security Affairs

ALPHV/BlackCat ransomware group began publishing victims’ data on the clear web to increase the pressure on them and force them to pay the ransom. ALPHV/BlackCat ransomware group has adopted a new strategy to force victims into paying the ransom, the gang began publishing victims’ data on the clear web to increase the pressure. Publishing data online will make data indexable by search engines, increasing the potential impact on the victims due to the public availability of the stol

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Facebook Messenger Scam Duped Millions

Threatpost

One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting.

Phishing 116
article thumbnail

Android Spyware 'Hermit' Discovered in Targeted Attacks

Dark Reading

The commercial-grade surveillance software initially was used by law enforcement authorities in Italy in 2019, according to a new report.

98
article thumbnail

Researchers disclosed a remote code execution flaw in Fastjson Library

Security Affairs

Researchers disclosed a remote code execution vulnerability, tracked as CVE-2022-25845, in the popular Fastjson library. Cybersecurity researchers from JFrog disclosed details of a now patched high-severity security vulnerability in the popular Fastjson library that could be potentially exploited to achieve remote code execution. Fastjson is a Java library that can be used to convert Java Objects into their JSON representation.

article thumbnail

RSAC Startup Competition Focuses on Post-Cloud IT Infrastructure

Dark Reading

A secure Web browser takes the top prize, and for the second year in a row malware detection is an afterthought.

Cloud 103
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

We’re Buried Under Email, A Monster of Our Own Creation via Medium.com

IG Guru

Not long ago, I posted the number of unread emails in my iPhone inbox on Twitter. This sparked a lively game of one-upmanship among a growing list of Internet luminaries, some of whom had — no joke — one million unread emails. The post We’re Buried Under Email, A Monster of Our Own Creation via Medium.com appeared first on IG GURU.

article thumbnail

Advancing Trust in a Digital World

Thales Cloud Protection & Licensing

Advancing Trust in a Digital World. divya. Thu, 06/16/2022 - 05:26. The pandemic has accelerated digital transformation beyond anyone’s imagination. Considering the increased cybersecurity risks introduced by digital technologies, what should society do to prevent cyber-attacks, reduce damage, and strengthen trust? In this blog post, I'll try to explain how to improve cybersecurity preparedness in the post-COVID world by promoting trust in the dig-ital world through awareness, culture, and sensi

article thumbnail

Are You Hiring Enough Entry-Level Security Pros?

Dark Reading

New (ISC)² survey shows employment levels for entry-level cyber pros lag behind every other experience level.