Wed.Mar 10, 2021

article thumbnail

Startup Probes Hack of Internet-Connected Security Cameras

Data Breach Today

'Arson Cats' Researchers Say Device Flaws Gave Them Full Access to Verkada Cameras The "Arson Cats" research group says it was able to exploit flaws in internet-accessible security cameras built by Silicon Valley "cloud-based enterprise video security" startup Verkada to access live video and audio feeds from inside Tesla, Okta and Cloudflare offices, plus healthcare facilities and prisons.

Security 340
article thumbnail

Home Assistant, Pwned Passwords and Security Misconceptions

Troy Hunt

Two of my favourite things these days are Have I Been Pwned and Home Assistant. The former is an obvious choice, the latter I've come to love as I've embarked on my home automation journey. So, it was with great pleasure that I saw the two integrated recently: always something. now you are in my @home_assistant setup also :) Thanks @troyhunt pic.twitter.com/4d4Qxnlazl — Jón Ólafs (@jonolafs) March 3, 2021 Awesome!

Passwords 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Impact of COVID-19 on Cybersecurity Strategies

Data Breach Today

Joe Nocera and Vikas Agarwal Analyze PwC Survey Findings The 2021 PwC Global Digital Trust Insights survey shows 96% of businesses will adjust their cybersecurity strategies as a result of the COVID-19 pandemic. Joe Nocera and Vikas Agarwal of PwC offer an analysis.

article thumbnail

'Thousands' of Verkada Cameras Affected by Hacking Breach

Dark Reading

Thousands of Verkada cameras have been affected by a breach from a group of hackers, who have reportedly gained access to surveillance systems inside several high-profile companies, police departments, hospitals, prisons and schools.

Access 135
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

List of Hacked Exchange Servers May Boost Recovery Efforts

Data Breach Today

Window Closing to Secure Small Organizations from Ransomware Computer security researchers have acquired an enormous list of compromised email servers from the perpetrators of the mass Microsoft Exchange compromises. But a big question looms: How bad is this situation going to get?

More Trending

article thumbnail

Hackers Waging 'Living Off the Land' Attacks on Azure

Data Breach Today

Microsoft Shares Threat Detection and Mitigation Strategies Microsoft is warning users of its Azure cloud platform that hackers are using several "living-off-the-land" attack techniques to evade security measures, escalate privileges and deploy cryptominers. The software giant released a threat detection and mitigation strategy for the platform.

Cloud 312
article thumbnail

How to Protect Vulnerable Seniors From Cybercrime

Dark Reading

According to the FBI, people over the age of 60 lose more money to cybercrime than any other age group. The good news: Safety is only three main tips away.

124
124
article thumbnail

CISA Will Manage.Gov Domain in Effort to Enhance Security

Data Breach Today

More Layers of Security Anticipated for Government Websites The Cybersecurity and Infrastructure Security Agency will take over the day-to-day management of the official.gov top-level domain in April, adding a greater emphasis on security for the domains used for government websites.

Security 305
article thumbnail

Monitor, detect and remediate Macs using Microsoft Azure Sentinel with Jamf Protect

Jamf

Today, we announced a new integration as part of our partnership efforts with Microsoft by connecting Jamf Protect and Microsoft Azure Sentinel. This integration natively pushes all Mac security-related data and alerts directly into Azure Sentinel instance with minimal configuration.

Security 111
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Microsoft Patch Tuesday: A Call to Action

Data Breach Today

Critical Updates to Exchange, Explorer Mitigate Risks Microsoft's rerelease on Patch Tuesday of the seven patches for the widely exploited Exchange vulnerabilities has given security experts a chance to reiterate the urgent need to install these and other critical security updates.

Risk 254
article thumbnail

White hat hackers gained access more than 150,000 surveillance cameras

Security Affairs

A group of hackers claimed to have compromised more than 150,000 surveillance cameras at banks, jails, schools, and prominent companies like Tesla and Equinox. A group of US hackers claimed to have gained access to footage from 150,000 security cameras at banks, jails, schools, healthcare clinics, and prominent organizations. The news was first reported by Bloomberg News who reported its to Verkada.

Access 110
article thumbnail

Education Sector OnDemand | Authentication for the Evolving Campus Community

Data Breach Today

Smart & Adaptive MFA for the Modern Campus View this webinar as we discuss multi-factor authentication for the evolving campus community.

article thumbnail

Breach Exposes Verkada Security Camera Footage at Tesla, Cloudflare

Threatpost

Surveillance footage from companies such as Tesla as well as hospitals, prisons, police departments and schools was accessed in the hack.

Security 127
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

It’s Open Season for Microsoft Exchange Server Hacks

WIRED Threat Level

A patch for the vulnerabilities China exploited has been released. Now, criminal groups are going to reverse engineer it—if they haven’t already.

IT 118
article thumbnail

Cyberattackers Exploiting Critical WordPress Plugin Bug

Threatpost

The security hole in the Plus Addons for Elementor plugin was used in active zero-day attacks prior to a patch being issued.

Security 122
article thumbnail

CIPL Submits Response to the EDPB Guidelines on Examples Regarding Data Breach Notification

Hunton Privacy

On March 2, 2021, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth submitted its response to the European Data Protection Board (“EDPB”) consultation on draft guidelines on examples regarding data breach notification (the “Guidelines”). The Guidelines were adopted on January 14, 2021 for public consultation. The EDPB’s Guidelines are intended to provide concrete personal data breach use cases and recommendations to help organizations (1) implement relevant technical

article thumbnail

Acting FTC Chairwoman Rebecca Kelly Slaughter gives first major policy speech – Protecting Consumer Privacy in a Time of Crisis via the Future of Privacy Forum

IG Guru

Check out the remarks here. The post Acting FTC Chairwoman Rebecca Kelly Slaughter gives first major policy speech – Protecting Consumer Privacy in a Time of Crisis via the Future of Privacy Forum appeared first on IG GURU.

Privacy 95
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A flaw in The Plus Addons for Elementor WordPress plugin allows sites takeover

Security Affairs

Researchers from the Wordfence team found a critical vulnerability in The Plus Addons for Elementor WordPress plugin that could be exploited to take over a website. Researchers at the Wordfence team of the security firm Defiant have spotted a critical flaw in The Plus Addons for Elementor WordPress plugin that could be exploited by attackers to gain administrative privileges to a website and take over it.

article thumbnail

Fake Ad Blocker Delivers Hybrid Cryptominer/Ransomware Infection

Threatpost

A hybrid Monero cryptominer and ransomware bug has hit 20,000 machines in 60 days.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Guest Blog: TalkingTrust. What’s driving the security of IoT? madhav. Thu, 03/11/2021 - 07:39. The Urgency for Security in a Connected World. Connectivity enables powerful, revenue-generating capabilities…from data telemetry and runtime analytics, to effectively predicting and maintenance requirements. There are so many reasons why manufacturers connect their products to the Internet, whether it’s industrial machines, medical devices, consumer goods or even cars.

IoT 77
article thumbnail

Malware Operator Employs New Trick to Upload Its Dropper into Google Play

Dark Reading

Check Point researchers recently discovered the Clast82 dropper hidden in nine legitimate Android utility apps.

IT 109
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Nim-Based Malware Loader Spreads Via Spear-Phishing Emails

Threatpost

Spear-phishing emails are spreading the NimzaLoader malware loader, which some say may be used to download Cobalt Strike.

article thumbnail

Microsoft’s March Patch Tuesday fixes 14 Critical flaws

Security Affairs

Microsoft’s March Patch Tuesday security updates address 89 vulnerabilities in its products, 14 are listed as Critical and 75 are listed as Important in severity. Microsoft’s March Patch Tuesday security updates address 89 vulnerabilities in its products, including Microsoft Windows components, Azure and Azure DevOps, Azure Sphere, Internet Explorer and Edge (EdgeHTML), Exchange Server, Office and Office Services and Web Apps, SharePoint Server, Visual Studio, and Windows Hyper-V.

article thumbnail

EU Council Agrees on Proposed ePrivacy Regulation

Data Matters

On February 10, 2021, the Council of the European Union (which includes representatives of the European Union (EU) member states, hereinafter Council) reached an agreement on the ePrivacy Regulation proposal that governs the protection of privacy and confidentiality of electronic communications services (ePrivacy Regulation). The first draft of the ePrivacy Regulation was approved by the European Commission in 2017 and has since been under discussion in the Council.

GDPR 68
article thumbnail

Digitally Transforming Trusted Transactions Through Biometrics, ML & AI

Dark Reading

The pandemic has increased the appetite for e-commerce and contactless payments, and biometrics and artificial intelligence are playing a larger role in securing those transactions.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

SAP Stomps Out Critical RCE Flaw in Manufacturing Software

Threatpost

The remote code execution flaw could allow attackers to deploy malware, modify network configurations and view databases.

article thumbnail

US Schools Faced Record Number of Security Incidents in 2020

Dark Reading

The K-12 Cybersecurity Resource Center reports an 18% increase in security incidents as schools moved classes online.

article thumbnail

How to build PURE supply chains in 2021

OpenText Information Management

As companies worldwide emerge from the COVID-19 pandemic, supply chain leaders are rethinking their supply chain infrastructure. This is the time to build back better. And supply chain leaders are evaluating top electronic data interchange (EDI) providers that can offer customized solutions with resilience and agility in mind. For some, this might mean outsourcing a … The post How to build PURE supply chains in 2021 appeared first on OpenText Blogs.