Wed.May 12, 2021

article thumbnail

Babuk Ransomware Gang Posts More DC Metro Police Data

Data Breach Today

Babuk Has Threatened to Release More MPD Info The Babuk ransomware gang has reignited its feud with the Washington, D.C. Metropolitan Police Department by posting what it says is an additional 22GB of stolen data and what it claims is a transcript of the failed ransom negotiations.

article thumbnail

RSAC insights: How the ‘CIEM’ framework is helping companies manage permissions glut

The Last Watchdog

A permissions glut is giving rise to an explosion of new exposures in modern business networks. Related: Securing digital identities. Companies are adopting multi-cloud and hybrid cloud infrastructures and relying on wide-open app development like never before. In doing so, permissions to make myriad software connections are proliferating. Taken together these man-to-machine and machine-to-machine connections result in cool new digital services.

Cloud 212
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Colonial Pipeline Attack Leads to Calls for Cyber Regs

Data Breach Today

Lawmakers, Others Say Ransomware Attack Demonstrates Need for Enhanced Security The ransomware attack against Colonial Pipeline, which has disrupted the flow of gasoline and other petroleum products throughout the eastern U.S. since Friday, is prompting members of Congress to call for new cybersecurity regulations and ask probing questions about regulators' scrutiny of security measures.

article thumbnail

RSAC insights: Sophos report dissects how improved tools, tactics stop ransomware attack

The Last Watchdog

A new report from Sophos dissects how hackers spent two weeks roaming far-and-wide through the modern network of a large enterprise getting into a prime position to carry out what could’ve been a devasting ransomware attack. Related: DHS embarks on 60-day cybersecurity sprints. This detailed intelligence about a ProxyLogon-enabled attack highlights how criminal intruders are blending automation and human programming skills to great effect.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Did Data Leak Discovery Reveal a Ransomware Incident?

Data Breach Today

Researcher Says Exposed Database Contained Ransom Demand Message An unsecured database of medical information on military veterans contained evidence of a potential incident, the security researcher who discovered the data leak says.

Military 227

More Trending

article thumbnail

Rise of DarkSide: Ransomware Victims Have Been Surging

Data Breach Today

Crime Syndicate's Big Game Hunting and Advanced Extortion Risk Becoming Commonplace For anyone wondering how the Russian-speaking, ransomware-wielding DarkSide crime syndicate was able to disrupt a major U.S. fuel pipeline, a more pertinent question might be: Why didn’t it happen sooner?

article thumbnail

TeaBot Android banking Trojan targets banks in Europe

Security Affairs

Malware researchers from Cleafy warn of a new Android banking trojan dubbed TeaBot (aka Anatsa) that is targeting banks in Europe. Malware experts from the Italian cybersecurity firm Cleafy have spotted a new Android banking trojan dubbed TeaBot (aka Anatsa) that is targeting banks in Spain, Germany, Italy, Belgium, and the Netherlands. TeaBot malware appeared in the threat landscape at the beginning of January 2021, it is still under development and according to the researchers, it is able to h

Access 117
article thumbnail

Colonial Pipeline Attack: “All Monsters Are Human”

Data Breach Today

Cybereason's Sam Curry on DarkSide and New Breed of Ransomware Attack In April, Cybereason published a blog detailing its research into the DarkSide ransomware strain that infected Colonial Pipeline this past week. Sam Curry of Cybereason shares insights on DarkSide and the tactics behind the new breed of ransomware attacks.

article thumbnail

MITRE Protection Tests Shed New Light on Endpoint Security

eSecurity Planet

MITRE added a new wrinkle to its latest endpoint detection and response (EDR) evaluations, a test of endpoint security products’ ability to stop an adversarial attack. Previous MITRE evaluations and the first part of the latest evaluation, Carbanak+FIN7 , focused on the ability of vendors to detect attacks and alert security staff. That approach focuses more on the strengths of EDR tools, which essentially add a centralized management layer to endpoint security, the ability to detect and r

Security 116
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

APT Group Using Backdoor for Espionage

Data Breach Today

Kaspersky Describes 'Operation TunnelSnake' That Appears to Have China Connection An ongoing advanced persistent threat campaign dubbed "Operation TunnelSnake" has been using a Windows rootkit named Moriya to deploy a passive backdoor to spy on victims, the security firm Kaspersky reports.

Security 189
article thumbnail

Microsoft Patch Tuesday for May 2021 fix 4 critical flaws

Security Affairs

Microsoft Patch Tuesday for May 2021 security updates addressed 55 vulnerabilities, four are rated as Critical. Microsoft Patch Tuesday for May 2021 security updates address 55 vulnerabilities in Microsoft Windows,NET Core and Visual Studio, Internet Explorer (IE), Microsoft Office, SharePoint Server, Open-Source Software, Hyper-V, Skype for Business and Microsoft Lync, and Exchange Server.

article thumbnail

Microsoft Patches 4 More Exchange Flaws

Data Breach Today

Patch Tuesday Update: These Vulnerabilities Not Yet Exploited in Wild Microsoft issued patches Tuesday for four more vulnerabilities in on-premises versions of the Exchange Server corporate email platform, one of which is a zero-day flaw.

175
175
article thumbnail

How Companies Need to Treat User Data and Manage Their Partners

Security Affairs

After the introduction of CCPA and GDPR, much more attention is given to third-party risks, and the privacy terms and conditions users agree to. Global privacy regulations, such as the CCPA and GDPR, were enacted to ensure stricter standards when handling the personal data of consumers. As per these regulations, organizations can be held responsible for their vendors’ inability to comply with regulations.

GDPR 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Google/Android announces privacy requirements

Data Protection Report

Google announced that it will follow industry standards with respect to privacy obligations. All developers with apps on Google Play will be required to disclose the type of data collected and stored and how such data is used by Q2 of 2022. These are in addition to other elements, such as security practices, data deletion upon uninstallation of app, etc.

Privacy 98
article thumbnail

NSA and ODNI analyze potential risks to 5G networks

Security Affairs

U.S. Intelligence agencies warn of weaknesses in 5G networks that could be exploited by crooks and nation-state actors for intelligence gathering. The U.S. National Security Agency (NSA), along with the DHS Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) have analyzed the risks and vulnerabilities associated with the implementation of 5G networks.

Risk 91
article thumbnail

Catches of the month: Phishing scams for May 2021

IT Governance

Welcome to May’s round-up of phishing scams. This month, we look at a scam imitating SharePoint that has bypassed Microsoft’s secure email gateway, and investigate the damaging effects of a data breach at a cryptocurrency platform. SharePoint users caught out by ‘urgent’ signature request. SharePoint users are being warned about targeted phishing attacks that claim users must urgently provide a signature on a document.

article thumbnail

‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices

Threatpost

Wi-Fi devices going back to 1997 are vulnerable to attackers who can steal your data if they're in range.

IoT 118
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cybersecurity: What Is Truly Essential?

Dark Reading

In an effort to protect their organizations, security professionals can overdo it. The result often works against them.

article thumbnail

Data and Disposition: How Disposition Protects Loss of Privacy in a Data-Driven World.

The Texas Record

Data is everywhere—when we click, swipe, type, or Skype, data is created and stored into various databases. What happens when that data is breached, identities are stolen, privacy is lost, or loss of property occurs? For public agencies, data breaches can result in loss of confidential or valuable information. What does this have to do with disposition?

Privacy 84
article thumbnail

66% of CISOs Feel Unprepared for Cyberattacks

Dark Reading

More than half of CISOs surveyed are more concerned about a cyberattack in 2021 than in 2020, researchers report.

111
111
article thumbnail

Researchers Flag e-Voting Security Flaws

Threatpost

Paper ballots and source-code transparency are recommended to improve election security.

Security 116
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Putting The Spotlight on DarkSide

Dark Reading

Incident responders share insight on the DarkSide ransomware group connected to the recent Colonial Pipeline ransomware attack.

article thumbnail

Telegram Fraudsters Ramp Up Forged COVID-19 Vaccine Card Sales

Threatpost

A new type of fraud is spiking across the platform: Selling fake vax records to people who want to lie their way into places where proof of vaccine is required.

Sales 84
article thumbnail

Vulnerable Protocols Leave Firms Open to Further Compromises

Dark Reading

Companies may no longer have Internet-facing file servers or weakly secured Web servers, but attackers that get by the perimeter have a wide-open landscape of vulnerability.

article thumbnail

U.S. Issues Ransomware Protection Guidance for Critical Infrastructure

eSecurity Planet

The U.S. Cybersecurity and Infrastructure Agency (CISA) and the FBI have issued guidance for protecting critical infrastructure from ransomware , shedding some light on the DarkSide attack that crippled the Colonial Pipeline and left much of the East Coast facing an energy shortage. The agencies didn’t name Colonial in the alert , referring only to a “pipeline company.” The company proactively disconnected operational technology (OT) systems upon discovering the attack, the ale

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Despite Heightened Breach Fears, Incident Response Capabilities Lag

Dark Reading

Many organizations remain unprepared to detect, respond, and contain a breach, a new survey shows.

101
101
article thumbnail

Senate Bill Would Expand Federal Children’s Privacy Protections

Hunton Privacy

On May 11, 2021, Senators Edward Markey (D-MA) and Bill Cassidy (R-LA) introduced the Children and Teens’ Online Privacy Protection Act (the “Bill”). The Bill, which would amend the existing Children’s Online Privacy Protection Act (“COPPA”), would prohibit companies from collecting personal information from children ages 13 to 15 without their consent.

Privacy 65
article thumbnail

TeaBot Trojan Targets Banks via Hijacked Android Handsets

Threatpost

Malware first observed in Italy can steal victims’ credentials and SMS messages as well as livestream device screens on demand.