Tue.Mar 15, 2022

article thumbnail

What is Cyber Threat Management?

IT Governance

Cyber threat management is the process of identifying, analysing, evaluating and addressing an organisation’s cyber security requirements. With more than a 1,000 publicly disclosed security incidents last year – and countless others that weren’t reported – cyber security is a growing priority. It’s only by actively monitoring threats throughout their lifecycle that organisations can identify the risks that they face and the steps they should take to mitigate them.

Risk 126
article thumbnail

Sanctions Halt Rewards for Bug Hunters in Belarus, Russia

Data Breach Today

Researcher in Belarus Says Bug Bounty Through HackerOne Is Sole Income Sanctions levied against Russia and Belarus for the invasion of Ukraine are affecting security researchers signed up with bug bounty platforms, which can no longer legally make payments. A researcher in Belarus says he's locked out from accessing $25,179 in his HackerOne account.

Access 353
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CVE-2022-0778 DoS flaw in OpenSSL was fixed

Security Affairs

OpenSSL addressed a high-severity denial-of-service (DoS) vulnerability, tracked as CVE-2022-0778, related to certificate parsing. OpenSSL released updates to address a high-severity denial-of-service (DoS) vulnerability, tracked as CVE-2022-0778 , that affects the BN_mod_sqrt() function used when certificate parsing. The flaw was discovered by the popular Google Project Zero researchers Tavis Ormandy.

IT 131
article thumbnail

Ukraine's 'IT Army' Call-Up: Don't Try This at Home

Data Breach Today

Despite Russian Aggression, Distributed Denial-of-Service Attacks Remain Illegal With Ukraine having called on the world to join its "IT Army" and help it hack Russia and ally Belarus, what could possibly go wrong? For starters, launching distributed denial-of-service attacks - at least from outside Ukraine - remains illegal and risks triggering an escalation by Moscow.

IT 353
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

[Eye Opener] Ukraine Is Now Being Hit With 4 Different Strains Of Wiper Malware

KnowBe4

Newly discovered data-destroying malware was found this week in attacks targeting Ukrainian organizations and deleting data across systems on compromised networks. "This new malware erases user data and partition information from attached drives," ESET Research Labs explained.

More Trending

article thumbnail

The German BSI agency recommends replacing Kaspersky antivirus software

Security Affairs

German Federal Office for Information Security agency, also known as BSI, recommends consumers not to use Kaspersky anti-virus software. The German Federal Office for Information Security agency, aka BSI, recommends consumers uninstall Kaspersky anti-virus software. The Agency warns the cybersecurity firm could be implicated in hacking attacks during the ongoing Russian invasion of Ukraine.

article thumbnail

Anonymous Reportedly Hacked Russian Energy Firm Rosneft

Data Breach Today

Report: Business Operations Unaffected, Despite Some Disruption International hacking collective Anonymous reportedly hacked the German subsidiary of Russian energy company Rosneft on Monday, die Welt newspaper says, citing the country's cybersecurity watchdog, the Federal Office for Information Security.

article thumbnail

Cybercrime-as-a-Service: Its Evolution and What You Can Do to Fight Back

KnowBe4

The cybercrime market has skyrocketed in a frightening way. With threats such as ransomware to Business Email Compromise (BEC), the stakes are higher than ever for organizations across all industries.

article thumbnail

Analysis: President Biden's Tech Package Seeks Ukraine Aid

Data Breach Today

The ISMG Security Report features an analysis of the U.S. government's request for billions of dollars in tech aid to curb the global impact of the Kremlin's campaign in Ukraine. It also examines Biden's cryptocurrency executive order and why breached organizations often don't share full details.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Dirty Pipe Linux flaw impacts most QNAP NAS devices

Security Affairs

Taiwanese vendor QNAP warns most of its NAS devices are impacted by high severity Linux vulnerability dubbed ‘Dirty Pipe.’ Taiwanese hardware vendor QNAP warns most of its Network Attached Storage (NAS) devices are impacted by the recently discovered Linux vulnerability ‘ Dirty Pipe.’ An attacker with local access can exploit the high-severity vulnerability Dirty Pipe to gain root privileges.

Passwords 101
article thumbnail

Cloud Security: With Challenges Come Solutions

Data Breach Today

With security tools, it’s essential to provide full coverage and full security visibility for the environment. Avi Shua discusses Orca Security's solution to those challenges and how it identifies risk-sensitive data and speeds up the process.

Cloud 246
article thumbnail

How Cisco Training Can Take Your IT Team to the Next Level

ITPro.TV

The IT team is at the heart of the business for most end users. They are relied on by everyone across the organization for everything from gaining access to resources or restoring them. As an IT Administrator, you may also have assigned them to different projects that needed to be completed for your organization, but … Continue reading How Cisco Training Can Take Your IT Team to the Next Level → The post How Cisco Training Can Take Your IT Team to the Next Level appeared first on ITP

IT 94
article thumbnail

Senators Request Briefing on Infrastructure Cybersecurity

Data Breach Today

Ask DHS Officials About Cyber Defense; Execs Reportedly Fear Hit on SWIFT With the ground war worsening in Ukraine, lawmakers in the U.S. are seeking guidance from DHS on ways to continue fortifying U.S. cyber defense. The move comes as some cyber experts predict an ultimate escalation in Russia's malicious cyber activity targeting Ukraine or NATO member networks.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Private Equity Firm Snaps Up RSA Conference

Dark Reading

Crosspoint Capital Partners, along with Clearlake Capital Group and Symphony Technology Group, are setting up RSA Conference as a separate company from RSA Security.

article thumbnail

Threat of Ukraine-Russia 'Spillover' Attacks on Healthcare

Data Breach Today

Anahi Santiago, CISO of ChristianaCare, Discusses Latest Cyber Challenges As the Ukraine-Russia war continues, healthcare sector entities need to be prepared to deal with potential spillover cyber incidents, says Anahi Santiago, CISO of ChristianaCare, the largest healthcare delivery organization in the state of Delaware. She discusses current cyber challenges.

244
244
article thumbnail

Mobile App Developers Leave Behind 2,100 Open Databases

Dark Reading

A simple request to the VirusTotal scanning service reveals thousands of mobile-application databases left open to the public by developers in a three-month period.

131
131
article thumbnail

Class Action Filed in Logan Health Breach Affecting 214,000

Data Breach Today

Negligence Alleged; Entity Settled a Lawsuit in an Earlier Hacking Incident A proposed class action lawsuit against a Montana-based healthcare organization after a recent hacking incident affecting 214,000 individuals - the entity's second significant breach since 2019 - alleges, among other claims, that the entity was negligent when it failed to protect sensitive data.

IT 243
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Critical flaws affect Veeam Data Backup software

Security Affairs

Veeam addressed two critical vulnerabilities impacting the Backup & Replication product for virtual environments. Veeam has released security patches to fix two critical vulnerabilities, tracked as CVE-2022-26500 and CVE-2022-26501 (CVSS score of 9.8), impacting the Backup & Replication solution for virtual environments. The solution implements data backup and restore capabilities for virtual machines running on Hyper-V, vSphere, VMware, Windows & Linux servers, laptops, NAS and more

article thumbnail

Regulator Announces Border Gateway Protocol Security Review

Data Breach Today

Move Follows Alleged Russian BGP Hijacking to Target Ukrainian Bank Before Invasion Could a fundamental but poorly secured protocol that helps power the internet finally get needed improvements? The Federal Communications Commission has opened a security review of Border Gateway Protocol, just days after Russia reportedly hijacked BGP to target a Ukrainian bank.

Security 240
article thumbnail

Shipping Fraud Rises Nearly 800% in 2021

KnowBe4

Shipping fraud had a global increase of nearly 800% over the course of 2021, according to TransUnion’s 2022 Global Digital Fraud Trends Report.

article thumbnail

The Fifth Option in Risk Treatment

Data Breach Today

Book Excerpt: Peter Gregory on Ignoring the Risk In an excerpt from his book "CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide," Peter Gregory discusses choosing the fifth option in risk management, which is ignoring the risk. He warns of the problems that choice can cause.

Risk 231
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CyberheistNews Vol 12 #11 [Heads Up] FBI: Ransomware Gang Breached 52 U.S. Critical Infrastructure Orgs

KnowBe4

[Heads Up] FBI: Ransomware Gang Breached 52 US Critical Infrastructure Orgs. Email not displaying? | View Knowbe4 Blog. CyberheistNews Vol 12 #11 | Mar. 15th., 2022. [Heads Up] FBI: Ransomware Gang Breached 52 U.S. Critical Infrastructure Orgs. The U.S. Federal Bureau of Investigation (FBI) says the Ragnar Locker ransomware gang has breached the networks of at least 52 organizations from multiple U.S. critical infrastructure sectors.

article thumbnail

ISO 27002:2022: Unpacking the InfoSec Management Standard

Data Breach Today

Gary Hibberd, known as "The Professor of Communicating Cyber" at cybersecurity services provider Cyberfort Group, discusses the biggest changes made since 2013 to the ISO 27001 international standard for an information security management system, which helps organizations secure their data assets.

article thumbnail

NAS Vendor Says Several of Its Products Likely Contain Linux 'Dirty Pipe' Flaw

Dark Reading

QNAP's disclosure this week is the latest reminder of the potentially wide impact of privilege escalation flaw in the Linux kernel.

IT 100
article thumbnail

Why Application Security Needs More Attention in Healthcare

Data Breach Today

Healthcare entities and other organizations frequently skimp on application security, which is a critical area, and this often results in data breaches, security incidents and other mishaps, says former Blue Cross of Idaho CISO Sandy Dunn, who is now CIO and CISO of security firm BreachQuest.

Security 130
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Phony Instagram ‘Support Staff’ Emails Hit Insurance Company

Threatpost

The phishing scam tried to steal login credentials by threatening account shutdown, due to users having purportedly shared “fake content.”.

article thumbnail

Why Public Agencies Are Struggling to Implement Zero Trust

Thales Cloud Protection & Licensing

Why Public Agencies Are Struggling to Implement Zero Trust. divya. Tue, 03/15/2022 - 10:01. On May 12, 2021, the White House released an Executive Order (E.O.) on improving U.S. cybersecurity. The directive’s third section, entitled “Modernizing Federal Government Cybersecurity,” requires Federal Civilian Executive Branch (FCEB) agencies to begin moving to a zero trust architecture (ZTA).

article thumbnail

Pandora Ransomware Hits Giant Automotive Supplier Denso

Threatpost

Denso confirmed that cybercriminals leaked stolen, classified information from the Japan-based car-components manufacturer after an attack on one of its offices in Germany.