Mon.May 30, 2022

article thumbnail

Microsoft Office: Attackers Injecting Code via Zero-Day Bug

Data Breach Today

Malicious Code Execution Traced to Weaponized Office Documents Dating From April Attention to anyone who manages a Microsoft Windows environment: Security researchers are tracking a zero-day vulnerability in Microsoft Office that's being actively exploited by attackers to run malicious code on a vulnerable system.

Security 320
article thumbnail

GUEST ESSAY: A Memorial Day call to upskill more veterans for in-demand cybersecurity roles

The Last Watchdog

It’s no secret that cybersecurity roles are in high demand. Today there are more than 500,000 open cybersecurity roles in the U.S., leaving organizations vulnerable to cyber threats. Related: Deploying employees as threat sensors. Meanwhile, 200,000 well-trained and technically skilled military service members are discharged each year. These individuals have many transferable skills that would make cybersecurity a prosperous civilian career.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Ransomware Files, Bonus Ep. 1: REvil Is Foiled

Data Breach Today

If software has a dangerous security flaw, should its maker tell customers to shut it down until it’s fixed? It’s a tough call, but one that Dutch company Hoppenbrouwers says the software vendor Kaseya should have undertaken last year to prevent a massive supply-chain attack executed by the REvil ransomware gang.

article thumbnail

Multiple Microsoft Office versions impacted by an actively exploited zero-day

Security Affairs

A zero-day flaw in Microsoft Office that could be exploited by attackers to achieve arbitrary code execution on Windows systems. The cybersecurity researcher nao_sec discovered a malicious Word document (“05-2022-0438.doc”) that was uploaded to VirusTotal from Belarus. The document uses the remote template feature to fetch an HTML and then uses the “ms-msdt” scheme to execute PowerShell code.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Importance of Securing Operational Technology

Data Breach Today

Shankar Karthikason on How to Stem the Growing Cyberthreat to Manufacturing Manufacturing is a huge industry with massive amounts of critical data and IoT surfaces, and it is also a lucrative target for cybercriminals. CyberEdBoard member Shankar Karthikason discusses how to secure your OT environment and build an effective cybersecurity program.

More Trending

article thumbnail

CISA Adds 75 Flaws to Known Vulnerability Catalog in 3 Days

Data Breach Today

Many Listed Flaws Previously Disclosed, Some More Than A Decade Old The U.S. Cybersecurity and Infrastructure Security Agency has added 75 flaws to its catalog of known exploited software vulnerabilities. They were disclosed in three separate batches of 21, 20 and 34 vulnerabilities on Monday, Tuesday and Wednesday respectively.

article thumbnail

EnemyBot malware adds new exploits to target CMS servers and Android devices

Security Affairs

The operators of the EnemyBot botnet added exploits for recently disclosed flaws in VMware, F5 BIG-IP, and Android systems. Operators behind the EnemyBot botnet are expanding the list of potential targets adding exploits for recently disclosed critical vulnerabilities in from VMware, F5 BIG-IP, and Android. The botnet was first discovered by Fortinet in March, the DDoS botnet targeted several routers and web servers by exploiting known vulnerabilities.

CMS 141
article thumbnail

Ransomware Gang Demands $5M From Austrian State Carinthia

Data Breach Today

Services Impacted Include Passport Issuing and Traffic Violation Ticketing The BlackCat ransomware group, aka ALPHV, which is said to be a rebrand of BlackMatter or DarkSide, has now targeted the Austrian state of Carinthia. The attack has "severely affected" government services in the state, says Gerd Kurath, a state spokesperson.

article thumbnail

Three Nigerian men arrested in INTERPOL Operation Killer Bee

Security Affairs

Interpol arrested three Nigerian men in Lagos, who are suspected of using the Agent Tesla RAT to reroute financial transactions and steal sensitive data. Interpol arrested 3 Nigerian men in Lagos, as part of an international operation codenamed Killer Bee. The three men are suspected of using the Agent Tesla RAT to reroute financial transactions and steal confidential details from corporate organizations.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

6 Steps to Ensure Cyber Resilience

Dark Reading

To minimize the impact of cyber incidents, organizations must be pragmatic and develop a strategy of resilience for dealing with break-ins, advanced malware, and data theft.

112
112
article thumbnail

GoodWill Ransomware victims have to perform socially driven activities to decryption their data

Security Affairs

Researchers discovered a new ransomware family called GoodWill that asks victims to donate the ransom for social causes. CloudSEK ’s Threat Intelligence Research team has disclosed a new ransomware strain called GoodWill, that demands victims the payment of a ransom through donations for social causes and financially helping people in need. “The ransomware group propagates very unusual demands in exchange for the decryption key.

article thumbnail

Good Luck Not Accidentally Hiring a North Korean Scammer

WIRED Threat Level

DPRK hackers are tricking their way into jobs with western firms. A US government alert reminds employers they're on the front lines—and potentially on the hook.

article thumbnail

Zero-Day ‘Follina’ Bug Lays Older Microsoft Office Versions Open to Attack

Threatpost

Malware loads itself from remote servers and bypasses Microsoft's Defender AV scanner, according to reports.

109
109
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Good Luck Not Accidentally Hiring a North Korean Scammer

WIRED Threat Level

DPRK hackers are tricking their way into jobs with Western firms. A US government alert reminds employers they're on the front lines—and potentially on the hook.

article thumbnail

Implementing an Archival Display in an in-House Archive

ARMA International

A common misconception is that only financial- and personnel-powerful archives like state and federal archives have the resources to implement an exhibit displaying part of its archival collection. You may think that such an exhibit would not be possible for a small in-house archive team whose primary workflow includes processing, maintaining, and preserving its records and documents.

article thumbnail

Seven centuries of Irish archives painstakingly recreated after being destroyed in civil war via the Guardian

IG Guru

Check out the article here. The post Seven centuries of Irish archives painstakingly recreated after being destroyed in civil war via the Guardian appeared first on IG GURU.

article thumbnail

Building a cyber resilient and safer world

OpenText Information Management

Join us for the Security Cloud Track at OpenText World EMEA 2022 As organizations continue to transform and recover from the pandemic, security teams must adapt to an ever-expanding threat landscape. Organizations must consider the IT and security implications of a remote workforce as employees move to remote and hybrid environments. Securing remote workers is … The post Building a cyber resilient and safer world appeared first on OpenText Blogs.

Cloud 62
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DIR 5-31-2022

Info Source

DIR 5-31-2022. To open and read this issue as a PDF (or to download): Click here.

40
article thumbnail

The European Health Data Space – 5 Things You Need to Know

DLA Piper Privacy Matters

What is the European Health Data Space? On 3 May 2022, the EU Commission published a draft Regulation on the European Health Data Space (“ HDS ”). The Regulation is the first sector-specific proposal in the Commission’s “European Strategy for Data”, which aims at creating a ‘single market for data’. In so doing, the Commission intends to promote innovation and economic growth by unlocking improved access to data, whilst still safeguarding fundamental rights.

GDPR 98
article thumbnail

DIR 5-31-2022

Info Source

DIR 5-31-2022. To open and read this issue as a PDF (or to download): Click here.

40
article thumbnail

Db2 for z/OS: The Online Path from a Multi-Table Table Space to Universal Table Spaces

Robert's Db2

Back in 2014, I posted an entry to this blog on the topic of getting to universal table spaces from non-universal table spaces. In that entry, I noted that there was an online path (ALTER followed by online REORG) for getting from a "classic" partitioned table space to a universal partition-by-range (PBR) table space, and for getting from a single-table simple table space or traditional segmented table space to a universal partition-by-growth (PBG) table space.

IT 62
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.