Fri.Jul 02, 2021

article thumbnail

REvil's Ransomware Success Formula: Constant Innovation

Data Breach Today

Affiliate-Driven Approach and Regular Malware Refinements Are Key, Experts Say REvil, aka Sodinokibi, is one of today's most notorious - and profitable - ransomware operations, driven by highly skilled affiliates who share profits with the operators. And the operators are constantly improving the malware, including porting it to Linux to target network-attached storage and hypervisors.

article thumbnail

Another 0-Day Looms for Many Western Digital Users

Krebs on Security

Some of Western Digital’s MyCloud-based data storage devices. Image: WD. Countless Western Digital customers saw their MyBook Live network storage drives remotely wiped in the past month thanks to a bug in a product line the company stopped supporting in 2015, as well as a previously unknown zero-day flaw. But there is a similarly serious zero-day flaw present in a much broader range of newer Western Digital MyCloud network storage devices that will remain unfixed for many customers who ca

Cloud 343
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analysis: Why Ransomware Is No. 1 Cyberthreat

Data Breach Today

This edition of the ISMG Security Report features a discussion about why the head of Britain's National Cyber Security Center says the No. 1 cyber risk is not nation-state attackers but ransomware-wielding criminals. Also featured: Western Digital IoT flaws; an FBI agent tracks cybersecurity trends.

article thumbnail

More Russian Hacking

Schneier on Security

Two reports this week. The first is from Microsoft, which wrote : As part of our investigation into this ongoing activity, we also detected information-stealing malware on a machine belonging to one of our customer support agents with access to basic account information for a small number of our customers. The actor used this information in some cases to launch highly-targeted attacks as part of their broader campaign.

Passwords 144
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hades Ransomware Has Targeted 7 Large Companies

Data Breach Today

Accenture Security: Attackers Focus on Those With Over $1 Billion in Revenue At least seven companies with annual revenue of over $1 billion have been hit so far this year by Hades ransomware, according to an Accenture Security report.

More Trending

article thumbnail

CISA Emphasizes Urgency of Avoiding 'Bad' Security Practices

Data Breach Today

Agency Warns of Impact on National Security Failure to take basic security steps - such as avoiding using end-of-life software and default passwords - can create serious national security risks, CISA stresses. The agency is in the early stages of developing a catalog of "bad practices" that should be avoided.

Security 312
article thumbnail

Diavol ransomware appears in the threat landscape. Is it the work of the Wizard Spider gang?

Security Affairs

Wizard Spider, the cybercrime gang behind the TrickBot botnet, is believed to be the author of a new ransomware family dubbed Diavol, Fortinet researchers report. Researchers from Fortinet reported that a new ransomware family, tracked as Diavol, might have been developed by Wizard Spider , the cybercrime gang behind the TrickBot botnet. The Trickbot botnet was used by threat actors to spread the Ryuk and Conti ransomware families, experts noticed similarities between Diavol and Conti threat

article thumbnail

Google Investigates Ad Injected Into 2FA SMS Messages

Data Breach Today

Text Ad Contained Link Directing to Avira's VPN Product Google says it's investigating how a text advertisement was injected into SMS messages containing two-step verification security codes. The text advertisement contained a link that redirected to a VPN product from antivirus vendor Avira.

Security 306
article thumbnail

CISA Offers New Mitigation for PrintNightmare Bug

Threatpost

CERT urges administrators to disable the Windows Print spooler service in Domain Controllers and systems that don’t print, while Microsoft attempts to clarify RCE flaw with a new CVE assignment.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Congress Considers Measures to Improve Telecom Security

Data Breach Today

House Committee Debates 9 Bills Focused on Securing Networks A House subcommittee is considering a slate of nine bills designed to improve cybersecurity practices in the telecommunications supply chains that support wireless networks.

Security 279
article thumbnail

Microsoft urges Azure users to update PowerShell to fix RCE flaw

Security Affairs

Microsoft is urging Azure users to update PowerShell to address a remote code execution vulnerability that was fixed earlier this year. Microsoft is recommending its Azure users to update PowerShell versions 7.0 and 7.1 to protect against a high severity remote code execution vulnerability tracked as CVE-2021-26701. The IT giant is inviting the PowerShell task automation tool to versions 7.0.6 or 7.1.3 as soon as possible. “If you manage yoiur Azure resources from PowerShell version 7.0 or

Security 126
article thumbnail

TrickBot Spruces Up Its Banking Trojan Module

Threatpost

After focusing almost exclusively on delivering ransomware for the past year, the code changes could indicate that TrickBot is getting back into the bank-fraud game.

IT 125
article thumbnail

A New Kind of Ransomware Tsunami Hits Hundreds of Companies

WIRED Threat Level

An apparent supply chain attack exploited Kaseya's IT management software to encrypt a "monumental" number of victims all at once.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Why Healthcare Keeps Falling Prey to Ransomware and Other Cyberattacks

Threatpost

Nate Warfield, CTO of Prevailion and former Microsoft security researcher, discusses the many security challenges and failings plaguing this industry.

article thumbnail

Experts warn of Babuk Locker attacks with recently leaked ransomware builder

Security Affairs

The recently leaked Babuk Locker ransomware builder was used by a threat actor in an ongoing campaign targeting victims worldwide. At the end of June, The Record first reported that the builder for the Babuk Locker ransomware was leaked online allowing threat actors to use it to create their own version of the popular ransomware. The Babuk Locker operators halted their operations at the end of April after the attack against the Washington, DC police department.

article thumbnail

5 Mistakes That Impact a Security Team's Success

Dark Reading

The way we work and treat each other go a long way in improving our organizations' security posture.

Security 110
article thumbnail

Cyber Defense Magazine – July 2021 has arrived. Enjoy it!

Security Affairs

Cyber Defense Magazine July 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 158 pages of excellent content. In this edition: Colonial Pipeline, JBS Cyber Attacks Shine Spotlight on Operational Technology Vulnerabilities for Wide Range of Business Sectors Getting The Cloud Right – Security and Compliance Flipping the Cyber Script. … and much more … Cyber Defense eMagazine July 2021 Edition.

IT 84
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Classified Ministry of Defence (UK) documents found at bus stop via BBC News

IG Guru

Check out the article here. The post Classified Ministry of Defence (UK) documents found at bus stop via BBC News appeared first on IG GURU.

article thumbnail

Secured-Core PCs May Mitigate Firmware Attacks, but Adoption Lags

Dark Reading

Microsoft maintains that exploitation of recent Dell vulnerabilities would be blocked on ultra-secure PCs - but most systems do not have the technology yet.

Security 106
article thumbnail

CISA alert urges to disable Windows Print Spooler to percent PrintNightmare attacks

Security Affairs

CISA issued a security alert to warn admins to disable the Windows Print Spooler service on servers not used for printing due to PrintNightmare zero-day. CISA issued an alert to warn admins to disable the Windows Print Spooler on servers not used for printing due to the risk of exploitation of the PrintNightmare zero-day vulnerability. ““while Microsoft has released an update for CVE-2021-1675 , it is important to realize that this update does not address the public exploits that also ide

article thumbnail

WFH: A Smart Time to Revisit Employee Use of Social Media

Dark Reading

Employers have their hands full when it comes to monitoring online activities that could hurt the brand or violate the organization's core values.

IT 84
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Friday Squid Blogging: Best Squid-Related Headline

Schneier on Security

From the New York Times : “ When an Eel Climbs a Ramp to Eat Squid From a Clamp, That’s a Moray. ” The article is about the eel; the squid is just eel food. But still… As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Security 116
article thumbnail

SOC Investment Improves Detection and Response Times, Data Shows

Dark Reading

A survey of IT and security pros finds many are confident in their ability to detect security incidents in near-real time or within minutes.

Security 110
article thumbnail

Microsoft Issues New CVE for 'PrintNightmare' Flaw

Dark Reading

Company says remote code execution issue in all Windows versions is different from one in Windows Print Spooler that it had patched last month, though both affect same function.

IT 73
article thumbnail

Barracuda Agrees to Acquire Skout Cybersecurity

Dark Reading

The acquisition will bring Barracuda into the extended detection and response (XDR) market with a tool for managed service providers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.