Mon.Oct 04, 2021

article thumbnail

GUEST ESSAY: What it will take to train the next generation of cybersecurity analysts

The Last Watchdog

It is no secret that there is, and has been for some time, a shortage of trained cyber security professionals in corporate IT Security teams. The Wharton School of the University of Pennsylvania observed that “nowhere is the workforce-skills gap more pronounced than in cybersecurity.”. Related: Deploying ‘human’ sensors’ According to data gathered by CyberSeek under a Commerce Department grant, there are currently nearly 465,000 unfilled cyber jobs across the US alone.

article thumbnail

What Happened to Facebook, Instagram, & WhatsApp?

Krebs on Security

Facebook and its sister properties Instagram and WhatsApp are suffering from ongoing, global outages. We don’t yet know why this happened, but the how is clear: Earlier this morning, something inside Facebook caused the company to revoke key digital records that tell computers and other Internet-enabled devices how to find these destinations online.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyberattacks Disable IT Networks at 2 Indiana Hospitals

Data Breach Today

Some Patients' Care Previously Postponed Due to COVID-19; What Happens Now? Two Indiana hospitals say their IT systems are disabled as they recover from cyberattacks suffered last week. Both hospitals in recent weeks have had to divert patients or postpone elective procedures as COVID-19 cases surged in the state. So what's the impact of the attacks on patient care?

IT 355
article thumbnail

More Than 90 Percent of Malware in Q2 Came Via Encrypted Traffic: WatchGuard

eSecurity Planet

A surprising 91.5 percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the security risk for the 80 percent of such organizations that lack processes for decrypting and scanning HTTPS traffic for threats. WatchGuard, which sells network security , intelligence and endpoint protection solutions, included that finding in its recently-released Internet Security Report , which is based on data coming in from t

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

New File-Locking Malware With No Known Decryptor Found

Data Breach Today

DSCI: Ransomware Alkhal Likely Spread Via Phishing, Malicious URLs The Data Security Council of India has issued an advisory about newly discovered ransomware Alkhal, which uses a strong encryption tool and has no known decryptor to recover lost data. The ransomware was likely discovered on Oct. 1 by security firms Malwarebytes and Cyclonis.

More Trending

article thumbnail

Facebook, Instagram, WhatsApp Suffer Widespread Outage

Data Breach Today

Social Media Giant Confirms Incident via Twitter; Analysis Suggests DNS Issue Social media giant Facebook experienced a global outage on Monday that also involved its properties - including Instagram, Messenger and WhatsApp. According to Cisco's internet analysis division, ThousandEyes, the tech giant experienced a DNS issue that hindered access to Facebook's tools and apps.

Access 281
article thumbnail

LockBit 2.0 ransomware hit Israeli defense firm E.M.I.T. Aviation Consulting

Security Affairs

Israeli Aerospace & Defense firm E.M.I.T. Aviation Consulting Ltd. was hit by LockBit 2.0 ransomware, operators will leak files on 07 Oct, 2021. LockBit 2.0 ransomware operators hit the Israeli aerospace and defense firm E.M.I.T. Aviation Consulting Ltd, threat actors claim to have stolen data from the company and are threatening to leak them on the dark web leak site of the group in case the company will not pay the ransom.

article thumbnail

Ukraine Busts 2 Suspects Tied to Major Ransomware Group

Data Breach Today

$150 Million in Worldwide Losses Tied to Unnamed Ransomware Operation and Suspects Police in Ukraine have arrested two members of a ransomware operation they say has targeted businesses in North American and Europe, leading to victim losses totaling at least $150 million. The operation also involved French cyber police, the FBI and Interpol, backed by Europol's European Cybercrime Centre.

article thumbnail

Facebook, WhatsApp, and Instagram are down worldwide, it’s panic online

Security Affairs

Users worldwide are experiencing problems while accessing Facebook services, including Instagram and WhatsApp. Users worldwide are not able to access Facebook, Instagram, and WhatsApp services due to a BGP problems. Users attempting to visit the above services are displaying “DNS_PROBE_FINISHED_NXDOMAIN.” The mobile applications of the social network giant and its Tor hidden services are also not working.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ex-Army Contractor Sentenced to 12 Years for Fraud

Data Breach Today

DOJ: Thousands of US Service Members, Veterans Targeted A former U.S. Army contractor has been sentenced to 12 years and seven months in prison and ordered to pay $2,331,639.85 in restitution, for conspiring to commit wire fraud and launder money, targeting thousands of military-affiliated individuals, according to a Department of Justice statement.

Military 154
article thumbnail

Top 5 Skills Modern SOC Teams Need to Succeed

Dark Reading

From basic coding to threat hunting, here are five skills modern SOC teams need to successfully navigate the future of high-scale detection and response.

121
121
article thumbnail

Cryptocurrency Exchange Bug Reveals 'WannaCry 2.0' Clues

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of how a cryptocurrency exchange bug has revealed North Korean monero laundering. Also featured are cyber insurance trends and cybercrime innovation.

Insurance 143
article thumbnail

Two ransomware operators were arrested in Kyiv with EUROPOL’s support

Security Affairs

Two ransomware operators arrested in Kyiv, Ukraine, that are suspected to have attacked more than 100 companies causing more than $150M in damages. A joint international law enforcement operation led to the arrest of the ransomware operators in Kyiv, Ukraine on September 28. The operation was conducted by the Ukrainian National Police, with the support of Europol, the FBI, Interpol, and French Gendarmerie. “On 28 September, a coordinated strike between the French National Gendarmerie (Gend

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Dentons Privacy Community: Data transfers from Asia – key takeaways

Privacy and Cybersecurity Law

Dentons Privacy Community met on September 15, 2021 to discuss how to approach international data transfers in Asia, in particular Singapore, Korea, Hong Kong and China. The session explored the evolving regulatory landscape, the key rules and transfer solutions, and recent legislative developments. Below are the key takeaways. Singapore. In addition to transfer solutions that will be familiar to privacy professionals in Europe, such as contracts and binding corporate rules, data exporters in Si

Privacy 98
article thumbnail

Pottawatomie County paid the ransom to recover its systems

Security Affairs

Pottawatomie County restored operations that were suspended after a ransomware attack hit its systems on September 17, 2021. Officials at Pottawatomie County announced to have fully recovered their IT infrastructure that was hit by a ransomware attack on September 17, 2021. County Administrator Chad Kinsley announced that the county opted to pay the ransomware, they revealed that they have paid less than 10% of the ransomware initially demanded by the ransomware operators.

IT 99
article thumbnail

Leverage Claris integration with Jamf

Jamf

Claris recently announced the general availability of their new purpose-built app created by iSolutions, to address the device, data and document retention requirements mandated by the Federal Communications Commission ECF (Emergency Connectivity Fund) Program.

article thumbnail

Transition Period for Old Standard Contractual Clauses Ends

Hunton Privacy

On September 27, 2021, the transition period allowing companies to continue using the old EU Standard Contractual Clauses (“SCCs”) for new transfers from the EU to a third country ended. Companies entering into new transfer agreements incorporating the SCCs must now use those published by the European Commission on June 4, 2021 (the “new SCCs”). Transfers from the UK that rely on SCCs must continue to use the old SCCs.

GDPR 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

JNUC 2021 is just around the corner

Jamf

October is here. You know what that means. It's almost time for JNUC! From the JNUC Junction to braindates and more find out what JNUC 2021 has in store.

IT 97
article thumbnail

New APT ChamelGang Targets energy and aviation companies in Russia

Security Affairs

ChamelGang APT is a new cyberespionage group that focuses on fuel and energy organizations and aviation industry in Russia. ChamelGang is a new APT group that was first spotted in March by researchers at security firm Positive Technologies, it targets Russian companies in the energy and aviation industry. In March, the cyberespionage group was observed leveraging ProxyShell against targets in 10 countries and used a variety of malware in its campaign.

article thumbnail

Encrypted & Fileless Malware Sees Big Growth

Threatpost

An analysis of second-quarter malware trends shows that threats are becoming stealthier.

article thumbnail

Name That Edge Toon: Mobile Monoliths

Dark Reading

Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

96
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Transnational Fraud Ring Bilks U.S. Military Service Members Out of Millions

Threatpost

A former medical records tech stole PII that was then used to fraudulently claim DoD and VA benefits, particularly targeting disabled veterans.

article thumbnail

Rocket’s Updated Documentation Portal Provides Modernized Experience for Streamlined Searches

Rocket Software

At Rocket, we know our customers are busy working to meet – and exceed – their organization’s IT goals to drive results. When it comes to troubleshooting or learning more about their Rocket solutions, they need to be able to easily search and access the information relevant to their products and interests. These searches need to be specific and instantaneous so that users can conveniently find the content they need, without digging through extraneous files.

Access 75
article thumbnail

Why Facebook, Instagram, and WhatsApp All Went Down Today

WIRED Threat Level

The problem relates to something called BGP routing, and it took down every part of Facebook's business.

IT 98
article thumbnail

Windows 11 Available: What Security Pros Should Know

Dark Reading

Microsoft discusses the security requirements and changes coming to the newest version of its Windows operating system.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Facebook Outage Drags Down Instagram, WhatsApp, Messenger, Oculus VR

Threatpost

They were all flat on their faces for hours on Monday, throwing off DNS error messages or other server-related errors.

article thumbnail

New Atom Silo Ransomware Group Targets Confluence Servers

Dark Reading

An attack that took place over two days used a recently disclosed vulnerability in Atlassian's Confluence collaboration software.

article thumbnail

U.S. Senate Considers Mandating 24-Hour Reporting Requirement for Ransom Payments

Data Protection Report

On September 28, 2021, the U.S. Senate Homeland Security and Governmental Affairs Committee released a draft bill that would, among other things, require nearly all entities that make a ransom payment as the result of a ransomware attack against the entity to report the payment to the Director of the Cybersecurity and Infrastructure Security Agency (CISA), a division of the U.S.