Fri.Mar 18, 2022

article thumbnail

Russia Says It's Seen 'Unprecedented' Level of Cyberattacks

Data Breach Today

Also: Anonymous Continues Its Cyberwar Against the Russian Government As the Ukrainian military resists Russian advances toward its major population centers, its IT security teams are contending with record cyber incidents - although the same is true of their eastern neighbors, with Russia reporting "unprecedented" cyberattacks on its networks.

IT 261
article thumbnail

Caketap, a new Unix rootkit used to siphon ATM banking data

Security Affairs

Experts spotted a new Unix rootkit, called Caketap, that was used to steal ATM banking data. Mandiant researchers discovered a new Unix rootkit named Caketap, which is used to steal ATM banking data, while investigating the activity of the LightBasin cybercrime group (aka UNC1945 ). The China-linked hacking group has been active since at least 2016, according to the CrowdStrike researchers it is using a very sophisticated toolset.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia May Have Caused Widespread Satellite Network Outage

Data Breach Today

Feds Issue Satellite Network Security Alert; Viasat Saw 'Deliberate' Cyberattack If Russia uses hack attacks to support its invasion, would Western governments want to immediately attribute those attacks or disruptions? Enter a Thursday alert from the U.S. government warning that it is "aware of possible threats to U.S. and international satellite communication networks.

article thumbnail

Google to Launch Google Analytics 4 in an Attempt to Address EU Privacy Concerns

Hunton Privacy

On March 16, 2022, Google announced the launch of its new analytics solution, “Google Analytics 4.” Google Analytics 4 aims, among other things, to address recent developments in the EU regarding the use of analytics cookies and data transfers resulting from such use. Background. On August 17, 2020, the non-governmental organization None of Your Business (“NOYB”) filed 101 identical complaints with 30 European Economic Area data protection authorities (“DPAs”) regarding the use of Google Analyti

Analytics 118
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

HHS: Health Sector Should Prepare for Ukraine-Russia Threats

Data Breach Today

Advises Entities to Ready Weekslong Continuity, Resilience Plans Federal authorities are advising healthcare sector entities to take precautions, including enhancing their cybersecurity posture and being prepared to implement four- to six-week business continuity plans, as they continue to face potential cyber incidents related to the Ukraine-Russia war.

More Trending

article thumbnail

Recognize the Threats, Part 2 - Book Excerpt

Data Breach Today

Part 2 of a Chapter of the New Book "Heuristic Risk Management" by Michael Lines Michael Lines is working with ISMG to promote awareness of the need for cyber risk management. As a part of that initiative, CyberEdBoard posts draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This chapter is "Recognize the Threats.

Risk 242
article thumbnail

Written IT Security Policies: Why You Need Them & How to Create Them

eSecurity Planet

Many security professionals think that if they have done the hard work of securing their organization, that should be enough. There is, however, a next step: Documenting policies. Even though drafting IT security policies can be a pain, formal policies provide a valuable resource to protect both the IT team and their organization. In this article, we’ll briefly touch on what policies are; tips for writing them; and the advantages policies provide for compliance, transitions, and IT team liabilit

IT 114
article thumbnail

EDPB Adopts Guidelines on Codes of Conduct as Tools for Transfers

Hunton Privacy

On February 22, 2022, the European Data Protection Board (the “EDPB”) adopted its final Guidelines 04/2021 on Codes of Conduct as tools for transfers (the “Guidelines”), following a public consultation that took place in 2021. Articles 46 of the EU General Data Protection Regulation ( the “GDPR”) provides that data controllers and processors must put in place appropriate safeguards when transferring personal data to third countries, including codes of conduct.

GDPR 111
article thumbnail

Agencies Warn on Satellite Hacks & GPS Jamming Affecting Airplanes, Critical Infrastructure

Threatpost

The Russian invasion of Ukraine has coincided with the jamming of airplane navigation systems and hacks on the SATCOM networks that empower critical infrastructure.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Why Vaccine Cards Are So Easily Forged

Schneier on Security

My proof of COVID-19 vaccination is recorded on an easy-to-forge paper card. With little trouble, I could print a blank form, fill it out, and snap a photo. Small imperfections wouldn’t pose any problem; you can’t see whether the paper’s weight is right in a digital image. When I fly internationally, I have to show a negative COVID-19 test result. That, too, would be easy to fake.

Paper 104
article thumbnail

Red TIM Research (RTR) team discovers a bug on Ericsson Network Manager

Security Affairs

TIM Red Team Research (RTR) researchers discovered a new flaw on Ericsson Network Manager, aka Ericsson flagship network product. TIM Red Team Research (RTR) team discovered a new vulnerability affecting Ericsson Network Manager, which is known as Ericsson flagship network product. Ericsson Network Manager and network OSS. As mentioned, we’re talking about an Ericsson flagship network product, it enables mobile radio network management, and their related evolutions , ensuring the conventional ou

Access 99
article thumbnail

Conti Leaks Reveal the Ransomware Group's Links to Russia

WIRED Threat Level

Members of the Conti ransomware group may act in Russia’s interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.

article thumbnail

China-linked threat actors are targeting the government of Ukraine

Security Affairs

Google’s TAG team revealed that China-linked APT groups are targeting Ukraine’s government for intelligence purposes. Google’s Threat Analysis Group (TAG) researchers uncovered cyberespionage operations conducted by the Chinese People’s Liberation Army (PLA) and other China-linked APT groups and that targeted Ukraine’s government to gather info on the ongoing conflict.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Gaming & Cybercrime

Record Nations

At Record Nations, we write pretty extensively on the subjects of identity theft & cybercrime. In the past we’ve covered everything from ransomware to social engineering attacks. After speaking with an expert recently, we were made aware of a new trend in cybercrime that you may not even be aware of. Gaming platforms as a […]. The post Gaming & Cybercrime appeared first on Record Nations.

article thumbnail

Russia-linked Cyclops Blink botnet targeting ASUS routers

Security Affairs

The recently discovered Cyclops Blink botnet, which is believed to be a replacement for the VPNFilter botnet, is now targeting the ASUS routers. The recently discovered Cyclops Blink botnet is now targeting the ASUS routers, reports Trend Micro researchers. The Cyclops Blink malware has been active since at least June 2019, it targets WatchGuard Firebox and other Small Office/Home Office (SOHO) network devices.

IoT 94
article thumbnail

Looking to improve HR content management???? 

OpenText Information Management

When it comes to connecting everything that matters, different lines of business (LOBs) must identify the challenges within their unique and often complex processes. These unique LOB processes and their challenges drive the type of connections or integrations needed to improve process efficiency and employee experiences. HR departments are a perfect example.

article thumbnail

Code-Sabotage Incident in Protest of Ukraine War Exposed Open Source Risks

Dark Reading

The maintainer of a widely used npm module served up an unwelcome surprise for developers.

Risk 124
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Convenient and Compliant Disposal for Media and Hard Drives via Vital Records Control

IG Guru

Check out the post here. The post Convenient and Compliant Disposal for Media and Hard Drives via Vital Records Control appeared first on IG GURU.

article thumbnail

Security Teams Struggle to Get Started With Zero Trust

Dark Reading

Nearly a third of respondents in a Dark Reading survey on endpoint security strategy say zero trust is too confusing to implement.

Security 102
article thumbnail

Google Blows Lid Off Conti, Diavol Ransomware Access-Broker Ops

Threatpost

Researchers have exposed the work of Exotic Lily, a full-time cybercriminal initial-access group that uses phishing to infiltrate organizations’ networks for further malicious activity.

Access 73
article thumbnail

The Road Ahead for Cyber and Infrastructure Security

Dark Reading

Despite cost, it's time to focus on securing legacy systems and physical infrastructure along with digital systems.

Security 103
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

DarkHotel APT Targets Wynn, Macao Hotels to Rip Off Guest Data

Threatpost

A DarkHotel phishing campaign breached luxe hotel networks, including Wynn Palace and the Grand Coloane Resort in Macao, a new report says.

article thumbnail

3 ways DAM can improve infrastructure investment projects

OpenText Information Management

If your government agency is gearing up to start or resume construction on public projects, you’re likely focused on permitting, environmental and safety improvements, and numerous other project details. In order to manage all these moving parts efficiently in the current approval landscape, agencies need the right technology stack. From one lens, the technology and … The post 3 ways DAM can improve infrastructure investment projects appeared first on OpenText Blogs.

article thumbnail

Sandworm APT Hunts for ASUS Routers with Cyclops Blink Botnet

Threatpost

The Russian-speaking APT behind the NotPetya attacks and the Ukrainian power grid takedown could be setting up for additional sinister attacks, researchers said.

IoT 73
article thumbnail

CyCognito Launches Exploit Intelligence

Dark Reading

Risk intelligence solution provides insight, visibility, and guidance to identify, prioritize, and remediate vulnerabilities like Log4j

Risk 74
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Fujitsu Introduces New Image Processing Technology on fi-8000 Series Scanners

Info Source

On February 15th Fujitsu Computer Products of America announced the introduction of a new series of digital scanners, the fi-8000, incorporating new “Clear Image Capture” image processing. The technology is designed to reproduce truer colors than traditional CIS (Contact Image Sensor) camera technology, and eliminate color shift that can create fuzzy edges, and address different focal depth points created by crumpled or uneven documents, such as passports.

article thumbnail

A Chance to Raise Shields Right

Dark Reading

CISA's "Shields Up" alert provides urgency — and opportunity — for supply chain conversations.

88
article thumbnail

Fujitsu Introduces New Image Processing Technology on fi-8000 Series Scanners

Info Source

On February 15th Fujitsu Computer Products of America announced the introduction of a new series of digital scanners, the fi-8000, incorporating new “Clear Image Capture” image processing. The technology is designed to reproduce truer colors than traditional CIS (Contact Image Sensor) camera technology, and eliminate color shift that can create fuzzy edges, and address different focal depth points created by crumpled or uneven documents, such as passports.