Tue.Aug 23, 2022

article thumbnail

4 Compliance Best Practices for Corporate Marketing Teams

Hanzo Learning Center

If your digital marketing efforts span the entire internet, from your corporate website to social media channels, and involve dynamic, interactive, or personalized content, you need to ensure that your web archiving capabilities can keep up. This requires good communication across all stakeholders, including marketing, web development, IT, legal, and compliance departments.

article thumbnail

Hospitals in U.S., France Dealing With Cyber Extortionists

Data Breach Today

Texas Hospital Still Being Pressured, While French Hospital Responds to Ransomware A Texas-based hospital is apparently still contending with pressure to pay an extortion group that claims to have stolen patient data months ago, while a French medical center responds to a weekend attack and demands to pay a $10 million ransom.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Much Cyber Liability Insurance Do You Need?

IT Governance

Cyber liability insurance helps organisations cover the financial costs of a data breach. It’s essential for any business that wishes to adequately prepare for disruptive incidents. Without insurance, organisations spend £3.6 million on average recovering from security incidents. That includes the costs associated with incident detection, notifying affected individuals and remediation.

Insurance 122
article thumbnail

How Criminals Are Weaponizing Leaked Ransomware Data

Data Breach Today

Accenture's Robert Boyce Advises Firms to Update Monitoring and Approval Processes Accenture analyzed the top 20 most active ransomware leak sites to see how threat actors are posting sensitive corporate information and making the data easy to search and exploit. Accenture's Robert Boyce explains how cybercriminals are weaponizing stolen ransomware data for follow-up attacks.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Best Open-Source Distributions for Pentesting and Forensics

eSecurity Planet

Linux has an extensive range of open-source distributions that pentesters, ethical hackers and network defenders can use in their work, whether for pentesting , digital forensics or other cybersecurity uses. Also known as “distros,” these distributions are variations of Linux that include the Linux kernel and usually a specific package manager. For example, Kali Linux, one of the most popular pentesting OSs, is Debian-based, which means it’s based on the Debian Project.

More Trending

article thumbnail

Over 80,000 Hikvision cameras can be easily hacked

Security Affairs

Experts warn that over 80,000 Hikvision cameras are vulnerable to a critical command injection vulnerability. Security researchers from CYFIRMA have discovered over 80,000 Hikvision cameras affected by a critical command injection vulnerability tracked as CVE-2021-36260. The Chinese vendor addressed the issue in September 2021, but tens of thousands of devices are yet to be patched.

Risk 109
article thumbnail

Twitter's Ex-Security Chief Files Whistleblower Complaint

Data Breach Today

Peiter Zatko Alleges 'Extreme, Egregious Deficiencies' in Twitter's Security Twitter's former security chief, Peiter Zatko, aka "Mudge," filed a whistleblowing complaint against the social media giant with the U.S. Securities and Exchange Commission, alleging that "extreme, egregious deficiencies" in its cybersecurity remain unresolved.

Security 256
article thumbnail

Vishing is a Rising Threat to the Enterprise

KnowBe4

Most of us are all too familiar with vishing, the scam voice calls that offer to erase your credit card debt, to extend your automobile warranty, to get you to donate to that worthy cause you’ve probably never heard of, to qualify for insurance you never knew you could qualify for, and so one. They’re a tiresome version of the old snake-oil come-on to a con game, and everyone would like to think they’re immune.

Insurance 103
article thumbnail

Karma Calling: LockBit Disrupted After Leaking Entrust Files

Data Breach Today

Ransomware Group's Site Hit by Days-Long Distributed-Denial-of-Service Attack Ransomware karma: The notorious LockBit 3.0 ransomware gang's site has been disrupted via a days-long distributed-denial-of-service attack, with administrator LockBitSupp reporting that it appears to be retribution for the gang leaking files stolen from a recent victim: security firm Entrust.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Mudge Blows Whistle on Alleged Twitter Security Nightmare

Dark Reading

Lawmakers and cybersecurity insiders are reacting to a bombshell report from former Twitter security head Mudge Zatko, alleging reckless security lapses that could be exploited by foreign adversaries.

article thumbnail

Vulnereable Hikvision cameras exposed online

Data Breach Today

Cyfirma Finds 80,000 Unpatched Chinese-made Cameras in Online Sweep An online search by cybersecurity firm Cyfirma found more than 80,000 unpatched cameras made by Hangzhou Hikvision Digital Technology Co. Attackers could exploit the vulnerability to add the cameras to a botnet or as a launching point for lateral movement deeper into the camera operator's network.

article thumbnail

Microsoft publicly discloses details on critical ChromeOS flaw

Security Affairs

Microsoft shared technical details of a critical ChromeOS flaw that could be exploited to trigger a DoS condition or for remote code execution. Microsoft shared details of a critical ChromeOS vulnerability tracked as CVE-2022-2587 (CVSS score of 9.8). The flaw is an out-of-bounds write issue in OS Audio Server that could be exploited to trigger a DoS condition or, under specific circumstances, to achieve remote code execution. “Microsoft discovered a memory corruption vulnerability in a Ch

article thumbnail

Obsidian's Hasan Imam on Spotting SaaS App Vulnerabilities

Data Breach Today

Obsidian Security has in recent months invested in giving enterprises more visibility into how their SaaS applications are talking to other SaaS applications so that supply chain compromise can be more easily detected and thwarted, according to CEO Hasan Imam.

Security 242
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Counterfeit versions of popular mobile devices target WhatsApp and WhatsApp Business

Security Affairs

Experts found backdoors in budget Android device models designed to target WhatsApp and WhatsApp Business messaging apps. Researchers from Doctor Web discovered backdoors in the system partition of budget Android device models that are counterfeit versions of famous brand-name models. The malware targets WhatsApp and WhatsApp Business messaging apps and can allow attackers to conduct multiple malicious activities. “Among them is the interception of chats and the theft of the confidential i

article thumbnail

Charming Kitten APT Wields New Scraper to Steal Email Inboxes

Dark Reading

Google researchers say the nation-state hacking team is now employing a data-theft tool that targets Gmail, Yahoo, and Microsoft Outlook accounts using previously acquired credentials.

86
article thumbnail

CISA adds Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog

Security Affairs

US Cybersecurity and Infrastructure Security Agency (CISA) added a flaw, tracked as CVE-2022-0028 , affecting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw impacting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog , based on evidence of active exploitation.

IT 85
article thumbnail

Meta Takes Offensive Posture With Privacy Red Team

Dark Reading

Engineering manager Scott Tenaglia describes how Meta extended the security red team model to aggressively protect data privacy.

Privacy 99
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Most Damning Allegation in the Twitter Whistleblower’s Report

WIRED Threat Level

Peiter “Mudge” Zatko’s claims about the company’s lax security are all bad. But one clearly captures the extent of systemic issues.

article thumbnail

Signal Phone Numbers Exposed in Twilio Hack

Schneier on Security

Twilio was hacked earlier this month, and the phone numbers of 1,900 Signal users were exposed : Here’s what our users need to know: All users can rest assured that their message history, contact lists, profile information, whom they’d blocked, and other personal data remain private and secure and were not affected. For about 1,900 users, an attacker could have attempted to re-register their number to another device or learned that their number was registered to Signal.

article thumbnail

Thoma Bravo Buying Spree Highlights Hot Investor Interest in IAM Market

Dark Reading

M&A activity in the identity and access management (IAM) space has continued at a steady clip so far this year.

article thumbnail

GitLab fixed a critical Remote Code Execution (RCE) bug in CE and EE releases

Security Affairs

DevOps platform GitLab fixed a critical remote code execution flaw in its GitLab Community Edition (CE) and Enterprise Edition (EE) releases. DevOps platform GitLab has released security updates to fix a critical remote code execution vulnerability, tracked as CVE-2022-2884 (CVSS 9.9), affecting its GitLab Community Edition (CE) and Enterprise Edition (EE) releases.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Novant Health Notifies Patients of Potential Data Privacy Incident

Dark Reading

Patients face possible disclosure of protected health information (PHI) to Meta, Facebook's parent company, resulting from an incorrect configuration of an online tracking tool.

article thumbnail

Firewall Bug Under Active Attack Triggers CISA Warning

Threatpost

CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.

Security 101
article thumbnail

Best practice when working with Azure AD

Jamf

Mark Morowczynski and Michael Epping, product managers in the Azure AD product group at Microsoft, use their customer experience to shed light on what customers can do to drive both security and usability improvements on macOS in relation to Microsoft 365 and Azure AD.

article thumbnail

Simplify your solution building with APIs at OpenText World 2022

OpenText Information Management

Building, connecting, and extending applications that leverage the power of APIs has become the key to success for Developers all over the world. The OpenText™ Developer Cloud provides developers with a new way to build solutions and speed end-to-end processes using our cloud services. During the Developer Summit at OpenText™ World 2022 in Las Vegas, … The post Simplify your solution building with APIs at OpenText World 2022 appeared first on OpenText Blogs.

Cloud 64
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

DevSecOps Gains Traction — but Security Still Lags

Dark Reading

Almost half of teams develop and deploy software using a DevSecOps approach, but security remains the top area of investment, a survey finds.

article thumbnail

How Hive becomes one of the most dangerous ransomware group

Outpost24

How Hive becomes one of the most dangerous ransomware group. 25.Aug.2022. Florian Barre. Tue, 08/23/2022 - 08:58. Jose Miguel Esparza, Head of Threat Intelligence. Threat Intelligence. Teaser. The Hive Gang is a Ransomware as a Service (RaaS) providers first identified in June 2021. Although relatively new, their aggressive tactics and ever evolving malware variants have made them one of the most successful RaaS groups of its kind.

article thumbnail

Apathy is Your Company's Biggest Cybersecurity Vulnerability — Here's How to Combat It

Dark Reading

Make security training more engaging to build a strong cybersecurity culture. Here are four steps security and IT leaders can take to avoid the security disconnect.