Mon.Jan 25, 2021

article thumbnail

Cyber Incident Knocks Construction Firm Palfinger Offline

Data Breach Today

Unknown Attack Has Disrupted the Company's Global IT Infrastructure The Austrian construction equipment manufacturing firm Palfinger AG reports being hit with a cyberattack that has knocked the majority of its worldwide IT infrastructure offline, eliminating its ability to use email and conduct business.

article thumbnail

Q&A: SolarWinds, Mimecast hacks portend intensified third-party, supply-chain compromises

The Last Watchdog

SolarWinds and Mimecast are long-established, well-respected B2B suppliers of essential business software embedded far-and-wide in company networks. Related: Digital certificates destined to play key role in securing DX. Thanks to a couple of milestone hacks disclosed at the close of 2020 and start of 2021, they will forever be associated with putting supply-chain vulnerabilities on the map.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DDoS Attackers Exploit Vulnerable Microsoft RDP Servers

Data Breach Today

Researchers: 33,000 Vulnerable Servers Could Be Used to Amplify Attacks Threat actors are exploiting vulnerable Microsoft Remote Desktop Protocol servers to amplify DDoS attacks, according to a report from Netscout, which offers mitigation advice.

334
334
article thumbnail

Cryptomining DreamBus botnet targets Linux servers

Security Affairs

Zscaler’s research team recently spotted a Linux-based malware family, tracked as DreamBus botnet, targeting Linux servers. Researchers at Zscaler’s ThreatLabZ research team recently analyzed a Linux-based malware family, tracked as DreamBus Botnet, which is a variant of SystemdMiner. The bot is composed of a series of Executable and Linkable Format (ELF) binaries and Unix shell scripts. .

Mining 134
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tesla Sues Former Employee, Alleges IP Theft

Data Breach Today

Company Claims Newly Hired Engineer Downloaded Software Files to Dropbox Tesla has filed a lawsuit against a former employee who the carmaker says stole thousands of confidential software files almost immediately after being hired in December.

310
310

More Trending

article thumbnail

Pediatric Hospital Faces Lawsuit After Blackbaud Breach

Data Breach Today

Case Spotlights Critical Vendor Security Risk Issues A proposed class action lawsuit has been filed against Rady Children's Hospital-San Diego in the wake of data breach resulting from a ransomware attack on Blackbaud, the hospital's cloud-based fundraising software vendor.

article thumbnail

Outgoing FCC Chair Issues Final Security Salvo Against China

Threatpost

Ajit Pai says Chinese telecom companies ‘biggest national security threat’ for regulators in exit interview.

Security 134
article thumbnail

Russian Pleads Guilty to Running Cybercrime Forum

Data Breach Today

Kirill Victorovich Firsov Was Administrator for Deer.io Market A Russian national who served as the administrator for the now-defunct Deer.io online clearinghouse - which sold stolen credentials, hacked servers and criminal services, such as assistance performing hacking activities - has pleaded guilty to a federal charge.

Marketing 273
article thumbnail

Breaking Down Joe Biden’s $10B Cybersecurity ‘Down Payment’

Threatpost

Tom Kellermann, head of cybersecurity strategy for VMware Carbon Black, talks about the top security challenges facing the US government as a new presidential administration steps in.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Automating the SOC: 'Start Small'

Data Breach Today

Nat Smith of Gartner on Applying Technology, Retaining SOC Analysts When deploying automation in their security operations centers, organizations should start with "small and simple things," advises Nat Smith of Gartner, who also offers tips on retaining skilled SOC analysts.

Security 252
article thumbnail

Dutch police arrested two people for the illegal sale of COVID-19 patient data

Security Affairs

Dutch police arrested two individuals for allegedly selling COVID-19 patient data stolen from the Dutch health ministry. Dutch police have arrested two individuals in the country for selling COVID-19 patient data stolen from the national COVID-19. The availability of COVID-19 patient data in the cybercrime underground was spotted by the RTL Nieuws reporter Daniel Verlaan.

Sales 97
article thumbnail

Assessing the SolarWinds Hack's Impact on Fraud

Data Breach Today

Breach Clarity's Al Pascual on the Challenges for Anti-Fraud Teams What impact could the SolarWinds supply chain hack have on fraud trends? Al Pascual of Breach Clarity offers an analysis.

252
252
article thumbnail

Innovation at its finest for Micro Focus IT Operations Management!

Micro Focus

According to Customers, how do we measure how Innovative we are compared with our Competitors? Micro Focus uses double-blind competitive benchmarking in order to gauge how well we are doing against the competition. This strategy means we can understand how we are performing with a high degree of statistical accuracy using a highly repeatable and. View Article.

IT 96
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Comparing Different AI Approaches to Email Security

Dark Reading

Get to know the difference between "supervised" and "unsupervised" machine learning.

Security 133
article thumbnail

Crowley Company Honored with Four 2021 Platinum Modern Library Awards

IG Guru

Frederick, Md. – The Crowley Company (Crowley), a worldwide leader in digitization scanning solutions and services with offices in Frederick, Maryland, San Dimas, California and Basingstoke, UK, is pleased to announce that the firm has been honored with LibraryWorks’ Modern Library (MLA) awards for the seventh consecutive year. Since the award programs’ inception in 2015, Crowley has amassed […].

article thumbnail

2.28M MeetMindful Daters Compromised in Data Breach

Threatpost

The ShinyHunters hacking group offer a raft of information, from location and contact info to dating preferences and bodily descriptions, as a free download.

article thumbnail

Small Security Teams Have Big Security Fears, CISOs Report

Dark Reading

Researchers poll security leaders who are tasked with protecting large organizations but have a small presence and budget.

Security 111
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cisco DNA Center Bug Opens Enterprises to Remote Attack

Threatpost

The high-severity security vulnerability (CVE-2021-1257) allows cross-site request forgery (CSRF) attacks.

Security 112
article thumbnail

Top 3 technology trends for Healthcare in 2021

OpenText Information Management

2020 was the most difficult year in recent history for Healthcare providers. As the different COVID-19 vaccines make their way into the market, we can only hope that we will return to some degree of normalcy by this summer. 2021 will be dominated by several major themes including the increase in remote health, improved personalization and patient engagement, and a significant focus on improved cyber security.

article thumbnail

SonicWall Breach Stems from ‘Probable’ Zero-Days

Threatpost

The security vendor is investigating potential zero-day vulnerabilities in its Secure Mobile Access (SMA) 100 series.

Access 97
article thumbnail

How to Better Secure Your Microsoft 365 Environment

Dark Reading

Security experts offer Microsoft 365 security guidance as more attackers target enterprise cloud environments.

Security 129
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

INSPIRE 20 Podcast: Meet Vandana Verma, Founder of Infosec Girls

Micro Focus

INSPIRE 20 Podcast: Meet Vandana Verma, Founder of Infosec Girls Attracting and recruiting more women into tech has been an on-going challenge for some time. Whilst progress is being made, there is always more that can be done to help address the lack of diversity in STEM (Science, Technology, Engineering & Maths) industries more broadly. View Article.

52
article thumbnail

2020's COVID Accelerated Digitalization Demands Stronger Cybersecurity in 2021

Dark Reading

As critical infrastructure faces increasing and sophisticated attacks, these trends will enable the energy sector to shore up its cybersecurity defenses.

article thumbnail

Physical destruction of data storage – Things to consider

Architect Security

I was asked recently to provide some thoughts on physical data destruction for an article David Spark ( CISOseries.com, Twitter: @dspark , LinkedIn) was working on. Here are my complete musings on the subject: The initial step when considering data destruction is basically the same first step in data protection: Take time to understand what kind of data you’re working with.

Risk 40
article thumbnail

SonicWall Is Latest Security Vendor to Disclose Cyberattack

Dark Reading

The network security firm is investigating a coordinated campaign in which attackers exploited vulnerabilities in SonicWall's products.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Podcast on Using Games

Adam Shostack

It would be trite writing to say it was fun to be on a podcast with Volko Ruhnke and Hadas Cassorla to talk about using games to teach. And while it was, it was really educational and inspirational. I learned from both of them, and I hope you enjoy the podcast as well! Volko Ruhnke, Adam Shostack and Hadas Cassorla – Building Games to Teach Real-World Security.

article thumbnail

Claroty Discloses Multiple Critical Vulns in Vendor Implementations of Key OT Protocol

Dark Reading

Flaws allow denial-of-service attacks and other malicious activity, vendor says.

127
127
article thumbnail

Creating a LaMetric App with Cloudflare Workers and KV

Troy Hunt

I had this idea out of nowhere the other day that I should have a visual display somewhere in my office showing how many active Have I Been Pwned (HIBP) subscribers I presently have. Why? I'm not sure exactly, it just seemed like a good idea at the time. Perhaps in this era of remoteness I just wanted something a little more. present. More tangible than occasionally running a SQL query.

Mining 106