Fri.Mar 12, 2021

article thumbnail

DearCry Ransomware Targets Unpatched Exchange Servers

Data Breach Today

On-Premises Exchange Servers May Have Been Hacked Since January, Experts Warn Attackers wielding DearCry - aka DoejoCrypt - ransomware have begun to exploit the serious proxy-logon flaw in unpatched versions of Microsoft Exchange running on premises. The vulnerability is one of four zero-day flaws patched last week by Microsoft, which APT attackers began exploiting in January.

article thumbnail

Metadata Left in Security Agency PDFs

Schneier on Security

Really interesting research : “Exploitation and Sanitization of Hidden Data in PDF Files” Abstract: Organizations publish and share more and more electronic documents like PDF files. Unfortunately, most organizations are unaware that these documents can compromise sensitive information like authors names, details on the information system and architecture.

Metadata 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GAO: CISA Has Many Unfinished Tasks

Data Breach Today

Audit Stresses Need for Better Communication With Companies Although CISA has made significant strides since it was established in 2018, the agency still has important work to do to fulfill its cybersecurity and national security obligations, the GAO finds. This includes better communications with industry partners that share responsibility for critical infrastructure.

article thumbnail

Malspam campaign uses icon files to delivers NanoCore RAT

Security Affairs

Researchers at Trustwave spotted a new malspam campaign that is abusing icon files to trick victims into installing the NanoCore Trojan. Researchers at Trustwave have spoted a new malspam campaign that is abusing icon files to trick victims into executing the NanoCore remote access Trojan. The emails use a. zipx file attachment, a. zipx file is a ZIP archive compressed using the most recent compression methods of the WinZip archiver to provide optimal results.

Archiving 133
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Spear-Phishing Campaign Distributes Nim-Based Malware

Data Breach Today

NimzaLoader Uses Nim Programming Language to Avoid Detection An ongoing spear-phishing campaign by the threat group TA800 is distributing a new malware loader based on the Nim programming language that's designed to help avoid detection, according to the cybersecurity company Proofpoint.

Phishing 300

More Trending

article thumbnail

Microsoft Exchange: At Least 10 APT Groups Exploiting Flaws

Data Breach Today

Some Attacks Predate Microsoft Being Alerted to the Vulnerabilities, ESET Says Serious vulnerabilities in Microsoft Exchange have been exploited by at least 10 APT groups that have been collectively been hitting thousands of companies over the last three months, including prior to when Microsoft was first alerted to the flaws and issued a patch, security researchers warn.

Security 269
article thumbnail

Internet disruption in Russia coincided with the introduction of restrictions

Security Affairs

Experts at the NetBlocks Internet Observatory observed this week a temporary disruption of internet service in Russia due to new restrictions. On Wednesday 10 March 2021, researchers from Network data from the NetBlocks Internet Observatory observed the disruption of internet service provided by the Russian operator Rostelecom. The partial disruption of the service coincided with the announcement of new restrictions by the telecoms watchdog Roskomnadzor.

Access 114
article thumbnail

Debt Collection Firm Reaches Breach Settlement With States

Data Breach Today

AMCA, Which Had Filed for Bankruptcy, Agrees to Bolster Its Security A coalition of 41 state attorneys general has reached a settlement with American Medical Collection Agency in the wake of a 2018 data breach that compromised the data of 21 million individuals and pushed the company to file for bankruptcy.

article thumbnail

Molson Coors Cracks Open a Cyberattack Investigation

Threatpost

The multinational brewing company did not say what type of incident caused a ‘systems outage,’ but it's investigating and working to get networks back online.

IT 114
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Verkada's Camera Debacle Traces to Publicly Exposed Server

Data Breach Today

'Arson Cat' Hacker Tillie Kottmann Says She's Not Worried About Law Enforcement Tales of poorly secured internet-connected cameras come along regularly. But the latest installment seems especially egregious because it involves Verkada, a widely used "surveillance camera as a service" startup, and led to remote hackers being able to spy on customers via their own cameras.

Security 263
article thumbnail

Microsoft Exchange Exploits Pave a Ransomware Path

Threatpost

As attacks double every hour, hackers are exploiting vulnerable Microsoft Exchange servers and installing a new family of ransomware called DearCry.

article thumbnail

Beer Brewer Molson Coors Reports Ongoing Cyber Incident

Data Breach Today

Multiple Systems Impacted, Including Production and Shipping Capabilities The Molson Coors Beverage Co. says it's in the process of responding to a cybersecurity incident that has caused system outages throughout the brewer's manufacturing process. The company did not identify the specific type of attack taking place.

article thumbnail

Weekly Update 234

Troy Hunt

A big, big week with a heap of different things on the boil. Cyber stuff, audio stuff, IoT stuff - it's all there! Sorry about the camera being a little blue at the start, if anyone knows why it's prone to do this I'd love to hear from you. But hey, at least the audio is spot on, hope you enjoy this week's video. References Complying with NIST Password Guidelines in 2021 (a piece from this week's sponsor, intro'd by yours truly) We're rapidly going cashless, but not everybody is happy (there are

Passwords 105
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Analysis: Lessons Learned From Emotet Takedown

Data Breach Today

The latest edition of the ISMG Security Report features cybercrime deterrence lessons learned from the disruption of the Emotet botnet operation. Also featured: An update on attacks tied to Microsoft Exchange flaw exploits; a discussion of the need to update business continuity plans.

Security 170
article thumbnail

Netflix's Password-Sharing Crackdown Has a Silver Lining

WIRED Threat Level

The streaming service is making account owners enter two-factor codes in a limited test. That's … actually not so bad.

Passwords 124
article thumbnail

Gaps Are Opportunities

Information Governance Perspectives

The Gaps are Opportunities strategy is rooted in a meditation on the importance of listening and observation and proves in short order wherever we look, especially in the weakest areas of a business, that there is always room for optimization. The post Gaps Are Opportunities appeared first on Rafael Moscatel.

98
article thumbnail

Dr. Pat Franks announces upcoming retirement from San Jose State University MARA Program

IG Guru

Spotlight on MARA Program Coordinator Dr. Pat Franks. Bidding A Fond Farewell - Our Brilliant, Bubbly Pioneer Is Moving On. The post Dr. Pat Franks announces upcoming retirement from San Jose State University MARA Program appeared first on IG GURU.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A Bird-Feed Seller Beat a Chess Master. Then It Got Ugly

WIRED Threat Level

Twitch and YouTube chess star Levy Rozman has faced over a week of sustained harassment after calling out an alleged cheater.

IT 118
article thumbnail

REvil Group Claims Slew of Ransomware Attacks

Threatpost

The threat group behind the Sodinokibi ransomware claimed to have recently compromised nine organizations.

article thumbnail

Contemplating the Coffee Supply Chain: A Horror Story

Dark Reading

On the bean-to-cup journey, dangers await around every corner. Here, well-caffeinated security experts warn the coffee industry about the threats.

Security 133
article thumbnail

Metamorfo Banking Trojan Abuses AutoHotKey to Avoid Detection

Threatpost

A legitimate binary for creating shortcut keys in Windows is being used to help the malware sneak past defenses, in a rash of new campaigns.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Power Equipment: A New Cybersecurity Frontier

Dark Reading

Power systems, HVAC systems, and other network-connected devices are exposing new vulnerabilities that must be secured.

article thumbnail

Critical Security Hole Can Knock Smart Meters Offline

Threatpost

Unpatched Schneider Electric PowerLogic ION/PM smart meters are open to dangerous attacks.

Security 120
article thumbnail

10,000+ WeLeakInfo customer records leaked

Security Affairs

An actor claimed to have registered one of the domains of WeLeakInfo, accessed details of 10000+ WeLeakInfo’ s customers, and leaked it. WeLeakInfo.com was a data breach notification service that was allowing its customers to verify if their credentials been compromised in data breaches. The service was claiming a database of over 12 billion records from over 10,000 data breaches.

article thumbnail

With Spectre Still Lurking, Google Looks to Protect the Web

WIRED Threat Level

To show how browsers can guard against the speculative execution bug, Google security researchers have shown how an attack would work.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Microsoft Exchange Server Attacks: 9 Lessons for Defenders

Dark Reading

Experts share their guidance for organizations running on-premise Exchange servers in the wake of rapidly spreading attacks.

88
article thumbnail

Europol Credits Sweeping Arrests to Cracked Sky ECC Comms  

Threatpost

Sky ECC claims that cops cracked a fake version of the app being passed off by disgruntled reseller.

article thumbnail

Microsoft Reports 'DearCry' Ransomware Targeting Exchange Servers

Dark Reading

Attackers have begun to deploy ransomware on Microsoft Exchange Servers compromised by the ProxyLogon exploits.