Wed.Sep 28, 2022

article thumbnail

WhatsApp fixed critical and high severy vulnerabilities

Security Affairs

WhatsApp has addressed two severe Remote Code Execution vulnerabilities affecting the mobile version of the software. WhatsApp has published three security advisories for 2022, two of which are related to CVE-2021-24042 and CVE-2021-24043 vulnerabilities discovered in January and February, and the third one is related to CVE-2022-36934 and CVE-2022-27492 fixed by the company in September.

article thumbnail

Would-be Software Pirates Served Malware Through 'NullMixer'

Data Breach Today

NullMixer Opens Windows To Dozens of Malicious Files A new malware dropper uncovered by Kaspersky targets would-be users of pirated software with a slew of nasty infections including backdoors, Trojan-Bankers, downloaders, spyware and more. The cybersecurity company calls the dropper "NullMixer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: These advanced phishing tactics should put all businesses on high alert

The Last Watchdog

Phishing attacks are nothing new, but scammers are getting savvier with their tactics. Related: The threat of ‘business logic’ hacks. The Iranian hacker group TA453 has recently been using a technique that creates multiple personas to trick victims , deploying “social proof” to scam people into engaging in a thread. One example comes from Proofpoint, where a researcher began corresponding with an attacker posing as another researcher.

Phishing 124
article thumbnail

Chilean Court System Hit With Ransomware Attack

Data Breach Today

A Raft of Cyber Disruptions Hit the South American Country in September A phishing email led to the spread of the Cryptolocker Trojan inside the court system of Chile, adding to a growing list of cyber disruptions affecting the South American country. Court officials stressed that the virus was contained before it could disrupt judicial proceedings.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How to Advocate for Data Privacy and Users' Rights

WIRED Threat Level

Want to speak up against Big Tech, unjust data collection, and surveillance? Here's how to be an activist in your community and beyond.

More Trending

article thumbnail

New Report on IoT Security

Schneier on Security

The Atlantic Council has published a report on securing the Internet of Things: “Security in the Billions: Toward a Multinational Strategy to Better Secure the IoT Ecosystem.” The report examines the regulatory approaches taken by four countries—the US, the UK, Australia, and Singapore—to secure home, medical, and networking/telecommunications devices.

IoT 112
article thumbnail

FDA Authorization Bill Drops Medical Device Cybersecurity

Data Breach Today

Congress Backs Away From Requiring Manufacturers to Patch Medical Devices A congressional deal will ensure the U.S. Food and Drug Administration can continue collecting fees from medical device manufacturers but at the price of dropping increased cybersecurity mandates for the industry. Requiring manufacturers to patch devices had bipartisan support.

article thumbnail

FTC Releases Report on Dark Patterns

Hunton Privacy

On September 15, 2022, the Federal Trade Commission released a report analyzing “dark patterns,” or “design practices that trick or manipulate users into making choices they would not otherwise have made and that may cause harm.” The report, titled “Bringing Dark Patterns to Light,” highlights dark patterns used across industries and different contexts, such as e-commerce, cookie consent banners, children’s apps and subscription sales.

article thumbnail

California Restricts Sharing Abortion Data With Other States

Data Breach Today

Laws Prohibits the Disclosure of Records for Out-of-State Law Enforcement California Gov. Gavin Newsom on Tuesday signed into law two bills containing privacy protections for information related to reproductive health and abortion, in the wake of the Supreme Court's ruling overturning Roe v. Wade. Other states may follow suit.

Privacy 130
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Fake Emails Purporting to be from UK Energy Regulator

KnowBe4

A phishing campaign is impersonating UK energy regulator Ofgem, according to Action Fraud, the UK’s cybercrime reporting centre.

Phishing 125
article thumbnail

NUVOLA: the new Cloud Security tool

Security Affairs

nuvola is the new open-source cloud security tool to address the privilege escalation in cloud environments. nuvola is the new open source security tool made by the Italian cyber security researcher Edoardo Rosa ( @_notdodo_ ), Security Engineer at Prima Assicurazioni. The tool was released during the RomHack 2022 security conference in Rome. The tool helps the security community to address the complex topic of privilege escalation on cloud environments such as AWS.

Cloud 103
article thumbnail

JNUC 2022 Keynote: tech users love and organizations trust.

Jamf

It’s a Jamf Nation User Conference (JNUC) of firsts: Our first JNUC outside of Minneapolis, Minnesota: our home state. Our first hybrid live/online JNUC. And our first time seeing each other at a live event since the start of the COVID-19 pandemic!

IT 98
article thumbnail

Meta dismantled the largest Russian network since the war in Ukraine began

Security Affairs

Meta dismantled a network of Facebook and Instagram accounts spreading disinformation across European countries. Meta announced to have taken down a huge Russian network of Facebook and Instagram accounts used to spread disinformation published on more than 60 websites impersonating news organizations across Europe. The disinformation operation began in May 2022, the network targeted primarily Germany, France, Italy, Ukraine and the UK, it was spreading fake content related to the war in Ukraine

IT 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

87% of Organizations Rank Cyberattacks as the Number One Threat to Their Business

KnowBe4

New data sheds a shocking light on just how inexperienced organizations are today in addressing cybersecurity needs – and the impact attacks are having on their business.

article thumbnail

North Korea-linked Lazarus continues to target job seekers with macOS malware

Security Affairs

North Korea-linked Lazarus APT group is targeting macOS Users searching for jobs in the cryptocurrency industry. North Korea-linked Lazarus APT group continues to target macOS with a malware campaign using job opportunities as a lure. The attackers aimed at stealing credentials for the victims’ wallets. Last week, SentinelOne researchers discovered a decoy documents advertising positions for the popular cryptocurrency exchange Crypto.com.

article thumbnail

Hurricane Ian Approaching Florida

National Archives Records Express

Hurricane Ian has strengthened as it moves north-northeastward over the northeastern Gulf of Mexico. NOAA is currently reporting that a life-threatening storm surge and hurricane-force winds are increasingly likely along much of the Florida west coast. While the immediate focus is on the Florida west coast – it is important to note that heavy rainfall will spread across central Florida on Wednesday and the Southeast U.S. on Thursday and Friday – likely causing considerable flooding in thes

article thumbnail

Defense firm Elbit Systems of America discloses data breach

Security Affairs

Elbit Systems of America, a subsidiary of defense giant Elbit Systems, disclosed a data breach after Black Basta ransomware gang claimed to have hacked it. In late June, the Black Basta ransomware gang claimed to have hacked Elbit Systems of America, the extortion group added the name of the company to its Tor leak site. Elbit Systems of America, LLC is a U.S.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FBI Helping Australian Authorities Investigate Massive Optus Data Breach: Reports

Dark Reading

Initial reports suggest a basic security error allowed the attacker to access the company's live customer database via an unauthenticated API.

article thumbnail

FBI: Cyber Criminals Will Continue Targeting Healthcare Payment Processors Through Phishing Campaigns and Social Engineering

KnowBe4

Despite the pandemic being largely considered over, a recent Private Industry Notification focused on the Healthcare industry indicates that organizations should remain vigilant.

article thumbnail

Lazarus Lures Aspiring Crypto Pros With Fake Exchange Job Postings

Dark Reading

Previously observed using fake Coinbase jobs, the North Korea-sponsored APT has expanded into using Crypo.com gigs as cover to distribute malware.

97
article thumbnail

Try the New Compliance Audit Readiness Assessment Today for the HIPAA Security Rule

KnowBe4

When it's time to complete a compliance audit of your cybersecurity readiness plan, are you thinking, "Ugh, is it that time again?".

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

7 Metrics to Measure the Effectiveness of Your Security Operations

Dark Reading

SOC metrics will allow stakeholders to track the current state of a program and how it's supporting business objectives.

Security 102
article thumbnail

The Journey Towards Reconciliation: OpenText Navigator Interns Share Their Stories

OpenText Information Management

On Friday, September 30th, Canadians will commemorate Orange Shirt Day and the second National Day for Truth and Reconciliation, honoring the lost children and survivors of residential schools and acknowledging the resulting generational trauma that remains prevalent today. The journey towards reconciliation, however, extends beyond one day and is rooted in action: the act of … The post The Journey Towards Reconciliation: OpenText Navigator Interns Share Their Stories appeared first on Ope

62
article thumbnail

4 Data Security Best Practices You Should Know

Dark Reading

There are numerous strategies to lessen the possibility and effects of a cyberattack, but doing so takes careful planning and targeted action.

article thumbnail

Network security: from reactive alerts to proactive threat hunting

OpenText Information Management

In any security-minded organization, there are three ways to prevent or mitigate threats beyond firewalls, passwords or locks. Imagine defending your network as you would defend a castle. In addition to walls, a gate, and a moat, you have: Threat detection: That’s the guards on watch, who keep an eye on suspicious activity.Threat response: Those … The post Network security: from reactive alerts to proactive threat hunting appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Adversaries Continue Cyberattacks with Greater Precision and Innovative Attack Methods According to NETSCOUT Report

Dark Reading

TCP-based, DNS water-torture, and carpet-bombing attacks dominate the DDoS threat landscape, while Ireland, India, Taiwan, and Finland are battered by DDoS attacks resulting from the Russia/Ukraine war.

71
article thumbnail

Affix cyber resilience to your Managed Services

OpenText Information Management

Managed Service Providers (MSPs) are a major target for cyber attacks and should consider adding Managed Detection and Response (MDR) for cyber resilience. Research shows a significant increase since 2020, with the frequency of attacks rising by 67%. In August 2022, the UK National Health Services (NHS) was impacted by an attack on its key … The post Affix cyber resilience to your Managed Services appeared first on OpenText Blogs.

IT 62
article thumbnail

BlackCat/ALPHV Gang Adds Wiper Functionality as Ransomware Tactic

Dark Reading

Using its "Exmatter" tool to corrupt rather than encrypt files signals a new direction for financially motivated cybercrime activity, researchers say.