Wed.Nov 11, 2020

article thumbnail

Biden's Cybersecurity Mission: Regain Momentum

Data Breach Today

Experts Say Cybersecurity Will Be a Higher Priority Cybersecurity is poised to become a higher White House priority when President-elect Joe Biden takes office. And he's expected to renew key international relationships needed in the fight against cyberattacks.

article thumbnail

SHARED INTEL: Coming very soon — ‘passwordless authentication’ as a de facto security practice

The Last Watchdog

As a tradeoff for enjoying our digital lives, we’ve learned to live with password overload and even tolerate two-factor authentication. But now, at long last, we’re on the brink of eliminating passwords altogether, once and for all. Related: CEOs quit Tweeting to protect their companies A confluence of technical and social developments points to username-and-password logons becoming obsolete over the next few years.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Banking Trojan Can Spy on Over 150 Financial Apps

Data Breach Today

Kaspersky: Ghimob Malware Started in Brazil But Is Spreading A recently uncovered banking Trojan targeting Android devices can spy on over 150 apps, including those of banks, cryptocurrency exchanges and fintech firms, as a way to gather credentials and other data, according to an analysis by security firm Kaspersky.

Security 356
article thumbnail

9 New Tactics to Spread Security Awareness

Dark Reading

Employees are often your first line of security defense when the bad guys come calling -- providing your workers are properly trained. Security leaders share how they're raising awareness.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

IRS Domain Spoofed in Fraud Campaign

Data Breach Today

Researchers Say Scammers Use Social Engineering Strategies A recently uncovered phishing campaign is using a spoofed U.S. Internal Revenue Service domain and social engineering techniques in an attempt to trick targeted victims into sending money to fraudsters, according to researchers at Abnormal Security.

Phishing 313

More Trending

article thumbnail

Phishing Campaign Tied to Trickbot Gang

Data Breach Today

Area 1 Security: Emails Deliver Bazar Backdoor and Buer Loader Researchers at Area 1 Security say a recently uncovered phishing campaign using a message saying that the recipient has been fired from their job is attempting to plant two malware strains - Bazar and Buer - using the Trickbot botnet.

Phishing 261
article thumbnail

We Secured the Election. Now How Do We Secure Trust in Results?

Dark Reading

Disinformation campaigns are now designed not only to influence how voters fill out their ballots, but also how confident they are in the entire process. How do legislators, media organizations, security professionals, and voters respond?

Security 126
article thumbnail

Breach Lawsuit Spotlights Complex Vendor Issues

Data Breach Today

Medical Device Maker Sues a Subcontractor After Misconfiguration Incident A medical device maker has sued an IT vendor in the wake of an email server migration mishap that exposed the health data of more than 277,000 individuals. The case illustrates the complexities of vendor risk management - especially after mergers and acquisitions.

Risk 242
article thumbnail

Ragnar Locker ransomware gang advertises Campari hack on Facebook

Security Affairs

?Ragnar Locker Ransomware operators have started to run Facebook advertisements to force their victims into paying the ransom. In November 2019, ransomware operators have started adopting a new double-extortion strategy first used by the Maze gang that sees threat actors also stealing unencrypted files before encrypting infected systems. Then the attackers threaten to release the stolen files if a ransom is not paid.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analysis: Threat Landscape Report

Data Breach Today

Louis Marinos of the European Cybersecurity Agency offers an analysis of the agency's new Threat Landscape 2020 report, which shows how cybercriminals have been advancing their capabilities, adapting quickly and targeting victims.

article thumbnail

The alleged decompiled source code of Cobalt Strike toolkit leaked online

Security Affairs

The alleged decompiled source code for the Cobalt Strike post-exploitation toolkit has been leaked online in a GitHub repository. The decompiled source code for the Cobalt Strike post-exploitation toolkit has allegedly been leaked online in a GitHub repository. Source Bleeping Computer. Cobalt Strike is a legitimate penetration testing toolkit and threat emulation software that allows attackers to deploy payloads, dubbed “beacons,” on compromised devices to remotely create shells, ex

IT 121
article thumbnail

The Security Failures of Online Exam Proctoring

Schneier on Security

Proctoring an online exam is hard. It’s hard to be sure that the student isn’t cheating, maybe by having reference materials at hand, or maybe by substituting someone else to take the exam for them. There are a variety of companies that provide online proctoring services, but they’re uniformly mediocre : The remote proctoring industry offers a range of services, from basic video links that allow another human to observe students as they take exams to algorithmic tools that use

article thumbnail

Former Microsoft worker sentenced to nine years in prison for stealing $10+ million

Security Affairs

A former Microsoft worker was sentenced to nine years in prison for a scheme to steal $10 million in digital currency. Volodymyr Kvashuk (26), a former Microsoft software engineer, was sentenced this week to nine years in prison for a scheme to steal $10 million in digital currency. Kvashuk is a Ukrainian citizen living in Renton, Washngton, was responsible for helping test Microsoft’s online retail sales platform.

Retail 103
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NSF-Funded Research Aims to Help Disrupt Cybercrime Supply Chains

Dark Reading

The National Science Foundation awarded a grant to Georgia State University (GSU) to come up with innovative ways to thwart the supply chains for counterfeiting, loan- and unemployment fraud.

103
103
article thumbnail

Microsoft Patch Tuesday fixes CVE-2020-17087 currently under active exploitation

Security Affairs

Microsoft Patch Tuesday updates for November 2020 address 112 flaws, including a Windows bug that was chained with Chrome issues in attacks. Microsoft Patch Tuesday updates for November 2020 address 112 vulnerabilities in multiple products, including Microsoft Windows, Office and Office Services and Web Apps, Internet Explorer (IE), Edge (EdgeHTML-based and Chromium-based), ChakraCore, Exchange Server, Microsoft Dynamics, Azure Sphere, Windows Defender, Microsoft Teams, and Visual Studio.

Libraries 102
article thumbnail

Nvidia Warns Windows Gamers of GeForce NOW Flaw

Threatpost

Both Nvidia and Intel faced severe security issues this week - including a high-severity bug in Nvidia's GeForce NOW.

Security 121
article thumbnail

EU bodies agree on new EU export rules for dual-use technology

Security Affairs

The European Union this week agreed to tighten up rules for the sale and export of dual-use technology. European Parliament votes to tighten up rules for the sale and export of surveillance and encryption technology. EU lawmakers and the European Council aim to update controls for the sale of dual-use solutions such as surveillance spyware, facial recognition systems and drones to prevent authoritarian government abusing them for censorship and to persecute political opponents and dissidents vio

Sales 101
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

COVID-19 Data-Sharing App Leaked Healthcare Worker Info

Threatpost

Philippines COVID-KAYA app allowed for unauthorized access typically protected by ‘superuser’ credentials and also may have exposed patient data.

Access 104
article thumbnail

Google and Mozilla fixed issues exploited at 2020 Tianfu Cup hacking contest

Security Affairs

Mozilla and Google have already fixed the critical flaws in Firefox and Chrome exploited by bug bounty hunters at 2020 Tianfu Cup hacking contest. Mozilla and Google have already addressed the critical Firefox and Chrome vulnerabilities that were recently exploited by white hat hackers at the 2020 Tianfu Cup hacking contest. The vulnerability in Chrome exploited by hackers at the 2020 Tianfu Cup, tracked as CVE-2020-16016, is an inappropriate implementation issue that resided in the base compo

article thumbnail

Want to Avoid an Extreme Cyberloss? Focus on the Basics

Dark Reading

New analysis of attacks and breaches -- to the tune of more than $20 million in damages and losses of at least 20 million records -- underscores the importance of planning for these events.

125
125
article thumbnail

Silver Peak SD-WAN Bugs Allow for Network Takeover

Threatpost

Three security vulnerabilities can be chained to enable unauthenticated remote code execution.

Security 124
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Avoid Getting Killed by Ransomware

Dark Reading

Using a series of processes, infosec pros can then tap automated data hygiene to find and fix files that attackers key in on.

article thumbnail

Ragnar Locker Ransomware Gang Takes Out Facebook Ads in Key New Tactic

Threatpost

Following a Nov. 3 ransomware attack against Campari, Ragnar Locker group took out public Facebook ads threatening to release stolen data.

article thumbnail

Security Hiring Plans Remain Constant Despite Pandemic

Dark Reading

Although we saw workforce gains this year, 56% of businesses surveyed report staff shortages are putting their organization at risk.

Security 106
article thumbnail

High-Severity Cisco DoS Flaw Can Immobilize ASR Routers

Threatpost

The flaw stems from an issue with the ingress packet processing function of Cisco IOS XR software.

Security 103
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

WhatsApp Using Up Your Phone Storage? Here’s How to Fix It

WIRED Threat Level

It's time to do something about those photos and videos automatically saving to your camera roll.

IT 101
article thumbnail

3 Tips For Successfully Running Tech Outside the IT Department

Dark Reading

When marketing opts for "extra-departmental IT," coordination and communication are required to keep things secured.

IT 98
article thumbnail

Minecraft Apps on Google Play Fleece Players Out of Big Money

Threatpost

Seven mobile apps for Android sneakily charge fans of Minecraft and Roblox hundreds of dollars per month.