Wed.Jul 07, 2021

article thumbnail

Zero Trust: Two Models for Implementation

Data Breach Today

LafargeHolcim's Manish Dave on Building a Framework Manish Dave, head of IT security and compliance at LafargeHolcim, a multinational company that manufactures building materials, describes two ways to implement the "zero trust" model: User-to-application and workload-to-workload segmentation.

article thumbnail

Microsoft Issues Emergency Patch for Windows Flaw

Krebs on Security

Microsoft on Tuesday issued an emergency software update to quash a security bug that’s been dubbed “ PrintNightmare ,” a critical vulnerability in all supported versions of Windows that is actively being exploited. The fix comes a week ahead of Microsoft’s normal monthly Patch Tuesday release, and follows the publishing of exploit code showing would-be attackers how to leverage the flaw to break into Windows computers.

Security 321
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Healthcare Workers Allege Amazon Alexa Violates Privacy

Data Breach Today

Lawsuit Highlights Virtual Assistant Device Risks Amazon's Alexa virtual assistant device and applications are unlawfully recording and storing highly sensitive and private conversations, including discussions of patient information, that were not meant to be recorded, four healthcare workers allege in a lawsuit seeking class action status.

Privacy 326
article thumbnail

Wiregrass Electric Cooperative hit by a ransomware attack

Security Affairs

Wiregrass Electric Cooperative, a rural Alabama electric cooperative was hit by a ransomware attack. Wiregrass Electric Cooperative, a rural Alabama electric cooperative that serves about 25,000 members, was hit by a ransomware attack. The cyberattack temporarily blocked the customers’ access to their account information, the cooperative is working to restore the impacted system.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Gartner Offers Insights on Migrating to SASE

Data Breach Today

Analyst Nat Smith on the Need for Reorganization As organizations prepare a plan for migrating to the Secure Access Service Edge, or SASE, model, they need to carefully assess the need for reorganization of the networking and security departments, says Nat Smith, senior director, security analyst at Gartner, which coined the SASE term.

Access 318

More Trending

article thumbnail

Kaseya Ransomware Attack: 'It Could Have Been Much Worse'

Data Breach Today

Michael Daniel of Cyber Threat Alliance on Impact of Latest Supply Chain Attack It was stealthy, and it was widespread. But perhaps the Kaseya VSA ransomware attack wasn't quite as effective and damaging as initially feared, says Michael Daniel, President and CEO of the Cyber Threat Alliance. He explains where defenses succeeded.

article thumbnail

WildPressure APT expands operations targeting the macOS platform

Security Affairs

WildPressure APT is targeting industrial organizations in the Middle East since 2019 and was spotted using now a new malware that targets both Windows and macOS. Researchers from Kaspersky have spotted a new malware used by the WildPressure APT group to targets both Windows and macOS systems. The WildPressure was spotted for the first time in August 2019 when researchers detected a never-before-seen malware, dubbed Milum , that had no similarities with other samples analyzed by the experts.

IT 124
article thumbnail

Kaseya Raced to Patch Before Ransomware Disaster

Data Breach Today

Dutch Researchers First Notified Kaseya in April of Vulnerabilities Miami-based software company Kaseya worked in earnest for three months to resolve flaws in its VSA monitoring and management software but ultimately lost the race, Dutch researchers say. A timeline released on Wednesday gives insight into what happened before a devastating mass ransomware attack.

article thumbnail

FTC Settles Children’s Privacy Case Against Online Coloring Book App, Recolor

Hunton Privacy

On July 1, 2021, the Federal Trade Commission settled a complaint brought under the Children’s Online Privacy Protection Act (“COPPA”) against Toronto-based Kuuhuub Inc. and its Finnish subsidiaries Kuu Hubb Oy and Recolor Oy, operators of the online coloring book app, Recolor. The FTC alleged that the app operators violated the COPPA Rule by collecting and disclosing personal information from child users of the app without first notifying their parents or obtaining verifiable parental consent.

Privacy 116
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Kaseya Ransomware Attack: 'This is a Dramatic Escalation'

Data Breach Today

Tom Kellermann of VMware Carbon Black on the Timing, Impact of REvil Strike The Kaseya VSA ransomware attack was discussed exhaustively over the Fourth of July holiday weekend. But there's one big question that hasn’t been answered, says Tom Kellermann, head of cybersecurity strategy at VMware Carbon Black. "Who gave REvil the zero-day?

article thumbnail

European Commission’s New Standard Contractual Clauses: What They Mean for UK Businesses

Hunton Privacy

In an article originally published on Practical Law , and reproduced with the permission of the publishers, Hunton Andrews Kurth London partner Bridget Treacy discusses the European Commission’s long-awaited, and now finalized, standard contractual clauses (“SCCs”) for international transfers of personal data made under the EU General Data Protection Regulation (“GDPR”).

article thumbnail

FIDO Alliance Update: New Guidelines, Standards Enhancements

Data Breach Today

Executive Director Andrew Shikiar Describes Latest Developments The FIDO Alliance, which is developing and promoting authentication standards designed to help reduce reliance on passwords, has unveiled user experience guidelines and new FIDO2 standards enhancements, says Andrew Shikiar, executive director.

article thumbnail

Why I Love (Breaking Into) Your Security Appliances

Threatpost

David "moose" Wolpoff, CTO at Randori, discusses security appliances and VPNs and how attackers only have to "pick one lock" to invade an enterprise through them.

Security 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

5 tips for incident response management success

IT Governance

The threat of cyber security incidents looms over all organisations. There are simply too many things that can go wrong – whether it’s a cyber attack, a technical malfunction or another delay – to assume that operations will always be functional. And when disaster strikes, time is of the essence. The longer it takes to respond, the more likely it is the costs will escalate.

Risk 98
article thumbnail

Critical Sage X3 RCE Bug Allows Full System Takeovers

Threatpost

Security vulnerabilities in the ERP platform could allow attackers to tamper with or sabotage victims' business-critical processes and to intercept data.

Security 105
article thumbnail

Catches of the month: Phishing scams for July 2021

IT Governance

Welcome to July’s review of phishing scams, in which we look at criminals’ latest tactics and provide examples of successful frauds. This month, we delve into the continued success of HMRC scams, look at why healthcare firms need to be particularly careful about the threat of phishing and review a report that analyses how attackers are able to fool people.

article thumbnail

Cloud Cryptomining Swindle in Google Play Rakes in Cash

Threatpost

At least 25 apps have lured in tens of thousands of victims with the promise of helping them cash in on the cryptomining craze.

Cloud 105
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours

Dark Reading

Automation allowed a REvil affiliate to move from exploitation of vulnerable servers to installing ransomware on downstream companies faster than most defenders could react.

article thumbnail

Fake Kaseya VSA Security Update Drops Cobalt Strike

Threatpost

Threat actors are planting Cobalt Strike backdoors by malspamming a bogus Microsoft update along with a SecurityUpdates.exe.

article thumbnail

Flow: How to improve your Agile and Project Management

IG Guru

by Andrew Ysasi July 7th, 2021 Those who chose the life of a project manager are no strangers to challenges, opportunities, success, and learning moments. Agile has been part of many of our lives for at least a decade. Agile changed the project management community making the unknown manageable, especially in the […]. The post Flow: How to improve your Agile and Project Management appeared first on IG GURU.

article thumbnail

MacOS Targeted in WildPressure APT Malware Campaign

Threatpost

Threat actors enlist compromised WordPress websites in campaign targeting macOS users.

111
111
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Are Security Attestations a Necessity for SaaS Businesses?

Dark Reading

Are security attestations becoming business imperatives, or are they merely token additions on the list of regulatory requirements?

article thumbnail

Suspected ‘Dr HeX’ Hacker Busted for 9 Years of Phishing

Threatpost

The unnamed suspect allegedly helped to develop carding and phishing kits with the aim of stealing customers' bank-card data.

article thumbnail

Fake Android Apps Promise Cryptomining Services to Steal Funds

Dark Reading

Researchers discover more than 170 Android apps that advertise cloud cryptocurrency mining services and fail to deliver.

Mining 88
article thumbnail

7 Browser Extensions to Increase Your Work Productivity

OneHub

Thanks to extensions, browsers aren’t just for navigation anymore. Extensions are add-on features that extend the capabilities of your browser. Extensions fall into many categories such as productivity, communication, fun, and security. Onehub was founded on a passion for business productivity, so it should come as no surprise that we love finding new tools to help us get the job done.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Sophos Acquires Capsule8 for Linux Server & Container Security

Dark Reading

The deal was announced the same day ZeroFox bought Dark Web intelligence firm Vigilante as a wave of security M&A continues.

article thumbnail

Hanzo At Legalweek(year) - Tips to Handle Non-traditional Data Sources

Hanzo Learning Center

We're halfway through 2021, and we can plainly see as we emerge from pandemic life, that remote work is here to stay.

52
article thumbnail

Autonomous Security Is Essential if the Edge Is to Scale Properly

Dark Reading

Service demands at the network edge mean customers need to get cost, performance, and security right.

Security 104