Fri.Aug 06, 2021

article thumbnail

Audit Slams FDIC for Inadequate Mobile Device Security

Data Breach Today

OIG Outlines Shortcomings, Recommends Fixes The FDIC has failed to properly update its policies for mobile device usage, conduct regular control assessments of its mobile device management solution or adequately log and monitor mobile cybersecurity practices, according to a new report from the Office of the Inspector General.

Security 326
article thumbnail

Using “Master Faces” to Bypass Face-Recognition Authenticating Systems

Schneier on Security

Fascinating research: “ Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution.” Abstract: A master face is a face image that passes face-based identity-authentication for a large portion of the population. These faces can be used to impersonate, with a high probability of success, any user, without having access to any user-information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Countering Cyberthreats: 2 Legislative Proposals Introduced

Data Breach Today

One Measure Calls for Sanctions Against Nations Tolerating Ransomware Gangs Two bipartisan bills introduced in Congress this week seek to address cyberthreats. One calls for imposing sanctions against countries that allow ransomware gangs to operate within their borders. Another would require law enforcement agencies to better track cybercrime statistics to identify trends.

article thumbnail

VMware addresses critical flaws in its products

Security Affairs

VMware has addressed a critical vulnerability that affects multiple products that could be exploited to gain access to confidential information. VMware has released security updates to address multiple flaws in its products, including a critical issue that could allow an attacker to access confidential information. A couple of vulnerabilities tracked as CVE-2021-22002 and CVE-2021-22003, impact Workspace One Access (Access), Identity Manager (vIDM), vRealize Automation (vRA), Cloud Foundation, a

IT 134
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ISMG Editors’ Panel: Government Cybersecurity Challenges

Data Breach Today

Also: Dealing With COVID-19 Business Recovery; Zynga Case Goes to Arbitration In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including improving federal agencies' cybersecurity and businesses recovering from the pandemic's impact.

More Trending

article thumbnail

Is Darknet Forum Ransomware Chatter Ban Having an Impact?

Data Breach Today

Report: XSS and Exploit Forum Members Using Workarounds to Violate the Ban The decision by the Russian-speaking darknet forums XSS and Exploit to ban all chatter relating to ransomware attacks has had a limited impact on cyber gangs' ability to communicate, according to the threat intelligence firm Digital Shadows.

article thumbnail

RansomEXX ransomware hit computer manufacturer and distributor GIGABYTE

Security Affairs

Taiwanese manufacturer and distributor of computer hardware GIGABYTE was a victim of the RansomEXX ransomware gang. RansomEXX ransomware gang hit the Taiwanese manufacturer and distributor of computer hardware GIGABYTE and claims to have stolen 112GB of data. At the time of this writing, the leak site of the RansomEXX gang dosn’t include the company name, but BleepingComputer has learned that the attack was conducted by this ransomware gang.

article thumbnail

Analysis: Oh, the Lies Ransomware Operators Tell

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of how ransomware attackers share about their inclinations, motivations and tactics. Also featured: The rise of integrity attacks; dispelling vaccine myths.

article thumbnail

Golang Cryptomining Worm Offers 15% Speed Boost

Threatpost

The latest variants of the Monero-mining malware exploit known web server bugs and add efficiency to the mining process.

Mining 143
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cybersecurity Leadership: Risk in OT and IIoT

Data Breach Today

CEO and CISO Panel Discusses Critical Infrastructure Protection OT, IoT, IIoT – each has critical distinctions, and each is increasingly vital to protecting the world's critical infrastructure from crippling cyber attacks. In a panel discussion, cybersecurity leaders discuss what it takes to get the C-suite's attention to prioritize this new generation of risk.

Risk 144
article thumbnail

UK High Court Dismisses Claims Following DSG Data Breach

Hunton Privacy

On July 30, 2021, the UK High Court handed down its judgment in the case of Warren v DSG Retail Ltd [2021] EWHC 2168 (QB), determining that the claimant could not seek damages on the basis of misuse of personal information, breach of confidence or common law negligence following a data breach. In 2018, DSG Retail Limited (“DSG”) experienced a cyber attack in which hackers infiltrated DSG’s systems and installed malware that ran on point of sale terminals in DSG stores.

article thumbnail

RansomEXX ransomware leaks files stolen from Italian luxury brand Zegna

Security Affairs

RansomEXX ransomware operators hit the popular Italian luxury fashion house Ermenegildo Zegna Holding and started leaking stolen files. Zegna is one of the most famous Italian luxury fashion houses. It was founded in 1910 by Ermenegildo Zegna in Trivero, Biella Province of the Piedmont region of Northern Italy. Ermenegildo Zegna Group is the largest menswear brand in the world by revenue.

article thumbnail

Squid Dog Toy

Schneier on Security

It’s sold out , but the pictures are cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Security 110
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Weekly Update 255

Troy Hunt

I'm back in the office this week and back to decent audio and video quality. There's loads of bits and pieces happening as evidence by almost an entire hour disappearing in this week's vid, ranging from problems with tradies (tradespeople), more lockdown, stats on some projects and then this week's blog post, 3D printing with my 9-year old daughter Elle.

Passwords 107
article thumbnail

Conti Leak Indicators – What to block, in your SOC….

Security Affairs

Security expert provided leak indicators for Conti ransomware operations that were recently disclosed by a disgruntled affiliate. An affiliate of the Conti RaaS has leaked the training material provided by the group to the customers of its RaaS, he also published the info about one of the operators. The Conti Ransomware operators offer their services to their affiliates and maintain 20-30% of each ransom payment.

article thumbnail

Amazon Kindle Vulnerable to Malicious EBooks

Threatpost

Prior to a patch, a serious bug could have allowed attackers to take over Kindles and steal personal data.

article thumbnail

Ivanti fixed a critical code execution issue in Pulse Connect Secure VPN

Security Affairs

Security firm Ivanti addressed a critical vulnerability in its Pulse Connect Secure VPN appliances that could be exploited to execute arbitrary code with root privileges. IT firm Ivanti released security updates to address multiple vulnerabilities in its Pulse Connect Secure VPN appliances. The most severe flaw, tracked as CVE-2021-22937 is a high-severity remote code execution vulnerability that resides in the admin web interface of Pulse Connect Secure.

Security 104
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why Software Education is Important to the Net Promotor Score

Micro Focus

Education. This is not normally a touchpoint along the customer journey that most people think of when describing the main interaction points with a company. However, at Micro Focus we operate a very different Customer Experience model to the industry normal. We statistically analyse which touchpoints along the customer journey provide the greatest impact on.

article thumbnail

ICRM 2022 OPEN BOARD OF REGENT POSITIONS

IG Guru

Active CRMs in good standing are invited to apply for candidacy to a Board of Regents position. CRAs are not eligible to serve on the Board Regents. For more information on terms and time commitment, please click here. President-Elect/Treasurer (2022-2024) The President-Elect/Treasurer is a member of the Executive Committee and serves as custodian of funds, securities, […].

article thumbnail

Critical Cisco Bug in VPN Routers Allows Remote Takeover

Threatpost

Security researchers warned that at least 8,800 vulnerable systems are open to compromise.

Security 136
article thumbnail

Researchers Call for 'CVE' Approach for Cloud Vulnerabilities

Dark Reading

New research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security.

Cloud 126
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Zoom Settlement: An $85M Business Case for Security Investment  

Threatpost

Zoom’s security lesson over end-to-end encryption shows the costs of playing cybersecurity catchup.

Security 119
article thumbnail

FragAttacks Foil 2 Decades of Wireless Security

Dark Reading

Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.

Security 136
article thumbnail

OpenText’s 2021 Corporate Citizenship Report

OpenText Information Management

These past 18 months have made it clear that companies have an opportunity to create positive change, not just for employees and customers, but for our local communities. We are all global citizens. From diversity to human rights and the environment, those who can make a difference, should. We are excited to share our Corporate … The post OpenText’s 2021 Corporate Citizenship Report appeared first on OpenText Blogs.

IT 63