Fri.Sep 10, 2021

article thumbnail

United Nations Says Intruders Breached Its Systems

Data Breach Today

Threat Actors Offered Credentials for UN's ERP Software; NATO Hit as Well The United Nations says on Thursday that its networks were accessed by intruders earlier this year, which lead to follow-on intrusions. Cybercrime analysts say they warned the agency when access credentials to a U.N. enterprise resource planning software system were seen offered for sale.

IT 316
article thumbnail

KrebsOnSecurity Hit By Huge New IoT Botnet “Meris”

Krebs on Security

On Thursday evening, KrebsOnSecurity was the subject of a rather massive (and mercifully brief) distributed denial-of-service (DDoS) attack. The assault came from “ Meris ,” the same new “Internet of Things” (IoT) botnet behind record-shattering attacks against Russian search giant Yandex this week and internet infrastructure firm Cloudflare earlier this summer.

IoT 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

United Nations Says Attackers Breached Its Systems

Data Breach Today

Brokers With Ransomware Ties Advertised Access to UN ERP and Also NATO Systems The United Nations says its networks were accessed by attackers earlier this year, leading to follow-on intrusions. One cybercrime analyst reports that he'd alerted NATO after seeing access credentials for one of its enterprise resource planning software systems for sale via the cybercrime underground.

IT 288
article thumbnail

Palo Alto Enters Small Business, Remote and Home Markets with Okyo

eSecurity Planet

Palo Alto Networks (PANW) is bringing its enterprise-class security to small business and home markets with Okyo , a Wi-Fi 6 hardware device announced today. At $349 a year, the security and router system seems attractively priced for small businesses and companies looking to secure remote workers , who have surged in number since the start of the Covid pandemic 18 months ago.

Marketing 125
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

MS Warns Users of Flaw in Azure Container Instances

Data Breach Today

Users Able to Access Other Users’ Information in ACI Service Microsoft has disclosed details of a vulnerability that researchers at Palo Alto Networks have named “Azurescape” because the attacks start from a container escape technique. The flaw “could potentially allow a user to access other customers’ information in the ACI service,” Microsoft says.

Access 265

More Trending

article thumbnail

Ransomware: Hot or Not? Here's Attackers' Ideal Target

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the most sought-after type of victim for ransomware-wielding attackers. Also featured: fighting extortion schemes and stress management tips.

article thumbnail

Experts confirmed that the networks of the United Nations were hacked earlier this year

Security Affairs

The United Nations this week confirmed that its computer networks were hit by a cyberattack earlier this year, as first reported by Bloomberg. The United Nations on Thursday confirmed that its computer networks were hit by a cyberattack earlier this year. “We can confirm that unknown attackers were able to breach parts of the United Nations infrastructure in April of 2021,” Stéphane Dujarric, spokesman for the UN Secretary-General, told Bloomberg.

article thumbnail

ISMG Editors' Panel: Ransomware Affiliates Seek New Gangs

Data Breach Today

Editors Also Discuss Why Terrorists Don't Lean Into Cyber In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including how ransomware affiliates change operators and why terrorists aren't launching massive cyberattacks.

article thumbnail

5 Steps For Securing Your Remote Work Space

Threatpost

With so many people still working from home, cybercriminals are trying to cash in. Cyberattacks have increased 300% and the risk of losing important data or being compromised is much greater at home. Here are five recommendations for securing your home office.

Security 113
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Transforming an Organization's Security Culture

Data Breach Today

CISO Bobby Ford on Building a New Cybersecurity Operating Model Bobby Ford of Hewlett Packard Enterprise says that too often when an organization engages with security, it happens in an ad hoc way. He describes his mission to create a Cybersecurity Center of Excellence to streamline the organization's security incident management and response processes.

Security 167
article thumbnail

Stolen Credentials Led to Data Theft at United Nations

Threatpost

Threat actors accessed the organization’s proprietary project management software, Umoja, in April, accessing the network and stealing info that can be used in further attacks.

Access 110
article thumbnail

Ransomware Stopper: Mandatory Ransom Payment Disclosure

Data Breach Today

Why Requiring Victims to Reveal Payments Would Help Blunt Criminal Business Model "Silence is gold." So says ransomware operator Ragnar Locker, as it attempts to compel victims to pay its ransom demand without ever telling anyone - especially not police. But some ransomware-battling experts have been advocating the opposite, including mandatory reporting of all ransom payments.

article thumbnail

Sidley Privacy and Cybersecurity Roundtable

Data Matters

Please join Sidley’s Privacy and Cybersecurity Group for a two-part discussion with UK government officials with a focus on data transfer and innovation. UK Data Protection and Data Transfers – New Directions. In this Chatham House discussion, our panelists will cover: Data Transfers to the U.S. and Developments on “Adequacy”. G7 and OECD Data Protection Initiatives.

Privacy 97
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Cost of Cloud Compromise and Shadow IT

Data Breach Today

Cloud 354
article thumbnail

International money launderer sentenced to more than 11 years

Security Affairs

A Canadian man, who helped North Korean threat actors to launder stolen funds, plead guilty to laundering tens of millions of dollars stolen in bank fraud schemes. A Canadian man who conspired to launder tens of millions of dollars stolen bank fraud schemes has been sentenced to 140 months in prison. The man is Ghaleb Alaumary (36), a Canadian citizen who also laundered money stolen in a massive cyberheist carried out by North Korea-linked threat actors.

Military 107
article thumbnail

Government publishes consultation on post-Brexit data reforms

DLA Piper Privacy Matters

The government has today published its eagerly awaited Consultation Paper on Reforms to the UK Data Protection Regime – ‘Data: A New Direction’ (“ Consultation Paper ”), setting out the specific areas for regulatory reform of the UK’s data protection regime. It follows a spate of activity from the government in relation to plans for its post-Brexit global data transfer regime and the publication of the UK’s National Data Strategy last year.

article thumbnail

Top Steps for Ransomware Recovery and Preparation

Threatpost

Alex Restrepo, Virtual Data Center Solutions at Veritas Technologies, discusses post-attack restoration options, and how to prepare for another one in the future.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ProtonMail Now Keeps IP Logs

Schneier on Security

After being compelled by a Swiss court to monitor IP logs for a particular user, ProtonMail no longer claims that “we do not keep any IP logs.

article thumbnail

Top 12 Cloud Security Best Practices for 2021

eSecurity Planet

From the very beginning of the cloud computing era, security has been the biggest concern among enterprises considering the public cloud. For many organizations, the idea of storing data or running applications on infrastructure that they do not manage directly seems inherently insecure. CloudPassage’s 2021 AWS Cloud Security Report found that misconfiguration of cloud platforms (71 percent), exfiltration of sensitive data (59 percent), and insecure APIs (54 percent) are the top cloud secu

Cloud 102
article thumbnail

Groove Ransomware Gang Tries New Tactic to Attract Affiliates

Dark Reading

The threat group, which leaked some 500,000 credentials for Fortinet SSL VPN devices, views ransomware as just one way to profit from compromised networks, experts say.

article thumbnail

Preparing for Ransomware: Are Backups Enough?

eSecurity Planet

In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups – but are they enough? Backups are a critical component of any enterprise cybersecurity posture, but they are not an airtight strategy. Like any other digital machine, backup systems are vulnerable to data loss and compromise.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Grayfly APT uses recently discovered Sidewalk backdoor

Security Affairs

Security researchers from Broadcom’s Symantec linked a previously undocumented backdoor to the Chinese Grayfly operation. Experts from Broadcom’s Symantec linked a previously undocumented backdoor to the Chinese Grayfly operation. In late August, ESET researchers uncovered the SideWalk backdoor that was employed by the Chine cyberespionage group in an attack aimed at a computer retail company based in the U.S.

Retail 97
article thumbnail

SOVA, Worryingly Sophisticated Android Trojan, Takes Flight

Threatpost

The malware appeared in August with an ambitious roadmap (think ransomware, DDoS) that could make it 'the most feature-rich Android malware on the market.'.

article thumbnail

Weekly Update 260

Troy Hunt

An early one today as I made space in the schedule to get out on the water 😎 I'm really liking the new Apple AirTags, I'm disliking some of the international media coverage about Australia's COVID situation, another gov onto HIBP and a blog post I've wanted to write for a long time on biometrics. That last one in particularly I felt was really important as time and time again, I hear these irrational statements from people about the perceived "risks" of biomet

article thumbnail

WhatsApp Fixes Its Biggest Encryption Loophole

WIRED Threat Level

The ubiquitous messaging service will add end-to-end encryption to backups, keeping your chats safe no matter whose cloud they're stored in.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Yandex Pummeled by Potent Meris DDoS Botnet

Threatpost

Record-breaking distributed denial of service attack targets Russia’s version of Google - Yandex.

IoT 111
article thumbnail

Information Governance community mourns the loss of Andy Sokol

IG Guru

Earlier today, i-SIGMA posted an announcement on their Facebook page that CopyScan and Scan School founder passed away unexpectedly earlier this week. In Memoriam: Andy Sokol It is with great sadness that the association announces the passing of Andrew Sokol, CSDS. As a successful entrepreneur, a fixture at association events, and a regular contributor to […].

article thumbnail

MyRepublic Data Breach Raises Data-Protection Questions

Threatpost

The incident raises considerations for security for critical data housed in third-party infrastructure, researchers say.