Fri.Mar 15, 2019

article thumbnail

Cover Your NAS Against Nasty Cr1ptT0r Ransomware

Data Breach Today

Crypto-Locking Extortion Targets Internet-Exposed D-Link Devices Criminals wielding a new strain of ransomware called Cr1ptT0r are targeting network-attached storage users. The campaign was first discovered in February after owners of D-Link network storage enclosures reported that their devices were being crypto-locked.

article thumbnail

It is the first time in the history that civic groups hold a protest against a national CERT

Security Affairs

Demonstration in front of the National CERT of Philippines for failing to act on cyber attacks targeting regime critical media and civil society organizations. On March 12, the World Day Against Cyber-Censorship, media and civil society organizations in Philippines held a demonstration in front of NCERT (National Computer Emergency Response Team) to protest against the negligence of the NCERT to support the investigation of the three months’ long Distributed Denial of Service attacks against reg

IT 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Role of 'Prosilience' in IoT Security

Data Breach Today

The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service.

IoT 239
article thumbnail

Financial services are embracing multi-cloud

DXC Technology

Multi-clouds — environments made up of multiple public and private clouds typically used for different purposes — may well be the cloud of choice for banks. That’s according to an independent report by 451 Research, ‘Multi-Cloud Fundamental to Financial Services Transformation.’ I’m not here to argue. This report, which was sponsored by Canonical — the […].

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Anti-Virus on Android: Beware of Low-Quality Apps

Data Breach Today

More Than Half of AV Apps are Ineffective, Testing Firm Finds More than half of 250 antivirus applications available in Google's Play Store offer insufficient protection against malicious software, according to a new study by testing organizations AV Comparatives. The findings suggest that users should be cautious when selecting a product.

220
220

More Trending

article thumbnail

Mental Healthcare Providers Respond to Ransomware Attacks

Data Breach Today

Two Entities Hit - One Pays Ransom; the Other Doesn't Two recent ransomware attacks on mental healthcare providers serve as reminders of the security incident response and risk mitigation pressure faced by entities handling especially sensitive patient information.

article thumbnail

7 Low-Cost Security Tools

Dark Reading

Security hardware doesn't have to be expensive or complex to do the job. Here are seven examples of low-cost hardware that could fill a need in your security operations.

article thumbnail

Congress Considers IoT Cybersecurity Legislation - Again

Data Breach Today

Third Attempt at Setting Minimum Standards for Devices Government Uses The U.S. Congress is hoping that the third time is the charm for an internet of things cybersecurity bill that would set minimum security standards for the connected devices that the federal government purchases for various projects.

article thumbnail

Proof-of-Concept Tracking System Finds RATs Worldwide

Dark Reading

Using a combination of Shodan scans and data from partners, Recorded Future finds nearly 500 malware controllers for 14 different families of remote-access Trojans, as well as the corporate networks they have infected.

Access 84
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mental Health Providers Respond to Ransomware Attacks

Data Breach Today

Two Entities Hit - One Pays Ransom; the Other Doesn't Two recent ransomware attacks on mental health providers serve as reminders of the security incident response and risk mitigation pressure faced by entities handling especially sensitive patient information.

article thumbnail

Recently fixed WinRAR bug actively exploited in the wild

Security Affairs

Several threat actors are still exploiting a recently patched critical vulnerability in the popular compression software WinRAR. Several threat actors are actively exploiting a critical remote code execution vulnerability recently addressed in WinRAR. The exploitation of the flaw in the wild is worrisome because the WinRAR software doesn’t have an auto-update feature, leaving millions of users potentially exposed to cyber attacks.

article thumbnail

Investment Adviser's View of Cybersecurity Market

Data Breach Today

Brad Topchick of Mooreland Partners on the Trends Driving 2019 Growth Broadcom acquired CA. AlienVault became AT&T Cybersecurity. These are just two of the deals that headlined in 2018. What does the 2019 market hold? Brad Topchick, managing director of Mooreland Partners, shares insights.

Marketing 174
article thumbnail

Secur Solutions Group data leak exposes 800,000 Singapore blood donors

Security Affairs

Secur Solutions Group data leak – Another clamorous data leak made the headlines, personal information of 808,201 blood donors in Singapore was exposed online. The news was first reported by The Straits Times, the huge trove of data was contained in a database operated by the Secur Solutions Group Pte Ltd (SSG). People who registered to donate since 1986 in Singapore was exposed because the company left the database unprotected on an Internet for more than two months, since January 4, 2019

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Zscaler's Stan Lowe on Digital Transformation

Data Breach Today

ISMG and Zscaler hosted a roundtable dinner in Columbus, OH on Feb. 22 focused on security's role in digital transformation. Managing expectation for security as a core component of business enablement was a core component of the discussion.

article thumbnail

Recapping RSA Conference 2019: No Silver Bullet for Security

Thales Cloud Protection & Licensing

I was really looking forward to participating in RSA 2019 and it was a great event. There was tremendous energy and buzz in our booth and on the show floor. The lively interactions in our booth validated that the Vormetric product line is still highly relevant and solves many of today’s challenges as customers move controls closer to the data, and also migrate their data to the cloud.

article thumbnail

Essentials of Supply Chain Security

Data Breach Today

Panorays CEO Matan Or-El on an Automated Approach to Defense According to some researchers, up to 61 percent of recent data breaches were a result of a third-party vulnerability. Matan Or-El, CEO of Panorays, discusses the weakest links of supply chain security and how to strengthen them with automated tools.

Security 174
article thumbnail

GlitchPOS PoS Malware appears in the cybercrime underground

Security Affairs

A new piece of PoS malware appeared in the threat landscape, the malicious code dubbed GlitchPOS has been found on a crimeware forum. The GlitchPOS malware is able to steal credit card numbers (Track1 and Track2) from the memory of the infected system, it uses a regular expression to perform this task. The malicious code was discovered by experts from Cisco Talos, the pre-built malware goes for $250, while the builder goes for $600.

Sales 80
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Security's Role in Digital Transformation

Data Breach Today

GE Digital's Al Ghous on How CISOs Can Influence the Change Security has the opportunity - or challenge - to help drive digital transformation within the enterprise. Al Ghous of GE Digital describes how security leaders can maximize their influence and avoid potholes.

article thumbnail

An exclusive interview with a CISO

IT Governance

Earlier this month we caught up with Geraint Williams, CISO for GRC International Group plc, to find out more about information security and how he raises awareness within the workplace. Watch the video below to hear what Geraint had to say about educating employees, the ever-changing threat landscape, and the importance of information and cyber security awareness at all levels of an organisation.

article thumbnail

Mobile storage & the organized office

TAB OnRecord

Let’s face it. Organizing and managing paper can be a huge challenge for any company, large or small. What if you could get on top of the paper game once and for all, and set up a system to keep your office organized going forward? Luckily, TAB has a solution that can improve space usage [.] Read More. The post Mobile storage & the organized office appeared first on TAB Records Management Blog | TAB OnRecord.

Paper 60
article thumbnail

Lenovo Patches High-Severity Arbitrary Code Execution Flaws

Threatpost

Lenovo has issued patches for several serious vulnerabilities in its products stemming from Intel technology fixes.

IT 80
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

On Norman Castles and the Internet

Dark Reading

When the Normans conquered England, they built castles to maintain security. But where are the castles of the Internet?

article thumbnail

How Hackers Pulled Off a $20 Million Mexican Bank Heist

WIRED Threat Level

Welcome to the world of fake accounts, phantom funds, and money mules.

article thumbnail

Unpatched Fujitsu Wireless Keyboard Bug Allows Keystroke Injection

Threatpost

An unpatched high-severity vulnerability allows keystroke injections in Fujitsu wireless keyboards.

75
article thumbnail

I Was Cited in a Court Decision

Schneier on Security

An article I co-wrote -- my first law journal article -- was cited by the Massachusetts Supreme Judicial Court -- the state supreme court -- in a case on compelled decryption. Here's the first, in footnote 1: We understand the word "password" to be synonymous with other terms that cell phone users may be familiar with, such as Personal Identification Number or "passcode.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What Is Single Sign-On, and How Can It Make Your Enterprise More Secure?

eSecurity Planet

We define single sign-on and how SSO solutions can be implemented to make your organization more secure.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I'm teaching a live online class called " Spotlight on Cloud: The Future of Internet Security with Bruce Schneier " on O'Reilly's learning platform, Thursday, April 4, at 10:00 AM PT/1:00 PM ET. The list is maintained on this page.

Cloud 51
article thumbnail

Governance, integration are top challenges to cloud data warehouse efforts

Information Management Resources

While cloud data warehouses are often an important first step in digital transformation, enterprises need to follow some best practices to overcome implementation challenges and increase investment return.

Cloud 55