Sat.Feb 06, 2021 - Fri.Feb 12, 2021

article thumbnail

Florida City's Water Hack: Poor IT Security Laid Bare

Data Breach Today

Oldsmar Used Windows 7, Shared TeamViewer Password, Didn't Have a Firewall The Florida city that experienced a breach of its water treatment system used now-unsupported Windows 7 machines, shared the same password for remote access and had no firewall. The incident is likely to raise questions about the vulnerability of critical infrastructure in small towns on slim IT security budgets.

IT 301
article thumbnail

5 Cloud Trends That Will Reshape IT in 2021

DXC Technology

We rang in 2020 with all the expectations that cloud computing would continue its progression as a massive catalyst for digital transformation throughout the enterprise. What we didn’t expect was a worldwide health crisis that led to a huge jump in cloud usage. Cloud megadeals have heralded a new era where cloud is a key […].

Cloud 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Email Attacks are Evolving in 2021

Threatpost

The money being wire transferred by business email compromise victims is on the rise, as cybersecurity criminals evolve their tactics.

article thumbnail

Microsoft Patch Tuesday, February 2021 Edition

Krebs on Security

Microsoft today rolled out updates to plug at least 56 security holes in its Windows operating systems and other software. One of the bugs is already being actively exploited, and six of them were publicized prior to today, potentially giving attackers a head start in figuring out how to exploit the flaws. Nine of the 56 vulnerabilities earned Microsoft’s most urgent “critical” rating, meaning malware or miscreants could use them to seize remote control over unpatched systems w

Access 288
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Senators Demand More Coordination in SolarWinds Investigation

Data Breach Today

Warner and Rubio Call for Designation of Leader of Four-Agency Effort Citing a lack of coordination and transparency, U.S. Sens. Mark Warner and Marco Rubio of the Intelligence Committee are urging the four federal agencies investigating the cyberattack that targeted SolarWinds and other organizations to designate a leader for their investigative efforts.

363
363

More Trending

article thumbnail

Hacking Nespresso machines to have unlimited funds to purchase coffee

Security Affairs

Some commercial Nespresso machines that are used in Europe could be hacked to add unlimited funds to purchase coffee. Some Nespresso Pro machines in Europe could be hacked to add unlimited funds to purchase coffee. The attack is possible because the machines use a smart card payment system that leverages insecure technology, the MIFARE Classic smart cards.

article thumbnail

Arrest, Raids Tied to ‘U-Admin’ Phishing Kit

Krebs on Security

Cyber cops in Ukraine carried out an arrest and several raids last week in connection with the author of a U-Admin , a software package used to administer what’s being called “one of the world’s largest phishing services.” The operation was carried out in coordination with the FBI and authorities in Australia, which was particularly hard hit by phishing scams perpetrated by U-Admin customers.

Phishing 256
article thumbnail

Patient Files Dumped on Darknet Site After Hacking Incidents

Data Breach Today

Data Appears to Come From 2 Healthcare Organizations in Florida, Texas The Conti cybercrime gang has reportedly leaked sensitive patient data, as well as employee records, on a darknet site following recent hacker attacks on a two healthcare organizations in Florida and Texas.

359
359
article thumbnail

Change Management - Still the Top Problem Facing End Users in 2021?

AIIM

The new year always brings with it a handful of important questions around the AIIM Community. What are the key trends in information management? What are the top challenges to overcome? More importantly, what are the best practices and strategies to overcome them? Each year, AIIM conducts extensive user-research throughout the community to address these questions and more.

Education 133
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Web Credit Card Skimmer Steals Data from Another Credit Card Skimmer

Schneier on Security

MalwareBytes is reporting a weird software credit card skimmer. It harvests credit card data stolen by another, different skimmer: Even though spotting multiple card skimmer scripts on the same online shop is not unheard of, this one stood out due to its highly specialized nature. “The threat actors devised a version of their script that is aware of sites already injected with a Magento 1 skimmer,” Malwarebytes’ Head of Threat Intelligence Jérôme Segura explains in a report sha

IT 142
article thumbnail

Packaging giant WestRock is still working to resume after recent Ransomware Attack

Security Affairs

Packaging giant WestRock revealed this week that the recent ransomware attack impacted the company’s IT and operational technology (OT) systems. American corrugated packaging company WestRock announced at the end of January that it was the victim of a ransomware attack that impacted its information technology (IT) and operational technology (OT) systems.

article thumbnail

Cybersecurity Leadership: Asset Discovery and Visibility

Data Breach Today

CEOs and CISOs on Threats Targeting Known and Unknown Assets In the wake of COVID-19-accelerated transformation and the SolarWinds hack, the importance of understanding your organization's digital exposure is more critical than ever. In this latest Cybersecurity Leadership panel, CEOs and CISOs discuss asset discovery and attack surface vulnerability.

article thumbnail

Brazilian Data Protection Authority Publishes Regulatory Strategy for 2021 – 2023

Hunton Privacy

On January 28, 2021, international Data Privacy Day, the newly formed Brazilian data protection authority ( Agência Nacional de Proteção de Dados , the “ANPD”) published its regulatory strategy for 2021-2023 and work plan for 2021-2022 (in Portuguese). ANPD Regulatory Strategy. The ANPD’s regulatory strategy for 2021-2023 sets forth the agency’s vision for becoming a reference, nationally and internationally, with respect to data protection matters.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Catches of the month: Phishing scams for February 2021

IT Governance

Cyber criminals have had constant success with coronavirus-related phishing scams, but their most recent campaign is the most dangerous we’ve seen. There have been multiple reports of people receiving an email purportedly from the NHS, saying they can book an appointment to receive their first COVID-19 vaccine. The sophisticated scam preys on people’s eagerness to be vaccinated and the much-publicised fact that the NHS is indeed emailing people to book vaccines.

Phishing 128
article thumbnail

Avaddon ransomware decryptor released, but operators quickly reacted

Security Affairs

An expert released a free decryption tool for the Avaddon ransomware, but operators quickly updated malware code to make it inefficient. The Spanish student Javier Yuste has released a free decryption tool for the Avaddon ransomware that can be used by the victims to recover their encrypted files for free. Yuste is a student at the Rey Juan Carlos University in Madrid, he developed the AvaddonDecrypter utility that could be used by victims of the ransomware when their computers should not have

article thumbnail

SAP Commerce Product Has Vulnerability

Data Breach Today

Company Issues Patch, Remediation Advice SAP has issued a patch and remediation advice for a critical remote code execution vulnerability in its SAP Commerce product that could, if exploited, disrupt the entire system.

IT 341
article thumbnail

Florida Water Hack Shows Danger of Remote Access Vulnerabilities

Hunton Privacy

On February 8, 2021, Pinellas County, Florida officials announced that a hacker had remotely gained access to the City of Oldsmar’s water treatment system on two separate occasions and was able to change the setting for sodium hydroxide in the water supply. The incident highlights the danger to local government information systems and the dangers of remote access vulnerabilities.

Access 128
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Supply-Chain Hack Breaches 35 Companies, Including PayPal, Microsoft, Apple

Threatpost

Ethical hacker Alex Birsan developed a way to inject malicious code into open-source developer tools to exploit dependencies in organizations internal applications.

130
130
article thumbnail

Adobe fixes a buffer overflow issue in Reader which is exploited in the wild

Security Affairs

Adobe released security patches for 50 flaws affecting six products, including a zero-day flaw in Reader that has been exploited in the wild. Adobe has released security updates that address 50 vulnerabilities affecting its Adobe Acrobat, Magento, Photoshop, Animate, Illustrator, and Dreamweaver products. Adobe fixed 23 CVEs in Adobe Reader , 17 of which have been rated as Critical.

Security 133
article thumbnail

Microsoft Issues Second Patch for Netlogon Vulnerability

Data Breach Today

First Patch for 'Zerologon' Flaw Had Been Issued Last August Microsoft has finally pushed out the second half of the software patch for the "Zerologon" privilege escalation vulnerability in the Windows Netlogon Remote Protocol more than five months after the first half of the patch was issued.

335
335
article thumbnail

EU Member States Agree on Council’s Text for the ePrivacy Regulation

Hunton Privacy

On February 10, 2021, representatives of the EU Member States reached an agreement on the Council of the European Union’s (the “Council’s”) negotiating mandate for the draft ePrivacy Regulation, which will replace the current ePrivacy Directive. The text approved by the EU Member States was prepared under Portugal’s Presidency and will form the basis of the Council’s negotiations with the European Parliament on the final terms of the ePrivacy Regulation.

Metadata 126
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Top 5 digital technology trends in Life Sciences in 2021

OpenText Information Management

In its ‘Covid-19: Accelerating digital transformation for Life Sciences’, Reuters states: “COVID-19 has placed the life sciences industry in Europe under extreme pressure, testing it like no other event. Lockdowns have shocked the system and exposed shortcomings, forcing every function to evaluate and adapt its roles and responsibilities almost overnight.

article thumbnail

Yandex security team caught admin selling access to users’ inboxes

Security Affairs

Russian internet and search company Yandex discloses a data breach, a system administrator was selling access to thousands of user mailboxes. Russian search engine and internet provider Yandex discloses a data breach, the company revealed that one of its system administrators was caught selling access to 4,887 user email accounts. The security incident was discovered during a routine screening by its internal security team, an internal investigation is still ongoing. “An internal investiga

Access 126
article thumbnail

5 Critical Questions Raised by Water Treatment Facility Hack

Data Breach Today

Incident Highlights the Need to Enhance OT Security As the investigation into the hacking of a water treatment facility in Florida continues, cybersecurity experts say the incident points to the urgent need to enhance operational technology security. Here are five key questions the incident raises.

article thumbnail

Florida Water Plant Hack: Leaked Credentials Found in Breach Database

Threatpost

Researchers discovered credentials for the Oldsmar water treatment facility in the massive compilation of data from breaches posted just days before the attack.

130
130
article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

A guide to cyber security for marketing agencies

IT Governance

If your marketing agency is under the impression that cyber security is strictly an IT issue, you should think again. Effective security is a company-wide commitment, and marketers play one of the most crucial roles. Consider how much personal data you collect; if that information is lost or stolen, it will severely damage your customer relationships.

Marketing 123
article thumbnail

Microsoft to notify Office 365 users of nation-state attacks

Security Affairs

Microsoft implements alerts for ‘nation-state activity’ in the Defender for Office 365 dashboard, to allow organizations to quickly respond. Since 2016 , Microsoft has been alerting users of nation-state activity, now the IT giant added the same service to the Defender for Office 365 dashboard. The new security alert will notify companies when their employees are being targeted by state-sponsored attacks.

article thumbnail

Plex Media Server Used to Amplify DDoS Threats

Data Breach Today

Researchers Warn of Yet Another Way to Boost Attacks Researchers with NetScout are warning that attackers are abusing certain versions of the Plex Media Server app to strengthen and amplify various DDoS attacks. The FBI has also warned about increases in DDoS attacks that use these types of amplification techniques.

311
311