Sat.Mar 21, 2020 - Fri.Mar 27, 2020

article thumbnail

COVID-19: The Digital Exposure Crisis

Data Breach Today

Cybersecurity Specialist John Walker on Lack of Preparedness, Bad Cyber Practices in UK The COVID-19 pandemic has exposed more than policy and social gaps, says U.K.-based cybersecurity expert John Walker. It's also manifested in digital exposures born out of lack of preparedness and bad practices. Walker offers insights on improving the cyber response.

article thumbnail

COVID-19 Phishing Schemes Escalate; FBI Issues Warning

Data Breach Today

Latest Schemes Target At-Home Employees; Some Spoof Health Agencies As the global COVID-19 pandemic worsens, security firms and law enforcement, including the FBI, are warning of increasing phishing and other the cybercriminal scams targeting a largely at-home workforce.

Phishing 362
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RIM implications of teleworking

The Schedule

Over the past weeks, more and more businesses, government agencies, educational facilities, and cultural heritage organizations have shuttered their physical locations — either in a proactive attempt to prevent community spread of the coronavirus or in response to local shelter in place/stay at home orders — and have stood up teleworking and online options.

article thumbnail

How to Avoid the Worst Online Scams

WIRED Threat Level

Phishing, malware, and more only escalate in times of uncertainty. Here's how to protect yourself.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

COVID-19 and the Need for 'Digital Distancing'

Data Breach Today

Tom Kellermann of VMware Carbon Black on Threats to Remote Workforce With the declaration of COVID-19 as a pandemic, and the global shift to work from home, Tom Kellermann of VMware Carbon Black sees a corresponding increase in hacking and espionage attempts against U.S. agencies, businesses and citizens. He says add "digital distancing" to your precautions.

182
182

More Trending

article thumbnail

Russia's Cybercrime Rule Reminder: Never Hack Russians

Data Breach Today

BuyBest Bust: Russia Charges 25 Individuals With Trafficking in Stolen Bank Card Data Russian authorities typically turn a blind eye to cybercrime committed by citizens, provided they target foreigners. But as the recent "BuyBest" arrests of 25 individuals demonstrate, authorities do not tolerate criminals that target Russians, and especially not anyone who targets Russian banks.

190
190
article thumbnail

The Wild, Wild West(world) of Cybersecurity

Dark Reading

Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.

article thumbnail

Tupperware Website Hit by Card Skimmer

Data Breach Today

Researchers Say Magecart-Style Attack Targeted Payment Card Data Tupperware, known for its colorful array of food storage containers, is the latest company to have its website hit with a credit card skimmer that siphons off payment card details at checkout, according to the security firm Malwarebytes. Here, malicious JavaScript hid in the online checkout payment form.

Security 244
article thumbnail

How to Evict Attackers Living Off Your Land

Dark Reading

As cyber defenses improve, adversaries are shifting to stealthy "living-off-the-land" attacks that use targets' own tools against them. Here are some tips to defend your turf.

97
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

US Government Sites Give Bad Security Advice

Krebs on Security

Many U.S. government Web sites now carry a message prominently at the top of their home pages meant to help visitors better distinguish between official U.S. government properties and phishing pages. Unfortunately, part of that message is misleading and may help perpetuate a popular misunderstanding about Web site security and trust that phishers have been exploiting for years now.

article thumbnail

New to Remote Working? Tapping Into 6+ Years of Tips for Working from Home

AIIM

For many across the globe, limiting their human contact, the home has become…well, home base for just about everything. Folks are taking advantage of virtual meeting software like GoToMeeting and Zoom to video chat with friends, host virtual dinner parties, and even play board games! And that’s just in our personal lives. In our work lives, companies are piecing together Digital Workplace strategies to allow their employees to work from home.

article thumbnail

Insurer Chubb Investigating 'Security Incident'

Data Breach Today

Maze Gang Claims Insurer Is a Victim, Emsisoft Reports Switzerland-based global insurance firm Chubb acknowledges that it's investigating a "security incident." Meanwhile, the Maze ransomware gang is claiming Chubb is its latest victim, according to researchers at the security firm Emsisoft.

Insurance 293
article thumbnail

NEW TECH: QuoLab advances ‘Security Operations Platform’ — SOP — technology

The Last Watchdog

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day. I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR technologies have arisen in just the past few years to help companies try to make sense of it all, even as catastrophic breaches persist.

Security 138
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Russians Shut Down Huge Card Fraud Ring

Krebs on Security

Federal investigators in Russia have charged at least 25 people accused of operating a sprawling international credit card theft ring. Cybersecurity experts say the raid included the charging of a major carding kingpin thought to be tied to dozens of carding shops and to some of the bigger data breaches targeting western retailers over the past decade.

Retail 288
article thumbnail

Summer Reading: Cognitive Surplus by Clay Shirky

AIIM

I'm on my summer vacation, which has afforded me some welcomed reading time. One of the good things about using a Kindle or Kindle on an iPad for reading is the ability to use highlights to create a running summary of a book's highlights. Even better is that these highlights are aggregated across ALL readers. So in effect, any book can have a built-in summary, generated by the wisdom of the crowds - pretty cool stuff.

Education 104
article thumbnail

Hackers Targeted World Health Organization

Data Breach Today

Researcher Says Spear-Phishing Incident Has Hallmarks of Nation-State Attack A hacking group targeted the World Health Organization earlier this month with an apparently unsuccessful spear-phishing campaign designed to harvest credentials as the United Nations organization was grappling with the global COVID-19 pandemic.

Phishing 269
article thumbnail

NEW TECH: Start-up QuoLab enters emerging ‘Security Operations Platform’ — SOP — space

The Last Watchdog

Defending enterprise networks has become a convoluted challenge, one that is only getting more byzantine by the day. I’ve written about the how SIEMs ingest log and event data from all across hybrid networks, and about how UEBA and SOAR technologies have arisen in just the past few years to help companies try to make sense of it all, even as catastrophic breaches persist.

Security 113
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

Ryuk Ransomware operators continue to target hospitals during COVID19 outbreak

Security Affairs

Operators behind the Ryuk Ransomware continue to target hospitals even as these organizations are involved in the fight against the Coronavirus pandemic. The threat actors behind the infamous Ryuk Ransomware continue to target hospitals, even as they are involved in containing the Coronavirus outbreak. The decision of the operators is not aligned with principal ransomware gangs that have announced they will no longer target health and medical organizations during the Coronavirus (COVID-19) pande

article thumbnail

A Twitch Streamer Is Exposing Coronavirus Scams Live

WIRED Threat Level

Kitboga has built a following by trolling telemarketers. Covid-19 opportunists have given him a whole new crop of targets.

Security 145
article thumbnail

Hijacked Routers Steering Users to Malicious COVID-19 Sites

Data Breach Today

Researchers: Cybercriminals Use DNS Hijacking to Spread New Type of Infostealer Cybercriminals are waging brute-force attacks that enable them to change DNS settings on home and small business routers to redirect victims to fake COVID-19-themed websites that push infostealer malware, according to the security firm Bitdefender.

Security 290
article thumbnail

Coding With Ari, for Kids at Home

Troy Hunt

Strange times, these. But equally, a time to focus on new things and indeed a time to pursue experiences we might not have done otherwise. As Ari now spends his days learning from home, I wanted to really start focusing more on his coding not just for his own benefit, but for all the other kids out there who are in the same home-bound predicament he now finds himself in.

IT 118
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Google issued 40,000 alerts of State-Sponsored attacks in 2019

Security Affairs

Google announced to have warned users of almost 40,000 alerts of state-sponsored phishing or malware attacks during 2019. Google shared data on alerts related to state-sponsored attacks, the tech giant revealed that it issued almost 40,000 alerts of state-sponsored phishing or malware attacks to its users during 2019. The number of alerts decreased by 25% when compared to 2018, possible reasons for this drop could be the increased efficiency of defense measures implemented by Google, but we cann

Phishing 142
article thumbnail

EDPS Publishes Letter Addressing Coronavirus and Monitoring Location Data

Hunton Privacy

On March 25, 2020, the European Data Protection Supervisor (“EDPS”) sent a letter to the Directorate-General for Communications Networks, Content and Technology (“DG CONNECT”) addressing the various initiatives involving telecommunications providers at the Member State level to monitor the spread of the COVID-19 outbreak using location data. In the letter, the EDPS states that the data protection rules currently in force in the EU are flexible enough to allow for the implementation of measures t

article thumbnail

FBI Shutters Alleged Russian Cybercriminal Forum

Data Breach Today

Deer.io Enabled Fraudsters to Buy and Sell Stolen Data, Federal Prosecutors Say The FBI this week seized the domain of Deer.io, which federal authorities describe as a clearinghouse for stolen data and cybercriminal services operating from Russia. The alleged administrator of the now-shuttered site has been arrested and charged.

248
248
article thumbnail

As Zoom Booms Incidents of ‘ZoomBombing’ Become a Growing Nuisance

Threatpost

Numerous instances of online conferences being disrupted by pornographic images, hate speech or even threats can be mitigated using some platform tools.

Privacy 124
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Coronavirus-themed campaign delivers a new variant of Netwalker Ransomware

Security Affairs

MalwareHunterTeam experts have identified a new Coronavirus phishing campaign that aims at delivering the Netwalker Ransomware. The number of coronavirus -themed cyberattacks continues to increase, MalwareHunterTeam researchers uncovered a new campaign that is delivering the Netwalker Ransomware, aka Mailto. The researchers have analyzed an attachment, named “ CORONAVIRUS_COVID-19.vbs ,” used in a new Coronavirus phishing campaign that was designed to deliver the Netwalker Ransomwar

article thumbnail

How to facilitate remote learning: Part 3 — Peer-to-peer interaction

Jamf

To best keep students and educators safe — schools are re-evaluating their teaching practices and learning environments to accommodate an at-home, remote learning experience. In part three of our five-part blog series, we show you ways to promote peer-to-peer interaction.

Education 114
article thumbnail

Chinese Cyber Espionage Continues Despite COVID-19

Data Breach Today

FireEye Finds APT41 Conducting a Global Campaign Despite the global COVID-19 pandemic, which started in China, Chinese cyber espionage campaigns are continuing, with a new campaign from one APT group targeting at least 75 enterprises in 20 countries, according to the security firm FireEye.

Security 259