Sat.Dec 05, 2020 - Fri.Dec 11, 2020

article thumbnail

Keeping Cyber Secure at Christmas

Dark Reading

Sylvain Cortes, Security Evangelist and cybersecurity expert at Alsid, highlights the need for security departments to raise awareness through their organizations over cyber threats this Christmas.

Security 129
article thumbnail

FireEye Hack: Sizing Up the Impact

Data Breach Today

Does Theft of Penetration Tools Pose a Serious Threat? FireEye's disclosure this week of the theft of its penetration testing tools - and its proactive response - has drawn praise but raised many questions, as well.

IT 298
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Avoiding Four Common Pitfalls When Moving to the Cloud

OpenText Information Management

As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how best to mitigate their impact. Selecting the correct level of service It is crucial that organizations select the right cloud partners to operate their systems.

Cloud 88
article thumbnail

OpenSSL is affected by a ‘High Severity’ security flaw, update it now

Security Affairs

The OpenSSL Project disclosed a serious security vulnerability in TLS/SSL toolkit that exposes users to denial-of-service (DoS) attacks. The OpenSSL Project warned of a ‘high-severity’ security vulnerability in the TLS/SSL toolkit that exposes users to denial-of-service (DoS) attacks. The flaw is a null pointer dereference, successful exploitation could trigger denial-of-service conditions.

Security 363
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

In 'The Mandalorian,' Stormtroopers Have Finally Discovered Tactics

WIRED Threat Level

Imperial troops have finally figured out how to do more than charge straight ahead.

Security 359

More Trending

article thumbnail

Ransomware Attacks Hitting Vulnerable MySQL Servers

Data Breach Today

Researchers: Attackers Also Selling Access to Over 250,000 Stolen Databases Hackers are targeting thousands of vulnerable MySQL servers around the world, using ransomware to exfiltrate data from organizations and then demanding payment, according to Guardicore Labs. The attackers are also selling access to over 250,000 stolen databases.

article thumbnail

Microsoft December 2020 Patch Tuesday fixes 58 bugs, 9 are critical

Security Affairs

Microsoft December 2020 Patch Tuesday security update address 58 vulnerabilities, 22 of them are remote code execution vulnerabilities. Microsoft December 2020 Patch Tuesday security update address 58 vulnerabilities, 22 of them are remote code issues. The flaws impact multiple products including Microsoft Windows, Edge (EdgeHTML-based), ChakraCore, Microsoft Office and Office Services and Web Apps, Exchange Server, Azure DevOps, Microsoft Dynamics, Visual Studio, Azure SDK, and Azure Sphere.

Security 362
article thumbnail

Critical Flaws in Millions of IoT Devices May Never Get Fixed

WIRED Threat Level

Amnesia:33 is the latest in a long line of vulnerabilities that affect countless embedded devices.

IoT 291
article thumbnail

Patch Tuesday, Good Riddance 2020 Edition

Krebs on Security

Microsoft today issued its final batch of security updates for Windows PCs in 2020, ending the year with a relatively light patch load. Nine of the 58 security vulnerabilities addressed this month earned Microsoft’s most-dire “critical” label, meaning they can be abused by malware or miscreants to seize remote control over PCs without any help from users.

Security 334
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Cybersecurity Leadership: Fighting Back Against Fraud

Data Breach Today

CEOS and CISOs on Responding to the Multichannel Fraud Spike Fraud explodes in tough times, and do times come any tougher than they have with COVID-19? In this latest Cybersecurity Leadership panel, CEOs and CISOs describe their efforts to spot and stop emerging fraud schemes involving synthetic IDs, social engineering and greater insider risks.

article thumbnail

Human resource consulting giant Randstad hit by Egregor ransomware

Security Affairs

Multinational human resource consulting firm Randstad NV announced that they were a victim of the Egregor ransomware. Egregor ransomware operators have breached the network of the multinational human resource consulting firm Randstad NV and have stolen unencrypted files during the attack. Randstad operates in 39 countries and employs over 38,000 people and generated €23.7 billion in revenue for 2019.

article thumbnail

The NSA Warns That Russia Is Attacking Remote Work Platforms

WIRED Threat Level

A vulnerability in VMWare has prompted a warning that companies—and government agencies—need to patch as soon as possible.

article thumbnail

Making the Best of Working from Home

AIIM

You know that saying, “When life gives you lemons, make lemonade”? It’s something I try to live by. I’m a self-proclaimed eternal optimist and always try to look for the positive in everything. If you do it often enough, you’ll soon find that there is always a positive way to look at things. It won’t always turn the bad completely good, but it will always put a positive spin on it and make it easier to handle.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Ransomware: Call Centers Cold-Call Victims to Demand Ransom

Data Breach Today

Such Specialization Highlights Ransomware Operators' Increasing Business Savvy Ransomware innovation seems to know no bounds, as crime gangs seek new ways to make crypto-locking malware ever more profitable. Beyond data-leak sites and affiliate programs, gangs have also been using call centers to cold-call victims, tell them they've been hit by ransomware, and request payment.

article thumbnail

Drug dealers are selling Pfizer COVID vaccines on the darkweb

Security Affairs

While the United Kingdom announced the distribution of the COVID-19 vaccine to the population drug dealers is selling ‘Pfizer COVID Vaccines.’. The UK became the first Western country to authorize a Covid-19 vaccine. The UK government announced the distribution of the Pfizer/BioNTech vaccine that has been granted emergency authorization by British regulators.

Sales 361
article thumbnail

The US Used the Patriot Act to Justify Logging Website Users

WIRED Threat Level

Plus: Better Twitter two-factor, a Spotify hack, and more of the week’s top security news.

Security 247
article thumbnail

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — Be the Answer to Secure Connectivity?

The Last Watchdog

Company networks have evolved rather spectacularly in just 20 years along a couple of distinct tracks: connectivity and security. We began the new millennium with on-premises data centers supporting servers and desktops that a technician in sneakers could service. Connectivity was relatively uncomplicated.

Access 213
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

NSA: Russian Hackers Exploiting VMware Vulnerability

Data Breach Today

Warning Urges Federal Agencies to Patch Vulnerable Systems Immediately The U.S. National Security Agency is warning that Russian state-sponsored threat actors are attempting to exploit a known vulnerability in several VMware products, according to an alert. Federal agencies are urged to apply fixes as soon as possible.

Security 327
article thumbnail

Adrozek malware silently inject ads into search results in multiple browsers

Security Affairs

Microsoft warns of a new malware named Adrozek that infects devices and hijacks Chrome, Edge, and Firefox browsers by changing their settings. Microsoft warned of a new malware named Adrozek that infects devices and hijacks Chrome, Edge, and Firefox browsers by changing their settings and inject ads into search results pages. Users are redirected to fraudulent domains where they are tricked into installing tainted software.

Security 360
article thumbnail

Russia's FireEye Hack Is a Statement—but Not a Catastrophe

WIRED Threat Level

The fallout from the attack may not be as dire as it first sounds.

IT 225
article thumbnail

[Podcast] Best of 2020 - A Special Year-End Episode

AIIM

Over the past several years, I've had the pleasure of interviewing hundreds of guests for AIIM On Air. It never fails to impress me that the level of knowledge and leadership among AIIM members and supporters is the best in the business. Each month we cover a variety of topics – from the latest in automation and innovation, to pressing and emerging challenges and opportunities that tell the story of the current state of IIM today.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Following FireEye Hack, Ensure These 16 Bugs Are Patched

Data Breach Today

Hunters Could Become the Hunted After Theft of Cybersecurity Firm's Hacking Tools Because 2020 wasn't already exciting enough, now we have to worry about being hunted by adversaries wielding FireEye's penetration testing tools, thanks to the company having suffered a big, bad breach. Here's a list of targeted flaws that every organization should ensure they've patched.

article thumbnail

A ransomware attack hit the Greater Baltimore Medical Center

Security Affairs

The Greater Baltimore Medical Center, Maryland, was hit by a ransomware attack that impacted computer systems and operations. The Greater Baltimore Medical Center in Towson, Maryland was a victim of a ransomware attack that impacted its IT systems. At the time of this writing, it is not clear the family of ransomware that hit the healthcare providers, it only confirmed that the security breach forced some procedures scheduled for Monday to be canceled. “On the morning of Sunday, December 6

article thumbnail

The Christchurch Shooter and YouTube's Radicalization Trap

WIRED Threat Level

The platform has gotten better about stamping out extremist content. But researchers say its policies and algorithms are still too opaque.

IT 211
article thumbnail

Finnish Data Theft and Extortion

Schneier on Security

The Finnish psychotherapy clinic Vastaamo was the victim of a data breach and theft. The criminals tried extorting money from the clinic. When that failed, they started extorting money from the patients : Neither the company nor Finnish investigators have released many details about the nature of the breach, but reports say the attackers initially sought a payment of about 450,000 euros to protect about 40,000 patient records.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Guilty Plea in 2016 Dyn DDoS Attack

Data Breach Today

Attack Took Down Amazon, PayPal, Spotify, Twitter and Others One of those responsible for the massive Mirai-based DDoS attack launched in October 2016 that targeted domain name resolver Dyn and knocked Amazon, PayPal, Spotify, Twitter and others offline has pleaded guilty to federal charges.

304
304
article thumbnail

Facebook links cyberespionage group APT32 to Vietnamese IT firm

Security Affairs

Facebook has suspended some accounts linked to APT32 that were involved in cyber espionage campaigns to spread malware. Facebook has suspended several accounts linked to the APT32 cyberespionage that abused the platform to spread malware. Vietnam-linked APT group APT32 , also known as OceanLotus and APT-C-00, carried out cyber espionage campaigns against Chinese entities to gather intelligence on the COVID-19 crisis.

article thumbnail

Hackers Accessed Covid Vaccine Data Through the EU Regulator

WIRED Threat Level

The European Medicines Agency has released limited details about the cyberattack.

Access 150