January 4, 2023

Dridex Returns, Targets MacOS Using New Entry Method

Dridex Returns, Targets MacOS Using New Entry Method Malware The Dridex variant we analyzed targets MacOS platforms with a new technique to deliver documents embedded with malicious macros to users. By: Armando Nathaniel Pedragoza January 05, 2023 Read time:  ( words) Normally, documents containing malicious macros enter a user’s system via email attachments posing as …

Dridex Returns, Targets MacOS Using New Entry Method Read More »

How the third-largest US county uses Elastic to accelerate investigations

As law enforcement organizations benefit from readily available online information and databases, they also face the challenge of combing through vast amounts of information, often housed in siloed systems and databases. Across the US, law enforcement teams in state and local government are turning to solutions such as Elastic to save time and improve accuracy …

How the third-largest US county uses Elastic to accelerate investigations Read More »

Why Data Hygiene is Key to Industrial Cybersecurity

If there’s a common denominator to today’s security woes, it’s complexity. Industrial and enterprise IT environments are more open, interdependent, and essential than ever before. Practicing good data hygiene is one of the best ways for organizations to protect themselves, and it starts with a zero-trust approach to network access. Complexity is a security risk …

Why Data Hygiene is Key to Industrial Cybersecurity Read More »

2023: The Year for ESG Compliance

ESG disclosure and compliance continues to be a top-of-mind issue for companies, shareholders, regulators and consumers alike. This post discusses some of the emerging regulatory requirements that companies need to be aware of and ready for in 2023 and years to come. Read more

BlackMatter’s Smash-and-Grab tactics and the need for RESPOND

Only a few years ago, popular reporting announced that the days of smash-and-grab attacks were over and that a new breed of hackers were taking over with subtler, ‘low-and-slow’ tactics [1]. Although these have undoubtedly appeared, smash-and-grab have quickly become overlooked – perhaps with worrying consequences. Last year, Google saw repeated phishing campaigns using cookie …

BlackMatter’s Smash-and-Grab tactics and the need for RESPOND Read More »

Twitter Wins Dismissal Of Saudi Dissident’s Suit For Now

By Hailey Konnath (January 4, 2023, 11:44 PM EST) — A California federal court has — for the second time — thrown out a suit brought by prominent Saudi Arabian political dissident Ali Al-Ahmed’s suit against Twitter over the suspension of his account, finding that Al-Ahmed hasn’t established standing and brought his claims too late, …

Twitter Wins Dismissal Of Saudi Dissident’s Suit For Now Read More »

MSI’s new laptops among the first to feature PCIe 5 SSDs

Among the new laptops that several manufacturers unveiled at CES 2023 this week are a few from MSI that introduce PCIe 5.0 SSDs to notebooks. The company has several models, but only the top-end variants support the cutting-edge storage standard. These include the new flagship Titan GT77 HX and two…Read more

Irish Privacy Watchdog Fines Meta 390 Million Euros for Ads

Governance & Risk Management , Privacy Social Media Company Fined for GDPR Violation Related to Ad Personalization Akshaya Asokan (asokan_akshaya) • January 4, 2023     Meta’s offices in Dublin (Image: Shutterstock) The Irish Data Protection Commission has imposed a fine of 390 million euros against Meta Ireland for violating the General Data Protection Regulation …

Irish Privacy Watchdog Fines Meta 390 Million Euros for Ads Read More »

Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations

Managed cloud hosting services company Rackspace Technology has confirmed that the massive Dec. 2 ransomware attack that disrupted email services for thousands of its small-to-midsized business customers came via a zero-day exploit against a server-side request forgery (SSRF) vulnerability in Microsoft Exchange Server, aka CVE-2022-41080. “We are now highly confident that the root cause in …

Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations Read More »

Attackers use stolen banking data as phishing lure to deploy BitRAT

In a case that highlights how attackers can leverage information from data breaches to enhance their attacks, a group of attackers is using customer information stolen from a Colombian bank in phishing attacks with malicious documents, researchers report. The group, which might have been responsible for the data breach in the first place, is distributing …

Attackers use stolen banking data as phishing lure to deploy BitRAT Read More »

Ex-GE engineer gets two years in prison after stealing turbine tech for China

An ex-General Electric engineer has been sentenced to two years in prison after being convicted of stealing the US giant’s turbine technology for China. New York resident Xiaoqing Zheng, 59, who used to be employed at GE Power and specialized in turbine sealing technology, was convicted of conspiracy to commit economic espionage at the end …

Ex-GE engineer gets two years in prison after stealing turbine tech for China Read More »

Critical flaws found in Ferrari, Mercedes, BMW, Porsche, and other carmakers

BMW, Mercedes, Toyota, and other popular carmakers use vulnerable APIs that could have allowed attackers to perform malicious activities. Cybersecurity researcher Sam Curry and his colleagues discovered many vulnerabilities in the vehicles manufactured by tens of carmakers and services implemented by vehicle solutions providers. The vulnerabilities could have been exploited by threat actors to perform …

Critical flaws found in Ferrari, Mercedes, BMW, Porsche, and other carmakers Read More »

Mud, sweat and data: The hard work of democratizing data at scale

Written by Rick “Ozzie” Nelson Jan 4, 2023 | FEDSCOOP Rick “Ozzie” Nelson is the Senior Vice President and General Manager, Public Sector at MicroStrategy. He is responsible for public sector data analytics and business intelligence solutions to enable inventory and asset management, financial and workforce planning, and mission and operational readiness. Rick “Ozzie” Nelson, …

Mud, sweat and data: The hard work of democratizing data at scale Read More »

2022 Leadership in Wind Energy Winners

Windpower Engineering & Development announces the winners of their 2022 Leadership in Wind program. Nominees were released in the February issue, and their user community voted on which companies they felt best exemplify wind leadership. SparkCognition has been awarded the winner of the Operation and Maintenance (O&M)/Asset Management category. SparkCognition was recognized for its Renewable …

2022 Leadership in Wind Energy Winners Read More »

Samsung has a plan to lock down all of the smart devices in your house

Samsung’s Knox has a reputation for being a defense-grade security system that protects smartphones, locks down their files, and separates personal data from work data. The company is taking that security a step further — several steps, actually — with the announcement of Samsung Knox Matrix.  Special Feature Knox Matrix wants to lock down all …

Samsung has a plan to lock down all of the smart devices in your house Read More »

Massachusetts school district, community college dealing with fallout from ransomware attacks

A school district and community college in Massachusetts are struggling to recover from ransomware attacks that have crippled their digital systems.  Bristol Community College said it discovered a cyberattack on December 23 and immediately launched an investigation after hiring a cybersecurity firm. The college is still determining whether personal information was accessed or stolen.  On …

Massachusetts school district, community college dealing with fallout from ransomware attacks Read More »

Wabtec Discloses Data Breach; LockBit Claims Responsibility

Fraud Management & Cybercrime , Ransomware Personal Information Compromised After Rail Giant Refused to Pay $30M Ransom Prajeet Nair (@prajeetspeaks) • January 4, 2023     (Image: Shutterstock) U.S rail and locomotive company Wabtec Corp. recently disclosed an 8-month-old breach that exposed personal and sensitive information of some individuals after the stolen data was posted …

Wabtec Discloses Data Breach; LockBit Claims Responsibility Read More »

Optimal Strategies for Building Better Collective Defenses

Fraud Management & Cybercrime , Governance & Risk Management , Remote Workforce Deputy State CISO of Arizona on Why Intermediaries Are Needed for Info Sharing Anna Delaney (annamadeline) • January 4, 2023     Ryan Murray, deputy state CISO, Arizona Arizona has long been a leader in leveraging IT and providing digital services to citizens, …

Optimal Strategies for Building Better Collective Defenses Read More »

Report: Airbus Eyes Minority Stake in Atos Security Business

Endpoint Security , Next-Generation Technologies & Secure Development , Security Operations Owning a Piece of Evidian Would Help Airbus Guard Communication Systems in Vehicles Michael Novinson (MichaelNovinson) • January 4, 2023     Airbus has once again expressed interest in Atos’ $4.8 billion cybersecurity, big data and digital business – this time as a minority …

Report: Airbus Eyes Minority Stake in Atos Security Business Read More »