Remove category disclosure
article thumbnail

Accelerating scope 3 emissions accounting: LLMs to the rescue

IBM Big Data Hub

The rising interest in the calculation and disclosure of Scope 3 GHG emissions has thrown the spotlight on emissions calculation methods. Within USEEIO, goods and services are categorized into 66 spend categories, referred to as commodity classes, based on their common environmental characteristics.

Mining 79
article thumbnail

Threat actors exploit recently disclosed Atlassian Confluence flaw in cryptomining campaign

Security Affairs

The issue was reported by security firm Volexity, CVE-2022-26134, and in the same week of its disclosure, Atlassian addressed the flaw in Confluence Server and Data Center products. Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. Follow me on Twitter: @securityaffairs and Facebook.

Security 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Android pre-installed apps are affected by high-severity vulnerabilities

Security Affairs

The researchers discovered the flaws in September 2021 and reported them to mce Systems and affected mobile service providers through Coordinated Vulnerability Disclosure (CVD) via Microsoft Security Vulnerability Research (MSVR). Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g.

Access 145
article thumbnail

Quick Threat Model Links October 2019

Adam Shostack

Continuum has a blog and a spreadsheet on threat modeling lambdas (as a category, not specific to Amazon Lambda), and also a post on threat modeling with CAPEC. Disclosure: I’m on advisory boards for Continuum and Ntrepid. There’s some context from Aaron Small, who made the project happen. What else have you seen?

Privacy 75
article thumbnail

California Consumer Privacy Act: Disclosure requirements

Data Protection Report

This is the Data Protection Report’s fourth blog in a series of blogs that will break down the major elements of the CCPA which will culminate in a webinar on the CCPA in October. Stay tuned for additional blogs and information about our upcoming webinar on the CCPA. Privacy policy disclosures.

Privacy 40
article thumbnail

Red TIM Research discovers a Command Injection with a 9,8 score on Resi

Security Affairs

Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog”) To nominate, please visit:? Follow me on Twitter: @securityaffairs and Facebook. Pierluigi Paganini.

article thumbnail

HHS updates online tracker guidance

Data Protection Report

Our readers may recall that HHS took a very broad view of the information that could constitute Protected Health Information (PHI) or Individually Identifiable Health Information (IIHI) whose disclosure to tracking vendors could potentially violate HIPAA. diabetes) and that, together with any individually identifying information (e.g.,