Wed.Jul 15, 2020

article thumbnail

How to Make the Most of Cyber Intelligence

Data Breach Today

Jeff Bardin of Treadstone 71 Outlines Key Strategic Steps Creating a cyber intelligence strategy involves operational and tactical measures as well as technical approaches, says Jeff Bardin, chief intelligence officer at Treadstone 71.

318
318
article thumbnail

Exclusive, Ghost Squad Hackers defaced European Space Agency (ESA) site

Security Affairs

A group of hacktivists that goes online with the name Ghost Squad Hackers has defaced a site of the European Space Agency (ESA). A group of hackers that goes online with the name Ghost Squad Hackers has defaced a site of the European Space Agency (ESA), [link]. I have reached them for a comment and they told me that the attack was not targeted, they defacted the site only for fun. “We are hacktivists, we usually hack for many various causes related to activism.” Ghost Squad Hackers&#

Military 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft: Patching 'Wormable' Windows Server Flaw Is Urgent

Data Breach Today

Check Point Research Report Explains 17-Year-Old 'SigRed' Flaw Affects Windows DNS Feature Microsoft is urging its customers to patch a "wormable" vulnerability affecting the Windows Server operating system that could allow an attacker to exploit an organization's entire infrastructure.

IT 267
article thumbnail

A New Map Shows the Inescapable Creep of Surveillance

WIRED Threat Level

The Atlas of Surveillance shows which tech law enforcement agencies across the country have acquired. It's a sobering look at the present-day panopticon.

IT 115
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Malware Hidden in Chinese Tax Software

Data Breach Today

Researchers: 'GoldenHelper' Backdoor Designed to Access Corporate Networks Malware designed to provide backdoor access to corporate networks, gain administrative privileges and deliver additional payloads was hidden in tax software the Chinese government requires companies doing business in the nation to use, researchers at the security firm Trustwave report.

More Trending

article thumbnail

Security for Peripheral Devices at Energy Dept. 'Inadequate'

Data Breach Today

Audit Finds a Lack of Security Controls for USBs, Printers and More Some units within the U.S. Energy Department lack adequate security controls and practices to mitigate risks posed by peripheral devices, such as USBs, printers, scanners and external hard drives, according to an inspector general report.

Security 175
article thumbnail

The importance of trust

IT Governance

Whether or not you’re aware of it, a large part of the system that lets commerce happen over the Internet really operates on little more than trust. It’s backed up by technology, but it essentially relies on businesses all over the world trusting that a small number of organisations are doing their jobs properly. Without this network of ‘trust relationships’, most of what we do on the Internet would be – at best – a gamble, and more likely just wouldn’t happen at all.

article thumbnail

Britain's 5G Policy Failure: No Ideal Alternative to Huawei

Data Breach Today

Western Governments Have Failed to Counter China's Move for Technology Dominance Britain's U-turn on Huawei, announcing that it will now ban the manufacturer's gear from its 5G networks, highlights this as yet unresolved problem: Years of underinvestment and policy failures have left Britain and its allies with no inexpensive, trusted alternative.

article thumbnail

Ever wonder why information matters in train safety?

OpenText Information Management

That anyone should be injured or killed in a transportation accident is a tragedy. Trains carry billions of passengers and tons of freight a year worldwide. Making sure their brakes work properly is no mere routine maintenance check. OpenText™ customer Knorr-Bremse Group is a leading manufacturer of brakes and other components of trains, metro cars, … The post Ever wonder why information matters in train safety?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Key Digital Payment Identity Management Issues

Data Breach Today

Ramping up authentication as e-commerce continues to grow requires achieving a delicate balance of a frictionless, yet secure, consumer experience, says Robert Capps of NuData Security, a unit of Mastercard.

article thumbnail

‘DDoS-For-Hire’ Is Fueling a New Wave of Attacks

WIRED Threat Level

Turf wars are heating up over the routers that fuel distributed denial of service attacks—and cybermercenaries are running rampant.

Security 102
article thumbnail

FAQ: How to Classify Your Records on TSLAC’s Retention Schedules

The Texas Record

One of the most common type of questions we receive in the Records Management Assistance Unit is how to classify, find, file, and match records to the local government retention schedules. By definition and use, a records retention schedule is a documented policy that serves to identify the records created or received by an organization or government entity and list the specific period of time the record must be maintained for the organization to meet their legal obligation.

article thumbnail

Brazil’s Banking Trojans Go Global

Threatpost

Four sophisticated malware families are ramping up their techniques and actively spreading to new countries, including the U.S.

Security 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A Twitter Hacking Spree Hits Musk, Obama, Apple, and More

WIRED Threat Level

An unprecedented “security incident” has rocked Twitter—and scammers are making off with huge amounts of bitcoin.

Security 103
article thumbnail

MGM Data Breach Ten Times Larger Than Initially Reported

Adam Levin

The discovery of a database for sale on the dark web suggests the 2019 data breach of MGM Resorts was significantly larger than initially reported. Access to the database was made available on a dark web cybercrime marketplace for roughly $3,000. It contains the personal information of more than 142 million guests of MGM hotels, according to technology reporting site ZDNet.

article thumbnail

How Nanotechnology Will Disrupt Cybersecurity

Dark Reading

Tangible solutions related to cryptography, intelligent threat detection and consumer security are closer than you think.

article thumbnail

NSA on Securing VPNs

Schneier on Security

The NSA's Central Security Service -- that's the part that's supposed to work on defense -- has released two documents (a full and an abridged version) on securing virtual private networks. Some of it is basic, but it contains good information. Maintaining a secure VPN tunnel can be complex and requires regular maintenance. To maintain a secure VPN, network administrators should perform the following tasks on a regular basis: Reduce the VPN gateway attack surface Verify that cryptographic algori

Security 107
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why information matters for the resilient organization

OpenText Information Management

Every company must become an information company to thrive in the next decade. We hear that a lot – but what does it really mean? Today, most organizations generate a lot of data. Supply chain information, customer interactions, employee records, office management data, asset usage records. The list is endless, and the challenge is to … The post Why information matters for the resilient organization appeared first on OpenText Blogs.

IT 75
article thumbnail

GoldenHelper, a new malware delivered via Chinese tax software

Security Affairs

Security researchers discovered another malware family delivered through tax software that some businesses operating in China are required to install. Security researchers at Trustwave have discovered another malware family delivered through tax software that Chinese banks require companies operating in the country to install. At the end of June, the same team of experts spotted GoldenSpy , a new backdoor, that is being distributed embedded in tax payment software (the Aisino Intelligent tax sof

IT 75
article thumbnail

FTC Privacy Shield Settlement Requires Company to Obtain Annual Outside Compliance Review

Hunton Privacy

On June 30, 2020, the Federal Trade Commission (“FTC”) announced it had entered into a consent agreement (the “Proposed Settlement”) with NTT Global Data Centers Americas, Inc. (“NTT”), a successor in interest to RagingWire Data Centers, Inc. (“RagingWire”), to settle allegations in a November 2019 Administrative Complaint that RagingWire misrepresented its participation in and compliance with the EU-U.S.

article thumbnail

A guide to data subject rights for data professionals

Collibra

In the world of data privacy, data subject rights are the hot topic for Chief Data Officers, Data Protection Officers, and all people who work with data right now. Data subject rights, also known as consumer rights and individual rights, r efers to a person’s control over how their personal data is used by businesses. Businesses are required to fulfill those rights to demonstrate sufficient management and protection of personal data and adherence to global privacy laws, such as the General Data

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Partnering With Tech and Fintech Firms: Key EU/UK Regulatory Considerations for the Payments Sector

Data Matters

There has been a rapid increase in collaboration between fintechs and other technology firms and more traditional payment service providers (PSPs) such as banks, merchant acquirers, and money transmitters. While fintechs and technology firms are often seen as direct competitors of traditional PSPs, in a market driven by innovation, both sides of the market increasingly consider collaboration a mutually beneficial way to play to each participating firm’s strengths.

article thumbnail

How to Extend Security Across Your Kubernetes Infrastructure

Security Affairs

How to enhance the security across a Kubernetes Infrastructure and mitigate the risk of cyber attacks. By David Bisson. The security risks surrounding containers are well-known. Container images suffer from vulnerabilities that malicious actors could exploit for the purpose of gaining access to the larger container environment, for instance. Containers might also be able to acquire new privileges, thereby allowing malicious actors to abuse those rights for the purpose of moving laterally in the

article thumbnail

What’s holding up digital contact tracing?

OpenText Information Management

In May, Norway became one of the latest countries to abandon its COVID-19 contract-tracing app amid data privacy concerns. As countries begin the slow process of emerging from lockdown, test and trace is an essential tool in minimizing the risk of spikes in infection. However, the need to share information makes sensitive data vulnerable to … The post What’s holding up digital contact tracing?

article thumbnail

The TLS 1.2 Deadline is Looming, Do You Have Your Act Together?

Threatpost

Sectors such as Education (47%), Energy (40%), and Public Administration (37%) have struggled to implement TLS 1.2 protocols.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Home is What the Terminal Emulates

Rocket Software

We’ve all been spending a lot of time at home lately. Many of us, as we live and work in our houses day-in, day-out, week after week, have found reasons to rearrange furniture, relocate hand towels and otherwise tune the environment to make it feel easier and more livable. To make it feel more like home. Anyone with their hands on the keyboard of a mainframe, IBM i, or other centralized server knows exactly what home feels like.

Mining 67
article thumbnail

Joe Biden, Bill Gates, Barack Obama All Hacked in Twitter Compromise

Adam Levin

The personal Twitter accounts of Elon Musk, Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Kanye West, Warren Buffett in addition to the official corporate accounts of Apple, Uber, and Cash were hijacked for several hours July 15 in an apparent Bitcoin scam. Most of the messages requested a transfer of Bitcoin with a promise of doubling all payments made within 30 minutes of posting.

article thumbnail

Top 5 Questions (and Answers) About GRC Technology

Dark Reading

For the first time in a long time, we must shift from managing localized risks against a landscape of economic growth to managing those issues under much less certain circumstances.

Risk 67