Thu.Sep 16, 2021

article thumbnail

Data governance council: What is it and why do you need one?

Collibra

A data governance council is a governing body for strategizing data governance programs, raising awareness of its importance, approving enterprise data policies and standards, prioritizing related projects, and enabling ongoing support. Giving the right direction, the data governance council empowers all to create value from data assets while complying with security and privacy.

article thumbnail

FTC: Health App, Device Makers Must Report Breaches

Data Breach Today

But Does the 'Policy Statement' Warning Overstep the Intention of the Rule? The FTC warns makers of personal health records, mobile health apps, fitness devices and a variety of similar products and services that they will face stiff civil monetary penalties for failure to comply with the commission's 12-year-old - but never-yet enforced - Health Breach Notification Rule.

358
358
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Trial Ends in Guilty Verdict for DDoS-for-Hire Boss

Krebs on Security

A jury in California today reached a guilty verdict in the trial of Matthew Gatrel , a St. Charles, Ill. man charged in 2018 with operating two online services that allowed paying customers to launch powerful distributed denial-of-service (DDoS) attacks against Internet users and websites. Gatrel’s conviction comes roughly two weeks after his co-conspirator pleaded guilty to criminal charges related to running the services.

Education 286
article thumbnail

Is Grief's Threat to Wipe Decryption Key Believable?

Data Breach Today

Analysts Say the Gang Is Escalating Rhetoric to Scare Victims Regarding the recent tactical innovation by the Grief ransomware gang that is threatening to wipe a victim's data and decryption key if the victim engages a ransom negotiator, analysts are calling this a desperate ploy to scare a target into paying the ransom demand.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

McAfee Finds Years-Long Attack by Chinese-Linked APT Groups

eSecurity Planet

An investigation by McAfee researchers into a case of a suspected malware infection uncovered a cyber attack that had been sitting in the victim organization’s network for years stealing data. The investigators said the advanced threat actors used a mixture of known and unique malware tools in the attack – which they dubbed Operation Harvest – to compromise the victim’s IT environment, exfiltrate the data and evade detection.

Military 133

More Trending

article thumbnail

OWASP Names a New Top Vulnerability for First Time in Years

eSecurity Planet

OWASP security researchers have updated the organization’s list of the ten most dangerous vulnerabilities – and the list has a new number one threat for the first time since 2007. The last update was in November 2017, and the latest draft is available for peer review until the end of the year. The Open Web Application Security Project (OWASP) is a nonprofit foundation and an open community dedicated to security awareness.

article thumbnail

Azure Zero-Day Flaws Highlight Lurking Supply-Chain Risk

Threatpost

Dubbed OMIGOD, a series of vulnerabilities in the Open Management Infrastructure used in Azure on Linux demonstrate hidden security threats, researchers said.

Risk 104
article thumbnail

Microsoft warns of attacks exploiting recently patched Windows MSHTML CVE-2021-40444 bug

Security Affairs

Microsoft revealed that multiple threat actors are exploiting the recently patched Windows MSHTML remote code execution security flaw (CVE-2021-40444 ). Microsoft warns of multiple threat actors, including ransomware operators, that are exploiting the recently patched Windows MSHTML remote code execution security flaw ( CVE-2021-40444 ) in attacks against organizations.

article thumbnail

Release of Standard Data Elements for Electronic Records Management

National Archives Records Express

We are pleased to announce the posting of the Standard Data Elements for Electronic Records Management ! We first shared drafts of the data elements on Records Express in January 2021. Thank you for all of your feedback. . We created the Standard Data Elements as part of our Federal Electronic Records Modernization Initiative (FERMI). Through FERMI, we have been working to improve the way agencies acquire ERM services and solutions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bitdefender released free REvil ransomware decryptor that works for past victims

Security Affairs

Researchers from Bitdefender released a free master decryptor for the REvil ransomware operation that allows past victims to recover their files for free. Good news for the victims of REvil ransomware gangs that were infected before the operations were temporarily halted on July 13th, Bitdefender released a free master decryptor that allows them to recover their files for free.

article thumbnail

REvil/Sodinokibi Ransomware Universal Decryptor Key Is Out

Threatpost

Bitdefender worked with law enforcement to create a key to unlock victims encrypted in ransomware attacks before REvil's servers went belly-up on July 13.

article thumbnail

ARMA Greater Columbus September 2021 Chapter Meeting – Tour of The Supreme Court of Ohio

IG Guru

Location: The Supreme Court of Ohio – Moyer Judicial Center Enter at 65 S. Front Street, Columbus, OH 43215 Date: September 23rd, 2021 Time: 2:40-4:00 pm. We will then be able to explore the Visitor Education Center’s interactive exhibits until 5:00 pm. Note: The tour begins at 3:00 PM. Please arrive early and allow yourself […]. The post ARMA Greater Columbus September 2021 Chapter Meeting – Tour of The Supreme Court of Ohio appeared first on IG GURU.

article thumbnail

Airline Credential-Theft Takes Off in Widening Campaign

Threatpost

A spyware effort bent on stealing cookies and logins is being driven by unsophisticated attackers cashing in on the initial-access-broker boom.

Access 98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Under Pressure: COVID-19 Forced Many Execs to Sideline Cybersecurity

Dark Reading

CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm between need and funding.

article thumbnail

Financial Cybercrime: Following Cryptocurrency via Public Ledgers

Threatpost

John Hammond, security researcher with Huntress, discusses a wallet-hijacking RAT, and how law enforcement recovered millions in Bitcoin after the Colonial Pipeline attack.

article thumbnail

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse

Elie

We propose a comprehensive online hate and harassment taxonomy derived from analyzing over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs.

Paper 62
article thumbnail

HP Omen Hub Exposes Millions of Gamers to Cyberattack

Threatpost

A driver privilege-escalation bug gives attackers kernel-mode access to millions of PCs used for gaming.

Access 96
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

FBI, CISA, CGCYBER Warn of APTs Targeting CVE-2021-40539

Dark Reading

The critical authentication bypass vulnerability exists in Zoho ManageEngine ADSelfService Plus, officials report.

article thumbnail

Data governance council: What is it and why do you need one?

Collibra

A data governance council is a governing body for strategizing data governance programs, raising awareness of its importance, approving enterprise data policies and standards, prioritizing related projects, and enabling ongoing support. Giving the right direction, the data governance council empowers all to create value from data assets while complying with security and privacy.

article thumbnail

Essential guidance for employers implementing COVID-19 measures at the workplace

Data Protection Report

As Singapore moves towards living with COVID-19 as an endemic disease, the Government has issued guidance for employers on the COVID-19 measures to be implemented at the workplace. We will discuss the guidance issued by (i) the Ministry of Manpower (“ MOM ”) on the updated safe management measures at the workplace; (ii) the MOM on COVID-19 vaccination in relation to the workplace; and (iii) the Personal Data Protection Commission (“ PDPC ”) on the collection of personal data at the workplace for

article thumbnail

Grappling With Growth, Employee Needs, and Security Amid a Return to Offices

Dark Reading

As organizations strive for a new version of business-as-usual, executives must prepare for challenges around infrastructure, varying guidelines, and balancing employee flexibility with office collaboration.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Jamf Parent App: New workflows for pediatric care.

Jamf

With the release of Jamf Pro 10.32, Jamf Parent app is now available to support families with patients who are admitted to the hospital.

52
article thumbnail

15% of the Nasdaq 100 Is Highly Susceptible to a Ransomware Attack, New Black Kite Research Finds

Dark Reading

Black Kite’s Ransomware Susceptibility Index (RSI) determined that 1-in-7 Nasdaq-100 companies ranked as highly susceptible to a ransomware attack.

article thumbnail

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse

Elie

We propose a comprehensive online hate and harassment taxonomy derived from analyzing over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs.

Paper 23
article thumbnail

HPE Survey Finds 76% of Doctors and Nurses Believe Telehealth Will Dominate Patient Care in Near Future

Dark Reading

Findings are presented in HPE's "Future of Healthcare" Report, which surveyed healthcare clinicians and IT Decision Makers (ITDMs) in the United States and United Kingdom.

IT 51
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

U.S. House Committee Votes to Create New FTC Privacy Bureau and Appropriate $1 Billion to the Agency

Hunton Privacy

On September 14, 2021, the U.S. House Committee on Energy and Commerce (“E&C Committee”) voted in favor of a legislative recommendation that would create a new Federal Trade Commission privacy bureau as part of the proposed $3.5 trillion federal budget reconciliation package. Specifically, the E&C Committee’s markup of the proposed budget would appropriate $1 billion to the FTC over 10 years to create and operate a bureau to accomplish the Commission’s work related to unfair or deceptive

Privacy 118
article thumbnail

Microsoft Warns of Uptick in MSHTML Attacks

Dark Reading

Attackers leveraging the flaw are using infrastructure associated with other criminal groups, including ransomware-as-a-service operators, the company says.

article thumbnail

FBI, CISA, and CGCYBER warn of nation-state actors exploiting CVE-2021-40539 Zoho bug

Security Affairs

The FBI, CISA, and the Coast Guard Cyber Command (CGCYBER) warn of state-sponsored attacks that are actively exploiting CVE-2021-40539 Zoho flaw. The FBI, CISA, and the Coast Guard Cyber Command (CGCYBER) warn that nation-state APT groups are actively exploiting a critical vulnerability, tracked as CVE-2021-40539 , in the Zoho ManageEngine ADSelfService Plus software.