Tue.Oct 27, 2020

article thumbnail

Sizing Up Nation-State Cyberthreats to the US Election

Data Breach Today

Digital Shadows: Disinformation, Ransomware, Phishing Attacks Prevail Online disinformation campaigns by nation-state actors are the biggest cyberthreat to the U.S. election as hackers attempt to influence final vote tallies as a way to undermine confidence, according to a Digital Shadows report. Russian hackers are most active, followed by Iran and China.

Phishing 204
article thumbnail

An Update on International and Cross-Border Discovery

AIIM

There have been some interesting developments in the world of E-Discovery tied to many of the same privacy protection laws and regulations changing the game in records and information management. To get a better understanding of how these regulations are affecting cross-border Discovery, we connected with our friends at the Association of Certified E-Discovery Specialists (ACEDS).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Online Platform Coordinates IoT Bug Reports

Data Breach Today

VulnerableThings.com Seeks to Improve Bug Reporting for Connected Devices A new online platform called VulnerableThings.com is aiming to become the go-to place for reporting and viewing reports on software flaws in IoT devices. The IoT Security Foundation and Oxford Information Labs say the platform could help vendors comply with new IoT regulations and standards.

IoT 318
article thumbnail

Reverse-Engineering the Redactions in the Ghislaine Maxwell Deposition

Schneier on Security

Slate magazine was able to cleverly read the Ghislaine Maxwell deposition and reverse-engineer many of the redacted names. We’ve long known that redacting is hard in the modern age, but most of the failures to date have been a result of not realizing that covering digital text with a black bar doesn’t always remove the text from the underlying digital file.

128
128
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Apps Infected With Adware Found on Google Play Store

Data Breach Today

Avast: Most of These Apps, Which Had 8 Million Downloads, Have Been Removed Some 21 malicious Android apps containing intrusive adware were discovered on the Google Play Store, but most have now been removed, according to a new report from the security firm Avast.

Security 199

More Trending

article thumbnail

French IT Services Firm Confirms Ryuk Ransomware Attack

Data Breach Today

Sopra Steria: Recovery Effort Will Take Weeks, But No Data Has Leaked French IT services firm Sopra Steria is confirming that its internal infrastructure sustained a Ryuk ransomware attack that has disrupted its operations, with a full recovery expected to take weeks.

article thumbnail

Survey Uncovers High Level of Concern Over Firewalls

Dark Reading

More than half of respondents are planning to reduce their network firewall footprint because of what they see as limitations in the technology.

134
134
article thumbnail

How to Fight Against 'Authorized Payment Fraud'

Data Breach Today

Two Card Security Experts Describe Effective Strategies Implementation of 3D Secure 2.0, a protocol designed to be an additional security layer for online credit and debit card transactions, by banks and merchants alike can play a critical role in reducing "authorized payment fraud," two security experts say.

Security 162
article thumbnail

MITRE Shield Matrix Highlights Deception & Concealment Technology

Dark Reading

The role that these technologies play in the MITRE Shield matrix is a clear indicator that they are an essential part of today's security landscape.

Security 126
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

China Issues Draft of Personal Information Protection Law

Hunton Privacy

On October 21, 2020, China issued a draft of Personal Information Protection Law (“Draft PIPL”) for public comments. The Draft PIPL marks the introduction of a comprehensive system for the protection of personal information in China. China’s Cybersecurity Law, Data Security Law (draft) and Draft PIPL constitute three fundamental laws on cybersecurity and data protection.

article thumbnail

Employees Aware of Emailed Threats Open Suspicious Messages

Dark Reading

A survey of 1,000 employees finds 96% of employees are aware of digital threats, but 45% click emails they consider to be suspicious.

117
117
article thumbnail

COVID-19 has created demand for cyber security personnel

IT Governance

With the COVID-19 pandemic forcing office workers around the world to work from home, organisations have faced a cyber security challenge like no other. Entire systems had to be overhauled, additional controls have been adopted to prevent cyber attacks and new software has been installed to help employees collaborate virtually. But these weren’t one-off tasks.

article thumbnail

Researchers: LinkedIn, Instagram Vulnerable to Preview-Link RCE Security Woes

Threatpost

Popular chat apps, including LINE, Slack, Twitter DMs and others, can also leak location data and share private info with third-party servers.

Security 108
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hacker was identified after the theft of $24 million from Harvest Finance

Security Affairs

A threat actor has stolen roughly $24 million worth of cryptocurrency assets from decentralized finance service Harvest Finance. A hacker has stolen approximately $24 million worth of cryptocurrency assets from decentralized finance service Harvest Finance , a web portal that lets users finding the farming opportunities that will maximize their yield(APY) returns.

IT 94
article thumbnail

Majority of Microsoft 365 Admins Don’t Enable MFA

Threatpost

Beyond admins, researchers say that 97 percent of all total Microsoft 365 users do not use multi-factor authentication.

article thumbnail

Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows

Dark Reading

Following the NSA's list of 25 security flaws often weaponized by Chinese attackers, researchers evaluated how they're used around the world.

Security 117
article thumbnail

Amazon Fires Employee Who Leaked Customer Names, Emails

Threatpost

Amazon notified customers and law enforcement of the insider-threat incident this week.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google removes a set of 21 malicious apps from the Play Store

Security Affairs

Google has removed 21 malicious apps from the official Play Store because they were found to serve intrusive and annoying ads. Google has removed 21 new malicious apps from the official Play Store because they were found displaying intrusive ads. The following malicious apps were spotted by researchers from cybersecurity firm Avast: Shoot Them Crush Car Rolling Scroll Helicopter Attack – NEW Assassin Legend – 2020 NEW Helicopter Shoot Rugby Pass Flying Skateboard Iron it Shooting Run

article thumbnail

Developers' Approach to App Testing Could Cut Flaw Fix Times by 80 Days

Dark Reading

An analysis of more than 130,000 active applications found more with at least one high-severity flaw compared with 2019.

119
119
article thumbnail

Cybersecurity Awareness Month: #BeCyberSmart

Collibra

This October we’re recognizing National Cybersecurity Awareness Month (NCSAM) to raise awareness about how to stay safe and secure online. This year’s theme is “Do Your Part. #BeCyberSmart,” a topic that feels even more timely while many of us are working from home. . New cybersecurity threats. As our lives become even more digital during the ongoing pandemic, we are facing many new challenges and threats in the security arena.

article thumbnail

Akamai Acquires Asavie

Dark Reading

Asavie's mobile, IoT, and security products and services will become part of the Akamai Security and Personalization Services product line.

IoT 108
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Holiday Shopping Craze, COVID-19 Spur Retail Security Storm

Threatpost

Veracode's Chris Eng discusses the cyber threats facing shoppers who are going online due to the pandemic and the imminent holiday season.

Retail 74
article thumbnail

5 Human Factors That Affect Secure Software Development

Dark Reading

With the move to remote work, it's especially important to understand how to support, discourage, and monitor conditions for development teams.

article thumbnail

Code42 Incydr Series: Secure Data in the Age of Remote Work

Threatpost

With Code42 Incydr, you can keep tabs on when and where your data is going — without restricting where or how your employees want to collaborate and work.

article thumbnail

Travelling Back in Time to the New York City of 1767-1768 via the Ratzen Map

Unwritten Record

There’s just something about old maps – some ineffable quality that draws the attention and makes one stop and bend closer to see what is there……and what’s not there. Has the landscape changed? Are towns missing or are towns shown that no longer exist? Is it engraved or is it a manuscript map? Are there images around the borders that show a time long gone, and what is going on in those images?

IT 58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Google Boots 21 Bogus Gaming Apps from Play Marketplace

Threatpost

Android apps packed with malware from HiddenAds family downloaded 8 million times from the online marketplace.

article thumbnail

Poll: Always Learning

Dark Reading

Cybersecurity certifications remain as popular as ever. Any interest in expanding your skill set?

article thumbnail

Webinar (EMEA): How Effective Digital Forms Simplify Data Capture and Easily Route Information

Docuware

Accurately collecting and structuring data is critical to your core business processes. Doing it efficiently involves avoiding pitfalls such as illegible handwriting scrawled across paper forms; hard to read PDFs with low resolution and human error on manual data entry. Using modern web forms eliminates these obstacles and offers a precise, streamlined and accelerated means of data collection.