Fri.Dec 04, 2020

article thumbnail

Bad Cookies: Privacy Regulator Fines Supermarket Giant

Data Breach Today

$3.7 Million Fine for French Supermarket Giant Carrefour for Alleged GDPR Violations France's privacy regulator has hit retail giant Carrefour with a $3.7 million fine for violating privacy laws, including GDPR. It's accused of failing to make privacy policies easy to understand, placing advertising cookies without consent and retaining customer data for unreasonable periods of time.

Privacy 275
article thumbnail

Recently disclosed CVE-2020-4006 VMware zero-day was reported by NSA

Security Affairs

VMware addressed CVE-2020-4006 zero-day flaw in VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector. VMware has finally released security updates to fix the CVE-2020-4006 zero-day flaw in VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector. At the end of November, VMware only has released a workaround to address the critical zero-day vulnerability that affects multiple VMware Workspace One components.

Passwords 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Defense Bill Would Restore White House Cybersecurity Post

Data Breach Today

Measure Is the Latest Effort to Revive Position A defense policy bill that Congress plans to vote on later this month now includes a provision that would restore the position of national cyber director at the White House, says Rep. Jim Langevin, D-R.I.

article thumbnail

Hundreds of millions of Android users exposed to hack due to CVE-2020-8913

Security Affairs

Hundreds of millions of Android users are potentially exposed to the risk of hack due to the use of Android Play Core Library versions vulnerable to CVE-2020-8913. The CVE-2020-8913 flaw is a local, arbitrary code execution vulnerability that resides exists in the SplitCompat.install endpoint in Android’s Play Core Library. The vulnerability is rated 8.8 out of 10.0 and impacts Android’s Play Core Library versions prior to 1.7.2.

Libraries 117
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Phishing Campaign Targeted Universities Worldwide

Data Breach Today

Researchers: 'Shadow Academy' Activity Coincided With Start of School Year A hacking group targeted 20 universities and other schools around the world earlier this year with a series of phishing campaigns designed to steal credentials, according to researchers at RiskIQ.

Phishing 256

More Trending

article thumbnail

Hacking Group Used Crypto Miners as Distraction Technique

Data Breach Today

Microsoft: Bismuth APT Tries to Distract Targets From Spying Tools A hacking group recently deployed cryptocurrency miners within targeted victims' networks to distract security teams from their cyberespionage campaigns, Microsoft reports.

Security 241
article thumbnail

Enigma Machine Recovered from the Baltic Sea

Schneier on Security

Neat story : German divers searching the Baltic Sea for discarded fishing nets have stumbled upon a rare Enigma cipher machine used by the Nazi military during World War Two which they believe was thrown overboard from a scuttled submarine. Thinking they had discovered a typewriter entangled in a net on the seabed of Gelting Bay, underwater archaeologist Florian Huber quickly realised the historical significance of the find.

Military 112
article thumbnail

Analysis: Apple iOS 'Zero-Click Exploit'

Data Breach Today

This edition of the ISMG Security Report features an analysis of a serious Apple iOS "zero-click exploit" that could have allowed hackers to remotely gain complete control of a device. Also featured: a discussion of identity proofing challenges and a review of New Zealand's updated Privacy Act.

Privacy 197
article thumbnail

CIPL Submits Response to UK DCMS’ National Data Strategy Consultation

Hunton Privacy

On December 2, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth submitted its response to the UK Department for Digital, Culture, Media and Sport’s (“DCMS”) UK National Data Strategy (“NDS”) consultation. In June 2018, the Secretary of State for the UK DCMS announced the UK Government’s intention to develop a NDS that would unlock the power of data across government and the wider economy while also building citizen trust.

Risk 96
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Balancing Security, Customer Service

Data Breach Today

Experian's David Britton on Identity Governance and Security Organizations can enhance security while maintaining a good customer experience by leveraging data for authentication, says David Britton of Experian.

article thumbnail

Weekly Update 220

Troy Hunt

It's a lighter weekly update this week, kinda feels like I'm still recovering from last week's epic IoT series TBH. It's also the last update from home before I go on my first decent trip since the whole pandemic thing started and as such, the next five updates will all come from other locations, some of them rather, uh, "remote". But there's still an hour of content today including the fact that it's HIBP's birthday ??

IoT 94
article thumbnail

The Future of Cyber Resilience—Enfuse On Air 2020

OpenText Information Management

The Future of Cyber Resilience – Click Here to View the Keynote OpenText’s 20th annual Enfuse conference—the cybersecurity and digital investigations event of the year—has just come to an end. The incredible four-week on-air conference series brought together cybersecurity leaders from around the world to share knowledge about the latest trends and technologies that are … The post The Future of Cyber Resilience—Enfuse On Air 2020 appeared first on OpenText Blogs.

article thumbnail

Vancouver Metro Disrupted by Egregor Ransomware

Threatpost

The attack, which prevented Translink users from using their metro cards or buying tickets at kiosks, is the second from the prolific threat group just this week.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Escape Endless Implementation with Micro Focus Enterprise Service Management

Micro Focus

Companies are relying on Service Desks more than ever in this pandemic. More employees are working from home and do not have access to their “friendly IT guy.” This means that enterprises are reporting significant increases in service desk tickets and consequently the idea of replacing their service desk right now is a scary proposition. . View Article.

Access 84
article thumbnail

VMware Rolls a Fix for Formerly Critical Zero-Day Bug

Threatpost

VMware has issued a full patch and revised the severity level of the NSA-reported vulnerability to "important.".

article thumbnail

Egregor ransomware attack paralyzed for 3 days payment systems at Metro Vancouver’s transportation agency TransLink

Security Affairs

The Egregor ransomware operators hit Metro Vancouver’s transportation agency TransLink disrupting services and payment systems. Egregor ransomware operators made the headlines again, this time they hit Metro Vancouver’s transportation agency TransLink causing the disruption of its services and payment systems. The news was also confirmed by Global News which has obtained the ransom letter sent to TransLink after the company announced to have detected “suspicious network activity” this week that

article thumbnail

Making Sense of the Security Sensor Landscape

Threatpost

Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The 2020 Workshop on Economics and Information Security (WEIS)

Schneier on Security

The workshop on Economics and Information Security is always an interesting conference. This year, it will be online. Here’s the program. Registration is free.

article thumbnail

High-Severity Chrome Bugs Allow Browser Hacks

Threatpost

Desktop versions of the browser received a total of eight fixes, half rated high-severity.

Security 108
article thumbnail

Islamic imprisoned hacker Ardit Ferizi ordered to be deported

Security Affairs

The Islamic hacker Ardit Ferizi, who is serving 20 years for giving his support to Islamic State group has been granted compassionate release. Ardit Ferizi , aka Th3Dir3ctorY, is the hacker that supported the ISIS organization by handing over data for 1,351 US government and military personnel. Ferizi is the first man charged with cyber terrorism that was extradited to the US early this year.

article thumbnail

BECs and EACs: What's the Difference?

Dark Reading

Email accounts are common targets for attack. Understanding how attack types differ is critical for successful defense.

93
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Novel Online Shopping Malware Hides in Social-Media Buttons

Threatpost

The skimmer steals credit-card data, using steganography to hide in plain sight in seemingly benign images.

article thumbnail

Flash Dies but Warning Signs Persist: A Eulogy for Tech's Terrible Security Precedent

Dark Reading

Flash will be gone by the end of the year, but the ecosystem that allowed it to become a software security serial killer is ready to let it happen again.

Security 106
article thumbnail

Is Your Cybersecurity Ready for the Holidays?

Adam Levin

Retailers around the world are anticipating less foot traffic in their shops this holiday season, with more than 75% of consumers expected to do most of their shopping online due to the pandemic. And if there was any doubt as to this proposition, Black Friday certainly proved the point. While that will certainly keep consumers safer when it comes to Covid-19 infections, it could make them more vulnerable to other ills like cybercrime.

article thumbnail

Microsoft Cloud Security Exec Talks New Tech, WFH, Gamification

Dark Reading

Gunter Ollman explains the benefits of CPSM technology, how IT security teams have evolved, and how the pandemic has shaped security.

Cloud 113
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Personal Info of Over 243 Million Brazilians Exposed Online

Adam Levin

The personal information of over 243 million Brazilians was left accessible online for at least six months. The data leak was discovered by the Brazilian newspaper Estadao and has been attributed to web developers leaving the password to a government database in the source code of a publicly accessible website. The potentially exposed data included full names, addresses, telephone numbers, and medical details of anyone who had registered with the country’s national health system, totaling roughl

article thumbnail

Intel Doubles Down on Emerging Technologies for Sharing and Using Data Securely

Dark Reading

Homomorphic encryption and federated learning could allow groups to share data and analysis while protecting the actual information.

article thumbnail

Mitigating Social Bias in Knowledge Graphs

Adam Shostack

There’s an interesting paper, Mitigating social bias in knowledge graph embeddings from a team at Amazon, which was presented at an academic workshop on bias in knowledge graph construction. The work is interesting, and the availability of approaches like this will be a welcome shift in how we deal with these important issues. Of course, these approaches are not panaceas, but starting to define and address relatively low hanging fruit is important.

Paper 40