Tue.Aug 28, 2018

article thumbnail

Breach Reveal: PG&E Exposed 30,000 Sensitive Records

Data Breach Today

Previously Unnamed Utility Reached Record $2.7 Million Settlement Agreement A previously unnamed U.S. energy company that agreed to a record $2.7 million settlement after it left 30,000 records about its information security assets exposed online for 70 days in violation of energy sector cybersecurity regulations has been named as California utility PG&E.

article thumbnail

Pwned Passwords, Now As NTLM Hashes!

Troy Hunt

I'm still pretty amazed at how much traction Pwned Passwords has gotten this year. A few months ago, I wrote about Pwned Passwords in Practice which demonstrates a whole heap of great use cases where they've been used in registration, password reset and login flows. Since that time, another big name has come on board too : I love that a service I use every day has taken something I've built and is doing awesome things with it!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bank of Spain Hit by DDoS Attack

Data Breach Today

Website of Spain's Central Bank Was Temporarily Offline Spain's central bank says its website was intermittently offline as it struggled to repel a distributed denial-of-service attack. The temporary disruption is a reminder "stresser/booter" DDoS-on-demand services remain inexpensive, easy to procure and often effective.

IT 124
article thumbnail

Expert publicly disclosed exploit code for Windows Task Scheduler Zero-Day

Security Affairs

A security researcher has publicly disclosed the details of zero-day privilege escalation vulnerability affecting all Microsoft’s Windows operating systems. A security researcher who handles the Twitter account @SandboxEscaper has disclosed the details of zero-day privilege escalation vulnerability affecting Microsoft’s Windows operating systems that could be exploited by a local attacker or malicious program to obtain system privileges on the vulnerable system.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Regulations Create Pressure to Take Privacy More Seriously

Data Breach Today

Companies that want to continue doing business globally will need to take privacy much more seriously, especially in light of increasingly strict new laws, ranging from the California Consumer Privacy Act to the EU's GDPR, says privacy and security expert Michelle Robles.

Privacy 100

More Trending

article thumbnail

Connecting the Dots With Machine Data

Data Breach Today

Matthew Joseff of Splunk on Fighting Fraud With Better Data Machine data and machine learning have the potential to connect disparate data sources, enabling better fraud detection and prevention, says Matthew Joseff of Splunk, who highlights real-world examples of fighting fraud with better data.

100
100
article thumbnail

FAQ: How long do we keep expunction orders?

The Texas Record

Picture this: you’ve gathered up all the records subject to an expunction order and you’re ready to return, destroy or redact them as directed by the court. Then you look at the expunction order. It identifies the person in the order and it’s a government record. What do you do with it? Based on how often we receive this question, we know many of you picture yourselves in this situation on a regular basis.

article thumbnail

Why Security Pros Need a Framework for Change

Data Breach Today

Dora Gomez of Association of Certified Fraud Examiners on Setting Priorities Dora Gomez of the Association of Certified Fraud Examiners discusses why security professionals should set up a framework to deal with changing regulations and threats.

Security 100
article thumbnail

Streaming Analytics with OpenText Magellan

OpenText Information Management

Streaming Analytics is the ability to continuously process, manage, monitor, enrich and perform real-time analysis on live streaming data (typically from sensors and other components of the Internet of Things [IoT]). As organizations across the globe embrace and deploy large-scale data processing engines like Apache Spark, it is enabling leaders and managers access to real-time or … The post Streaming Analytics with OpenText Magellan appeared first on OpenText Blogs.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mobile/Web App Security: How Do You Know it's Working?

Data Breach Today

Nick Holland and Chris Mizell of Arxan Technologies reflect on key findings from their recent Executive Roundtable on mobile security

Security 100
article thumbnail

Critical Apache Struts flaw CVE-2018-11776 exploited in attacks in the wild

Security Affairs

According to the threat intelligence firm Volexity, the CVE-2018-11776 vulnerability is already being abused in malicious attacks in the wild. Just yesterday I wrote about the availability online of the exploit code for the recently discovered Critical remote code execution vulnerability CVE-2018-11776 in Apache Struts 2. The PoC code was published on GitHub and experts were warning of the risks of massive attacks.

Mining 55
article thumbnail

Highlights from DefCon 2018

Thales Cloud Protection & Licensing

This year, DefCon’s theme was 1983, intending to represent the choices a society may face on the eve of full authoritarian control. We attended the show with our colleague Paul Cleary and sat in on many talks (and demos) ranging from attacking IoT devices over insecure Bluetooth connections, to exploiting publically available expired certificates. There were many security issues present in corporate AD implementations, and hacking commonly-used voting machines was discussed.

article thumbnail

Cryptocurrency Platform Atlas Quantum hacked, 260k users impacted

Security Affairs

The Cryptocurrency Platform Atlas Quantum suffered a security breach, information belonging to more than 260,000 users was stolen by hackers. Hackers stole information related to over 260,000 users of the Cryptocurrency Platform Atlas Quantum. Exposed data includes customer names, phone numbers, and email addresses, as well as customer account balances.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The bias problem with artificial intelligence, and how to solve it

Information Management Resources

From facial recognition for unlocking our smartphones to speech recognition and intent analysis for voice assistance, artificial intelligence is all around us today.

article thumbnail

Free Cybersecurity Services Offer a First Step to Securing US Elections

Dark Reading

Some key security vendors - including Microsoft, Google, Cloudflare - are offering pro bono services and tools for election jurisdictions and campaigns this election season. But will it help?

article thumbnail

Second Circuit Stands By Medidata “Spoofing” Decision

Hunton Privacy

As reported on Hunton’s Insurance Recovery blog , the Second Circuit has rejected Chubb subsidiary Federal Ins. Co.’s request for reconsideration of the court’s July 6, 2018, decision, confirming that the insurer must cover Medidata’s $4.8 million loss under its computer fraud insurance policy. In July, the court determined that the loss resulted directly from the fraudulent emails.

article thumbnail

WhatsApp: Mobile Phishing's Newest Attack Target

Dark Reading

In 2018, mobile communication platforms such as WhatsApp, Skype and SMS have far less protection against app-based phishing than email.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

NotPetya

Schneier on Security

Andy Greenberg wrote a fascinating account of the Russian NotPetya worm, with an emphasis on its effects on the company Maersk. BoingBoing post.

IT 47
article thumbnail

Why Security Needs a Software-Defined Perimeter

Dark Reading

Most security teams today still don't know whether a user at the end of a remote connection is a hacker, spy, fraudster -- or even a dog. An SDP can change that.

article thumbnail

Morgan Templar, #InfoGov18 Speaker Interview Series

IG Guru

We’re pleased to bring you a series of interviews with some of the presenters at The Information Governance Conference 2018. The Information Governance Conference is the only conference designed from the ground up to help you strategically protect and extract value from your organization’s information. The Conference, going into its’ fifth year, brings together the top […].

article thumbnail

North Korea’s Lazarus Tied to Cryptojacking Campaign Targeting MacOS

The Security Ledger

North Korean state-sponsored hacking group Lazarus is believed to be behind a recent crypto jacking attack on several banks with an unexpected twist–the use of a Trojan that tricked a company employee into downloading malware, according to Kaspersky Lab. Kaspersky researchers made what they call the “unexpected discovery” while. Read the whole entry. » Related Stories Amnesty International Targeted by Israeli Spyware Kaspersky Deems Crypto-jacking the New Ransomware as Cry

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Welcome UFL RIM Listserv Members!

IG Guru

Welcome Listserv Members! Welcome to IG GURU – www.igguru.net! Peter, Marc, and the founders of the Listserv did a fantastic job providing a community and forum for industry professionals. My sincere thank you for all the work they did for us! Whether you joined the Listserv for news, jokes, job announcements, or for educational information, […].

article thumbnail

Five benefits of eDiscovery software for Financial Services

OpenText Information Management

Financial Service organizations are among the most highly regulated industries and routinely face a myriad of compliance and administrative proceedings. Prominent financial regulators like the UK Serious Fraud Office and the US Securities and Exchange Commission have already adopted the best eDiscovery (electronic discovery) solutions available to enhance their own reviews.

article thumbnail

The call for speaking proposals is open! – IAPP

IG Guru

Global Privacy Summit 2019 Certification Training April 30-May 1 Active Learning May 1 Conference May 2-3 WASHINGTON, DC Do you have expertise to share on the Summit stage? The recent Global Privacy Summit 2018 left the data protection community abuzz with big ideas, practical solutions and valuable new connections. We’re still riding the wave here […].

Privacy 40
article thumbnail

Three Decades On: RSA Labs Sets Course for Future

The Security Ledger

RSA Chief Technology Officer and head of RSA Labs Zulfikar Ramzan says his company, which pioneered commercial applications of public key cryptography, is setting its sites on the future as it looks to embrace the disruptive security solutions of the future. The joke is that “change is the only constant” in the information security. Read the whole entry. » Related Stories Secure Access as a Business Accelerator: a Conversation with Pulse Secure IoT, Machine Learning and AI in t

IoT 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft Windows Zero-Day Found in Task Scheduler

Threatpost

A Windows task scheduler API function does not check permissions - so any potential local bad actor can alter them to gain elevated privileges.

article thumbnail

Fileless Attacks Jump 94% in First Half of 2018

Dark Reading

While ransomware is still popular, fileless and PowerShell attacks are the threats to watch this year.

article thumbnail

ThreatList: Ransomware Attacks Down, Fileless Malware Up in 2018

Threatpost

The first half of 2018 saw an uptick in fileless malware attacks and a downturn in ransomware attacks, for now.