Thu.Nov 29, 2018

article thumbnail

Federal Prosecutors Discuss SamSam Indictments

Data Breach Today

In the latest edition of the ISMG Security Report, hear prosecutors discuss the indictments of two Iranians in connection with SamSam ransomware attacks. Also: Updates on allegations that Google is violating GDPR and cryptocurrency's impact on crime trends.

GDPR 200
article thumbnail

Knock-Knock Docker!! Will you let me in? Open API Abuse in Docker Containers

Security Affairs

Exploring the open API abuse for Docker Containers. Docker is a popular container product which has been adopted widely by the community. Preface. IT industry has seen quite a few transformations in last couple of decades with advent of disruptive technologies. Back in 2000, every aspiring student wanted to become computer /IT engineer, thanks to “.com” boom that was storming the IT industry back in those days.

Mining 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Data & Leads' Site Disappears After Data Exposure Alert

Data Breach Today

Data Aggregator Exposed 44.3 Million Individuals' Details via Unsecured Servers Another day, another "Have I Been Pwned" alert, this time involving 44.3 million individuals' personal details found in unsecured instances of Elasticsearch, which appear to have been left online by Data & Leads, a Toronto-based data aggregation firm.

196
196
article thumbnail

Office 365 and SharePoint Training Giveaway

AIIM

We're getting close to our December Virtual Event and we have an exciting announcement! As a "Thank You", we're going to be giving away two Office 365 and SharePoint training courses. That's $995 worth of AIIM training for free! To be eligible, simply register and attend our FREE Virtual Event on Thursday, December 6th from 11am-3pm EST. At the end, we will select two winners at random from the list of attendees- that's it!

IT 80
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Why Contingency Planning for Vendor Data Disputes Is Critical

Data Breach Today

Lawsuit Over Patient Records Access Highlights the Need to Be Prepared A lawsuit over a Florida dentist's inability to access patient data stored by a cloud-based electronic medical records vendor illustrates why all healthcare providers need to plan for possible disruptions caused by disputes with business associates.

Cloud 184

More Trending

article thumbnail

Highlights of NIST Cybersecurity Framework Version 1.1

Data Breach Today

Matthew Barrett of NIST Outlines New Components, Including Supply Chain Risk Management The latest version of the NIST Cybersecurity Framework - Version 1.1 - includes more information on supply chain risk management, authentication, authorization, identity proofing and self-assessing cybersecurity risk management, says Matthew Barrett of the National Institute of Standards and Technology.

article thumbnail

Data breaches grow across UK education sector

IT Governance

A recent freedom of information request by chartered accountants UHY Hacker Young reveals a worrying rise in reported data breaches across the UK education sector. The high-profile GDPR (General Data Protection Regulation) mandates data breach reporting in many cases, and a lot of incidents have been reported since the Regulation came into force, but the numbers shared by the ICO (Information Commissioner’s Office) reveal a growing trend even before then.

article thumbnail

Dell data breach – Dell forces password reset after the incident

Security Affairs

Dell data breach – IT giant Dell disclosed a data breach, the company confirmed it has detected an intrusion in its systems on November 9th 2018. Attackers were trying to exfiltrate customer data (i.e. names, email addresses, and hashed passwords) from the company portal Dell.com, from support.dell.com websites. Wednesday that its online electronics marketplace experienced a “cybersecurity incident” earlier this month when an unknown group of hackers infiltrated its internal ne

article thumbnail

Dunkin' Donuts Serves Up Data Breach Alert

Dark Reading

Forces potentially affected DD Perks customers to reset their passwords after learning of unauthorized access to their personal data.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

U.S. DoJ charges Iranian duo over SamSam Ransomware activity

Security Affairs

The U.S. DoJ charges two Iranian men over their alleged role in creating and spreading the infamous SamSam ransomware. Two Iranian men, Faramarz Shahi Savandi (34) and Mohammad Mehdi Shah Mansouri (27) have been charged by DoJ for their role in creating and distributing the dreaded SamSam ransomware. The duo faces six hacking and extortion-related charges , including conspiracy to commit wire fraud, intentional damage to a protected computer, conspiracy to commit fraud and related activity in c

article thumbnail

Six ways that a pilot program helps your digital transformation succeed

TAB OnRecord

Pilot programs are a proven and effective way to minimize the risk of failures and maximize the benefits delivered by digitization initiatives. Here are six common ways that your colleagues are using pilot programs to ensure success when going digital: 1. Proving the business case From the outset of your pilot, look for quantifiable gains [.] Read More.

article thumbnail

FBI Takes Down a Massive Advertising Fraud Ring

Schneier on Security

The FBI announced that it dismantled a large Internet advertising fraud network, and arrested eight people: A 13-count indictment was unsealed today in federal court in Brooklyn charging Aleksandr Zhukov, Boris Timokhin, Mikhail Andreev, Denis Avdeev, Dmitry Novikov, Sergey Ovsyannikov, Aleksandr Isaev and Yevgeniy Timchenko with criminal violations for their involvement in perpetrating widespread digital advertising fraud.

IT 85
article thumbnail

The journey to AI is easier than you might think

IBM Big Data Hub

Only IBM has step by step framework that helps clients accelerate their journey to AI – and it starts with Information Architecture. .

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The importance of consumer IAM in the world of the ‘digital-savvy’ customer

OpenText Information Management

Consumer Identity and Access Management (CIAM), also known as B2C IAM, is still relatively new but it is rapidly becoming a ‘must have’ for any customer-focused business. It sets the foundation for an enterprise to deliver great customer experiences while creating the ideal balance between convenience and security. In the first of our CIAM blog … The post The importance of consumer IAM in the world of the ‘digital-savvy’ customer appeared first on OpenText Blogs.

B2C 74
article thumbnail

Perspectives on the ‘Paris Call’

Thales Cloud Protection & Licensing

“We the People of the United States, in Order to form a more perfect Union”. “Four score and seven years ago”. “I have a dream”. These are very well known quotes to every American. These quotes where opening salvos by great leaders who knew we had to come together for change and for good. Although the quotes I know off the top of my head are provincial, I also know that when there is a time that requires change, a time people must come together, for good, we should be listening to great leaders

article thumbnail

New Report Details Rise, Spread of Email-based Attacks

Dark Reading

Criminals are diversifying their target list and tactics in a continuing effort to keep email a valuable attack vector against enterprise victims.

82
article thumbnail

How can Scottish businesses prepare for a cyber incident?

IT Governance

Cyber attacks and data breaches are inevitable, and with 41% of executives saying they spend at least twice as much on investigations and relation interventions as is lost to cybercrime, it is in every organisation’s best interests to be fully prepared. Will it happen to my organisation? Cyber attacks can happen at any time and to any organisation, although according to the Scotsman , small and medium-sized businesses are targeted more often “because they don’t have the same defences in place”.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to enable 2FA on Twitter with Authy, Google Authenticator or another Mobile Application

PerezBox

It’s been a long time since I have had to enable 2FA on Twitter and found the process completely infuriating. Twitter’s 2FA configuration uses SMS as the default option, this. Read More. The post How to enable 2FA on Twitter with Authy, Google Authenticator or another Mobile Application appeared first on PerezBox.

article thumbnail

Supreme Court of Pennsylvania Ruling on Common Law Duty to Protect Electronic Employee Data

Hunton Privacy

On November 21, 2018, the Supreme Court of Pennsylvania ruled that a putative class action filed against UPMC (d/b/a The University of Pittsburg Medical Center) should not have been dismissed. The case arose from a data breach in which criminals accessed UPMC’s computer systems and stole the personal and financial information of 62,000 current and former UPMC employees.

article thumbnail

MITRE Changes the Game in Security Product Testing

Dark Reading

Nonprofit has published its first-ever evaluation of popular endpoint security tools - measured against its ATT&CK model.

article thumbnail

4 reasons to get CISMP qualified

IT Governance

A version of this blog was originally published on 10 November 2017. Those seeking a qualification that demonstrates a broad understanding of information security management should consider the British Computer Society CISMP (Certificate in Information Security Management Principles). Here are four reasons why: It’s the perfect starting point. If you are eager to develop a career in information security, CISMP is the perfect starting point.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Return of Email Flooding

Dark Reading

An old attack technique is making its way back into the mainstream with an onslaught of messages that legacy tools and script writing can't easily detect.

IT 70
article thumbnail

Weekly podcast: Uber, Google, and City of York Council vs RapidSpike

IT Governance

This week, we discuss the latest fines for Uber in connection with its 2016 data breach, GDPR complaints against Google, and the other side of the City of York Council ‘hack’ story. Hello and welcome to the IT Governance podcast for Friday, 30 November. Here are this week’s stories. The Information Commissioner’s Office has fined Uber £350,000 for the data breach it tried to cover up in 2016.

GDPR 58
article thumbnail

Library and Archives Canada’s journey of discovery: modernising our digital preservation infrastructure using Preservica

Preservica

On World Digital Preservation Day 2018, Sylvain Bélanger, Director General of Digital Operations and Preservation at Library and Archives Canada (LAC) discusses operating at scale, the challenges of preserving high volume born-digital content, and giving Canadians greater access to Canada’s continuing memory. World Digital Preservation Day is a great opportunity to celebrate the work of digital specialists globally, as well as the transformation of the technology driving digital preservation in

article thumbnail

Beware the Malware-Laden Brexit News

Dark Reading

New Fancy Bear attack campaign lures victims with phony Brexit-themed document to deliver Zekapab payload.

74
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Critical Zoom Flaw Lets Hackers Hijack Conference Meetings

Threatpost

Hackers can spoof messages, hijack screen controls and kick others out of meetings.

article thumbnail

Anti-Botnet Guide Aims to Tackle Automated Threats

Dark Reading

The international guide is intended to help organizations defend their networks and systems from automated and distributed attacks.

66
article thumbnail

Why ARMA’s IGBOK is important

IG Guru

For those of us in the industry, the concepts of information governance (IG) are not foreign. We know that IG is dynamic and there are many methodologies and best practices to help us with our programs. Last February, ARMA released the first version of the IGBOK. A group of 16 writers and experts from various […]. The post Why ARMA’s IGBOK is important appeared first on IG GURU.