Sun.Aug 04, 2019

article thumbnail

DealPly adware abuses reputation services to remain under the radar

Security Affairs

Malware researchers from enSilo have spotted a new variant of the DealPly adware that uses a new method to avoid detection. Researchers from enSilo have discovered a new variant of the modular DealPly adware that abuses the reputation services provided by Microsoft’s SmartScreen ( aka Windows Defender SmartScreen ) and McAfee’s WebAdvisor to avoid detection.

article thumbnail

The Wrong Way to Talk About the El Paso Shooter's Manifesto

WIRED Threat Level

The more oxygen these manifestos get, the wider their messages spread. And no one understands that better than the people posting them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The US Gov is testing high-altitude balloons for surveillance

Security Affairs

The US government is testing high-altitude balloons manufactured by Sierra Nevada to conduct surveillance over American soil. The US government is planning to use high-altitude balloons to conduct surveillance over Americans. The high-altitude balloons are manufactured by Sierra Nevada Corporation, they will cover a large area in the United States’ Midwest.

article thumbnail

Cloudflare Ditches 8chan. What Happens Now?

WIRED Threat Level

In an interview with WIRED, Cloudflare CEO Matthew Prince explains his decision to stop protecting 8chan—and where the notorious forum goes from here.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Poshmark, the social commerce marketplace, discloses a data breach

Security Affairs

Poshmark, a social commerce marketplace where people in the United States can buy and sell new or used clothing, shoes, and accessories, disclosed a data breach. On August 1, the US social commerce marketplace Poshmark disclosed a data breach. The company discovered unauthorized access to its servers, the intruders stole personal information of the users, including usernames , hashed passwords, first and last names, gender information, and city of residence.

More Trending

article thumbnail

Houston County Schools in Alabama delayed the school year’s opening due to a malware attack

Security Affairs

It has happened again, for the second time in a few days, Houston County Schools in Alabama delayed the school year’s opening due to a malware attack. The long wave of malware attacks against US schools continues, for the second time in a week, the Houston County Schools in Alabama delayed the school year’s opening scheduled for August 1st due to a malware attack. “Students will now report back on Monday, August 12.

article thumbnail

Weekly Update 150

Troy Hunt

Vegas! I'm a bit late with this week's update but I thought I'd catch up with Scott Helme and do the video together. We're talking about the events in Vegas, the ongoing Project Svalbard process, some very screwy messaging about certificates from Sectigo and the Irish government coming on board HIBP. Next week we'll do another one from Vegas and talk about what the events of the week here were like.

article thumbnail

Security Affairs newsletter Round 225 and Important Update

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Hi folk, let me inform you that I suspended the newsletter service, anyway I’ll continue to provide you a list of published posts every week through the blog. Once again thank you! Crooks used rare Steganography technique to hack fully patched websites in Latin America.

article thumbnail

Having the Right Technology is Only One Piece of the Puzzle: eDiscovery Trends

eDiscovery Daily

We all get the eDiscovery technology is changing – in large part because the demands of eDiscovery are changing. Amazingly enough though, it’s not just about the technology – as a recent article discusses, it’s as much about the training on how to use the technology as it is about the capabilities of the technology itself. In Corporate Counsel ( A Journey of Self E-Discovery , written by Frank Ready), the author speaks with several eDiscovery and technology experts regarding the needs and chall

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Protected: Hak5 tool workshops — Achieving Security Awareness Through Social Engineering Attacks BlackHat USA 2019

Architect Security

There is no excerpt because this is a protected post.