Tue.Aug 25, 2020

article thumbnail

More Ransomware Gangs Threaten Victims With Data Leaking

Data Breach Today

22% of Ransomware Incidents Now Involve Data Exfiltration, Investigators Find Ransomware gangs are increasingly not just claiming that they'll leak data if victims don't pay, but following through. On average, about a quarter of all successful ransomware attacks feature a gang claiming to have first stolen data. But in recent months, the number of gangs actually doing so has surged.

article thumbnail

Vulnerability scans and false positives: the importance of sanitising input

IT Governance

The importance of checking a web application for vulnerabilities is well understood, but it can take a lot of skill and time to do this manually. There are many tools available that can automate the process but, as with all tools, it is important to understand their limitations. Web application scanning tools will automatically review a website by crawling through all its links, reviewing each page using an algorithm to match responses to signatures.

Libraries 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple Disagrees With Report About Mintegral Ad SDK

Data Breach Today

Security Firm Snyk Alleges China-Based Mintegral Logs Activity, Steals Ad Clicks An advertising software development kit called Mintegral that's embedded in 1,200 iOS apps misattributes ad clicks and logs potentially sensitive app data, security firm Snyk alleges. But Apple says there's no evidence the SDK is harming users.

Security 230
article thumbnail

The Fatal Flaw in Data Security

Dark Reading

Simply stated: No matter how sophisticated your security software is, data cannot be simultaneously used and secured. But that may be changing soon.

Security 123
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

4 Risk Mitigation Principles for the Remote Workforce

Data Breach Today

Jeff Schilling of Teleperformance on Risk Management During COVID-19 Pandemic Jeff Schilling, global CISO at Teleperformance, a Paris-based company offering digitally integrated business services worldwide, describes four principles for mitigating security risks for the remote workforce during the COVID-19 pandemic.

Risk 194

More Trending

article thumbnail

Lazarus Group Targets Cryptocurrency Firms Via LinkedIn Messages

Threatpost

The North Korean-linked APT's latest campaign shows that it is shifting focus to target the cryptocurrency and financial verticals.

IT 115
article thumbnail

Phishing Attack Used Box to Land in Victim Inboxes

Dark Reading

A phishing attack targeting government and security organizations used a legitimate Box page with Microsoft 365 branding to trick victims.

article thumbnail

Safari Bug Revealed After Apple Takes Nearly a Year to Patch

Threatpost

Polish security researcher unveiled the flaw in a cross-browser sharing API that could allow attackers to steal user files.

Security 108
article thumbnail

Identifying People by Their Browsing Histories

Schneier on Security

Interesting paper: " Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories ": We examine the threat to individuals' privacy based on the feasibility of reidentifying users through distinctive profiles of their browsing history visible to websites and third parties. This work replicates and extends the 2012 paper Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns [ 48 ].

Paper 112
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Shoring Up the 2020 Election: Secure Vote Tallies Aren’t the Problem

Threatpost

With many in the public sphere warning about a potential compromise of the integrity of the Presidential Election, security researchers instead flag online resources and influence campaigns as the biggest problem areas.

article thumbnail

Data privacy and trust in a digital-first COVID-19 era

OpenText Information Management

The COVID-19 crisis has accelerated the pace of digital transformation, making digital interaction central to almost every process and forcing organizations to adapt quickly. Where digital strategies were once mapped in one- to three-year phases, businesses are now scaling their initiatives in a matter of days, weeks, and months. The rush to adapt to this … The post Data privacy and trust in a digital-first COVID-19 era appeared first on OpenText Blogs.

article thumbnail

Protest App Bridgefy Riddled with Vulnerabilities

Adam Levin

A messaging app popular with activists and protesters around the globe was found to have several major vulnerabilities that could compromise user privacy. Bridgefy is a mesh messaging app that lets users send and receive texts to others nearby without requiring an internet connection. While the developers of the app say it’s ideal for communicating during large gatherings, natural disasters, or in school settings, the app’s publicized security and encryption features have made it a favorite for

article thumbnail

Online Business Fraud Down, Consumer Fraud Up

Dark Reading

Criminals are changing tactics to match changing business conditions in the coronavirus pandemic, according to a new report.

88
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Learning About Structure-Aware Fuzzing and Finding JSON Bugs to Boot

ForAllSecure

Introduction. What do JSON, YAML, and HTTP have in common? They’re all examples of ubiquitous data serialization and transmission standards, making them great targets for testing with fuzzing. While fuzzing has found many bugs in these kinds of targets, they all have requirements for structure in order for data to be considered “valid.” Handling these structure requirements intelligently is the key to finding the next level of bugs that others may have missed!

59
article thumbnail

Three Easy Ways to Avoid Meow-like Database Attacks

Dark Reading

The largest problem facing database security today is the disconnect between security teams and DBAs beginning from the moment of configuration and continuing throughout the database lifecycle.

article thumbnail

FERMI Collaboration Day

National Archives Records Express

On Thursday, August 6, we co-hosted a virtual Collaboration Day with the General Services Administration (GSA) on electronic records management solutions. The Collaboration Day was part of our Federal Electronic Records Modernization Initiative (FERMI). At the event, we provided updates including the release of Version 2 of the Universal Electronic Records Management Requirements , our work on the Federal Business Lifecycle and Business Capabilities, and the draft Universal Use Cases.

article thumbnail

CIPL Releases New Paper on COVID-19 and U.S. Privacy Law

Hunton Privacy

On August 25, 2020, Hunton’s Centre for Information Policy Leadership (“CIPL”) released a new paper entitled “ Data Protection in the New Decade: Lessons from COVID-19 for a US Privacy Framework. ” The paper examines how the COVID-19 pandemic has emphasized the need for a U.S. federal privacy law. It also highlights seven key takeaways from the pandemic to consider when developing this new law: Data and the technologies that facilitate its collection and use are an essential part of our lives.

Paper 50
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Lantern Slides of the Revenue Cutter Service, 1900-1915

Unwritten Record

Though the United States Coast Guard officially took on that name in 1915, its origin dates back over 230 years ago. In August 1790, what became known as the United States Revenue Cutter Service was established under the Treasury Department to assist with customs enforcement. The Revenue Cutter Service merged with the U.S. Life-Saving Service to create the United States Coast Guard in January 1915. .

IT 51
article thumbnail

Tracey Sterne

Archives Blogs

In November of 1981, an item appeared in The New York Times -and it seemed all of us in New York (and elsewhere) who were interested in music, radio, and culture in general, saw it: . “Teresa Sterne,” it read, “who in 14 years helped build the Nonesuch Record label into one of the most distinguished and innovative in the recording industry, will be named Director of Music Programming at WNYC radio next month.

article thumbnail

The 2020 Archive-It Partner Meeting is going virtual!

Archive-It

by the Archive-It team. Archive-It is hosting our annual partner meeting online this year, on Wednesday October 7th from 9am-12pm. Please join your colleagues for updates, presentations from practitioners, breakout groups with peers, and real-time discussions on all things web archiving-related. This half day meeting will feature one-on-one Office Hours, networking opportunities, and even a little bit of entertainment.

article thumbnail

NEW TECH: Trend Micro flattens cyber risks — from software development to deployment

The Last Watchdog

Long before this awful pandemic hit us, cloud migration had attained strong momentum in the corporate sector. As Covid19 rages on, thousands of large to mid-sized enterprises are now slamming pedal to the metal on projects to switch over to cloud-based IT infrastructure. A typical example is a Seattle-based computer appliance supplier that had less than 10 percent of its 5,000 employees set up to work remotely prior to the pandemic.

Risk 134
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Updated 2020 eDiscovery Reference Model (EDRM) Incorporates Information Governance via EDRM.net

IG Guru

Information Governance has been added to the new EDRM Model per EDRM.net. Check out the post below or download it here. The post Updated 2020 eDiscovery Reference Model (EDRM) Incorporates Information Governance via EDRM.net appeared first on IG GURU.

article thumbnail

Learning About Structure-Aware Fuzzing and Finding JSON Bugs to Boot

ForAllSecure

Introduction. What do JSON, YAML, and HTTP have in common? They’re all examples of ubiquitous data serialization and transmission standards, making them great targets for testing with fuzzing. While fuzzing has found many bugs in these kinds of targets, they all have requirements for structure in order for data to be considered “valid.” Handling these structure requirements intelligently is the key to finding the next level of bugs that others may have missed!

article thumbnail

Implementing a transformation agenda with Collibra and Tableau

Collibra

Prior to the pandemic, most companies had offices where employees collaborated in person with their colleagues. This meant that employees could easily turn to their neighbor and ask a question or ask to see a dataset. However, today, this is not possible. Now, we are forced to reach out over Zoom, email or slack, which adds additional time to a seemingly simple request.

article thumbnail

Learning About Structure-Aware Fuzzing and Finding JSON Bugs to Boot

ForAllSecure

Introduction. What do JSON, YAML, and HTTP have in common? They’re all examples of ubiquitous data serialization and transmission standards, making them great targets for testing with fuzzing. While fuzzing has found many bugs in these kinds of targets, they all have requirements for structure in order for data to be considered “valid.” Handling these structure requirements intelligently is the key to finding the next level of bugs that others may have missed!

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Project Zero expert found 3 flaws in Apache Web Server

Security Affairs

Administrators of servers running Apache have to update their installs immediately to fix multiple vulnerabilities disclosed by a Google researcher. Apache Foundation released the 2.4.46 version to address three flaws affecting its web server software that could be potentially exploited by attackers, under specific conditions, to execute arbitrary code or to trigger a DoS condition by crashing the server.

Security 126