Fri.Feb 04, 2022

article thumbnail

The UK’s new International Data Transfer Agreement Released

Data Matters

On 28 January 2022, the UK Government Department for Digital, Culture, Media & Sport ( DCMS ) laid before the UK Parliament its International Data Transfer Agreement ( IDTA ) and International Data Transfer Addendum ( UK Addendum ) to the European Commission’s Standard Contractual Clauses ( EU SCCs ). If no objections are raised by the UK Parliament, the IDTA and the UK Addendum will come into force on 21 March 2022.

GDPR 119
article thumbnail

The EARN IT Act Is Back

Schneier on Security

Senators have reintroduced the EARN IT Act, requiring social media companies (among others) to administer a massive surveillance operation on their users: A group of lawmakers led by Sen. Richard Blumenthal (D-CT) and Sen. Lindsey Graham (R-SC) have re-introduced the EARN IT Act , an incredibly unpopular bill from 2020 that was dropped in the face of overwhelming opposition.

IT 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware attack hit Swissport International causing delays in flights

Security Affairs

Aviation services company Swissport International was hit by a ransomware attack that impacted its operations. Swissport International Ltd. is an aviation services company providing airport ground,lounge hospitality and cargo handling services owned by an international group of investors. The company handles around 282 million passengers and 4.8 million tonnes of cargo annually, on behalf of some 850 client-companies in the aviation sector.

article thumbnail

Want to Be an Ethical Hacker? Here's Where to Begin

Dark Reading

By utilizing these resources, beginner hackers can find their specific passions within the cybersecurity space and eventually make their own mark in the ethical hacking profession.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Microsoft blocked tens of billions of brute-force and phishing attacks in 2021

Security Affairs

Office 365 and Azure Active Directory (Azure AD) customers were the targets of billions of brute-force and phishing attacks last year. Microsoft revealed that Office 365 and Azure Active Directory (Azure AD) customers were the targets of billions of phishing emails and brute force attacks last year. The IT giant added has blocked more than 25.6 billion Azure AD brute force authentication attacks and detected 35.7 billion phishing emails with Microsoft Defender for Office 365 in 2021.

Phishing 102

More Trending

article thumbnail

Over 500,000 people were impacted by a ransomware attack that hit Morley

Security Affairs

Business services firm Morley was hit by a ransomware attack that may have exposed data of +500,000 individuals. Business services company Morley was victim of a ransomware attack that may have resulted in a data breach impacting more than 500,000 individuals. Morley Companies is a United States corporation that provides business services to Fortune 500 and Global 100 clients; contact centers and back office processing; meetings and incentives management; and exhibits and displays production.

article thumbnail

Argo CD Security Bug Opens Kubernetes Cloud Apps to Attackers

Threatpost

The popular continuous-delivery platform has a path-traversal bug (CVE-2022-24348) that could allow cyberattackers to hop from one application ecosystem to another.

Cloud 86
article thumbnail

Retail giant Target open sources Merry Maker e-skimmer detection tool

Security Affairs

Retail giant Target is going to open-source an internal tool, dubbed Merry Maker , designed to detect e-skimming attacks. Retail giant Target announced the release in open-source of an internal tool, dubbed Merry Maker , designed to detect e-skimming attacks. Merry Maker is a tool designed by Target security developers Eric Brandel and Caleb Walch (@ebrandel and @cawalch) to detect the presence of e-skimmer on e-store.

Retail 104
article thumbnail

Attackers Target Intuit Users by Threatening to Cancel Tax Accounts

Threatpost

The usual tax-season barrage of cybercriminal activity is already underway with a phishing campaign impersonating the popular accounting and tax-filing software.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

A nation-state actor hacked media and publishing giant News Corp

Security Affairs

American media and publishing giant News Corp revealed it was victim of a cyber attack from an advanced persistent threat actor. American media and publishing giant News Corp revealed it was victim of a cyber attack from an advanced persistent threat actor that took place in January. The attackers compromised one of the systems of the company and had access to emails and documents of some employees.

article thumbnail

The 3 Most Common Causes of Data Breaches in 2021

Dark Reading

Phishing, smishing, and business email compromise continue to do their dirty work.

article thumbnail

Zimbra zero-day vulnerability actively exploited by an alleged Chinese threat actor

Security Affairs

An alleged Chinese threat actor is actively attempting to exploit a zero-day vulnerability in the Zimbra open-source email platform. An alleged Chinese threat actor, tracked as TEMP_Heretic , is actively attempting to exploit a zero-day XSS vulnerability in the Zimbra open-source email platform. The zero-day vulnerability impacts almost any Zimbra install running version 8.8.15.

article thumbnail

2022 CIGO Assn Announces IG Best Practice Awards

IG Guru

February 1, 2022 CIGO Association is pleased to announce that submissions are invited for the 2022 1st Annual CIGO IG Best Practice Awards. Submission Deadline is Monday, February 28, 2022. Only one nomination per organization. More information is here. Submissions must be made in PowerPoint, no more than 10 slides. An additional1-page written summary is optional and recommended. […].

72
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Russia-linked Gamaredon APT targeted a western government entity in Ukraine

Security Affairs

The Russia-linked Gamaredon APT group attempted to compromise an unnamed Western government entity in Ukraine. Palo Alto Networks’ Unit 42 reported that the Russia-linked Gamaredon APT group attempted to compromise an unnamed Western government entity operating in Ukraine in January, while geopolitical tensions between Russia and Ukraine have escalated dramatically.

article thumbnail

‘Long Live Log4Shell’: CVE-2021-44228 Not Dead Yet

Threatpost

The ubiquitous Log4j bug will be with us for years. John Hammond, senior security researcher at Huntress, discusses what's next.

article thumbnail

Expert Insights: Training the Data Elephant in the AI Room

Dark Reading

Be aware of the risk of inadvertent data exposure in machine learning systems.

Risk 97
article thumbnail

Adding to our Team

The Texas Record

The records management assistance team at the Texas State Library and Archives Commission welcomes a new analyst this month. Read more about Katherine Hoffman , who is now the point of contact for local governments in the East-South region of Texas. The East-South region is comprised of the following counties: Aransas Austin Bexar Brazoria Calhoun Colorado Comal.

article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

China-Linked Group Attacked Taiwanese Financial Firms for 18 Months

Dark Reading

The Antlion group, also known as Pirate Panda and Tropic Trooper, has shifted to targeting mainly Taiwan, using custom backdoors against financial organizations.

84
article thumbnail

Consultus, LLC v. CPC Commodities (W.D. Mo. 2022)

eDiscovery Law

Key Insight: Plaintiffs argue that defendants’ claims of privilege should be overruled due to the crime-fraud exception. Defendants withheld emails claiming work product and attorney-client privilege. Plaintiffs have not argued that the emails are not covered by either the work product doctrine or the attorney-client privilege. The purpose of the crime-fraud exception is to assure […].

40
article thumbnail

Best Internet Security Suites & Software for 2022

eSecurity Planet

Malware is one of the biggest threats businesses face, and with nearly a third of all malware coming through the internet and email, businesses and consumers alike need ways to protect themselves. The best internet security software comes in several different forms, giving businesses all of the protection they need to identify and stop malware before it causes bigger problems.

Security 142
article thumbnail

If data is the new oil, ISO 20022 is the new gasoline

IBM Big Data Hub

The phrase ‘data is the new oil’ has been widely used in the last number of years, but in an unrefined state, it has limited use. ISO 20022 is refined and provides the necessary structure to efficiently drive multiple engines in a bank. Background on ISO 20022. ISO 20022 was first introduced in 2004 to provide more standardization and deliver richer information for Financial Services transactions.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Tips for API Security Testing

ForAllSecure

API security testing is a process that should be done regularly in order to ensure the safety of your application's data and users. In this post, we'll cover some tips to remember when testing your APIs as well as some free tools you can use to get started. First, let's start with a few key things to keep in mind when performing API security testing: Know what you're looking for.

article thumbnail

Friday Squid Blogging: Are Squid from Another Planet?

Schneier on Security

An actually serious scientific journal has published a paper speculating that octopus and squid could be of extraterrestrial origin. News article. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Paper 98