Sun.Feb 03, 2019

article thumbnail

Hacker who reported a flaw in Hungarian Magyar Telekom faces up to 8-years in jail

Security Affairs

Hungarian police arrested a young hacker because he discovered and exploited serious vulnerabilities in the systems of the Magyar Telekom. Which are the risks for a hacker that decide to publicly disclose a vulnerability? The case I’m going to discuss shows us legal implication for this conduct. Last year, Hungarian law enforcement arrested a young hacker (20) because he discovered and exploited serious vulnerabilities in the systems of the Magyar Telekom, the major Hungarian telecommunica

Retail 97
article thumbnail

Backup to the Future with NetVault Backup!

Quest Software

Ever hear this, "We want high availability, no lags or downtime and it needs to be secure." So simple right? Explore must-have features of Data Protection. ( read more ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security firm Recorded Future discovered the hacker behind Collection #1

Security Affairs

Researchers at the threat intel firm Recorded Future, have identified the hacker who amassed credentials in Collection #1 archive. Security experts at the threat intel firm Recorded Future, have discovered the hacker who allegedly created and offered for sale the massive collection known as Collection #1. The ‘Collection #1’ archive was discovered by the cyber security expert Troy Hunt, it included 773 million records.

article thumbnail

IG GURU gets help from Marketing Pro – Robin Thompson

IG Guru

Robin has been a leader in the RIM and IG field for many years, having been recognized with two-lifetime achievement awards for her work, and the partnership is intended to bring IG GURU to a broader audience. “I look forward to IG GURU in different verticals for the benefit of our readership and our sponsors. […]. The post IG GURU gets help from Marketing Pro – Robin Thompson appeared first on IG GURU.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Security Affairs newsletter Round 199 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you! Using steganography to obfuscate PDF exploits. Aztarna – the open-source scanning tool for vulnerable robots.

More Trending

article thumbnail

Can Enterprises execute a GRC Movement?

Security Affairs

Managed security services or security operations, cloud security, GRC is one of the fastest growing solutions in the world. The only place I can say more risk = more gain would be in the entrepreneurship space…because in the enterprise cyber security kingdom, it is just the opposite! So let me explain…. Before I start, stating some facts: – Global IT spend according to Gartner is 3.7 Trillion in 2018, and Cyber security market is 150 Billion which makes cyber security 4% of the total IT in

article thumbnail

Experts observed a new sextortion scam Xvideos-themed

Security Affairs

A sextortion scam campaign attempts to trick victims into believing that the adult site Xvideos.com was hacked and that crooks recorded its visitors. The creativity of cybercriminals is inexhaustible, a new variant of sextortion scam appeared in the threat landscape. A new sextortion scam campaign attempts to trick victims into believing that the popular adult site Xvideos.com was hacked and that crooks used a malicious script that records a visitor through their webcam.