Mon.Aug 31, 2020

article thumbnail

Australian Driver's Licenses Exposed on S3 Bucket

Data Breach Today

It's Unclear Who Owns the Data and If Those Affected Will Be Notified About 54,000 Australian driver's licenses were exposed in an open Amazon Simple Storage Service bucket, according to a security researcher. It remains unclear what entity or agency exposed the data and whether those affected will be notified.

Security 346
article thumbnail

Remote work requirement exposes the corporate digital divide

DXC Technology

Like many others, my family and I have done our best to enjoy the unexpectedly large amount of time we have together at home due to social distancing guidelines. Adjusting to the new normal, we have relied heavily on Internet access not only for work and school, but to stay sane and keep the peace. […]. The post Remote work requirement exposes the corporate digital divide appeared first on DXC Blogs.

Access 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Class Action Lawsuit Questions Blackbaud's Hacker Payoff

Data Breach Today

Company Says It Paid Ransomware Attacker for Promise to Delete Stolen Data Blackbaud is one of a growing number of organizations that say they paid ransomware attackers primarily for their promise to delete exfiltrated data. A class action lawsuit filed against the software vendor in the wake of its breach notification questions whether attackers' promises have any merit.

article thumbnail

Hackers are trying to exploit DoS flaw in Cisco IOS XR software running in carrier-grade routers

Security Affairs

Cisco warns that threat actors are attempting to exploit a high severity DoS flaw in its Cisco IOS XR software that runs on carrier-grade routers. Cisco warned over the weekend that attackers are trying to exploit a high severity memory exhaustion denial-of-service (DoS) vulnerability ( CVE-2020-3566 ) affecting the Cisco IOS XR Network OS that runs on carrier-grade routers.

Access 130
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The SASE Model: What's Driving Adoption?

Data Breach Today

Gartner's Rajpreet Kaur Offers Implementation Tips The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.

More Trending

article thumbnail

COVID-19 Phishing Scheme Spreads AgentTesla Trojan

Data Breach Today

Fake Messages Offer Surgical Masks and Other PPE A global phishing campaign that purports to offer information about surgical masks and other personal protective equipment for use during the COVID-19 pandemic is infecting victims' devices with the AgentTesla remote access Trojan, according to researchers at Area 1 Security.

Phishing 246
article thumbnail

Qbot uses a new email collector module in the latest campaign

Security Affairs

QBot Trojan operators are using new tactics in their campaign to hijack legitimate email conversations to steal sensitive data from the victims. Researchers from Check Point are warning of a new trend observed in QBot Trojan campaign targeting Microsoft Outlook users, QBot Trojan operators are using new tactics to hijack legitimate email conversations and steal personal and financial data from the victims.

Passwords 106
article thumbnail

Lack of MFA May Have Enabled Sendgrid Account Compromise

Data Breach Today

Email Service Provider Moving to Implement Additional Security Measures Security professionals are expressing surprise that email service provider Sendgrid did not have multifactor authentication in place to protect its customer accounts, which resulted in a large, but unknown, number being compromised with the data being sold on the darknet.

article thumbnail

Apple Accidentally Approved Malware to Run on MacOS

WIRED Threat Level

The ubiquitous Shlayer adware has picked up a new trick, slipping past Cupertino's “notarization” defenses for the first time.

Security 121
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Apple Accidentally Notarizes Shlayer Malware Used in Adware Campaign

Threatpost

The notarized malware payloads were discovered in a recent MacOS adware campaign, disguised as Adobe Flash Player updates.

Security 120
article thumbnail

Testing & Automation Pay Off for NSA's DevSecOps Project

Dark Reading

Communication with stakeholders, extensive testing, and robust automation pays dividends for military intelligence agency, one of several presenters at GitLab's virtual Commit conference.

Military 130
article thumbnail

How Cryptography Lets Down Marginalized Communities

WIRED Threat Level

Speaking at a prestigious crypto conference this month, Seny Kamara called on the field to recognize its blind spots—and fix them.

IT 94
article thumbnail

Slack Patches Critical Desktop Vulnerability

Dark Reading

The remote code execution flaw could allow a successful attacker to fully control the Slack desktop app on a target machine.

107
107
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Nuxeo Announces Strong Revenue Growth and Continued Product Innovation

Info Source

Company produces significant ARR growth and first profitable quarter in its history. NEW YORK, August 26, 2020 — Nuxeo , the leading cloud-native Content Services Platform, today announced several notable growth benchmarks, including 33 percent year-over-year (YOY) revenue growth for the first half of 2020, and 36 percent YOY revenue growth for the second quarter of 2020.

ECM 78
article thumbnail

From Defense to Offense: Giving CISOs Their Due

Dark Reading

In today's unparalleled era of disruption, forward-thinking CISOs can become key to company transformation -- but this means resetting relationships with the board and C-suite.

87
article thumbnail

Critical Slack Bug Allows Access to Private Channels, Conversations

Threatpost

The RCE bug affects versions below 4.4 of the Slack desktop app.

Access 125
article thumbnail

What’s new in OpenText AI & Analytics Cloud Edition (CE) 20.3

OpenText Information Management

Organizations are facing a common challenge in the information era, with data being generated and stored at an exponential rate and an increasing need to derive meaningful value from that information. The new innovations and enhancements we introduce with each release are designed help you close that gap. With OpenText AI & Analytics Cloud Edition … The post What’s new in OpenText AI & Analytics Cloud Edition (CE) 20.3 appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Seny Kamara on "Crypto for the People"

Schneier on Security

Seny Kamara gave an excellent keynote talk this year at the (online) CRYPTO Conference. He talked about solving real-world crypto problems for marginalized communities around the world, instead of crypto problems for governments and corporations. Well worth watching and listening to.

article thumbnail

UVA Researcher Charged with Computer Intrusion & Trade Secret Theft

Dark Reading

Chinese national Haizhou Hu was researching bio-mimics and fluid dynamics at the University of Virginia.

101
101
article thumbnail

Stolen Fortnite Accounts Earn Hackers Millions Per Year

Threatpost

More than 2 billion breached Fortnite accounts have gone up for sale in underground forums so far in 2020 alone.

Sales 91
article thumbnail

Malicious Android Apps Slip Through Google Play Protection

Dark Reading

Multiple Android apps were found spying on users and recruiting victims' devices into ad-fraud botnets.

99
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Charming Kitten Returns with WhatsApp, LinkedIn Effort

Threatpost

The Iran-linked APT is targeting Israeli scholars and U.S. government employees in a credential-stealing effort.

article thumbnail

The Blurred Lines and Closed Loops of Google Search

WIRED Threat Level

Seemingly small design tweaks to the search results interface may change how and where people find information online.

article thumbnail

Cloud Security Alliance, ISACA Announce Strategic Partnership to Reinvent Cloud Auditing and Assurance via ISACA Press Release

IG Guru

Organizations to collaborate on joint venture to bring the Certificate of Cloud Auditing Knowledge (CCAK) to the market via ISACA. The post Cloud Security Alliance, ISACA Announce Strategic Partnership to Reinvent Cloud Auditing and Assurance via ISACA Press Release appeared first on IG GURU.

Cloud 63
article thumbnail

There is no one-size-fits-all for IoT

OpenText Information Management

Recently I gave a couple of webinars and one of the questions posed during the Q&A asked to give my recommendations on sensors to use in a supply chain. I hated to give my response because it was a total non-answer: It depends because there is no one-size-fits-all for IoT. What I could not communicate … The post There is no one-size-fits-all for IoT appeared first on OpenText Blogs.

IoT 58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Stop notarized adware and protect your Mac fleet.

Jamf

An active adware campaign that leverages notarized payloads.

98
article thumbnail

Waiver or Modification of Requirements Under Section 1135 of the Social Security Act in Louisiana and Texas as the Result of Hurricane Laura via DHHS OCR

IG Guru

August 27, 2020 Waiver or Modification of Requirements Under Section 1135 of the Social Security Act in Louisiana and Texas as the Result of Hurricane Laura What: HHS Secretary Azar has declared a Public Health Emergency as a result of Hurricane Laura Where: States of Louisiana and Texas Actions/Follow-Up: Please view the Waiver or Modification of Requirements […].

article thumbnail

The Hacker Mind Podcast: Can a Machine Think Like A Hacker?

ForAllSecure

If you’re a fan of The Game of Thrones, then here’s a little known bit of trivia. In 1970, a young science fiction writer turned chess player, George RR Martin, played with his Northwestern University team against one of the fastest computers of the time -- and the humans won. It would take another 27 years before IBM’s Deep Blue defeated world chess champion Gary Kasparov, and -- how’s this for a coincidence?

IT 52