Fri.May 31, 2019

article thumbnail

Checkers, Rally's Burger Joints Hit By POS Malware

Data Breach Today

Infections Started in 2015 and Ran Through April Checkers Drive-In Restaurants says 102 of its 900 U.S. locations were hit with point-of-sale malware, with one California restaurant infected over a more than two-year period starting in December 2015. Checkers is the latest victim in a string of attacks against retailers, restaurants and hotel chains.

Retail 230
article thumbnail

NY Investigates Exposure of 885 Million Mortgage Documents

Krebs on Security

New York regulators are investigating a weakness that exposed 885 million mortgage records at First American Financial Corp. [NYSE:FAF] as the first test of the state’s strict new cybersecurity regulation. That measure, which went into effect in March 2019 and is considered among the toughest in the nation, requires financial companies to regularly audit and report on how they protect sensitive data, and provides for fines in cases where violations were reckless or willful.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Sounds Second Alarm Over BlueKeep Vulnerability

Data Breach Today

Security Experts Warn Exploits Are Coming Microsoft has taken the unusual step of issuing a second warning about BlueKeep, a vulnerability that, if left unpatched, could allow an attacker to use a worm-like exploit to take over devices running older Windows operating systems. Security researchers warn that exploits are coming.

Security 223
article thumbnail

Russian military plans to replace Windows with Astra Linux

Security Affairs

The Russian army seems to be in the process of replacing the Windows system with the Debian-based Linux distribution Astra Linux. Cyber security seems to subvert the globalization concept, governments are working to develop their own technology fearing possible espionage and sabotage activities of foreign states. The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux.

Military 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

11 Hot Sessions: Infosecurity Europe 2019

Data Breach Today

Cybersecurity Conference Addresses AppSec, Incident Response, Top Threats and More Infosecurity Europe returns to London June 4-6, featuring more than 230 sessions over three days covering a range of topics, including application security, automation, data protection, risk management, incident response and threat analysis. Here's a preview of 11 hot sessions.

More Trending

article thumbnail

Audit Identifies Australian Health Sector Security Weaknesses

Data Breach Today

Many of the Problems Are Also Common in the U.S. Similar to security deficiencies often found in the U.S. healthcare sector, weak security controls and practices are putting Australian patient data and hospital services at high risk for serious cyberattacks, according to a new government audit.

Security 164
article thumbnail

HiddenWasp, a sophisticated Linux malware borroes from Mirai and Azazel

Security Affairs

Security experts at Intezer have discovered a new Linux malware tracked as ‘HiddenWasp’ that borrows from Mirai, Azazel malicious codes. HiddenWasp is a new sophisticated Linux malware still undetected by the majority of anti-virus solutions. According to the experts at Intezer, the malware was involved in targeted attacks. . “Unlike common Linux malware, HiddenWasp is not focused on crypto-mining or DDoS activity.

article thumbnail

Fingerpointing Over Baltimore's Ransomware Attack

Data Breach Today

The latest edition of the ISMG Security Report analyzes the "blame game" in the wake of a ransomware attack against the city of Baltimore. Also featured: Discussions of cyberthreats in the financial services sector and open source security concerns.

article thumbnail

Gen Z Interns and Social Media: A Perfect Security Storm

Threatpost

A lack of security training for interns, and their obsession with sharing content on social media, could lead to a perfect storm for hackers looking to collect social engineering data.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Growth of Adaptive Authentication

Data Breach Today

OneSpan's Tim Bedard on Evolutionary Strategies and Controls The right authentication controls at the right time for the right transactions - the adaptive authentication message is taking off, says OneSpan's Tim Bedard. And here are some quick wins organizations might focus on when starting down the path.

article thumbnail

The Human Cost of Cyberattacks

Schneier on Security

The International Committee of the Red Cross has just published a report: " The Potential Human Cost of Cyber-Operations." It's the result of an "ICRC Expert Meeting" from last year, but was published this week. Here's a shorter blog post if you don't want to read the whole thing. And [link] by one of the authors.

IT 84
article thumbnail

What CCPA Means to Security Leaders

Data Breach Today

Attorney Sadia Mirza on the Impact of Emerging Privacy Legislation Post-GDPR, the California Consumer Privacy Act was the first piece of US legislation to emerge - but it's hardly the last. Attorney Sadia Mirza of Troutman Sanders talks about the potential impact of CCPA and other pending privacy legislation.

GDPR 155
article thumbnail

The Pyramid Hotel Group data leak exposes 85GB of security logs of major hotel chains

Security Affairs

vpnMentor researches have recently discovered that hotel brands managed by The Pyramid Hotel Group have suffered a data leak. vpnMentor exp erts have discovered that hotel brands managed by The Pyramid Hotel Group , including Marriott, have suffered a da ta leak, vpnMentor’s research team discovered the unprotected server through port scanning to examine known IP blocks.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Auditing Your Records Management Program

The Texas Record

Does your program spell success? We’ve spoken here before about the benefits of doing an audit on your records management program to ascertain whether your program is working as it should, and this month, I was able to ask some folks who have helped with an audit in their agencies about the details of the practice. Jerry Sorrells, Records Management Officer for the Texas State Technical College System, and Benito Ybarra, Chief Audit and Compliance Officer for the Texas Department of Transportati

article thumbnail

Microsoft warns for the second time of applying BlueKeep patch

Security Affairs

Microsoft issued a new warning for users to update their systems to address the remote code execution vulnerability dubbed BlueKeep. Microsoft issued a new warning for users of older Windows OS versions to update their systems in order to patch the remote code execution vulnerability dubbed BlueKeep. The vulnerability , tracked as CVE-2019-0708, impacts the Windows Remote Desktop Services (RDS) and was addressed by Microsoft with May 2019 Patch Tuesday updates.

Risk 79
article thumbnail

5G Networks Spark Concerns For Enterprise Risks

Threatpost

As 5G deployments continue to increase, what are the top security risks for enterprises? We discuss with an expert during GSMA's Mobile360 conference.

Risk 83
article thumbnail

Security expert shows how to bypass macOS Gatekeeper

Security Affairs

A security researcher demonstrated how to bypass the Apple macOS Gatekeeper by leveraging trust in network shares. The Italian security researcher Filippo Cavallarin demonstrated how to bypass the macOS Gatekeeper by leveraging trust in network shares. The Apple Gatekeeper is designed to protect OS X users by performing a number of checks before allowing an App to run.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Checkers Breach Underscores Continued POS Dangers

Dark Reading

Attacks on point-of-sale terminals garners less attention these days, but the most recent breach of the restaurant chain shows hackers have not lost focus.

Sales 78
article thumbnail

0patch released micropatch for BearLPE Zero-Day flaw in Windows 10 Task Scheduler

Security Affairs

Researchers at 0patch released a temporary micropatch for the unpatched BearLPE local privilege escalation zero-day flaw in Windows 10. Experts at 0patch released a micropatch to temporary fix a still-unpatched local privilege escalation on systems without rebooting them. The zero-day vulnerability, dubbed BearLPE , was recently disclosed by the security researcher SandboxEscaper. .

article thumbnail

SANS Launches Security Awareness Certification

Dark Reading

The SANS Security Awareness Professional (SSAP) will be available this summer to professionals focused on measuring and mitigating human risk.

article thumbnail

Microsoft's BlueKeep Bug Isn't Getting Patched Fast Enough

WIRED Threat Level

At this rate, it will take years to fix a critical vulnerability that remains in over 900,000 Windows machines. A worm will arrive much sooner.

IT 78
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Black Hat Q&A: Building Infosec Communities for Women

Dark Reading

Three security experts offer a sneak peek into their upcoming Black Hat USA talk on organizing female infosec communities in Korea, Japan and Taiwan.

article thumbnail

Researcher Exploits Microsoft’s Notepad to ‘Pop a Shell’

Threatpost

Google Project Zero researcher unearths a bug in Microsoft’s Notepad Windows application.

article thumbnail

GDPR's First-Year Impact By the Numbers

Dark Reading

The latest statistics on GDPR spending, compliance rates, enforcement, and consumer attitudes on privacy protection.

GDPR 87
article thumbnail

Weekly Update 141

Troy Hunt

Another week, another conference. This time, Scott and I have just wrapped up the AusCERT event which is my local home town conference (I can literally see my house from Scott's balcony). We're talking about the event, upcoming ones, Scott's Hack Yourself First UK tour, some funky default values in EV certs and then we head off down a rabbit hole of 2FA and people getting fired for failing simulated phishing tests.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New SOAP Attack Hits South African Home Routers

Dark Reading

A huge wave of attacks is targeting home routers in South Africa for recruitment into a Hakai-based botnet.

87
article thumbnail

Nvidia Fixes High-Severity Flaws in GeForce Experience for Gamers

Threatpost

Nvidia is urging gamers to update its GeForce Experience software after patching two high-severity vulnerabilities.

IT 67
article thumbnail

Focusing on Endpoints: 5 Steps to Fight Cybercrime

Dark Reading

Follow these best practices to strengthen endpoint management strategies and protect company data.

87