Mon.Mar 11, 2019

article thumbnail

Citrix Hacked by Password-Spraying Attackers, FBI Warns

Data Breach Today

Cyber-Espionage Campaign Appears Separate to Recent Credential-Stuffing Breach Citrix Systems is investigating a suspected hack attack, resulting in the theft of business documents, after being tipped off by the FBI. The breach alert follows Citrix recently disclosing that in late 2018, hackers breached some of its customers' accounts via credential-stuffing attacks.

Passwords 265
article thumbnail

Defining Intelligent Information Management

AIIM

Recently AIIM released an industry watch report titled, The State of Information Management, Getting Ahead of the Digital Information Curve. In it, AIIM makes the case that every organization is on — or should be on — a Digital Transformation journey. At the heart of this transformation journey is the need to understand, anticipate and redefine internal and external customer experiences.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach of 'Verifications.io' Exposes 763 Million Records

Data Breach Today

Experts Question How 'Big Data Email Verification Platform' Amassed Information Verifications.io, a self-described "big data email verification platform," has suffered a massive breach. Security researcher Bob Diachenko said he discovered the site was exposing 763 million records.

Big data 245
article thumbnail

Severe RCE vulnerability affected popular StackStorm Automation Software

Security Affairs

The security researcher Barak Tawilyhas discovered a severe vulnerability, tracked as CVE-2019-9580, in the popular, open source event-driven platform StackStorm. According to the expert, the flaw could be exploited by a remote attacker to trick developers into executing arbitrary commands on targeted services. StackStorm has been used to automate workflows in many industries, it allows developers to configure actions, workflows, and scheduled tasks, to perform some operations on large-scale ser

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Role of AI, Machine Learning in Email Security

Data Breach Today

Adrien Gendre of Vade Secure on Infrastructure Protection Machine learning models and artificial intelligence are transforming the way email is secured, says Adrien Gendre of Vade Secure.

More Trending

article thumbnail

Why CISOs Need Partners for Security Success

Data Breach Today

John Pescatore of SANS Institute on Essential Steps to Take CISOs need to work with partners in other departments to help ensure the success of major security projects, says John Pescatore, the director of the SANS Institute, who spoke at RSA Conference 2019.

Security 178
article thumbnail

What’s the difference between containers and virtual machines?

DXC Technology

I was at a conference recently when I realized the person I was talking with thought that containers were just smaller versions of virtual machines (VM). Ah, no. No, they’re not. Yes, they can function in the same ways from a practical viewpoint. For example, they’re both commonly used to run server applications. How they […].

Cloud 95
article thumbnail

The Advantages of Automated Threat Hunting

Data Breach Today

Steven Grossman of Bay Dynamics on Automating Critical Security Tasks Threat hunting is a critical but labor-intensive task for security analysts. But automation can provide significant advantages, says Steven Grossman of Bay Dynamics.

Security 178
article thumbnail

STOP ransomware encrypts files and steals victim’s data

Security Affairs

Experts observed the STOP ransomware installing the Azorult password-stealing Trojan to steal account credentials, cryptocurrency wallets, and more. The STOP ransomware made the headlines because it is installing password-stealing Trojans on the victims’ machines. Experts observed the ransomware also installing the dreaded Azorult password-stealing Trojan on victim’s machine to steal account credentials, cryptocurrency wallets, documents and more.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Dealing with 'Right to Be Forgotten' Requirements

Data Breach Today

Mike Kiser of Sailpoint on Identity Governance Issues The "right to be forgotten" is a critical component of GDPR, but requirements vary widely globally. Mike Kiser of Sailpoint discusses related identity governance issues.

GDPR 170
article thumbnail

Crooks use The Pirate Bay to spread PirateMatryoshka malware via reputed seeders

Security Affairs

Crooks are abusing the torrent website The Pirate Bay to distribute the PirateMatryoshka malware that fuels the victim’s PC with unwanted software. Crooks abusing torrent services to distribute malware is not a novelty, Torrent users are often exposed to serious threats such if the one recently spotted by Kaspersky Lab and dubbed by the expert PirateMatryoshka.

article thumbnail

3 Places Security Teams Are Wasting Time

Dark Reading

Dark Reading caught up with RSA Security president Rohit Ghai at the RSA Conference to discuss critical areas where CISOs and their teams are spinning their wheels.

article thumbnail

What is the Data Protection Act 2018?

IT Governance

In the run-up to the GDPR (General Data Protection Regulation) , experts repeatedly described the law as the successor to the UK’s DPA (Data Protection Act) 1998. But that was somewhat misleading, because the same day the GDPR came into force, the UK adopted the DPA 2018. Technically, this is the law that replaces the DPA 1998, and both it and the GDPR currently apply to all organisations in the UK that process personal data.

GDPR 79
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Top 10 Takeaways from RSA Conference 2019

eSecurity Planet

After five days of sessions, events and demos, what were the key cybersecurity themes that emerged at RSA Conference 2019?

article thumbnail

The enterprise data warehouse of the future

IBM Big Data Hub

Though the enterprise data warehouse (EDW) has traditionally been the repository for historical data such as sales and financials, it is quickly evolving to meet the demands of new technologies.

Sales 75
article thumbnail

GPEN and National DPAs Publish Sweep Results on Privacy Accountability

Hunton Privacy

On March 5, 2019, the Global Privacy Enforcement Network (“GPEN”), a global network of more than 60 data protection authorities (“DPAs”) around the world, published the results of its 2018 intelligence gathering operation on organizations’ data privacy accountability practices (the “Sweep”). On the same date, some participating DPAs released the results of the Sweep exercise carried out in their respective jurisdiction.

Privacy 74
article thumbnail

Moxa Industrial Switches plagued with several flaws

Security Affairs

Security experts have discovered many vulnerabilities, including a critical issue, in Moxa EDS and IKS industrial switches. Industrial control systems used in many industries, including the energy sector, critical manufacturing, and transportation, continues to be an element of concern for security experts. Researchers have discovered several vulnerabilities in Moxa EDS and IKS industrial switches.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

763M Email Addresses Exposed in Latest Database Misconfiguration Episode

Dark Reading

MongoDB once again used by database admin who opens unencrypted database to the whole world.

102
102
article thumbnail

Researcher Claims Iranian APT Behind 6TB Data Heist at Citrix

Threatpost

IRIDIUM is an APT that uses proprietary techniques to bypass two-factor authentication for critical applications, according to security firm Resecurity.

article thumbnail

Hackers Break into System That Houses College Application Data

Dark Reading

More than 900 colleges and universities use Slate, owned by Technolutions, to collect and manage information on applicants.

79
article thumbnail

Forrester: Ransomware Set to Resurge As Firms Pay Off Attacks

Threatpost

In this video, Josh Zelonis, senior analyst at Forrester Research, discusses the next great security threats to enterprises.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to jump start your enterprise digital transformation

DXC Technology

Does your organization have a digital transformation strategy that it’s struggling to execute? Unfortunately, you are not alone. But the urgency to make real progress is mounting. If your industry hasn’t already been disrupted by competitors wielding the latest wave of new technology — Big Data, cloud, mobile, AI, machine learning, robotic process automation, IoT, […].

article thumbnail

Are your business processes getting the data they need to succeed?

OpenText Information Management

Humans are social creatures—we were born to be socially connected and we understand the world, and ourselves, better when we are in relationships with others. We need feedback from all sorts of people to help see the bigger picture and make better decisions. Similarly, organizational processes need information from a wide variety of sources to … The post Are your business processes getting the data they need to succeed?

ECM 58
article thumbnail

IT Security Administrators Aren't Invincible

Dark Reading

IT security administrators and their teams are responsible for evaluating an organization's security tools and technologies, but are they armed with the proper tools, considerations, and budget to do so? Fourth in a six-part series.

IT 58
article thumbnail

Understanding DataOps & DevOps: Different approach, but same goal

Information Management Resources

Instead of a focus on application delivery, DataOps focuses on accelerating the delivery of an organization’s information assets, data pipelines, and insights.

60
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

NSA, DHS Call for Info Sharing Across Public and Private Sectors

Dark Reading

Industry leaders debate how government and businesses can work together on key cybersecurity issues.

article thumbnail

Google Patches Critical Bluetooth RCE Bug

Threatpost

In all, Google reported 45 bugs in its March update with 11 ranked critical and 33 rated high.

IT 72
article thumbnail

Georgia's Jackson County Pays $400K to Ransomware Attackers

Dark Reading

The ransomware campaign started March 1 and shut down most of Jackson County's IT systems.