Fri.Jul 27, 2018

article thumbnail

State Govts. Warned of Malware-Laden CD Sent Via Snail Mail from China

Krebs on Security

Here’s a timely reminder that email isn’t the only vector for phishing attacks: Several U.S. state and local government agencies have reported receiving strange letters via snail mail that include malware-laden compact discs (CDs) apparently sent from China, KrebsOnSecurity has learned. This particular ruse, while crude and simplistic, preys on the curiosity of recipients who may be enticed into popping the CD into a computer.

Phishing 178
article thumbnail

Ransomware Attack Leads to Discovery of Lots More Malware

Data Breach Today

Missouri Clinic Finds Computers 'Loaded with Malware' A family care clinic in Missouri says those investigating and mitigating a recent ransomware attack discovered that its systems were "loaded with a variety of malware programs." Experts say such post-breach discoveries are common.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digitalizing Core Business Processes — Part 2 of 3 — There is still a lot of work to do with basic process improvement

AIIM

In “ The State of Intelligent Information Management: Getting Ahead of the Digital Transformation Curve ,” AIIM made the case that every organization is on – or should be on! – a Digital Transformation journey. The heart of this Transformation journey is understanding, anticipating, and redefining internal and external customer experiences. AIIM believes that Digital Transformation effectiveness is imperiled by a rising tide of information chaos and confusion, and that rising tide of information

article thumbnail

A More Dynamic Approach to Cybersecurity

Data Breach Today

Data science is playing a fundamental role in a more dynamic approach to cybersecurity, says Jim Routh, CISO of Aetna, who stresses the importance of applying machine learning to front-line data security controls. Routh will be a featured speaker at the ISMG Security Summit in New York Aug. 14-15.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Digitalizing Core Business Processes — Part 2 of 3 — There is still a lot of work to do with basic process improvement

AIIM

In “ The State of Intelligent Information Management: Getting Ahead of the Digital Transformation Curve ,” AIIM made the case that every organization is on – or should be on! – a Digital Transformation journey. The heart of this Transformation journey is understanding, anticipating, and redefining internal and external customer experiences. AIIM believes that Digital Transformation effectiveness is imperiled by a rising tide of information chaos and confusion, and that rising tide of information

More Trending

article thumbnail

Retired Malware Samples: Everything Old is New Again

Lenny Zeltser

Finding real-world malware samples that illustrate practical analysis techniques is tricky. When training professionals how to reverse-engineer malware , I’ve gone through lots of malicious programs for the purpose of educational examples. Here are some of the samples that I’ve retired from the FOR610 course over the years, because they no longer seemed current or relevant.

article thumbnail

Democracy at risk due to fake news and data misuse, MPs conclude

The Guardian Data Protection

Parliamentary inquiry to demand urgent action to combat ‘relentless targeting of hyper-partisan views’ The Cambridge Analytica Files: read the Observer’s full investigation Democracy is at risk unless the government and regulators take urgent action to combat a growing crisis of data manipulation, disinformation and so-called fake news, a parliamentary committee is expected to say.

Risk 75
article thumbnail

India’s Final Draft on Data Privacy Law Issued Today

Hunton Privacy

On July 27, 2018, the Justice BN Srikrishna committee, formed by the Indian government in August 2017 with the goal of introducing a comprehensive data protection law in India, issued a report, A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (the “Committee Report”), and a draft data protection bill called the Personal Data Protection Bill, 2018 (the “Bill”).

article thumbnail

Why you should be concerned about payment card data breaches

IT Governance

In this blog, we look at the ongoing threat of debit and credit card fraud, explaining why it appeals to cyber criminals, what they do with the stolen information and how implementing the requirements of the PCI DSS (Payment Card Industry Data Security Standard) can thwart crooks’ schemes. Everyone is a target. You don’t have to look too hard to find cases of payment card fraud.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Parasite HTTP RAT implements a broad range of protections and evasion mechanims

Security Affairs

Researchers from Proofpoint have discovered a new remote access Trojan (RAT) named Parasite HTTP that implements a broad range of evasion techniques. The Parasite HTTP RAT has a modular architecture that allows authors to easily add new features. The malware includes sandbox detection, anti-debugging, anti-emulation, and other defense mechanisms. “Proofpoint researchers recently discovered a new remote access Trojan (RAT) available for sale on underground markets.

article thumbnail

Mandatory documents for ISO 27001:2013

IT Governance

Organisations looking to comply with ISO 27001 must produce many documents demonstrating the steps they have taken to meet the Standard’s requirements. This enables staff to identify how the Standard applies to their organisation, and provides a framework for staying secure. You must complete: 3 The scope of the ISMS. 2 Information security policy. 1.2 Information security risk assessment process. 1.3 Information security risk treatment plan. 1.3 d) The Statement of Applicability. 2 Informa

article thumbnail

How A Group of Imprisoned Hackers Introduced JPay to the World

WIRED Threat Level

Over the last 15 years, JPay has quietly been moving into prisons across the country—connecting family members through email, at a cost.

article thumbnail

Db2 for z/OS: Using the Profile Tables to Direct DDF Applications to Particular Package Collections

Robert's Db2

I've posted several entries to this blog on the topic of high-performance DBATs (for example, one from a few years ago covered a MAXDBAT implication related to high-performance DBAT usage). You may well be aware that a "regular" DBAT (a DBAT being a DDF thread) becomes a high-performance DBAT when a package bound with RELEASE(DEALLOCATE) is allocated to the DBAT for execution.

IT 48
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New Report on Police Digital Forensics Techniques

Schneier on Security

According to a new CSIS report , "going dark" is not the most pressing problem facing law enforcement in the age of digital data: Over the past year, we conducted a series of interviews with federal, state, and local law enforcement officials, attorneys, service providers, and civil society groups. We also commissioned a survey of law enforcement officers from across the country to better understand the full range of difficulties they are facing in accessing and using digital evidence in their c

article thumbnail

Equifax Breach Update: What’s Been Done — One Year Later

Rippleshot

The true weight from the massive Equifax data breach that’s believed to have impacted roughly 148 million Americans is going to be felt for years to come. One year later, there seems to plenty of questions as to how the company dealt with the aftermath, and what it is doing to prevent a breach of such magnitude from occurring again. The Equifax breach has dominated headlines in the fraud ecosystem not just because of the total number of exposed records, but also because of the scope of what thos

article thumbnail

Dutch brothers sentenced to community service for involvement in CoinVault ransomware distribution

Security Affairs

On Thursday, two Dutch brothers were sentenced to 240 hours of community service for creating and using the CoinVault ransomware. In 2015, Melvin (25) and Dennis van den B. (21), were arrested from a district court in Rotterdam for their alleged involvement in CoinVault ransomware creation and distribution. On Thursday, the Dutch men were sentenced to 240 hours of community service for creating and using the CoinVault ransomware.

article thumbnail

Weekly Update 97

Troy Hunt

Alrighty, 2 big things to discuss today and I'll jump right into them here: Exactis: it's hard to know where to even start with this one and frankly, the more I think about the more frustrated I am that services like this even exist in the first place. But they do and it's worthwhile being aware of them so have a listen to the video this week and check out the links I've shared below.

IT 44
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Tech firms fear regulation nightmare if MPs get their way

The Guardian Data Protection

Report into fake news could put legal burden on firms such as Twitter and Facebook to remove harmful and illegal content Facebook, Twitter and Google could face their worst regulation nightmares if the recommendations of parliament’s report into fake news, based on a leaked version published on Friday by the former campaign strategist for Vote Leave , come to pass.

IT 43
article thumbnail

India’s Draft on Data Privacy Law Issued Today

Hunton Privacy

On July 27, 2018, the Justice BN Srikrishna committee, formed by the Indian government in August 2017 with the goal of introducing a comprehensive data protection law in India, issued a report, A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians (the “Committee Report”), and a draft data protection bill called the Personal Data Protection Bill, 2018 (the “Bill”).

article thumbnail

Automating Kernel Exploitation for Better Flaw Remediation

Dark Reading

Black Hat researchers plan on open sourcing a new framework they say can help organizations get a better rein on vulnerability fixes for kernel bugs.

45
article thumbnail

16 popular VPNs leak your data: Here’s the full list

IG Guru

VPNs are becoming increasingly popular due to data privacy concerns, but a new report found that some aren't effective. The post 16 popular VPNs leak your data: Here’s the full list appeared first on IG Guru.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Automating Kernel Exploitation for Better Flaw Remediation

Dark Reading

Black Hat researchers plan on open sourcing a new framework they say can help organizations get a better rein on vulnerability fixes for kernel bugs.

45
article thumbnail

Security Glitch in IoT Camera Enabled Remote Monitoring

Threatpost

After researchers found a security glitch that let them hack into an IoT camera, the manufacturer of the camera has fixed the issue.

IoT 43
article thumbnail

'Identity Has Become the Perimeter': Oracle Security SVP

Dark Reading

Eric Olden, Oracle's new leader in security and identity, shares how the enterprise tech giant plans to operate in a cloud-first world.

article thumbnail

IoT and data governance – is more necessarily better?

Information Management Resources

The development of smart devices, coupled with the incessant need to collect data for all and any reason, has contributed to a new challenge for organizations in the field of manufacturing of these types of devices in general, and analytics in particular.

IoT 34
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Every Week Is Shark Week in Cyberspace

Dark Reading

Your data, identities, and credentials are cyber chum. Here's how to protect yourself from the feeding frenzy.

47
article thumbnail

Threatpost News Wrap Podcast For July 27

Threatpost

Threatpost editors Tom Spring and Lindsey O'Donnell talk about the week's biggest news.

article thumbnail

Facebook says EU data privacy law caused user drop. Europe disagrees

Information Management Resources

Amid a plummeting share price, Facebook Inc. wants panicked investors to believe Europe’s strict General Data Protection Regulation is to blame for fewer people using the social network in the region.