Mon.Jun 10, 2019

article thumbnail

Unsecured Database Leaves 8.4TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4TB of email metadata. While it's not clear if anyone accessed the data, an attacker could have seen all email being sent or received by a specific person.

Metadata 276
article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

Locking down firmware. This is fast becoming a profound new security challenge for all companies – one that can’t be pushed to a side burner. Related: The rise of ‘memory attacks’ I’m making this assertion as federal authorities have just commenced steps to remove and replace switching gear supplied, on the cheap, to smaller U.S. telecoms by Chinese tech giant Huawei.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Multiple Class Action Lawsuits Filed in AMCA Breach

Data Breach Today

More Than a Dozen Lawsuits in Several States re: Breach Impacting 20 Million Patients A flurry of class action lawsuits have already been filed by individuals alleging they have been injured by a data breach at American Medical Collection Agency, which impacted more than 20 million patients of at least three medical laboratory testing firms.

article thumbnail

Essential Tips to Scale Remote Work Productively

AIIM

Recently, you may have heard the phrase, “I am working remotely.” But, what exactly is remote work? Let’s start by explaining the term first. A remote worker is someone who works outside the office space. As technology has evolved, it has changed the way people work and created new opportunities to work outside the office walls. Remote working is also referred to as teleworking or telecommuting.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft Warns of Large Spam Campaign Hitting Europe

Data Breach Today

Attackers Using Older Office Exploit Microsoft is warnings about a large-scale spamming campaign hitting several countries in Europe, with the attackers using an old Office exploit to send emails to victims that contain malware in RTF attachments.

193
193

More Trending

article thumbnail

Huawei Ban: White House Budget Chief Seeks Delay

Data Breach Today

Banning Chinese Manufacturer Means 'Dramatic Reduction' in Government Suppliers The White House budget chief is seeking to delay a ban on the U.S. government using products manufactured by Huawei. In a letter seen by the Wall Street Journal, Russell T. Vought, the acting director of the Office of Management and Budget, says organizations need more time to switch suppliers.

article thumbnail

'Lone Wolf' Scammer Built a Multifaceted BEC Cybercrime Operation

Dark Reading

A one-man 419 scam evolved into a lucrative social-engineering syndicate over the past decade that conducts a combination of business email compromise, romance, and financial fraud.

86
article thumbnail

The Vision for Omnichannel Authentication

Data Breach Today

Enterprises today have many digital ways of interacting with their customers - and therefore just as many ways for authenticating those users and transactions. Sesh Venkataraman of CA Technologies explains the business value of omnichannel authentication solutions.

article thumbnail

Shanghai Jiao Tong University data leak – 8.4TB in email metadata exposed

Security Affairs

Security expert discovered an exposed database belonging to Shanghai Jiao Tong University containing 8.4TB in email metadata. Cloudflare Director of Trust & Safety Justin Paine discovered an unprotected database owned by Shanghai Jiao Tong University that was exposed online. The Shanghai Jiao Tong University is considered one of the most prominent academic institution based in China.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Meet the women shaping the future of AI

IBM Big Data Hub

Read why IBM has just launched the inaugural IBM Women Leaders of AI , and why we’re honoring women pioneering AI in their businesses in diverse industries from across the globe.

78
article thumbnail

CIA sextortion campaign, analysis of a well-organized scam

Security Affairs

Crooks are posing as CIA agents in a sextortion campaign, they are sending emails to inform the victims of an investigation into online pedophilia rings. Crooks are posing as CIA agents in a new sextortion campaign, they are sending emails to inform potential victims of an ongoing investigation into online pedophilia rings. Fraudsters are offering to drop the investigations on the victims for money, according to experts at Kaspersky. “The author of the e-mails that caught our experts’ coll

article thumbnail

Unmixed Messages: Bringing Security & Privacy Awareness Together

Dark Reading

Security and privacy share the same basic goals, so it just makes sense to combine efforts in those two areas. But that can be easier said than done.

Privacy 77
article thumbnail

CVE-2019-2725 Oracle WebLogic flaw exploited in cryptojacking campaign

Security Affairs

The CVE-2019-2725 vulnerability in Oracle WebLogic recently, addressed by the company, is being exploited in cryptojacking attacks, Trend Micro reports. Experts at Trend Micro reported that the recently patched CVE-2019-2725 vulnerability in Oracle WebLogic is being exploited in cryptojacking attacks. The flaw is a deserialization remote command execution zero-day vulnerability that affects the Oracle WebLogic wls9_async and wls – wsat components.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft Warns of Email Attacks Executing Code Using an Old Bug

Threatpost

The flaw affected all versions of Microsoft Office, Microsoft Windows and architecture types dating back to 2000, and was patched in November 2017.

article thumbnail

Hackers Stole a Border Agency Database of Traveler Photos

WIRED Threat Level

In compromising a Customs and Border Protection subcontractor, hackers make off with photos of travelers and license plates.

article thumbnail

Retro video game website Emuparadise suffered a data breach

Security Affairs

Retro video game website Emuparadise revealed to have suffered a data breach that exposed 1.1 Million accounts back in April 2018. Emuparadise is a website that offers tons of roms, isos and retro video games, users can download and play them with an emulator or play them with the web browser. The security breach occurred in April 2018 and exposed account information for approximately 1.1 million Emuparadise forum members.

article thumbnail

Black Hat USA Offers Fresh Perspectives on Enterprise Cybersecurity

Dark Reading

Learn new enterprise-grade techniques for identifying vulnerabilities, improving Active Directory security, and building trust with customers at Black Hat USA this summer.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CVE-2019-12735 – opening a specially crafted file in Vim or Neovim Editor could compromise your Linux system

Security Affairs

Bad news for Linux users, a flaw tracked as CVE-2019-12735 allows to hack their systems by tricking them into opening a specially crafted file in Vim or Neovim Editor. Security expert Armin Razmjou has recently found a high-severity vulnerability (CVE-2019-12735) in Vim and Neovim command-line text editing applications. The vulnerability, tracked as CVE-2019-12735, is classified as an arbitrary OS command execution vulnerability.

article thumbnail

Cognitive Bias Can Hamper Security Decisions

Dark Reading

A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes.

article thumbnail

Microsoft warns of spam campaign exploiting CVE-2017-11882 flaw

Security Affairs

Microsoft is warning of an active spam campaign targeting European languages that leverages an exploit to infect simply by opening the attachment. Microsoft issued a warning on Friday about an ongoing spam campaign that is targeting European users. Spam messages are carrying weaponized RTF documents that could infect users with malware without any user interaction, just opening the RTF documents.

article thumbnail

Joining Axonius to Tackle IT Asset Management

Lenny Zeltser

I’m drawn to large-scale problems, I guess: At the onset of cloud computing, I was helping companies benefit from cloud economics without undue risks. Later, I switched to protecting data at numerous retail businesses that thought they couldn’t afford security. Next, I focused on stopping a seemingly endless stream of malware designed to bypass endpoint defenses.

IT 61
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Spain extradites 94 Taiwanese to China phone and online fraud charges

Security Affairs

Spanish authorities extradited 94 Taiwanese to China to face telephone and online fraud charges, Taiwan’s Foreign Ministry expressed a strong regret. Spain extradited 94 Taiwanese to China to face telephone and online fraud charges, the indicted were transferred via plane by officials. “The suspects arrived Friday morning at Beijing airport on a chartered flight.

article thumbnail

Employment Scam

Schneier on Security

Interesting story of an old-school remote-deposit capture fraud scam, wrapped up in a fake employment scam. Slashdot thread.

74
article thumbnail

Federal Photos Filched in Contractor Breach

Dark Reading

Data should never have been on subcontractor's servers, says Customs and Border Protection.

85
article thumbnail

Mozilla Confirms Premium Firefox Browser With Security Features

Threatpost

A future premium Firefox browser could come with security features like VPN and secure cloud solutions.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Ideation Challenge seeks brightest young minds in artificial intelligence

Information Management Resources

The annual competition created by KPMG gathers STEM students from around the world with the aim of solving real-world business issues with AI-driven ideas and solutions.

article thumbnail

China Issues Draft of Data Security Administrative Measures

Hunton Privacy

On May 28, 2019, the Cyberspace Administration of China (“CAC”) released draft Data Security Administrative Measures (the “Measures”) for public comment. The Measures, which, when finalized, will be legally binding, supplement the Cybersecurity Law of China (the “Cybersecurity Law”) that took force on June 1, 2017, with detailed and practical requirements for network operators who collect, store, transmit, process and use data within Chinese territory.

article thumbnail

What’s your customer’s perfect travel experience? Use advanced analytics to find out

DXC Technology

Years ago, airline travel was considered glamorous. People wore suits and dresses. They smoked cigarettes, drank martinis and cut their steaks with metal knives. There was only one version of the perfect travel experience and it was wrapped up in the glamour and prestige of the journey itself — and the personal service supporting it. […].