Wed.Jan 02, 2019

article thumbnail

Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack

Krebs on Security

Cloud hosting provider Dataresolution.net is struggling to bring its systems back online after suffering a ransomware infestation on Christmas Eve, KrebsOnSecurity has learned. The company says its systems were hit by the Ryuk ransomware, the same malware strain that crippled printing and delivery operations for multiple major U.S. newspapers over the weekend.

article thumbnail

The Ongoing Battle to Secure Card Payments

Data Breach Today

Although chip cards are now commonplace in the U.S., there is still much work to be done securing card transactions online and offline. Randy Vanderhoof of the U.S. Payments Forum discusses 2019 initiatives.

Security 158
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Connecting the dots between security intentions and actions -- Infographic

AIIM

On average, organizations believe the volume of information will grow from X to 4.2X. This explosive growth translates into a rising ride of chaos. 75% of organizations see information chaos as a major problem for their organization. As a result, there is a core instability in information management practices in most organizations. 92% of organizations believe that something needs to change and that they must modernize their information management strategy.

article thumbnail

HHS Publishes Guide to Cybersecurity Best Practices

Data Breach Today

Co-Developed with Healthcare Sector Coordinating Council, Designed for Organizations of All Sizes With the aim of helping healthcare entities of all sizes improve their cybersecurity, the Department of Health and Human Services has issued a four-volume publication of voluntary best practices. Experts weigh in on whether it will prove helpful, especially for smaller organizations.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

CNIL Publishes Guidance on Data Sharing with Business Partners or Data Brokers

Hunton Privacy

On December 28, 2018, the French Data Protection Authority (the “CNIL”) published guidance regarding the conditions to be met by organizations in order to lawfully share personal data with business partners or other third parties, such as data brokers. The guidance focused, in particular, on such a scenario in the context of the EU General Data Protection Regulation (“GDPR”).

More Trending

article thumbnail

wget utility potential leaked password via extended filesystem attributes

Security Affairs

Developers that include the GNU’s wget utility in their applications have to use the new version that was released on Boxing Day. GNU Wget is a free software package for retrieving files using HTTP, HTTPS, FTP and FTPS the most widely-used Internet protocols. It is a non-interactive commandline tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc.

Passwords 104
article thumbnail

Ex-NSA Contractor Was a Suspect In Shadow Brokers Leak

Dark Reading

New court document shows law enforcement suspected possible involvement of Harold Martin in Shadow Brokers' release of classified NSA hacking tools.

87
article thumbnail

Hackers stole $750,000 worth Bitcoin from Electrum wallets

Security Affairs

The latest attack of 2018 against cryptocurrency wallets and organizations in the cryptocurrency industry hit the popular Electrum wallets. Hackers hit Electrum Bitcoin wallet and stole over 200 bitcoin, more than $750,000. The attack started on December 21th , 2018, and hackers leveraged a critical vulnerability that was addressed in early 2018. The vulnerability could be exploited by attackers to use rogue Electrum servers to generate and display popups to the unaware users.

article thumbnail

25 Years Later: Looking Back at the First Great (Cyber) Bank Heist

Dark Reading

The Citibank hack in 1994 marked a turning point for banking -- and cybercrime -- as we know it. What can we learn from looking back at the past 25 years?

IT 85
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cloud Hosting Provider DataResolution.net hit by the Ryuk ransomware?

Security Affairs

The Cloud hosting provider Dataresolution.net was hit by a ransomware-based attack on Christmas Eve that took down its systems. Data Resolution LLC provides software hosting, business continuity systems, cloud computing, and data center services to more serves than 30,000 businesses worldwide, The news was first reported by the popular investigator Brian Krebs on KrebsOnSecurity, the company believe its systems were infected with the Ryuk ransomware.

article thumbnail

EU Commission Decision Reconciles Data Protection Rules with the Need for Effective Trade Defence and Trade Policy Investigations

Data Matters

On December 17, 2018, European Commission Decision (EU) 2018/1996 (the ‘ Decision ’) was published in the Official Journal of the European Union. The Decision lays down rules designed to reconcile the rights of individuals respecting their personal data, with the need for effective trade defence and trade policy investigations in the EU. The power to adopt the Decision is provided for by EU Regulation 2018/1725 (the ‘ Regulation ’), which regulates the processing of personal data by the European

article thumbnail

Experts analyzed the distribution technique used in a recent Emotet campaign

Security Affairs

ESET analyzed the distribution technique used by cyber criminals in new Emotet campaign that has recently affected various countries in Latin America. In November, experts from ESET uncovered a massive spam campaign that was distributing the Emotet malware. The campaign targeted several users in some Latin American countries and ESET shared details on the propagation used in this campaign.

article thumbnail

Cybersecurity Rules for Insurance Companies to Take Effect in South Carolina

Hunton Privacy

New cybersecurity rules for insurance companies licensed in South Carolina are set to take effect in part on January 1, 2019. The new law is the first in the United States to be enacted based on the data security model law drafted by the National Association of Insurance Commissioners. The law requires licensed insurance companies to notify state insurance authorities of data breaches within 72 hours of confirming that nonpublic information in the company’s (or a service provider’s) system was “

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

AI in Security Carries as Many Questions as Answers

Dark Reading

Companies are adopting machine intelligence even though there are still issues and questions regarding its performance, a new report on AI use in cybersecurity shows.

article thumbnail

Is blockchain in the supply chain overhyped?

OpenText Information Management

From increasing conflict minerals traceability to monitoring supply chain disruptions or late delivery of shipments, the benefits of blockchain in the supply chain seem clear. According to Craig Wentworth, Principal Analyst at MWD Advisors, although blockchain in the supply chain has proven benefits, such as increasing quality decision making surrounding food and product safety while … The post Is blockchain in the supply chain overhyped?

article thumbnail

EU Offers Bug Bounties For 14 Open Source Projects

Threatpost

As the bug bounty programs begin to roll out in January, security experts worry that the programs miss the mark on truly securing open source projects.

article thumbnail

Cyberattack Halts Publication for US Newspapers

Dark Reading

A virus disrupted print and delivery for the Chicago Tribune, Los Angeles Times, Baltimore Sun, and other US publications this weekend.

78
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Chrome in Android Leaks Device Fingerprinting Info

Threatpost

Attackers could craft a campaign that makes use of the device profile in order to exploit any vulnerabilities in a targeted fashion.

article thumbnail

Scaling Threat Modeling Training

Adam Shostack

For the last few years, I’ve been delivering in-person threat modeling training. I’ve trained groups ranging from 2 to 100 people at a time, and I’ve done classes as short as a few hours and as long as a week. That training is hands on and intense, and I’m very proud that my NPS customer satisfaction ratings tend to come in around 60-70, up there with Apple and Nordstroms.

article thumbnail

What is a Hacker?

IG Guru

January 2nd, 2019 – by Andrew Ysasi and guest writer Chris Robert If you are reading this, you may be here to get some validation or confirmation that hackers are good. Well, I have it for you. As a youth, I grew up watching movies like War Games, Sneakers, and Hackers. I also read books […]. The post What is a Hacker? appeared first on IG GURU.

IT 52
article thumbnail

US-CERT Offers Tips for Securing Internet-Connected Holiday Gifts

Dark Reading

Key steps to making those home Internet of Things devices just a bit safer.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

AIIM Announces New Board of Directors

Info Source

January 2, 2019, Silver Spring, MD — The Association for Intelligent Information Management ( AIIM ), announces the election of two new board members following its Annual Meeting held in December in Silver Spring, Maryland. The following directors will serve on the AIIM Board of Directors beginning January 1, 2019 through December 31, 2021: David Jones, Vice President Product Marketing, Nuxeo.

article thumbnail

Long-Range Familial Searching Forensics

Schneier on Security

Good article on using long-range familial searching -- basically, DNA matching of distant relatives -- as a police forensics tool.

58
article thumbnail

Breaking down data silos to succeed at digital transformation

Information Management Resources

Enterprises must look beyond the network, storage and compute stack to create meaningful insights out of data—the true business asset.

article thumbnail

Newsmaker Interview: Bruce Schneier on Physical Cyber Threats

Threatpost

Bruce Schneier discusses the clash between critical infrastructure and cyber threats.

IoT 64
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Data on 997 North Korean Defectors Targeted in Hack

Dark Reading

Nearly 1,000 North Koreans who defected to South Korea had personal data compromised by an unknown attacker.

article thumbnail

Irish DPC Issues Preliminary Guidance on Data Transfers in the Event of a “No Deal” Brexit

Hunton Privacy

On December 21, 2018, the Irish Data Protection Commission (the “DPC”) published preliminary guidance on data transfers to and from the UK in the event of a “no deal” Brexit (the “Guidance”). The Guidance is relevant for any Irish entities that transfer personal data to the UK, including Northern Ireland. The Guidance notes that if the UK leaves the European Union at 00:00 CET on March 30, 2019, without a withdrawal agreement in place, the UK will be deemed a third country for the purposes of EU

article thumbnail

Hogan Lovells Announces New Privacy and Cybersecurity Partners

HL Chronicle of Data Protection

We are pleased to announce the election of our new 2019 Hogan Lovells data protection partners and this expansion of our market-leading global Privacy and Cybersecurity practice. Congratulations to these talented lawyers helping to build and grow this emerging area of law: Joke Bodewits (Amsterdam, Netherlands). Allison Holt (Washington DC, United States).