Thu.Jan 17, 2019

article thumbnail

Airline Booking System Exposed Passenger Details

Data Breach Today

Vulnerability Highlights Poor Security Controls for Passenger Name Records Airline booking system provider Amadeus - whose system is used by 500 airlines - is investigating a software vulnerability that exposed passenger name records, which is the bundle of personal and travel data that gets collected when booking a flight.

Security 256
article thumbnail

Fact or Fiction: The 3 Biggest Misconceptions About Artificial Intelligence

AIIM

While Artificial Intelligence (AI) has the potential to be a very powerful tool in information management, the topic is so wrapped up in hyperbole and confusion that it can be challenging to cut through all the noise, causing many to fear the complexity of AI. As you may know, AIIM recently launched a new training course titled Practical AI for the Information Professional.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Breach Collection Contains 773 Million Unique Emails

Data Breach Today

2.7 Billion Email/Password Combo List Available for Credential Stuffing, Troy Hunt Warns Australian security expert Troy Hunt says an 87 GB compilation of username and password combinations - drawn from more than 2,000 databases - includes 773 million unique email addresses for apparent use in credential-stuffing attacks. Takeaway: Use a unique password for every site, or else.

article thumbnail

French DPA Publishes Updated Data Protection Impact Assessment Guidance

Data Matters

Under Article 35(3) of the EU General Data Protection Regulation (GDPR), organisations are required to conduct a data protection impact assessment (DPIA) where they: (i) engage in a systematic and extensive evaluation of personal aspects of individuals, based on automated processing, and on which decisions are based that produce legal or other effects that concern the individual, or (ii) process special categories of personal data (e.g. health data) on a large scale or personal data relating to

GDPR 90
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Why Do Phishing Attacks Continue to Plague Healthcare?

Data Breach Today

Experts Offer Tips for How to Avoid Falling Victim Several health data breaches involving phishing attacks - including one that potentially exposed data on more than 100,000 individuals - have been added to the federal health data breach tally this month. Why do these breaches keep happening, and what more can be done to prevent them?

Phishing 201

More Trending

article thumbnail

Getting Smarter About Threat Intelligence

Data Breach Today

Threat intelligence sharing is all about trust, speed and context. And yet many enterprise intel programs lack one or more of those qualities. Jon Clay of Trend Micro discusses what it takes to stand up a customized threat intelligence program.

IT 155
article thumbnail

Prices for Zero-Day Exploits Are Rising

Schneier on Security

Companies are willing to pay ever-increasing amounts for good zero-day exploits against hard-to-break computers and applications: On Monday, market-leading exploit broker Zerodium said it would pay up to $2 million for zero-click jailbreaks of Apple's iOS, $1.5 million for one-click iOS jailbreaks, and $1 million for exploits that take over secure messaging apps WhatsApp and iMessage.

article thumbnail

Drupal fixes 2 critical code execution issues flaws in Drupal 7, 8.5 and 8.6

Security Affairs

Drupal released security updates for Drupal 7, 8.5 and 8.6 that address two “critical” security vulnerabilities that could be exploited for arbitrary code execution. The first vulnerability could be exploited by a remote attacker to execute arbitrary PHP code. The flaw resides in the phar stream wrapper implemented in PHP and is related to the way it handles untrusted phar : // URIs. “A remote code execution vulnerability exists in PHP’s built-in phar stream wrapper w

CMS 81
article thumbnail

Brexit uncertainty and what it means for businesses and their data

IT Governance

Earlier this week, Theresa May’s EU Withdrawal Bill was defeated in parliament by a record 230 votes, sparking speculation and fear for the future of the UK’s relationship with the EU. But no matter what the outcome is, businesses can’t be expected to stay in a state of uncertainty for much longer. With a desperate need for guidance on how to proceed, IT Governance Founder and Executive Chairman Alan Calder has provided some much-needed clarity.

IT 78
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

South Korea: hackers compromised Defense Acquisition Program Administration PCs

Security Affairs

South Korea – Allegedstate-sponsored hackers compromised 10 PCs at ministry’s Defense Acquisition Program Administration. Unknown hackers compromised 10 PCs at ministry’s Defense Acquisition Program Administration which is the office that manages the military procurement. The news was confirmed by the South Korea Ministry of National Defense. “It has been turned out that 30 computers installed on the internal system of the Defense Acquisition Program Administration, in ch

article thumbnail

New Attacks Target Recent PHP Framework Vulnerability

Dark Reading

Multiple threat actors are using relatively simple techniques to take advantage of the vulnerability, launching cryptominers, skimmers, and other malware payloads.

80
article thumbnail

Brexit: millions of EU citizens cannot access records, court told

The Guardian Data Protection

Judge grants hearing of judicial review application over Home Office data rules Millions of EU citizens could find it difficult to assert their right to remain in the UK after Brexit under Home Office rules denying them access to their own personal records, the high court has been told. The practical impact of the regulations will be to prevent those pursuing immigration claims from “obtaining key material about their cases”, said Ben Jaffey QC on behalf of two civil rights organisations.

Access 75
article thumbnail

KnowledgeLake, Inc. acquires RPA technology company RatchetSoft, LLC after years of successful partnership

Info Source

ST. LOUIS, Missouri – January 17, 2019 – KnowledgeLake, a transactional content services company, today announced the acquisition of RatchetSoft, a U.S.-based robotic process automation (RPA) technology provider. KnowledgeLake customers and partners can now leverage intelligent document capture, workflow, and RPA in a next-generation cloud content platform—all from one vendor.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Facebook Shuts Hundreds of Russia-Linked Pages, Accounts for Disinformation

Dark Reading

Facebook says the accounts and pages were part of two unrelated disinformation operations aimed at targets outside the US.

85
article thumbnail

Unprotected server of Oklahoma Department of Securities exposes millions of government files

Security Affairs

A huge trove of data belonging to the Oklahoma Department of Securities (ODS) was left unsecured on a server for at least a week. Another data leak made the headlines, a huge trove of data belonging to the Oklahoma Department of Securities (ODS) was left unsecured on a server for at least a week. It is not clear how long data were left exposed online, according to the Shodan search engine, the server had been publicly open since at least November 30, 2018.

article thumbnail

773 Million Email Addresses, 21 Million Passwords For Sale on Hacker Forum

Dark Reading

Data appears to be from multiple breaches over past few years, says researcher who discovered it.

Sales 91
article thumbnail

Weekly Update 122

Troy Hunt

And then there was the biggest data breach to go into HIBP ever! I wrote that sentence from home just after publishing all the data, then I got on a plane. Holy cow that's a lot of emails! Hundreds upon hundreds of emails came in whilst on the way to Dubai, more than I'll ever be able to respond to. Plus, I'm actually trying to have some downtime with my son on this trip particularly over the next few days so a bunch of stuff is going to have to go unanswered or at best, delayed.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Simulating Lateral Attacks Through Email

Dark Reading

A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them.

80
article thumbnail

Microsoft Launches Azure DevOps Bug Bounty Program

Threatpost

Microsoft is offering rewards of up to $20,000 for flaws in its Azure DevOps online services and the latest release of the Azure DevOps server.

IT 73
article thumbnail

The Security Perimeter Is Dead; Long Live the New Endpoint Perimeter

Dark Reading

The network no longer provides an air gap against external threats, but access devices can take up the slack.

article thumbnail

erwin Automation Framework: Achieving Faster Time-to-Value in Data Preparation, Deployment and Governance

erwin

Data governance is more important to the enterprise than ever before. It ensures everyone in the organization can discover and analyze high-quality data to quickly deliver business value. It assists in successfully meeting increasingly strict compliance requirements, such as those in the General Data Protection Regulation (GDPR). And it provides a clear gauge on business performance.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cyber-Jackpot: 773M Credentials Dumped on the Dark Web

Threatpost

Thousands of individual breaches make up the database, one of the largest troves of stolen credentials ever seen.

article thumbnail

Microsoft Launches New Azure DevOps Bug Bounty Program

Dark Reading

A new program will pay bounties of up to $20,000 for new critical bugs in the company's Azure DevOps systems and services.

76
article thumbnail

New Year’s Cleanup

The Texas Record

You don’t have to – and probably shouldn’t! – use the trendy KonMari method of cleaning and organizing when it comes to managing government records. We can’t exactly apply the principle of whether or not a record ‘sparks joy’, because if that were the case, the public would be very upset about how much we get rid of.

Cleanup 58
article thumbnail

How to achieve cost effective content localization

OpenText Information Management

Executing successful global digital marketing campaigns can be a complex nightmare even for the most digitally savvy organization. Fortune 500 companies have invested significant resources in Digital Asset Management (DAM) platforms in order to categorize, securely share, and organize assets efficiently, but very often fail to take full advantage of their DAM investment during the … The post How to achieve cost effective content localization appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

UK House of Commons Rejects Draft Brexit Withdrawal Agreement

Hunton Privacy

On January 15, 2019, the UK House of Commons rejected the draft Brexit Withdrawal Agreement negotiated between the UK Prime Minister and the EU by a margin of 432-202. While the magnitude of the loss sets in motion a process which could potentially have resulted in an early general election being held, on January 16 a majority of British Members of Parliament rejected a vote of no confidence in Theresa May’s government.

GDPR 55
article thumbnail

Go Hands-On with New Security Tricks at Black Hat Asia

Dark Reading

Get up close and personal with the latest tools and techniques for testing (and breaking) everything from HTTPS to deep neural networks to Microsoft Office!

article thumbnail

Cryptomining Malware Uninstalls Cloud Security Products

Threatpost

New samples of cryptomining malware performs a never-before-seen function: uninstalling cloud security products.

Cloud 62