Mon.Dec 17, 2018

article thumbnail

Ireland's Privacy Watchdog Probes Facebook Data Breaches

Data Breach Today

6.8 Million Users' Private Photos Exposed, Triggering GDPR Investigation Ireland's privacy watchdog is probing data breaches at Facebook that exposed users' private data. In the latest breach to be disclosed, Facebook has warned that for a 12-day period in September, up to 6.8 million users' private photos may have been revealed to 1,500 apps built by 876 developers.

article thumbnail

Amnesty Report: Twitter Abuse Toward Women Is Rampant

WIRED Threat Level

Frustrated by Twitter's silence on abuse against women, Amnesty International crowdsourced its own data and found that the platform was especially toxic for black women.

IT 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Drivers to Enable Digital Transformation in Financial Services

Data Breach Today

Digital transformation (DX) continues to drive growth across financial services firms, creating new opportunities to increase revenue and foster innovation. Cloud - whether public, private or a hybrid approach - is foundational to achieving DX objectives, as is secure, resilient and scalable network connectivity. Customers demand a seamless experience across all digital channels.

article thumbnail

The Business Value of Enterprise Content Management (ECM) Solutions

AIIM

Enterprise Content Management (ECM) is a systematic approach to capture, manage, store, preserve and deliver information related to business processes. So if it is related to business processes, especially to core business processes, it must be considered key for any organization. Many companies have the willingness to bring into their network of systems an Enterprise Content Management Solution, but then they fail to maintain the system properly once implemented.

ECM 85
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Gartner's Avivah Litan on Impact of Marriott Breach

Data Breach Today

Analyst Contends Nation-States Are Waging Cyberwar and Our Defenses Are Lacking In the aftermath of the Marriott breach, it's fair to characterize Gartner's Avivah Litan as mad as hell and not wanting the U.S. to take it anymore. Going into 2019, Litan has policy and technology recommendations for national cyber defense.

IT 159

More Trending

article thumbnail

How Russian Trolls Used Meme Warfare to Divide America

WIRED Threat Level

A new report for the Senate exposes how the IRA used every major social media platform to target Americans before and after the 2016 election.

article thumbnail

A second sample of the Shamoon V3 wiper analyzed by the experts

Security Affairs

A second sample of the Shamoon wiper was uploaded to Virus total on December 13, from the Netherlands, experts analyzed it. Last week security experts at Chronicle announced the discovery of a new variant of the infamous Shamoon malware , the sample was uploaded to Virus Total from Italy at around the time Italian oil services company Saipem announced to have suffered a cyber attack.

article thumbnail

How Instagram Became the Russian IRA's Go-To Social Network

WIRED Threat Level

A Senate report finds that Russia's Internet Research Agency was far more active, and more successful, on Instagram in 2017 than on Facebook or Twitter.

article thumbnail

OpenText buys Liaison Technologies

OpenText Information Management

I’m pleased to announce that OpenText has acquired Liaison Technologies, a recognized leader in cloud-based information integration and data management solutions. As part of the OpenText Cloud Platform, this acquisition will extend the OpenText Business Network with a next-generation integration platform for connecting applications, data and devices.

Cloud 78
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Decrypting HiddenTear Ransomware for free with HT Brute Forcer

Security Affairs

Good news for the victims of the dreaded HiddenTear Ransomware , the popular cybersecurity expert Michael Gillespie has devised a tool dubbed HT Brute Forcer that could allow decrypting files for free. In 2015, the Turkish security researchers Utku Sen published the HiddenTear ransomware, the first open source ransomware, for educational purposes.

article thumbnail

New Shamoon Variant

Schneier on Security

A new variant of the Shamoon malware has destroyed signifigant amounts of data at a UAE "heavy engineering company" and the Italian oil and gas contractor Saipem. Shamoon is the Iranian malware that was targeted against the Saudi Arabian oil company, Saudi Aramco, in 2012 and 2016. We have no idea if this new variant is also Iranian in origin, or if it is someone else entirely using the old Iranian code base.

IT 76
article thumbnail

Germany’ BSI chief says ‘No Evidence’ of Huawei spying

Security Affairs

The head of Germany’s BSI admitted that since now there is no proof espionage activity conducted through Huawei technology. US first, and many other countries after, have decided to ban network equipment manufactured by the Chinese telecom giant Huawei. In November 2018, the Wall Street Journal reported that the US Government is urging its allies, including Germany, to exclude Huawei from critical infrastructure and 5G architectures.

article thumbnail

How you can demonstrate GDPR compliance

IT Governance

Organisations have had to radically rethink their approach to data protection now that the GDPR (General Data Protection Regulation) is in effect. But did you know that data controllers can be in violation of the GDPR even if they don’t violate any its data protection rules? This is because the Regulation requires organisations to demonstrate their compliance.

GDPR 73
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Shhhhh! The Secret to Secrets Management

Dark Reading

Companies need to take a centralized approach to protecting confidential data and assets. Here are 12 ways to get a handle on the problem.

82
article thumbnail

Pivots and Payloads

Adam Shostack

SANS has announced a new boardgame, “ Pivots and Payloads ,” that “takes you through pen test methodology, tactics, and tools with many possible setbacks that defenders can utilize to hinder forward progress for a pen tester or attacker. The game helps you learn while you play. It’s also a great way to showcase to others what pen testers do and how they do it.” If you register for their webinar, which is on Wednesday the 19th, they’ll send you some posters ver

IT 71
article thumbnail

Russia's IRA Targeted Black Americans, Exploiting Racial Tensions

WIRED Threat Level

A new report documents how the Internet Research Agency had a much more sustained, deliberate focus on black Americans.

article thumbnail

Lax Controls Leave Fortune 500 Overexposed On the Net

Dark Reading

The largest companies in the world have an average of 500 servers and devices accessible from the Internet - and many leave thousands of systems open to attack.

Access 73
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

IT Governance featured on Gibraltar News about common cyber threats 

IT Governance

One of IT Governance’s governance and risk management consultants, Andrew Pattison, was interviewed by GBC News last week about the most common types of cyber threats after delivering IT Governance’s three-day training course on “Effective Protection against Cyber crime”. The course was held in Gibraltar and hosted by Rock Learning. . Commenting on the current cyber security landscape, Andrew said: “The biggest challenge when it comes to cyber security and data protection is that organisations

article thumbnail

Facebook: Photo API Bug Exposed 6.8M User Photos

Dark Reading

The flaw let developers access images that users may not have shared publicly, including those they started to upload but didn't post.

Access 81
article thumbnail

Facebook Bug Exposes Photos of 6.8 Million Users

Adam Levin

A bug on Facebook gave app developers unauthorized access to the photos of as many as 6.8 million users. The bug, which affected Facebook’s photo API, was active from September 13 through September 25, when it was discovered by Facebook and fixed. September 25 was coincidentally the same day the company announced a massive security breach that affected 30 million users.

article thumbnail

53 Bugs in 50 Days: Researchers Fuzz Adobe Reader

Dark Reading

Automatic vulnerability finding tools detect more than 50 CVEs in Adobe Reader and Adobe Pro during a 50-day experiment.

80
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why data privacy professionals need a new approach to compliance

Information Management Resources

There are common requirements that span several of the new privacy laws and data protection regulations. By embracing them, you will be better prepared to help your organization become compliant.

Privacy 68
article thumbnail

Cyber Readiness Institute Launches New Program for SMBs

Dark Reading

Program seeks to raise employee cyber awareness at small and midsize businesses and give their owners the tools to make a difference.

74
article thumbnail

U.S. Ballistic Missile Defense System Rife with Security Holes

Threatpost

Widespread, unpatched vulnerabilities are just one set of problems uncovered by a Department of Defense audit.

article thumbnail

Disk-Wiping 'Shamoon' Malware Resurfaces With File-Erasing Malware in Tow

Dark Reading

As with previous attacks, organizations in the Middle East appear to be main targets, Symantec says.

79
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Charming Kitten Iranian Espionage Campaign Thwarts 2FA

Threatpost

The campaign targets politicians involved in economic and military sanctions against Iran, along with various journalists and human rights activists.

article thumbnail

EU – New powers for European Cyberagency

DLA Piper Privacy Matters

On 10 December 2018, the European lawmakers reached a political agreement on the European Cybersecurity Act. The intention of this new EU Regulation is to better protect the European Union against cyber-attacks, including a strengthening of the powers of the European Agency for Network and Information Security (“ENISA”). The Regulation still needs to be formally approved by the European Parliament and the Council of the EU, likely in March 2019 or soon thereafter.

article thumbnail

PewDiePie Hackers Say They Launched Second Printer Siege

Threatpost

The hackers behind the attack said they have targeted hundreds of thousands of printers in the latest attack dubbed #PrinterHack2.

IoT 68