Tue.Feb 26, 2019

article thumbnail

Tech Industry Pushes for Australian Encryption Law Changes

Data Breach Today

Senate Committee Reviewing Law With an Eye to Amend Technology organizations say Australia's anti-encryption law passed in December is already undermining trust in their local operations. The comments come as a Senate committee is reviewing the law - passed in a hurry in December - to consider whether to amend it.

article thumbnail

List of data breaches and cyber attacks in February 2019 – 692,853,046 records leaked

IT Governance

The shortest month of the year is over in a flash, but not before a significant number of data breaches and cyber attacks could take place. I count this month’s total of leaked records to be 692,853,046, bringing 2019’s total to 2,462,038,109. At the time of publication, that’s roughly 30,000 records per minute so far this year…. As always, if I’ve missed anything please do let me know in the comments below.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UConn Health Among the Latest Phishing Victims

Data Breach Today

A Number of Newly Reported Health Data Breaches Stem From Email Incidents Phishing and other hacking incidents have led to several recently reported large health data breaches, including one that UConn Health reports affected 326,000 individuals.

Phishing 187
article thumbnail

Attacking Soldiers on Social Media

Schneier on Security

A research group at NATO's Strategic Communications Center of Excellence catfished soldiers involved in an European military exercise -- we don't know what country they were from -- to demonstrate the power of the attack technique. Over four weeks, the researchers developed fake pages and closed groups on Facebook that looked like they were associated with the military exercise, as well as profiles impersonating service members both real and imagined.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Filling Vacant Cybersecurity Jobs: The Role of 'Reskilling'

Data Breach Today

How can the many job openings for cybersecurity specialists be filled? "Reskilling" can play a critical role, says Greg Touhill, the nation's first federal CISO, who's now president of Cyxtera Technologies. In an interview, he offers a preview of his upcoming presentation at the RSA Conference 2019.

More Trending

article thumbnail

Sen. Warner Demands Answers on Healthcare Cybersecurity

Data Breach Today

Writes Letters to HHS, NIST, Industry Groups Posing Long Lists of Questions Senator Mark Warner, D-Va., has sent letters to four federal agencies and 12 healthcare associations posing long lists of questions as a prelude to developing short-term and long-term strategies for improving healthcare cybersecurity.

article thumbnail

Auto-Classifying data with Magellan and beyond

OpenText Information Management

In today’s digital world, the ability to establish defensible and transparent processes to auto-classify digital content is of growing importance to the intelligent and connected enterprise. As data stores get bigger and bigger, the burden of classifying them grows as well. In fact, the challenge is not just to classify digital content quickly, accurately, and … The post Auto-Classifying data with Magellan and beyond appeared first on OpenText Blogs.

article thumbnail

Recently disclosed Drupal CVE-2019-6340 RCE flaw exploited in the wild

Security Affairs

Threat actors in the wild are exploiting the recently patched CVE-2019-6340 flaw in the Drupal CMS to deliver cryptocurrency miners and other payloads. Just three days after the CVE-2019-6340 flaw in Drupal was addressed, threat actors in the wild started exploiting the issue to deliver cryptocurrency miners and other payloads. Last week, Drupal core team released security updates that address a “highly critical” remote code execution vulnerability.

article thumbnail

NERC $10,000,000 Fine of Public Utility Highlights the Need for Cybersecurity Preparedness and CIP Compliance Programs

Data Matters

On January 25, 2019, the North American Electric Reliability Corporation (“NERC”) asked the Federal Energy Regulatory Commission (“FERC”) to approve a settlement issuing a record $10 million fine against an unidentified utility resulting from violations of critical infrastructure protection standards (“CIP”) occurring mostly between 2015 and 2018 (referred to hereafter as the “Settlement Agreement”).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Author of NeverQuest botnet pleads guilty to bank fraud

Security Affairs

The Russian hacker Stanislav Vitaliyevich Lisov pleads guilty to bank fraud after running a botnet that spread ‘NeverQuest’ malware for three years. The Russian hacker Stanislav Vitaliyevich Lisov , aka “Black,” “Blackf,” is accused of using the NeverQuest banking Trojan to steal login information from victims. The man has pled guilty to one count of conspiracy to commit computer hacking in Manhattan Federal Court, he faces a sentence of up to five years in pr

article thumbnail

The ethics of AI are up in the air, and that’s dangerous

DXC Technology

If you had a super power, would you use it for good or evil? That’s a question every organization faces as they begin to use artificial intelligence (AI) to do business. And though AI isn’t a super power per se, it is like having the Batcomputer or Tony Stark’s J.A.R.V.I.S. on hand to thwart the […].

article thumbnail

Social Media Platforms Double as Major Malware Distribution Centers

Dark Reading

Because many organizations tend to overlook or underestimate the threat, social media sites, including Facebook, Twitter, and Instagram, are a huge blind spot in enterprise defenses.

75
article thumbnail

The Dark Sides of Modern Cars: Hacking and Data Collection

Threatpost

How features such as infotainment and driver-assist can give others a leg up on car owners.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Your Employees Want to Learn. How Should You Teach Them?

Dark Reading

Security practitioners are most likely to stay at organizations that offer career development. Here are eight tips to consider as you plan your course of action.

article thumbnail

Data protection fee: how much must data controllers pay to register with the ICO?

IT Governance

This blog has been updated to reflect industry updates. Originally published 20 June 2018. If you’re classified as a data controller under the GDPR (General Data Protection Regulation) , you might have overlooked an important compliance obligation: since 25 May 2018, the Data Protection (Charges and Information) Regulations 2018 have required every organisation or sole trader that processes personal data to register with the ICO (Information Commissioner’s Office) – unless all the processing t

GDPR 71
article thumbnail

‘Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud

Threatpost

A known vulnerability combined with a weakness in bare-metal server reclamation opens the door to powerful, high-impact attacks.

Cloud 85
article thumbnail

CCPA Amendment Bill Seeks to Expand Private Right of Action and Eliminate 30-Day Cure Period for CA AG Enforcement Actions

Hunton Privacy

On February 22, 2019, California state senator Hannah Beth-Jackson introduced a bill ( SB-561 ) that would amend the California Consumer Privacy Act of 2018 (“CCPA”) to expand the Act’s private right of action and remove the 30-day cure period requirement for enforcement actions brought by the State Attorney General. The bill would not change the compliance deadline for the CCPA, which remains January 1, 2020.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

What is information classification and how is it relevant to ISO 27001?

IT Governance

This blog has been updated to reflect industry updates. Originally published 26 June 2013. Information classification is a process in which organisations assess the data that they hold and the level of protection it should be given. Organisations usually classify information in terms of confidentiality – i.e. who is granted access to see it. A typical system will include four levels of confidentiality: Confidential (only senior management have access).

IT 69
article thumbnail

DIY Botnet Detection: Techniques and Challenges

Dark Reading

Botnets continue to spread to places never dreamed of a few years ago. But you can fight them off, and these tips can help.

80
article thumbnail

Holes in 4G and 5G Networks Could Let Hackers Track Your Location

WIRED Threat Level

New research shows how nearby attackers can see where you are, send you spoofed carrier messages, and more.

article thumbnail

Critical WinRAR Flaw Found Actively Being Exploited

Threatpost

The spam campaign is being used to spread a malicious.exe file, taking advantage of a vulnerability in WinRAR which was patched in January.

69
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A 'Cloudy' Future for OSSEC

Dark Reading

As more organizations move to the public cloud and to DevOps and DevSecOps processes, the open source alternative for host-based intrusion detection is finding new uses.

Cloud 61
article thumbnail

Hackers Can Slip Invisible Malware into 'Bare Metal' Cloud Computers

WIRED Threat Level

Researchers point a tough-to-fix in some cloud computing setups: hackable firmware.

Cloud 84
article thumbnail

GUEST ESSAY: Repelling social engineering attacks requires shoring up the weakest link: humans

The Last Watchdog

101
101
article thumbnail

'Cloudborne': Bare-Metal Cloud Servers Vulnerable to Attack

Dark Reading

Firmware vulnerabilities provide direct access to server hardware, enabling attackers to install malware that can pass from customer to customer.

Cloud 62
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

High-Severity SHAREit App Flaws Open Files for the Taking

Threatpost

SHAREit has fixed two flaws in its app that allow bad actors to authenticate their devices and steal files from a victim's device.

article thumbnail

7 ways the new California privacy law will impact all organizations

Information Management Resources

The regulation will impact the national and global economy, representing a seismic change for compliance procedures in the US, similar to how GDPR has changed privacy rules globally.

Privacy 59
article thumbnail

Researchers Build Framework for Browser-Based Botnets

Dark Reading

HTML5 used to build persistent malware on victims' computers.

80