Tue.Feb 27, 2018

article thumbnail

Data Cache May Contain 2,800 Partly Undiscovered Breaches

Data Breach Today

Organizations Scramble After 80 Million Potentially Breached Records Surface An analysis of a massive 8.8 GB trove of files containing usernames and plaintext passwords suggests hundreds of services may have experienced unreported or undiscovered data breaches. Data breach expert Troy Hunt says the trove of 80 million records appears to contain fresh data.

article thumbnail

How Liberals Amped Up a Parkland Shooting Conspiracy Theory

WIRED Threat Level

A fake story about a Parkland student started on the right, but outrage-tweeting on the left propelled it into the mainstream.

IT 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cryptocurrency Theft: Hackers Repurpose Old Tricks

Data Breach Today

Web Injects, Malware, Phishing and Fake Advertising Used in Attack Arsenal Criminals continue their quest for acquiring cryptocurrencies without having to buy and manage their own mining equipment. They're resorting to attacks aimed at stealing the cryptocurrencies via hacking, phishing, fake advertising and web injection attacks via repurposed banking Trojans.

Mining 133
article thumbnail

Russia's Olympics Hack Was the Country's Latest False Flag Attack

WIRED Threat Level

The Kremlin's hacking misdirection is evolving. And even when those attempts to confuse forensics fail, they still succeed at sowing future doubt.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

IoT Devices: Reducing the Risks

Data Breach Today

Attorney Steven Teppler, who recently wrote a report that addresses risks related to the internet of things, offers insights on risk management steps organizations in all sectors must take as IoT devices proliferate in the enterprise.

IoT 125

More Trending

article thumbnail

Deception Technology: Worth the Investment?

Data Breach Today

Interest in deception technology is growing because it can play a valuable role in improving intrusion detection, says Anton Chuvakin of Gartner, who explains the intricacies of the emerging technology in an in-depth interview.

IT 111
article thumbnail

The US v. Microsoft Supreme Court Case Has Big Implications for Data

WIRED Threat Level

The United States high court will decide whether a US warrant extends to digital data stored overseas.

article thumbnail

What's in store for a business analytics pro at Think 2018

IBM Big Data Hub

Whether you’re a developer, manager of an IT department or almost any other kind of business intelligence professional, Think 2018 has something for you.

article thumbnail

Luxembourg DPA Publishes Data Breach Reporting Form

Hunton Privacy

On February 12, 2018, the Luxembourg data protection authority ( Commission nationale pour la protection des donées , “CNPD”) published on its website (in English and French ) a form to be used for the purpose of compliance with data breach notification requirements applicable under the EU General Data Protection Regulation (the “GDPR”). The CNPD also published questions and answers (“Q&As”) regarding the requirements (only available in French ).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How the growth of IoT is changing data management

IBM Big Data Hub

Data management is a discipline that's remained relatively unchanged and, to put it bluntly, somewhat stagnant over the past 10 or 20 years. Since the dawn of the Internet of Things (IoT), these trends have already reversed.

IoT 53
article thumbnail

Security Starts with the User Experience

Dark Reading

Preventing a data breach is safer and more cost-effective than dealing with a breach after it has already happened. That means a focus on security in the design phase.

article thumbnail

Massive Malspam Campaign Targets Unpatched Systems

Threatpost

Morphisec said that it has detected several malicious word documents – part of a “massive” malspam campaign – that takes advantage of a critical Adobe Flash Player vulnerability discovered earlier this month.

IT 47
article thumbnail

Incident 'Management': What IT Security Can Learn from Public Safety

Dark Reading

How a framework developed for fighting California wildfires back in the '70s can fortify first responders to a modern cyberattack.

IT 57
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Apple Tackles Cellebrite Unlock Claims, Sort Of

Threatpost

In the wake of claims an Israeli company Cellebrite has developed an unlocking tool for any iPhone, Apple is urging customers to upgrade to the latest version of iOS 11.

article thumbnail

Memcached Servers Being Exploited in Huge DDoS Attacks

Dark Reading

Multiple vendors this week say they have seen a recent spike in UDP attacks coming in via port 11211.

64
article thumbnail

WordPress Users Warned of Malware Masquerading as ionCube Files

Threatpost

Researchers have found sneaky encoded malware targeting WordPress and Joomla sites that pretends to be ionCube files.

CMS 54
article thumbnail

NSA's Rogers: No White House Request for Action Against Russian Hacking

Dark Reading

US Cyber Command head Michael Rogers told US Senate Armed Services Committee that actions to deter Russian hackers from interfering with upcoming US elections requires an order from the White House.

42
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Remote Code Execution Bug Patched in Adobe Acrobat Reader DC

Threatpost

A remote code execution security flaw has been patched in one of the latest versions of Adobe Acrobat Reader DC.

article thumbnail

Misleading Cyber Foes with Deception Technology

Dark Reading

Today's deception products go far beyond the traditional honeypot by catching attackers while they are chasing down non-existent targets inside your networks.

article thumbnail

93 Percent of Legal Professionals Surveyed by Consilio Think AI Will Be Helpful to Legal: eDiscovery Trends

eDiscovery Daily

The things I do to get a blog post out. When you travel to Dallas for the Masters Conference (which is today) and forget your laptop charger, then make a trip to Best Buy to get a replacement — only to get back to the hotel and find out that the one you bought doesn’t fit your laptop (even though it listed the laptop manufacturer on the package) you wind up typing your blog post on the hotel computer in the Business Center.

article thumbnail

March Dark Reading Event Calendar Spans BlackOps to SecDevOps

Dark Reading

These upcoming webinars will help you comprehend the mysterious machinations inside the minds of hackers and in-house developers.

41
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

GDPR considerations when implementing software usage analytics

Information Management Resources

It is the obligation of the data controller to confirm GDPR compliance has been met by any outside vendors, and they should be able to document its real-time status at a moment's notice.

GDPR 38
article thumbnail

The Moll Atlas: How the World Appeared in 1721

Unwritten Record

Among the many treasures tucked away in the Archives is a series of maps known simply as “The Moll Atlas” (RG 76, Series 30). While the name might not initially scream “excitement”, the Moll Atlas is breathtaking for not only its complexity, but the sheer beauty of the maps themselves. Unfortunately, this is not the entire series due to the fact that some of the maps were not able to be scanned and, as a side note, the shadowing that can be seen in the images below is due to the fact that the

Sales 40
article thumbnail

Selling the power of data analytics through simple storytelling

Information Management Resources

As organizations evaluate the role of new technologies in their business strategy, the burden is on the software developer and data analyst to clearly communicate the potential of each.

article thumbnail

Nation-State Hackers Adopt Russian 'Maskirovka' Strategy

Dark Reading

New CrowdStrike report shows blurring of state-sponsored and cybercrime hacking methods.

41
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Making AI software smarter by adding human feedback

Information Management Resources

Developers can now really push the limits of their artificial intelligence platforms, giving them not just more human-like and life-like speech patterns, but also more accurate responses.

article thumbnail

Splunk to Acquire Phantom

Dark Reading

$350 million deal scheduled to close Q1 2018.

45
article thumbnail

Retailers want more insights from point-of-sale data

Information Management Resources

Pressured to justify their on-shelf presence, brands are turning to POS data to better forecast sales, improve promotional effectiveness, and reduce out of stocks, says Eric Green.

Sales 29