Tue.Dec 04, 2018

article thumbnail

Kubernetes Alert: Security Flaw Could Enable Remote Hacking

Data Breach Today

Patch Container-Orchestration System Now or Risk Serious Consequences A severe vulnerability in Kubernetes, the popular, open-source software for managing Linux applications deployed within containers, could allow an attacker to remotely steal data or crash production applications. Microsoft and Red Hat have issued guidance and patches, and recommend immediate updating.

Security 248
article thumbnail

A Breach, or Just a Forced Password Reset?

Krebs on Security

Software giant Citrix Systems recently forced a password reset for many users of its Sharefile content collaboration service, warning it would be doing this on a regular basis in response to password-guessing attacks that target people who re-use passwords across multiple Web sites. Many Sharefile users interpreted this as a breach at Citrix and/or Sharefile, but the company maintains that’s not the case.

Passwords 203
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

12 States File Data Breach Lawsuit Against EHR Vendor

Data Breach Today

In Wake of Massive Data Breach, Attorneys General Allege Violations of HIPAA, State Laws In a groundbreaking effort, the attorneys general of a dozen states have jointly filed a federal lawsuit against a cloud-based electronic health records vendor that reported a 2015 data breach affecting 3.9 million individuals.

article thumbnail

[Podcast] Up Against 70,000 Boxes of Paper - One Law Firm’s Paper-Free Journey

AIIM

No, you read that title right – seventy THOUSAND boxes of paper in the highly restrictive environment of legal services. That’s what Susan Gleason , Manager of Records and Information Governance at Shipman & Goodwin and her team were up against. The Connecticut-based law firm was in the position that many firms face - they had been using paper-intensive records management for years and looking to build up their Information Governance , retention schedules, and ultimately move away from paper

Paper 83
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

14 Hot Sessions at Black Hat Europe 2018

Data Breach Today

Top-Flight Information Security Conference Returns to London The Black Hat Europe information security conference returns to London, featuring 40 research-rich sessions covering diverse topics, including politically motivated cyberattacks, recovering passwords from keyboards thanks to thermal emanations, hacking Microsoft Edge and detecting "deep fakes.

Passwords 191

More Trending

article thumbnail

Lack of Business Associate Agreement Triggers HIPAA Fine

Data Breach Today

Company That Provides Contracted Physicians Faces $500,000 Penalty Federal regulators have slapped a company that provides contracted physicians to hospitals and nursing homes with a $500,000 HIPAA settlement in a breach case involving the lack of a business associate agreement with an individual providing billing services.

187
187
article thumbnail

[Podcast] Up Against 70,000 Boxes of Paper - One Law Firm’s Paper-Free Journey

AIIM

No, you read that title right – seventy THOUSAND boxes of paper in the highly restrictive environment of legal services. That’s what Susan Gleason , Manager of Records and Information Governance at Shipman & Goodwin and her team were up against. The Connecticut-based law firm was in the position that many firms face - they had been using paper-intensive records management for years and looking to build up their Information Governance , retention schedules, and ultimately move away from paper

Paper 80
article thumbnail

Question: Did Quora Hack Expose 100 Million Users?

Data Breach Today

Answer: Yes, Q&A Site Believes Hackers Stole Private Content, Hashed Passwords Next to corporate communications that claim that "your security is important to us," any website post titled "security update" portends bad news. So too for question-and-answer site Quora, which says a hack exposed 100 million users' personal details, including hashed passwords and private content.

Passwords 183
article thumbnail

IT Security Lessons from the Marriott Data Breach

eSecurity Planet

500 million people are at risk because of a data breach at Marriott's Starwood hotel chain. What steps can your organization take to limit the risk of suffering the same fate?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

GDPR Compliance: The Role of Vendor Risk Management

Data Breach Today

Attorney Steven Teppler on Holding Vendors Accountable Why is ramping up vendor risk management such a critical component of compliance with the EU's General Data Protection Regulation? Attorney Steven Teppler provides insights.

article thumbnail

Foreign Trolls Are Targeting Veterans on Facebook

WIRED Threat Level

Opinion: The VA needs to take preventative measures to protect vets—and more broadly, our democracy—from digital manipulation and fraud.

Security 111
article thumbnail

Fighting Against Phishing

Data Breach Today

Richard Conti of Children's Hospital of Philadelphia on Risk Mitigation Steps Because phishing attacks are so pervasive, aggressive staff educational efforts are essential, says Richard Conti of The Children's Hospital of Philadelphia, who also discusses other risk mitigation steps.

Phishing 175
article thumbnail

Bad Consumer Security Advice

Schneier on Security

There are lots of articles about there telling people how to better secure their computers and online accounts. While I agree with some of it, this article contains some particularly bad advice: 1. Never, ever, ever use public (unsecured) Wi-Fi such as the Wi-Fi in a café, hotel or airport. To remain anonymous and secure on the Internet, invest in a Virtual Private Network account, but remember, the bad guys are very smart, so by the time this column runs, they may have figured out a way to hack

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A CISO's Insights on Breach Prevention

Data Breach Today

Anahi Santiago of Christiana Care on Patching, Mitigating Insider Threats A failure to patch systems and slipups that lead to insider threats are two major causes of breaches in the healthcare sector that need to be urgently addressed, says Anahi Santiago of Christiana Care Health System.

162
162
article thumbnail

New strain of Ransomware infected over 100,000 PCs in China

Security Affairs

Security experts reported a new strain of malware spreading in China, the malicious code rapidly infected over 100,000 PCs in just four days. Unfortunately, the number of infections is rapidly increasing because hackers compromised a supply chain. It is interesting to note that this ransomware requests victims to pay 110 yuan (nearly Euro 14) in ransom through WeChat Pay. “On December 1, the first ransomware that demanded the “WeChat payment” ransom broke out in the country.

article thumbnail

Enhancing Security Governance

Data Breach Today

Longtime CISO Vito Sardanopoli on Building an Effective Security Program A formal security program that spells out precise governance components is critical to protecting sensitive data, says Vito Sardanopoli, who served on the U.S. Department of Health and Human Services Healthcare Industry Cybersecurity Task Force.

article thumbnail

4 Industries That Have to Fight the Hardest Against Cyberattacks

Security Affairs

Society’s dependence on internet-based technologies means security professionals must defend against cyberattacks as well as more traditional threats, such as robbers or disgruntled employees. However, cybercriminals target some industries at disproportionally high rates. Here are four of them: 1. Health Care. Since health care professionals deal with life-or-death situations, cyberattacks could hinder both productivity and patient care to a tremendous degree.

Retail 86
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

5 Emerging Trends in Cybercrime

Dark Reading

Organizations can start today to protect against 2019's threats. Look out for crooks using AI "fuzzing" techniques, machine learning, and swarms.

85
article thumbnail

Quora data breach: hackers obtained information on roughly 100 million users

Security Affairs

Another day another illustrious victim of the data breach, the popular question-and-answer website Quora suffered a major data breach that exposed 100 million users. On Monday, the popular question-and-answer website Quora suffered a major data breach, unknown hackers breached its systems and accessed 100 million user data. The company is notifying the incident to the affected users and reset their passwords as a precautionary measure, it also reported it to law enforcement.

article thumbnail

A look back on 2018: What was hype and what was, perhaps, underrated

Thales Cloud Protection & Licensing

As we close in on the final few days of the year and look ahead to the clean slate that 2019 represents, I wanted to take a few moments to reflect on 2018 – specifically, what tech innovations and predictions held true, which fell a bit flat and which were entirely unexpected. If we examine Gartner’s Top Predictions for 2018 and beyond, IoT and cryptocurrencies rise to the top.

IoT 70
article thumbnail

M2M protocols can be abused to attack IoT and IIoT systems

Security Affairs

Security experts from Trend Micro discovered that some machine-to-machine (M2M) protocols can be abused to attack IoT and industrial Internet of Things (IIoT) systems. According to a study conducted by experts from Trend Micro and the Polytechnic University of Milan. attackers abuse M2M protocols to target IoT and IIoT devices. The experts analyzed the M2M protocols, the Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP).

IoT 83
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Backdoors Up 44%, Ransomware Up 43% from 2017

Dark Reading

Nearly one in three computers was hit with a malware attack this year, and ransomware and backdoors continue to pose a risk.

article thumbnail

10 top analytics and business intelligence trends for 2019

Information Management Resources

New data quality management practices, data discovery techniques and predictive and prescriptive analytics tools will be among the top trends impacting analytics and business intelligence.

article thumbnail

DHS, FBI Issue SamSam Advisory

Dark Reading

Following last week's indictment, federal government issues pointers for how security pros can combat SamSam ransomware.

article thumbnail

Dissecting the latest Ursnif DHL-Themed Campaign

Security Affairs

Security experts at Yoroi – Cybaze Z-Lab discovered a new variant of the infamous Ursnif malware targeted Italian users through a malspam campaign. Introduction. In the last weeks, a new variant of the infamous Ursnif malware was discovered hitting Italian users through a malspam campaign. In fact, Yoroi-Cybaze ZLAB isolated several malicious emails having the following content: Subject: “VS Spedizione DHL AWB 94856978972 proveniente dalla GRAN BRETAGNA AVVISO DI GIACENZA”.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Nonprofits on Facebook Get Hacked—Then They Really Need Help

WIRED Threat Level

Facebook is an enormous platform for charitable giving, but some nonprofit leaders say there aren’t enough resources when something goes wrong.

article thumbnail

4 Lessons Die Hard Teaches About Combating Cyber Villains

Dark Reading

With proper planning, modern approaches, and tools, we can all be heroes in the epic battle against the cyber threat.

81
article thumbnail

Three ways to simplify your digital content supply chain

OpenText Information Management

Sharing and collaborating on large media files, especially with partners and clients outside your organization, can be a challenge for anyone involved in the provisioning of digital content. Whether it’s ensuring external parties have the proper credentials to access digital assets, dealing with confusing user interfaces or complicated workflows, there are always hoops to jump … The post Three ways to simplify your digital content supply chain appeared first on OpenText Blogs.

Access 63