Tue.Mar 26, 2019

article thumbnail

'Operation ShadowHammer' Shows Weakness of Supply Chains

Data Breach Today

Report: Poor Asus Security Allowed Its PCs to be Infected with Backdoors A sophisticated attack campaign dubbed "Operation ShadowHammer" involved an advanced persistent threat group planting backdoors within Asus computers by subverting the Taiwan-based PC maker's third-party supply chain and updater software, Kaspersky Lab warns.

Security 232
article thumbnail

NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

The Last Watchdog

One way to grasp how digital transformation directly impacts the daily operations of any organization – right at this moment — is to examine the company’s application environment. Related: How new exposures being created by API sprawl. Pick any company in any vertical – financial services, government, defense, manufacturing, insurance, healthcare, retailing, travel and hospitality – and you’ll find employees, partners, third-party suppliers and customers all demanding remote access to an

Security 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Steve Katz on Cybersecurity's State of the Union

Data Breach Today

World's First CISO Weighs in on the Technologies and Trends Shaping 2019 It's been decades now since Steve Katz became the business world's first CISO. Today he is still active in the cybersecurity community and offers his unique perspective on security threats, solutions and the next generation of leaders.

article thumbnail

10 Movies All Security Pros Should Watch

Dark Reading

Don't expect to read about any of the classics, like 'War Games' or 'Sneakers,' which have appeared on so many lists before. Rather, we've broadened our horizons with this great mix of documentaries, hacker movies, and flicks based on short stories.

Security 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Is US Foreign Cyber-Policy on Track?

Data Breach Today

Ex-Cyber Czar Chris Painter on Where US is Getting it Right - and Wrong How the country responds to the growing cyberthreats will shape its diplomatic, military and economic power. With the stakes this high, is the U.S. getting it right? Chris Painter, commissioner on the Global Commission on the Stability of Cyberspace and former White House cyber czar offers his perspective.

Military 178

More Trending

article thumbnail

Report: Half of Breaches Trace to Hacking, Malware Attacks

Data Breach Today

Business Email Compromise and Payroll Portal Hacks Are Surging, Beazley Warns Beazley Breach Response Services, a unit of global insurance company Beazley, reports that nearly half of the more than 3,300 breaches it investigated last year traced to a hack attack or malware infection. And half of those hacking/malware attacks were tied to business email compromise schemes.

Insurance 173
article thumbnail

Personal Data Left on Used Laptops

Schneier on Security

A recent experiment found all sorts of personal data left on used laptops and smartphones. This should come as no surprise. Simson Garfinkel performed the same experiment in 2003, with similar results.

article thumbnail

FBI's Palmore on Leadership and Diversity

Data Breach Today

Cyber Investigator on the Need to Diversify Skills in Cyber Workforce At a time when diversity is a key topic within the cybersecurity leadership and workforce, MK Palmore of the FBI says we also need a diversification of skills to help improve breach defense and response.

article thumbnail

How to get back files encrypted by the Hacked Ransomware for free

Security Affairs

Good news for the victims of the Hacked Ransomware, the security firm Emsisoft has released a free decryptor to decrypt the data of infected computers. Security experts at Emsisoft released a free decryptor for the Hacked Ransomware. The Hacked Ransomware was first spotted in 2017, it appends.hacked extension to the encrypted files and includes ransom notes in Italian, English, Spanish, and Turkish.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How Web Application Firewalls Are Evolving

Data Breach Today

Signal Sciences' Andrew Peterson on How WAFs Can Support Application Security Web application firewalls usually have not been a part of the DevSecOps conversation, but that's changing, says Andrew Peterson, CEO of Signal Sciences.

Security 170
article thumbnail

Russia Regularly Spoofs Regional GPS

Dark Reading

The nation is a pioneer in spoofing and blocking satellite navigation signals, causing more than 9,800 incidents in the past three years, according to an analysis of navigational data.

90
article thumbnail

GAO: Equifax-Like Breaches Require Greater Civil Penalties

Data Breach Today

Report Calls for New Rules to Pave the Way for Bigger Fines One way to ensure greater protection for consumers and their personal information following massive data breaches is to give the U.S. Federal Trade Commission the ability to impose greater civil penalties against consumer reporting agencies, such as Equifax, a new government report concludes.

article thumbnail

Ex-NSA Director Rogers: Insider Threat Prevention a 'Contract'

Dark Reading

Ret. Admiral Michael Rogers - who served as head of the NSA and the US Cyber Command from 2014 to 2018 - on how to handle the risk of insiders exposing an organization's sensitive data.

Risk 90
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Authenticating in the Age of IoT

Data Breach Today

Nok Nok Lab's Philip Dunkelberger on Why Traditional Authentication Won't Work With the advent of the internet of things, authentication needs to be far more scalable, says Phillip Dunkelberger, CEO of Nok Nok Labs.

article thumbnail

The Ursnif Gangs keep Threatening Italy

Security Affairs

Malware researchers at Cybaze-Yoroi ZLab team uncovered a new Ursnif malware campaign that reached several organizations across Italy. Introduction. The Ursnif trojan confirms itself as one of the most active malware threats in cyberspace, even during the past days, when new attack attempts reached several organizations across Italy. Cybaze -Yoroi ZLab team dissected its infection chain to keep tracking the evolution of this persistent malware threat, analyzing its multiple stages, each one with

article thumbnail

Aussie InfoSec Researcher to Be Sentenced

Data Breach Today

Police Charged Researcher With Network Intrusion An Australian computer security researcher will be sentenced May 1 after pleading guilty to several charges related to an unauthorized intrusion into the network of GoGet, a vehicle sharing service.

Security 138
article thumbnail

iOS 12.2 update addresses some troubling vulnerabilities

Security Affairs

This week Apple released iOS 12.2 to address 51 security vulnerabilities in the popular mobile operating system running on iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. Most of the flaws affect the web rendering engine WebKit, an attacker could trick victims into opening a maliciously crafted web content to execute arbitrary code, disclose sensitive user information, bypass sandbox restrictions, or launch universal cross-site scripting attacks on the device.

Access 82
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Broadcom Executive on Acquisition of CA Technologies

Data Breach Today

Clayton Donley on How Security Ties Into Broadcom's Vision Late in 2018, Broadcom completed its acquisition of CA Technologies. What is the vision of this new cybersecurity products and services enterprise? Clayton Donley, general manager of security at Broadcom, shares insights.

article thumbnail

Under Attack: Over Half of SMBs Breached Last Year

Dark Reading

Many small and midsize businesses work faster and harder than large enterprises, but they're just as vulnerable to cybercrime.

97
article thumbnail

Whitehat settings allow white hat hackers to Test Facebook mobile apps

Security Affairs

Facebook introduced new settings designed to make it easier for cyber experts to test the security of its mobile applications. Facebook has announced the implementation of new settings to make it easier for white hat hackers to test the security of its mobile applications. To protect Facebook users, the mobile apps of the company implement security mechanisms such as Certificate Pinning that ensures the integrity and confidentiality of the traffic sent from the user device to Facebook servers.

article thumbnail

DPIAs for retail and hospitality 

IT Governance

Although DPIAs (data protection impact assessments) are not a new concept, the GDPR (General Data Protection Regulation) now mandates them under certain circumstances. A DPIA is essentially a risk assessment that needs to be conducted before carrying out any processing activities, particularly those “using new technologies”, that are “likely” to result in a “high risk” to the rights and freedoms of natural persons.

Retail 78
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

California, Here We Come: Getting Ready for the California Consumer Privacy Act of 2018

Data Matters

WEBINAR. Wednesday, March 27, 2019 | 4:00 p.m. EDT / 1:00 p.m. PDT. CLE & CPE Credit Offered. When the California Consumer Privacy Act enters into force on January 1, 2020, it will grant consumers extensive new data rights and place a number of new obligations on companies – obligations that in some ways even exceed those imposed by the European General Data Protection Regulation (GDPR).

Privacy 68
article thumbnail

Data Privacy Manifestos: Competitive Advantage or the Start of Something Bigger?

Dark Reading

Facebook is the latest company to weigh in with a corporate manifesto focused on privacy. Though it's a welcome trend, only time will tell how many follow through.

Privacy 80
article thumbnail

Mastercard Wades Into Murky Waters With Its New Digital ID

WIRED Threat Level

The credit card company has more details about its plan for a decentralized, universal digital ID, but questions remain.

IT 91
article thumbnail

ASUS Patches Live Update Bug That Allowed APT to Infect Thousands of PCs

Threatpost

If users have an impacted devices, they need to immediately run a backup of their files and restore their operating system to factory settings, said ASUS.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

HIMSS 2019 showcased the transformation of healthcare and the rise of the technology giants

DXC Technology

by Damon Auer The jury is in. Artificial intelligence and the consumerization of care are here to stay. In the week before the 2019 HIMSS meeting, I wrote a blog predicting what trends and technologies we could expect to see at the big show. The conference itself didn’t disappoint and just about everything I predicted […].

article thumbnail

Apple iOS 12.2 Patches 51 Serious Flaws

Threatpost

Apple patched more than 50 flaws in iOS 12.2, including an array of bugs in Webkit and a vulnerability that allows apps to secretly listen to users.

article thumbnail

How Zello Became a Lifeline for Venezuelans Under Maduro

WIRED Threat Level

A dedicated community of Zello moderators is using the voice-chat app to help bring news and coordinate aid amid the country's political and economic crisis.

Privacy 66