Fri.Feb 22, 2019

article thumbnail

Hackers Target Fresh Drupal CMS Flaw to Infiltrate Sites

Data Breach Today

CMS Project Team Patches "Highly Critical" Remote Code Execution Vulnerability Patch alert: Some versions of the popular content management system Drupal have a "highly critical" flaw that attackers can exploit to remotely execute code. The Drupal project team has released updates to fix the problem, which is already being targeted by hackers.

CMS 244
article thumbnail

5 ways organizations can benefit from machine learning

IBM Big Data Hub

Machine learning (ML) offers huge potential to help compliance and legal teams accomplish many of their most important rule tracking, employee monitoring and documentation activities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Toyota Australia, Healthcare Group Hit By Cyberattacks

Data Breach Today

Country Has Faced a Series of Security Incidents in Recent Weeks Australia has faced a few tough weeks on the cybersecurity front. Toyota Australia's computer systems were still down Friday after an attempted cyberattack. A healthcare group acknowledged it was the victim of a ransomware attack. And last week, suspected nation-state attackers hit Parliament's email systems.

article thumbnail

6 Tips for Getting the Most from Your VPN

Dark Reading

VPNs are critical for information security. But simply having these cozy security tunnels in the toolkit isn't enough to keep an organization's data safe.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Big Dump of Pakistani Bank Card Data Appears on Carder Site

Data Breach Today

Street Value of 70,000 Cards on Joker's Stash is $3.5 Million, Group-IB Says The notorious carder site Joker's Stash is featuring a fresh batch of Pakistani banks' payment card data with an estimated street value of $3.5 million. Nearly all of the 70,000 bank cards are advertised as being from Meezan Bank, the country's largest Islamic bank.

212
212

More Trending

article thumbnail

Password Manager Weaknesses Revealed

Data Breach Today

The latest edition of the ISMG Security Report describes vulnerabilities found in popular password generator apps. Plus, the evolution of blockchain as a utility and a new decryptor for GandCrab ransomware.

Passwords 199
article thumbnail

WhatsApp fixes Face ID and Touch ID authentication bypass

Security Affairs

WhatsApp recently implemented Face ID and Touch ID authentication for Apple iOS app, but unfortunately, it can be easily bypassed. Earlier February, WhatsApp introduced Face ID and Touch ID authentication for its iOS app to allow users to lock the application using the Face ID facial recognition and Touch ID fingerprint systems. The security feature can be enabled from Settings -> Account -> Privacy -> Screen Lock menu item.

article thumbnail

Information Blocking Rules: What They Would Mean for CISOs

Data Breach Today

Healthcare CISOs and other security and privacy leaders must carefully assess HHS' proposed new rules designed to help prevent the blocking of health information sharing and consider how they might "operationalize" the provisions within their organizations, says attorney Jodi Daniel.

Privacy 174
article thumbnail

Gen. Nakasone on US CyberCommand

Schneier on Security

Really interesting article by and interview with Paul M. Nakasone (Commander of U.S. Cyber Command, Director of the National Security Agency, and Chief of the Central Security Service) in the current issue of Joint Forces Quarterly. He talks about the evolving role of US CyberCommand, and it's new posture of "persistent engagement" using a "cyber-presistant force": From the article: We must "defend forward" in cyberspace, as we do in the physical domains.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google forgot to tell customers that Nest Hub has a microphone

Security Affairs

Google on Wednesday revealed that it forgot to inform users that its Nest Secure home alarm system includes a microphone. Google announced this week that it forgot to inform users that its Nest Secure home alarm system includes a microphone. “The problem: Nest users didn’t know a microphone existed on their security device to begin with.” states a post published by Business Insider that first reported the news. “The existence of a microphone on the Nest Guard, which is th

Privacy 76
article thumbnail

New Malware Campaign Targets Job Seekers

Dark Reading

LinkedIn profiles provide a persistent, patient threat actor with the information required to craft spear-phishing messages.

article thumbnail

Phishing Scam Cloaks Malware With Fake Google reCAPTCHA

Threatpost

Phishing emails target a bank's users with malware - and make their landing page look more legitimate with fake Google reCAPTCHAs.

article thumbnail

To Mitigate Advanced Threats, Put People Ahead of Tech

Dark Reading

Preventative technologies are only part of the picture and often come at the expense of the humans behind them.

86
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The future of smartphones may be in your mind

DXC Technology

The smartphone’s days are numbered, thanks in part to market saturation, lack of any significant technological breakthroughs in recent years, and the need of manufacturers to avoid commoditization, which forces down prices and destroys margins. Technology research firm IDC said in December that it expects worldwide smartphone shipments to decline by 3% in 2018, the […].

article thumbnail

Threatpost News Wrap Podcast For Feb. 22

Threatpost

From password manager vulnerabilities to 19-year-old flaws, the Threatpost team broke down this week's biggest news stories.

article thumbnail

La recuperación de desastres como servicio ofrece otra forma de simplificar la TI

DXC Technology

La recuperación ante desastres como estrategia de simplificación de TI es posible. Disaster recovery exige un grado de compromiso difícil de sostener. Usted sabe que necesita prepararse para lo inevitable, pero se requiere disciplina para mantener copias de seguridad. También es necesario un presupuesto para mantener un backup estable y al día, por si acaso. […].

Cloud 46
article thumbnail

How and why the data privacy mandate is expanding

Information Management Resources

The privacy mandate is expanding. Consumers expectations are increasing. And there will be regulation here in the US as well as in Europe. If you don’t keep up, there will be consequences.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Digital transformation through community – Collibra’s 2019 Data Citizens Conference

Collibra

Our team is gearing up for the fourth annual Data Citizens conference , which is being held this year on May 22-23 at the Conrad Hotel in New York City. With more than 600 attendees expected at this year’s event, Data Citizens continues to be the world’s largest gathering of professionals focused on transforming their businesses and delivering on strategic goals through better approaches to data.

article thumbnail

Learn to Plug (or Exploit) New Vulnerabilities at Black Hat Asia

Dark Reading

There's no better place to bone up on the ins and outs of web security than Black Hat Asia in Singapore next month.

article thumbnail

Video: HackerOne CEO on the Evolving Bug Bounty Landscape

Threatpost

Threatpost talks to HackerOne CEO Marten Mickos on the EU's funding of open source bug bounty programs, how a company can start a program, and the next generation of bounty hunters.

IoT 45
article thumbnail

6 top trends in emerging and disruptive technologies

Information Management Resources

Cloud-based machines, interactive collaboration tools and video collaboration are among the technology trends that organizations can expect to advance this year.

Cloud 53
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Threatpost Poll: Are Password Managers Too Risky?

Threatpost

Weigh in on password managers with our Threatpost poll.

article thumbnail

New Legislation Builds on California Data Breach Law

Dark Reading

This bill requires businesses to notify consumers of compromised passport numbers and biometric data.

article thumbnail

EU calls for End to Default Passwords on Internet of Things

The Security Ledger

A group representing European telecommunications firms last week published technical specifications for securing a wide range of consumer Internet of Things devices including toys, smart cameras and wearable health trackers. The post EU calls for End to Default Passwords on Internet of Things appeared first on The Security Ledger. Related Stories Russian Cyber Criminal Named as Source of Massive Collection 1 Data Dump Four More Collections, 700 Million Stolen Passwords Discovered Abine says Blur

article thumbnail

Gas Station Skimmer Fraud Triggers Secret Service Memo

Rippleshot

As payment technology evolves, so does the techniques of hackers. Gas stations skimming fraud has been one of the hot topics that continually falls onto the list of latest and greatest ways that fraudsters compromised payment card data at the pump. This is going to continue being a major topic of discussions across the financial services ecosystem long after the EMV deadline sets in for gas stations in October 2020.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

GDPR Enforcement Update: Increasing Fines Expected from German DPAs

HL Chronicle of Data Protection

Many companies have been struggling with GDPR implementation over the past two years, putting much effort into new roles, privacy concepts, and workflows. Now that the dust of the immediate GDPR compliance rush is settling, the first details of fines imposed under the GDPR and the number of cases pending with Data Protection Authorities (DPAs) in Europe are being made public.

GDPR 40
article thumbnail

Values to Consider During Selection for Digitization

IG Guru

Selection practice in most archives is aimed at meeting the current needs of user communities. Criteria developed by archives to select items for digitization are based on evidential and aesthetic values, as well as informational, intrinsic, and artifactual values. AESTHETIC VALUES Items chosen for digitization depend on aesthetic values, as well as traditional research values. […].

article thumbnail

Data Breaches of the Week: Tales of PoS Malware, Latrine Status

Threatpost

U.S. and subcontinent consumers were the most affected by this week's exposure revelations.