Thu.Oct 04, 2018

article thumbnail

North Korean Hackers Tied to $100 Million in SWIFT Fraud

Data Breach Today

FireEye Traces APT38 Attacks; US-CERT Issues ATM Cash-Out Malware Attack Alert A gang of North Korean government hackers, known as APT38, has stolen more than $100 million from banks in Asia and Africa via fraudulent SWIFT transfers, cybersecurity firm FireEye warns. Separately, the U.S. government says North Korea is also behind serious ATM malware cash-out attacks.

article thumbnail

China planted tiny chips on US computers for cyber espionage

Security Affairs

China used tiny chips implanted on computer equipment manufactured for US companies and government agencies to steal secret information. According to a report published by Bloomberg News, China used tiny chips implanted on computer equipment manufactured for US companies and government agencies, including Amazon and Apple, to steal secret information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

We Want to Help You Increase Your ROI

AIIM

The rapid increase of "Big Content" in the digital age has culminated an array of costly legacy information systems and technologies that store and manage content but with no way to modernize or connect to each other. This begs the question: How do you strategically modernize to move forward and also work – efficiently – in your multiple systems? How do you realize your ROI?

article thumbnail

Conspiracy Theories Around the "Presidential Alert"

Schneier on Security

Noted conspiracy theorist John McAfee tweeted : The "Presidential alerts": they are capable of accessing the E911 chip in your phones - giving them full access to your location, microphone, camera and every function of your phone. This not a rant, this is from me, still one of the leading cybersecurity experts. Wake up people! This is, of course, ridiculous.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

6 ways your organisation can suffer a data breach

IT Governance

When you think of data breaches, you may well picture hackers infecting an organisation’s systems and stealing files. But that’s only one of six common ways a data breach can occur. The ICO (Information Commissioner’s Office) defines a breach as the “accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data.

More Trending

article thumbnail

Weekly Podcast: Russian cyber crimes, Facebook breach and Tory conference app

IT Governance

This week, we discuss Russian cyber crime, the Facebook breach affecting 90 million users and the Conservative Party’s conference app breach. Hello and welcome to the IT Governance podcast for Friday, 5 October. Here are this week’s stories. The NCSC (National Cyber Security Centre) has accused the Russian military intelligence service – the GRU – of a campaign of “cyber attacks targeting political institutions, businesses, media and sport”.

article thumbnail

7 Steps to Start Your Risk Assessment

Dark Reading

Risk assessment can be complex, but it's vital for making good decisions about IT security. Here are steps to start you down the path toward a meaningful risk assessment process.

Risk 88
article thumbnail

CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops

Security Affairs

Positive Technologies while analyzing Intel Management Engine (ME) discovered that Apple did not disable Intel Manufacturing Mode in its laptops. Experts from security firm Positive Technologies while analyzing Intel Management Engine (ME) discovered that Apple forgot did not lock it in laptops. The Intel Management Engine consists of a microcontroller that works with the Platform Controller Hub chip, in conjunction with integrated peripherals, it is a critical component that handles data excha

article thumbnail

How Russian Spies Infiltrated Hotel Wi-Fi to Hack Their Victims Up Close

WIRED Threat Level

A new indictment details how Russian agents camped outside hotels when remote hacking efforts weren't enough.

Security 107
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US offers its cyber warfare defense capabilities to NATO

Security Affairs

The United States will offer its offensive cyber capabilities to NATO to strengthen its defenses against threat actors like Russian ones. The United States is expected to announce to provide cyber warfare capabilities to NATO to strengthen its defenses against threat actors like Russian ones. The announcement is expected today at a meeting of defence ministers in Brussels, the decision follows the public commitment of Britain and Denmark in providing cyber resources to NATO.

IT 90
article thumbnail

Helen Nissenbaum on Data Privacy and Consent

Schneier on Security

This is a fantastic Q&A with NYU Law Professor Helen Nissenbaum on data privacy and why it's wrong to focus on consent. I'm not going to pull a quote, because you should read the whole thing.

article thumbnail

Canada blames Russia for cyber attacks against its structures

Security Affairs

The Government of Canada blamed the GRU , the Russian military’s intelligence agency, for cyber attacks at the Montreal-based World Anti-Doping Agency. “The government of Canada assesses with high confidence that the Russian military’s intelligence arm, the GRU, was responsible” for these cyber attacks, the foreign ministry said in a statement.

article thumbnail

Project spotlight: Partnering with TAB to digitize loan documents and streamline operations

TAB OnRecord

A large regional bank was looking to optimize operations by digitizing loan collections housed in three separate locations. These collections included millions of pages of loans documents for retail, mortgage, private banking and commercial clients – including complex cross-collateralized loans. Digitizing these loan documents and loading them into the FIS Vision Content system was a [.

Retail 68
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

US Indicts 7 Russian Intel Officers for Hacking Anti-Doping Organizations

Dark Reading

Netherlands expels four of the suspects trying to break into an organization investigating a chemical used in the recent attack on a former Russian spy in Britain.

81
article thumbnail

NIST Seeks Public Comment on Managing Internet of Things Cybersecurity and Privacy Risks

Hunton Privacy

The U.S. Department of Commerce’s National Institute of Standards and Technology recently announced that it is seeking public comment on Draft NISTIR 8228, Considerations for Managing Internet of Things (“IoT”) Cybersecurity and Privacy Risks (the “Draft Report”). The document is to be the first in a planned series of publications that will examine specific aspects of the IoT topic.

article thumbnail

Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?

Security Affairs

The Canadian restaurant chain Recipe Unlimited that operates over 20 restaurant brands has suffered a major IT outage over the weekend in a “malware outbreak.” The company operates nearly 1,400 restaurants under 19 different brands in Canada, Recipe Unlimited has suffered a major malware-based attack that impacted several of its brands.

article thumbnail

GDPR Report Card: Some Early Gains but More Work Ahead

Dark Reading

US companies paid the most, to date, to meet the EU's General Data Protection Regulation, according to a recent study, but UK companies made greater progress in achieving compliance goals.

GDPR 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why Supply Chain Hacks Are a Cybersecurity Worse Case Scenario

WIRED Threat Level

A blockbuster report from Bloomberg says that China has compromised servers used by major US companies. It's a problem that experts have long feared, and still don't know how to resolve.

article thumbnail

ThreatList: 83% of Routers Contain Vulnerable Code

Threatpost

Five out of six name brand routers, such as Linksys, NETGEAR and D-Link, contain known open-source vulnerabilities.

IoT 89
article thumbnail

Full steam ahead for EMVCo (and partners) in the fight against online commerce fraud

Thales Cloud Protection & Licensing

EMVCo was formed in the early 1990s and for many years concentrated, almost exclusively, on developing the detailed specifications for chip-based payment cards frequently referred to as EMV cards. In a similar way to PCI SSC branching out beyond PCI DSS (that I covered in an earlier blog ), you will now find that EMVCo now spends much more of its time and effort in creating other non-card specifications to support a wide range of emerging digital payment methods – these cover areas where fraud i

article thumbnail

Apple, Amazon Strongly Refute Server Infiltration Report

Threatpost

An explosive Bloomberg report, if true, would highlight the largest supply chain attack to have been launched against American corporations.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

NASCAR's digital evolution on track

Collaboration 2.0

NASCAR leads the way in the transition to digital for domestic US motorsports and the marketing ecospheres and sponsors that rely on them.

article thumbnail

Win with AI: Niagara Bottling taps IBM Data Science Elite Team

IBM Big Data Hub

Sreesha Rao, senior manager of IT applications at Niagara Bottling and Seth Dobrin, CDO of IBM Analytics, spoke with Dave Vellante in NYC on the eve of the 13 September taping of the Win with AI digital broadcast about the company’s efforts to save on plastic use by optimizing the settings of its pallet wrappers, machines that wrap an entire pallet stacked with cases of bottles in multiple revolutions of stretch plastic.

article thumbnail

For $14.71, You Can Buy A Passport Scan on the Dark Web

Dark Reading

That's the average price of a digital passport scan, and it goes up with proof of identification, a new study finds.

IT 85
article thumbnail

New Obligations Under the NYDFS Cybersecurity Regulation Came Online in September

HL Chronicle of Data Protection

The New York State Department of Financial Services (NYDFS) Cybersecurity Regulation (23 NYCRR Part 500) came into effect March 1, 2017 (see our previous publications: “ New York Department of Financial Services Cybersecurity rules revised and delayed ,” “ The ‘Final Final’ Is Here: NYDFS Cybersecurity Regulations ,” and “ A guide to NYDFS Cybersecurity Regulation’s March 1 implementation deadline ”).

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards

Dark Reading

If true, the attack using Supermicro motherboards could be the most comprehensive cyber breach in history.

article thumbnail

Add collaboration to your mobile business app development

OpenText Information Management

Users of high value software development tools are aware of the benefits that tools like OpenText™ Gupta TD Mobile provide for their software development projects. They are used to shortened development cycles, higher productivity of development teams and lower overall cost of software development. With every new release, OpenText is increasing the value that development … The post Add collaboration to your mobile business app development appeared first on OpenText Blogs.

Cloud 60
article thumbnail

The Architectural Mirror (Threat Model Thursdays)

Adam Shostack

A few weeks ago, I talked about “ reflective practice in threat modeling “, thinking about how we approach the problems we face, and asking if our approaches are the best we can do. Sometimes it’s hard to reflect. It’s hard to face the mirror and say ‘could I have done that better?’ That’s human nature. Sometimes, it can be easier to learn from an analogy, and I’ll again go to physical buildings as a source.