Wed.Sep 04, 2019

article thumbnail

Huawei Accuses US Government of Hack Attacks

Data Breach Today

White House 'Using Every Tool At Its Disposal' to Disrupt Business, Firm Claims The battle between Huawei Technologies and the White House continues to intensify, with the Chinese manufacturing giant accusing the U.S. of "using every tool at its disposal" to disrupt its business, including cyberattacks and employee intimidation.

article thumbnail

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The Last Watchdog

The convergence of DevOps and SecOps is steadily gaining traction in the global marketplace. Some fresh evidence of this encouraging trend comes to us by way of shared intelligence from WhiteHat Security. Related: The tie between DevOps and SecOps. Organizations that are all-in leveraging microservices to speed-up application development, on the DevOps side of the house, have begun acknowledging the importance of incorporating SecOps along the way.

Security 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy Advocates Criticize FTC's Google Settlement

Data Breach Today

Google to Pay $170 Million Fine for YouTube's Privacy Violations Google will pay a $170 million fine to settle allegations that its YouTube subsidiary illegally collected personal information about children without their parents' consent, according to the Federal Trade Commission. But some children's right groups and members of Congress say the penalty is far too low.

Privacy 166
article thumbnail

Black Hat/DefCon 2019: Where is Quantum?

Thales Cloud Protection & Licensing

The weeklong “hacker summer camp” of the combined Black Hat and DefCon drew over 22,000 attendees to Las Vegas last month. Overall, we continue to think the security industry is still ripe for commoditization, especially from the cloud providers who have the capacity to simply offer features as a default. Last year we thought we saw evidence that security vendors were consolidating and on the cusp of providing higher order services to meet this threat, but we didn’t see much evidence of that str

IoT 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Seeking Indicators of Behavior

Data Breach Today

Sam Curry of Cybereason on Making the Shift For many cybercrime investigators, it's all about finding indicators of compromise - evidence a crime has been committed. Sam Curry of Cybereason describes the value of making a shift to cataloging indicators of behavior.

IT 166

More Trending

article thumbnail

Mitigating the Risks Posed by Malicious Insiders

Data Breach Today

HIPAA Enforcement Agency Warns Against Overlooking the Threat While hacking incidents grab the top spots on the federal tally of large health data breaches these days, the serious threat of malicious insiders must not be overlooked or underestimated, the HIPAA enforcement agency and security experts warn.

Risk 157
article thumbnail

Android Zero-Day exploits are the most expensive in the new Zerodium price list

Security Affairs

Zero-day broker Zerodium has updated the price list for both Android and iOS exploits, with Android ones having surpassed the iOS ones for the first time. For the first time, the price for Android exploits is higher than the iOS ones, this is what has emerged from the updated price list published by the zero-day broker Zerodium. Announcement: We've updated our prices for major Mobile exploits.

article thumbnail

Responding to Threats Based on Business Risks

Data Breach Today

Craig Harber of Fidelis Cybersecurity on Addressing Emerging Threats Nation-state actors, cybercriminals, hacktivists - each of these adversaries poses threats to enterprises. But how can organizations prioritize the threats and respond based on business risks? Craig Harber of Fidelis Cybersecurity discusses advanced threats and how to raise the bar on response.

Risk 157
article thumbnail

Rising Fines Will Push Breach Costs Much Higher

Dark Reading

The cost of breaches will rise by two-thirds over the next five years, exceeding an estimated $5 trillion in 2024, primarily driven by higher fines as more jurisdictions punish companies for lax security.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Strategies for Securing Digital Transformation

Data Breach Today

PJ Maloney and William 'Buck' Houston on Steps to Bolster Cyber Defense Digital transformation is the buzz across all sectors, but it poses significant security risks to enterprises. PJ Maloney of DXC Technology and William "Buck" Houston of Micro Focus Global Alliances weigh in on new strategies for securing the transformation.

article thumbnail

Creator of multiple IoT botnets, including Satori, pleaded guilty

Security Affairs

Kenneth Currin Schuchman (21) from Vancouver, Washington pleaded guilty to creating and operating multiple DDoS IoT botnet , including Satori. Kenneth Currin Schuchman (21) from Vancouver, Washington, aka Nexus Zeta, pleaded guilty to creating and operating multiple DDoS IoT botnets. Court documents revealed that the man suffers from Asperger Syndrome and autism disorder.

IoT 82
article thumbnail

iPhone Hacks May Be Linked to Broader China Spying

Data Breach Today

Volexity Says Websites Related to Muslim Group Hit By Android Exploits An extraordinary iPhone hacking campaign revealed by Google last week may be linked to other Android spying campaigns focused on websites related to the Uyghurs, a Chinese Muslim minority group, and the East Turkistan region of China, according to new research from Volexity.

157
157
article thumbnail

JSWorm: The 4th Version of the Infamous Ransomware

Security Affairs

Malware researchers at Yoroi -Cybaze ZLab have analyzed the fourth version of the infamous JSWorm Ransomware. Introduction. The ransomware attacks have no end. These cyber weapons are supported by a dedicated staff that constantly update and improve the malware in order to make harder detection and decryption. As the popular GandCrab , which was carried on up to version 5 until its shutdown, also other ransomware are continuously supported with the purpose of creating revenues for cyber criminal

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Third-Party Risk Management: NY DFS Regulation Compliance

Data Breach Today

Ted Augustinos of Locke Lord LLP Addresses the Challenges Defining the scope of third-party risk is challenging, says Ted Augustinos of Locke Lord LLP, who discusses compliance with the New York Department of Financial Services' cybersecurity regulation.

article thumbnail

Experts devised advanced SMS phishing attacks against modern Android-based phones

Security Affairs

Experts warn of advanced phishing attacks in certain modern Android-based phones that can trick users into accepting new malicious phone settings. When users insert a new SIM in their mobile phone and access to the cellular network for the first time, the carrier service automatically configures or sends you a message containing settings for the connection to data services.

article thumbnail

Regulatory Update: NAIC Summer 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2019 National Meeting (Summer Meeting) in New York City from August 3 to 6, 2019. The Summer Meeting was highlighted by the following activities. 1. NAIC Evaluating Definition of “Best Interest” to Determine Whether to Impose Such a Standard in the Suitability in Annuity Transactions Model Regulation.

article thumbnail

Some Zyxel devices can be hacked via DNS requests

Security Affairs

Experts at SEC Consult discovered several security issues in various Zyxel devices that allow to hack them via unauthenticated DNS requests. Security researchers at SEC Consult discovered multiple vulnerabilities in various Zyxel devices, including hardcoded credentials and issues that could allow to hack them via unauthenticated DNS requests. The first issue is an information disclosure flaw via unauthenticated external DNS requests that affect Zyxel devices from the USG, UAG, ATP, VPN and NXC

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

CEO ‘Deep Fake’ Swindles Company Out of $243K

Threatpost

Cybercrooks successfully fooled a company into a large wire transfer using an AI-powered deep fake of a chief executive's voice, according to a report.

article thumbnail

7 key stages of the data protection impact assessment (DPIA)

IT Governance

Under the GDPR, DPIAs (data protection impact assessments) are mandatory for data processing that is “likely to result in a high risk to the rights and freedoms of data subjects” Effectively a type of risk assessment, DPIAs assess how these high-risk processing activities could impact data subjects. Failure to adequately conduct a DPIA where required constitutes a breach of the GDPR.

article thumbnail

Phishing Campaign Uses SharePoint to Slip Past Defenses

Dark Reading

Cybercriminals targeting financial institutions in the UK bypassed Symantec email gateway and other perimeter technologies.

article thumbnail

The security risks of checking emails on your holiday

IT Governance

Look around your office. We bet there are a few more empty desks than usual. It’s a problem organisations have every year as staff head off on their summer holidays. Fortunately – or perhaps not – modern technology means employees can be thousands of miles from the office but only a few clicks from their inbox. Some of us will have the restraint to leave work commitments behind and focus on what’s truly important: finishing that bottle of sangria and getting a few dozen pictures for Instagram.

Risk 72
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

5G Standard to Get New Security Specifications

Dark Reading

Researchers had recently demonstrated how attackers could intercept device capability information and use it against 5G mobile subscribers.

article thumbnail

Digital Transformation: Why a Robust Partner Strategy Is Critical to Success

Micro Focus

Over the past few weeks, I’ve written a series of blogs on digital transformation (DX). The benefits of evolving your organization to become more digitally advanced are numerous, which is why it is perhaps the hottest topic now discussed in IT circles and in boardrooms. One key aspect of digital transformation (DX) that often doesn’t. View Article.

article thumbnail

An Inside Look at How CISOs Prioritize Budgets & Evaluate Vendors

Dark Reading

In-depth interviews with four market-leading CISOs reveal how they prioritize budgets, measure ROI on security investments, and evaluate new vendors.

article thumbnail

Creative collaboration for industry-leading enterprise DAM

OpenText Information Management

If you’re involved in any form of digital content collaboration – whether as a designer, copywriter, project manager, or decision-maker – you have probably felt the pains of having too many people involved, inconsistent or conflicting feedback, version control, juggling multiple campaigns and deliverables at once (often with competing deadlines) and ultimately too many rounds … The post Creative collaboration for industry-leading enterprise DAM appeared first on OpenText Blogs.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Android Phone Flaw Allows Attackers to Divert Email

Dark Reading

Researchers find that a spoofing a service message from the phone carrier is simple and effective on some brands of Android smartphones.

77
article thumbnail

Cyber Defense Magazine – September 2019 has arrived. Enjoy it!

Security Affairs

Cyber Defense Magazine September 2019 Edition has arrived. We hope you enjoy this month’s edition … packed with over 179 pages of excellent content. Our Growing Media Platforms… www.cyberdefenseawards.com www.cyberdefensemagazine.com www.cyberdefenseradio.com www.cyberdefensetv.com After 7 Years, We’ve Completely Rebuilt CyberDefenseMagazine.com – Please Let Us Know What You Think.

IT 63
article thumbnail

Credit Card Privacy

Schneier on Security

Good article in the Washington Post on all the surveillance associated with credit card use.

Privacy 84