Thu.Oct 03, 2019

article thumbnail

Senators Press Social Media Firms to Fight 'Deepfake' Videos

Data Breach Today

Warner and Rubio Want Companies to Develop Standards and Policies to Combat Fakes U.S. senators Mark Warner and Marco Rubio are urging social media firms to create policies and standards to combat the spread of "deepfake" videos, which they say pose a potential threat to American democracy.

177
177
article thumbnail

SHARED INTEL: Threat actors add a human touch to boost effectiveness of automated attacks

The Last Watchdog

Trends in fashion and entertainment come and go. The same holds true for the cyber underground. Related: Leveraging botnets to scale attacks For a long while now, criminal hackers have relied on leveraging low-cost botnet services to blast out cyber attacks as far and wide as they could, indiscriminately. Over the past 18 months or so, a fresh trend has come into vogue.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Remote Desktop Protocol: Securing Access

Data Breach Today

Microsoft's Remote Desktop Protocol is one of the most widely used utilities for connecting to remote machines. But it poses risks if organizations don't actively monitor how it's used, says Chris Morales of the security firm Vectra.

Access 171
article thumbnail

Does your use of CCTV comply with the GDPR?

IT Governance

You might be surprised to learn that CCTV footage is subject to the GDPR (General Data Protection Regulation). The Regulation isn’t just about written details, like names and addresses; it applies to any information that can identify someone. That includes pictures and videos, which is why you should be careful about the way you use CCTV. Let’s take a look at the steps you should follow to ensure your video surveillance methods are GDPR-compliant. 1.

GDPR 110
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Report: 'PKPLUG' Espionage Campaign Targets Southeast Asia

Data Breach Today

Unit 42 Researchers Describe Malware Attacks That May Have Ties to China Threat actors that may have connections to China has been using a variety of malware in a series of information-gathering espionage campaigns across Southeast Asia since at least 2013, according to researchers at Palo Alto Networks' Unit 42 division.

164
164

More Trending

article thumbnail

HHS Gives Dental Practice Posting PHI on Yelp a Bad Review

Data Breach Today

Practice Must Pay a $10,000 HIPAA Settlement A dental practice in Texas that responded to patients' Yelp reviews by disclosing patient names and other health information has gotten a bad review from federal regulators: A $10,000 HIPAA monetary settlement and a corrective action plan.

155
155
article thumbnail

The Future of Data Protection Begins at GITEX 2019

Thales Cloud Protection & Licensing

Digital criminals won’t stop targeting the Middle East. I’ve seen numerous attack campaigns targeting this region come to the surface in 2019 alone. Back in April, I remember FireEye discovered that bad actors behind the TRITON custom attack framework had infiltrated a second critical infrastructure organization. That’s less than two years after the company spotted the first TRITON attack where malefactors used TRITON to disrupt a critical infrastructure organization in the Middle East.

Cloud 92
article thumbnail

OnDemand Webinar | Post-GDPR and CCPA: What Must Security Leaders Know about Privacy?

Data Breach Today

The new interdependence of security and privacy within the enterprise. Watch this webinar and learn about the interdependence of security and privacy.

Privacy 134
article thumbnail

6 cyber-espionage campaigns since 2013 attributed to PKPLUG China-linked group

Security Affairs

Security experts linked a number of cyber-espionage campaigns observed over the years to the same Chinese threat actor, tracked as PKPLUG. Security experts linked a number of cyber-espionage campaigns observed over the years to the same Chinese threat actor, tracked as PKPLUG. The name comes from the threat actor using PlugX inside ZIP archives containing the ASCII magic bytes “PK” in the header. “For three years, Unit 42 has tracked a set of cyber espionage attack campaigns ac

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Measuring the Security of IoT Devices

Schneier on Security

In August, CyberITL completed a large-scale survey of software security practices in the IoT environment, by looking at the compiled software. Data Collected: 22 Vendors 1,294 Products 4,956 Firmware versions 3,333,411 Binaries analyzed Date range of data: 2003-03-24 to 2019-01-24 (varies by vendor, most up to 2018 releases). [.]. This dataset contains products such as home routers, enterprise equipment, smart cameras, security devices, and more.

IoT 81
article thumbnail

Dutch police shut down bulletproof service hosting tens of DDoS botnets

Security Affairs

Dutch police seized a bulletproof hosting service in a major takedown, the infrastructure was used by tens of IoT botnets involved in DDoS attacks. A joint operation conducted by the Netherlands’ National Criminal Investigation Department and National Cyber Security Center allowed to track down and seize five servers that were composing a cybercrime underground bulletproof hosting service.

IoT 87
article thumbnail

Data science: Breaking down the silos

IBM Big Data Hub

Today’s data science and analytics teams are often composed of individuals with a variety of skill sets, educational backgrounds, levels of exposure to open source tools and professional needs.

article thumbnail

EU citizens lose court challenge over access to Home Office data

The Guardian Data Protection

Judge rules Data Protection Act clause denying them right to obtain records is not unlawful Brexit latest – live updates Campaigners have lost a high court challenge over new laws that prevent EU citizens living in Britain from finding out what data the Home Office holds on them. The3million group had challenged an exemption clause in the Data Protection Act that came into force last year, which denies them the right to access their personal records in immigration cases.

Access 72
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How the City of Angels Is Tackling Cyber Devilry

Dark Reading

A new mobile app makes a cybersecurity threat lab available to more small businesses in Los Angeles.

article thumbnail

WhatsApp Flaw Opens Android Devices to Remote Code Execution

Threatpost

A double-free bug could allow an attacker to achieve remote code execution; users are encouraged to update to a patched version of the messaging app.

article thumbnail

Researchers Link Magecart Group 4 to Cobalt Group

Dark Reading

Their findings demonstrate how Group 4 is likely conducting server-side skimming in addition to client-side activity.

82
article thumbnail

New Reductor Malware Hijacks HTTPS Traffic

Threatpost

Dubbed Reductor, this malware can manipulate HTTPS traffic by tweaking a browser’s random numbers generator.

86
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Common Pitfalls of Security Monitoring

Dark Reading

We need technology, but we can't forget the importance of humans working methodically to make it effective.

article thumbnail

Addressing GDPR Challenges: An Interactive Session on Handling Data Breaches

Hunton Privacy

On October 15, 2019, Hunton Andrews Kurth will host a luncheon seminar in our Brussels office on Addressing GDPR Challenges: An Interactive Session on Handling Data Breaches. In this roundtable discussion, our speakers will lead a dialogue to share experiences on handling data breaches under the EU General Data Protection Regulation (“GDPR”). Hear about lessons learned to-date, best practices and recent enforcement actions.

article thumbnail

American Express Insider Breaches Cardholder Information

Dark Reading

The ex-employee accessed names, Social Security numbers, card numbers, and more in an attempt to commit fraud.

Access 82
article thumbnail

Foxit PDF Reader Vulnerable to 8 High-Severity Flaws

Threatpost

Eight high-severity vulnerabilities exist in the Foxit Reader tool for editing PDF files.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

20M Russians' Personal Tax Records Exposed in Data Leak

Dark Reading

An unprotected Elasticsearch cluster contained personally identifiable information on Russian citizens from 2009 to 2016.

76
article thumbnail

Take these steps to reskill your workforce for the Age of Automation

DXC Technology

By Ben Eubanks, Principal Analyst, Lighthouse Research & Advisory The age of automation is radically disrupting work as we know it. By 2022, seventy-five million jobs in 20 economies are expected to disappear, just as 133 million new jobs are created. And by 2030, 375 million workers will need to find new work, as automation […].

IT 47
article thumbnail

How FISMA Requirements Relate to Firmware Security

Dark Reading

Federal guidelines can help all organizations pragmatically and meaningfully improve their firmware security.

article thumbnail

Archives*RM Testimonial #1

The Schedule

I have plenty of personal and some anecdotal evidence that good records management contributes to good archives. But with enough people demonstrating a desire to explore these intersections, I decided one good avenue to pursue would be collecting testimonials from practitioners who see the value of RM to archival work. With the assistance of Cathy Miller, we’ve begun this endeavor and today bring to you our first testimonial.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cartoon Contest: Second Wind

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

56
article thumbnail

Episode 163: Cyber Risk has a Dunning-Kruger Problem also: Bad Password Habits start at Home

The Security Ledger

In this episode of Security Ledger Podcast (#163) sponsored by LastPass: companies are spending more than ever on cyber security, but feel less secure. Why? Kevin Richards of the insurer Marsh joins us to talk about that company's Cyber Risk Perceptions Survey. Also Yaser Masoudnia of LastPass* joins us to talk about the blurry line between. Read the whole entry. » Related Stories Explained: Two-Factor vs.

Risk 40
article thumbnail

Bank of England cyber resilience exercise

Data Protection Report

BoE publish high level findings of the financial sector (“sector”) cyber simulation exercise. Exercise overview. The exercise explored the sector’s resilience to a major cyber incident impacting the UK. Alongside the Bank of England & PRA, Financial Conduct Authority and HM Treasury, participants included 29 market leading firms and Financial Market Infrastructures.