Fri.Sep 16, 2022

article thumbnail

Cybersecurity & Threat Modeling: Automated vs. Manual

Data Breach Today

Cybersecurity threat modeling: automated tools or manual methods? It's not an either/or situation, say Stephen de Vries, CEO and co-founder of IriusRisk, and Adam Shostack of Shostack and Associates. Each approach brings unique business value, and they discuss the merits of both.

article thumbnail

Uber hacked, internal systems and confidential documents were allegedly compromised

Security Affairs

Uber on Thursday disclosed a security breach, threat actors gained access to its network, and stole internal documents. Uber on Thursday suffered a cyberattack, the attackers were able to penetrate its internal network and access internal documents, including vulnerability reports. We are currently responding to a cybersecurity incident. We are in touch with law enforcement and will post additional updates here as they become available. — Uber Comms (@Uber_Comms) September 16, 2022.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sound Off: How Is SoftPOS Changing the Payments Landscape?

Data Breach Today

PCI Expert Troy Leach Sounds Off on SoftPOS and the 'Renaissance of Payments' Software point of sale or SoftPOS is a groundbreaking technology that allows businesses to accept card payments directly on their devices without requiring any additional software. As this payment method gains widespread adoption, what does it mean for the security of our payments systems?

Sales 240
article thumbnail

IT Governance Podcast Episode 8: Twitter, Instagram, InterContinental and Cloud security

IT Governance

This week, we discuss allegations of data security failures at Twitter, a €405 million fine for Instagram, a cyber attack on InterContinental Hotels Group, and why Cloud security is so important. Now available on Spotify , Amazon Music , Apple Podcasts and SoundCloud. The post IT Governance Podcast Episode 8: Twitter, Instagram, InterContinental and Cloud security appeared first on IT Governance UK Blog.

Cloud 130
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Chinese State Hackers Unleash Linux Backdoor

Data Breach Today

Malware Aimed at Hong Kong University After Protests, Eset Researchers Say Chinese state-backed cyber spies developed a Linux variant of a Windows backdoor to target a Hong Kong university after Beijing squashed pro-democracy protests in the city. The threat group, called SparklingGoblin, deployed the custom-built implant in February 2021, Eset researchers say.

238
238

More Trending

article thumbnail

SMBs! Forget Retainer-based Security Assessments: Demand Funded POCs

Data Breach Today

A New Delivery Model Surfacing for Various Assessment Services, but Best for SMBs? A new delivery model is surfacing for various assessment services - one that is going to be bad for SMBs, whose options were already limited.

Security 230
article thumbnail

North Korea-linked APT spreads tainted versions of PuTTY via WhatsApp

Security Affairs

North Korea-linked threat actor UNC4034 is spreading tainted versions of the PuTTY SSH and Telnet client. In July 2022, Mandiant identified a novel spear phish methodology that was employed by North Korea-linked threat actor UNC4034. The attackers are spreading tainted versions of the PuTTY SSH and Telnet client. The attack chain starts with a fake job opportunity at Amazon sent to the victims via email.

Archiving 121
article thumbnail

Uber security breach 'looks bad', caused by social engineering

KnowBe4

It was all over the news, but ZDNet's Eileen Yu was one of the first. -- "Hacker is believed to have breached Uber's entire network in a social engineering attack, which one security vendor says is more extensive than the company's 2016 global data breach and access logs potentially altered.".

Security 108
article thumbnail

Business Application Compromise & the Evolving Art of Social Engineering

Dark Reading

Be wary of being pestered into making a bad decision. As digital applications proliferate, educating users against social engineering attempts is a key part of a strong defense.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

10 Tips on how to improve data quality

Collibra

The importance of high-quality data is documented throughout the top verticals and is especially significant with the recent pandemic. As a result, achieving high data quality is a critical objective for data-driven organizations. Improving data quality delivers: . Trusted reporting and analytics. Optimized operational processes. Superior customer experience.

article thumbnail

Relay Attack against Teslas

Schneier on Security

Nice work : Radio relay attacks are technically complicated to execute, but conceptually easy to understand: attackers simply extend the range of your existing key using what is essentially a high-tech walkie-talkie. One thief stands near you while you’re in the grocery store, intercepting your key’s transmitted signal with a radio transceiver.

article thumbnail

Akamai mitigated a new record-breaking DDoS attack against a Europen customer

Security Affairs

Akamai announced to have recently blocked a new record-breaking distributed denial-of-service (DDoS) attack. On Monday, September 12, 2022, Akamai mitigated the largest DDoS attack ever that hit one of its European customers. The malicious traffic peaked at 704.8 Mpps and appears to originate from the same threat actor behind the previous record that Akamai blocked in July and that hit the same customer.

article thumbnail

Massive Data Breach at Uber

Schneier on Security

It’s big : The breach appeared to have compromised many of Uber’s internal systems, and a person claiming responsibility for the hack sent images of email, cloud storage and code repositories to cybersecurity researchers and The New York Times. “They pretty much have full access to Uber,” said Sam Curry, a security engineer at Yuga Labs who corresponded with the person who claimed to be responsible for the breach. “This is a total compromise, from what it looks like

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Phishing from a French Government Career Website

KnowBe4

Attackers are exploiting a legitimate French government website to send phishing messages, according to researchers at Vade. The website, Pôle Emploi, is a career site for companies looking for job recruits. The attackers are responding to job postings with phony resumes that contain a link to a Google Form designed to harvest credentials.

article thumbnail

Hacker Pwns Uber Via Compromised VPN Account

Dark Reading

A teen hacker reportedly social-engineered an Uber employee to hand over an MFA code to unlock the corporate VPN, before burrowing deep into Uber's cloud and code repositories.

Cloud 88
article thumbnail

Experts warn of self-spreading malware targeting gamers looking for cheats on YouTube

Security Affairs

Threat actors target gamers looking for cheats on YouTube with the RedLine Stealer information-stealing malware and crypto miners. Researchers from Kaspersky have spotted a self-extracting archive, served to gamers looking for cheats on YouTube, that was employed to deliver the RedLine Stealer information-stealing malware and crypto miners. The RedLine malware allows operators to steal several pieces of information, including credentials, credit card data, cookies, autocomplete information store

article thumbnail

Malware on Pirated Content Sites a Major WFH Risk for Enterprises

Dark Reading

Malware-laced ads are hauling in tens of millions of dollars in revenue for operators of pirated-content sites — posing a real risk to enterprises from remote employees.

Risk 86
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

California Enacts the California Age-Appropriate Design Code Act

Hunton Privacy

On September 15, 2022, California Governor Gavin Newsom signed into law the California Age-Appropriate Design Code Act (the “Act”). The Act, which takes effect July 1, 2024, places new legal obligations on companies with respect to online products and services that are “likely to be accessed by children” under the age of 18. The Act is modeled on the UK’s Age-Appropriate Design Code.

Privacy 67
article thumbnail

Popular IoT Cameras Need Patching to Fend Off Catastrophic Attacks

Dark Reading

Several models of EZVIZ cameras are open to total remote control by cyberattackers, and image exfiltration and decryption.

IoT 99
article thumbnail

New California Legislation Adds to Existing Smart Device Labeling Requirements

Hunton Privacy

On September 6, 2022, the California legislature presented Assembly Bill 2392 to Governor Gavin Newsom. AB-2392, which has not yet been signed by Governor Newsom, would allow Internet-connected device manufacturers to satisfy existing device labeling requirements by complying with National Institute of Standards and Technology (“NIST”) standards for consumer Internet of Things (“IoT”) products.

article thumbnail

Highlights of the 2022 Pwnie Awards

Dark Reading

Since 2007, the Pwnies have celebrated the good, the bad, and the wacky in cybersecurity. Enjoy some of the best moments of this year's ceremony.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

[MSP News] Manage Your Multiple KnowBe4 Accounts Faster with Managed Training and Phishing Rolled Into One

KnowBe4

You wanted the ability to manage both phishing and training campaigns across multiple KnowBe4 accounts, and we listened!

article thumbnail

5 Best Practices for Building Your Data Loss Prevention Strategy

Dark Reading

The entire security team should share in the responsibility to secure sensitive data.

article thumbnail

Recap of the 2022 Best Practice Exchange/CoSA (un)conference

Preservica

The Best Practices Exchange (BPE) is one of those conferences that slips my radar until I need information about how the archives community is thinking about X (insert electronic records, born digital archives, digital preservation, etc. here). Inevitably my google search will return a presentation title from a previous BPE (un)conference that seems to perfectly answer my question.

article thumbnail

Will the Cloud End the Endpoint?

Dark Reading

When an organization fully embraces the cloud, traditional endpoints become disposable. Organizations must adapt their security strategy for this reality.

Cloud 58
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Digitization vs. Digital Preservation

Preservica

Preservica's VP Marketing Alaine Behler recently sat down with our partner History Associates Incorporated (HAI) for a conversation about digitization vs digital preservation. Q: Thanks for joining us, Alaine. Can you tell us about Preservica? When did the company get started with digital preservation and why? A: Thank you for inviting me to this conversation.

article thumbnail

How Hospitals Are Keeping Their Employees and Patients Safe With Visitor Management

HID Global

HID’s Intelligent Patient Visitor Management supports patient well-being and provides a safe and efficient environment for patients, workers and visitors.

52
article thumbnail

Note to Security Vendors: Companies Are Picking Favorites

Dark Reading

A stunning three-quarters of companies are looking to consolidate their security products this year, up from 29% in 2020, suggesting fiercer competition among cybersecurity vendors.