Mon.Dec 31, 2018

article thumbnail

Stop the Presses: Don't Rush Tribune Ransomware Attribution

Data Breach Today

Nation States and Cybercrime Gangs Keep Blurring; Tools Alone Don't Equal Actors Don't rush to blame the printing outage at newspapers owned by Tribune Publishing on anything more than an organization failing to block a malware outbreak. And even if it does prove to be a Ryuk ransomware attack, there's no proof yet that any particular nation state is behind the campaign, experts warn.

article thumbnail

‘Roma225’ campaign targets companies in the Italian automotive sector

Security Affairs

‘Roma225’ campaign -The Cybaze-Yoroi ZLab researchers investigated a recent espionage malware implant weaponized to target companies in the Italian automotive sector. The malware was spread through well-written phishing email trying to impersonate a senior partner of one of the major Brazilian business law firms: “ Veirano Advogados ”. The malicious email intercepted during the CSDC operations contains a PowerPoint add-in document (“.ppa ” extension), armed with auto-open VBA macro c

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Suspected Ransomware Outbreak Disrupts US Newspapers

Data Breach Today

Tribune Media Suspects Ryuk Ransomware Hit Publishing and Production Systems Production of newspapers owned by Chicago-based Tribune Publishing have been disrupted after malware began infecting the company's publishing and printing systems. Tribune newspapers report that they appear to have been hit by crypto-locking Ryuk ransomware.

article thumbnail

EU launches bug bounty programs for 15 software

Security Affairs

The European Commission decided to launch its bug bounty initiative, the Free and Open Source Software Audit (FOSSA) project. Bug bounty programs are very important for the security of software and hardware, major tech firms launched their own programs to discover flaws before hackers. The European Commission recognized the importance of bug bounty programs and decided to launch its bug bounty initiative, the Free and Open Source Software Audit (FOSSA) project.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Why Mastercard Launched a 'Fusion Center' for Security

Data Breach Today

Mastercard has launched a "fusion center" designed to increase its speed of response and coordination among departments in the event of a cyberattack, says CSO Ron Green, who explains the initiative.

Security 175

More Trending

article thumbnail

The Critical Importance of Data Integrity

Data Breach Today

Microsoft's Diana Kelley on How to Keep Data Untampered Altered data can be just as damaging as lost or stolen data. Diana Kelley of Microsoft outlines key steps for how enterprises can improve how they maintain data integrity.

166
166
article thumbnail

Top 3 trends leading to multicloud adoption

IBM Big Data Hub

Martec's law states, “Technology changes exponentially; organizations change logarithmically.” Translation? Technology will accelerate faster than companies can adapt to increasing data growth and adopt new business models.

80
article thumbnail

China's APT10

Schneier on Security

Wired has an excellent article on China's APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers' networks. I am reminded of the NSA's " I Hunt Sysadmins " presentation, published by the Intercept.

78
article thumbnail

Going From Info Overload To Action

Attensa

The Technology community has discussed and debated the impact of information abundance for many years. By itself, info abundance is simply a positive spin on information overload. It is the consequence of abundance on our business and professional lives (increasingly intertwined) that are interesting. Let’s get to the heart of why we care at all – creating value i.e. innovation, service to customers, leadership, risk management etc.

Risk 64
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Worst Hacks of 2018: Marriott, Atlanta, Quora, and More

WIRED Threat Level

From the Marriott and Facebook meltdowns to state-sponsored assaults, 2018 was an eventful year for cybercrime.

article thumbnail

What US data privacy legislation really needs to look like

Information Management Resources

Currently, all 50 states have privacy-based regulations, and every one of those states have different requirements on government notification in the event of a data breach.

Privacy 65
article thumbnail

Cryptocurrency Wallet Hacks Spark Dustup

Threatpost

Cryptocurrency wallets Trezor and Ledger are vulnerable to a number of different type attacks, researchers say.

71
article thumbnail

Is Your Company Doing Market Research for Your Advertiser?

Adam Levin

Unless you live in a boot at the bottom of Loon Lake, you know that everything you do online is tracked. When you load a web page, an array of scripts, cookies, and code starts chugging away behind the scenes gleaning information about who you are, where you are, how you got to the site, what you’re clicking on, and where you go next. At least now most websites disclose what they’re up to and ask for your consent – compliments of the new EU General Data Privacy Regulation.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Threatlist: Dark Web Markets See an Evolution in Q3

Threatpost

Vulnerabilities, stolen credentials and an evolution of marketplaces mark the Dark Web in Q3.

article thumbnail

IT Security Vulnerability Roundup – December 2018

eSecurity Planet

We look at 10 significant security flaws disclosed within the past 30 days.

article thumbnail

Malware Attack Crippled Production of Major U.S. Newspapers

Threatpost

Reports have linked the attack to the Ryuk ransomware.

article thumbnail

3 Reasons why tape should be included in your DR strategies

IG Guru

Repost – I wrote this article on LinkedIn and it got picked up by IDM. Friday, March 18, 2016 – 10:45 By Andrew Ysasi I frequently hear chatter about using tape technology online, at conferences, and even in meetings that can be summed up in one statement, “Tape is dead. It is old technology and […]. The post 3 Reasons why tape should be included in your DR strategies appeared first on IG GURU.

IT 41
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Going From Info Overload To Action

Attensa

The Technology community has discussed and debated the impact of information abundance for many years. By itself, info abundance is simply a positive spin on information overload. It is the consequence of abundance on our business and professional lives (increasingly intertwined) that are interesting. Let’s get to the heart of why we care at all – creating value i.e. innovation, service to customers, leadership, risk management etc.

Risk 40
article thumbnail

What Are Your Information Management Resolutions for 2019?

Gimmal

2018 was a year of massive change at Gimmal. This year, we've added a bunch of new features to our next generation records management platform, including connectors for Documentum and Box. We believe intelligent, cross-repository records management will continue to grow in importance to organizations next year, as leaders begin to understand that records management departments have the potential to unlock vast amounts of value stored in otherwise neglected information.

article thumbnail

How stream processing will impact data management in 2019

Information Management Resources

Stream processing is one of the core enabling technologies that is driving this new wave of real-time data across organizations of all industries.

45
article thumbnail

Zero-knowledge attestation

Imperial Violet

U2F/FIDO tokens (a.k.a. “Security Keys”) are a solid contender for doing something about the effectiveness of phishing and so I believe they're pretty important. I've written a fairly lengthy introduction to them previously and, as mentioned there, one concerning aspect of their design is that they permit attestation: when registering a key it's possible for a site to learn a cryptographically authenticated make, model, and batch.

Metadata 147
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cloud computing gets a second look from health execs

Information Management Resources

Shift in thinking due to their desire to cut data center costs, deploy new apps quickly, and access flexible and scalable resources for data storage and computing power.

Cloud 38
article thumbnail

SandboxEscaper released PoC code for a new Windows zero-day

Security Affairs

Security expert SandboxEscaper published a proof-of-concept (PoC) code for a new Windows zero-day, it is the fourth she released this year. The proof-of-concept (PoC) code published by SandboxEscaper overwrites ‘ pci.sys’ with information about software and hardware problems, collected through the Windows Error Reporting (WER) event-based feedback infrastructure.

article thumbnail

Podcast Episode 127: Donnie, Talk to China and Other Lessons from 2018

The Security Ledger

In this week’s podcast: as 2018 winds down, we invited David Aitel, the Chief Security Technical Officer at Cyxtera Technologies, to talk about the biggest stories of the year, including the supply chain attack on Super Micro, China's continued attacks on western firms, U.S. indictments of Russian and Chinese hackers and what 2019 may have in. Read the whole entry. » Related Stories Episode 124: The Twitter Accounts Pushing French Protests and Social Engineering the Software Supply Chain Po