Mon.Feb 18, 2019

article thumbnail

A Deep Dive on the Recent Widespread DNS Hijacking Attacks

Krebs on Security

The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that attack went down and who was hit have remained shrouded in secrecy.

Passwords 262
article thumbnail

Criminals, Nation-States Keep Hijacking BGP and DNS

Data Breach Today

While Exploitable Protocols and Processes Persist, Adoption of Secure Fixes Lags The internet is composed of a series of networks built on trust. But they can be abused due to weaknesses in older protocols, such as Border Gateway Protocol and the Domain Name System, which were not designed to be secure and are now being abused for online crime and espionage.

Security 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ATT&CKized Splunk – Threat Hunting with MITRE’s ATT&CK using Splunk

Security Affairs

Most of us know MITRE and the ATT&CK framework that they have come up with. What a splendid job they have done for the cyber security community by bringing most of the key attack vectors under an organized framework that segregates these attack vectors in various stages of a typical attack. Moreover, not only they have orchestrated the key attack vectors but the mitigation and detection guidance for each attack vector are also part of this framework.

Cloud 105
article thumbnail

Facebook's Leaky Data Bucket: App Stored User Data Online

Data Breach Today

Android App Left User Data Open Without Authentication or TLS/SSL A security consultancy discovered Facebook user data exposed in two different places online without authentication or encryption. The data is now offline. It came from an Android app that purported to offer statistical information to logged-in users.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Facebook May Be Fined for Billions for Cambridge Analytica Scandal

Adam Levin

Facebook’s long string of privacy scandals may (finally) have some meaningful repercussions by way of a multi-billion dollar fine from the Federal Trade Commission. The social media giant has been under investigation by the FTC since March 2018 in the wake of the Cambridge Analytica scandal, which affected 87 million users and may have been a pivotal influence in the 2016 election campaign.

Privacy 99

More Trending

article thumbnail

NATO Group Catfished Soldiers to Prove a Point About Privacy

WIRED Threat Level

With $60 and a few fake Facebook accounts, researchers were able to identify service members in a military exercise, track their movement, and even persuade them to disobey orders.

article thumbnail

Key Security Considerations for AI and Robotics

Data Breach Today

As the use of artificial intelligence tools and robotics continues to grow, it's crucial for organizations to assess the potential security risks posed, says attorney Stephen Wu, who reviews key issues in an interview.

article thumbnail

Free Tool: Honey Feed

Security Affairs

Cybersecurity expert Marco Ramilli shared another tool of his arsenal that extracts suspicious IPs from undesired connections, his HoneyPots. Hi folks, today I’d like to point you out another tool of mine which extracts suspicious IPs from undesired connections. In other words: HoneyPots. I run a personal HoneyPot network which stands from years and over time it harvested numerous IP addresses which could be, potentially, malicious (typically scanners).

article thumbnail

Privacy Ops: The New Nexus for CISOs & DPOs

Dark Reading

No longer can privacy be an isolated function managed by legal or compliance departments with little or no connection to the organization's underlying security technology.

Privacy 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

PoC Exploit Code for recent container escape flaw in runc published online

Security Affairs

The Proof-of-concept (PoC) exploit code for a recently discovered vulnerability in runc tracked as CVE-2019-5736 is now publicly available. Last week, Aleksa Sarai, a senior software engineer at SUSE Linux GmbH, disclosed a serious vulnerability tracked CVE-2019-5736 affecting runc , the default container runtime for Docker, containerd , Podman, and CRI-O.

Cloud 87
article thumbnail

The Imperfect Truth About Finding Facts in a World of Fakes

WIRED Threat Level

It used to make sense to believe something until it was debunked; now, it makes sense to assume certain claims are fake—unless they are verified.

IT 86
article thumbnail

New Trickbot module implements Remote App Credential-Grabbing features

Security Affairs

The Trickbot banking trojan continues to evolve, Trend Micro detected a new variant that includes a new module used for Remote App Credential-Grabbing. The infamous Trickbot banking trojan is back, experts at Trend Micro detected a new strain of the malware using an updated info-stealing module. The new strain of the Trickbot banking trojan that a updated info-stealing module. llows it to harvest remote desktop application credentials.

article thumbnail

I Am Not Associated with Swift Recovery Ltd.

Schneier on Security

It seems that someone from a company called Swift Recovery Ltd. is impersonating me -- at least on Telegram. The person is using a photo of me, and is using details of my life available on Wikipedia to convince people that they are me. They are not. If anyone has any more information -- stories, screen shots of chats, etc. -- please forward them to me.

IT 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Account security - a divided user perception

Elie

This post considers the perception clash that exists between what users perceive to be their most valuable accounts (email and social networks) and those they think they should protect the most (online banking).

article thumbnail

Expert found privilege escalation issue in LG Device Manager

Security Affairs

Security expert discovered a privilege escalation flaw that could be exploited by attackers to elevate permissions to SYSTEM in the LG Device Manager application for LG laptops. A security expert who goes online with the moniker Jackson T. has discovered the flaw, tracked as CVE-2019-8372, while analyzing the tool’s low-level hardware access (LHA) kernel-mode driver, which is associated with the LG Device Manager system service.

Access 69
article thumbnail

Cataloging IoT Vulnerabilities

Schneier on Security

Recent articles about IoT vulnerabilities describe hacking of construction cranes , supermarket freezers , and electric scooters.

IoT 79
article thumbnail

Wifi dans les lieux publics : Pensez-y à deux fois …

DXC Technology

Réfléchissez-vous avant de vous connecter à un réseau sans fil ? La commodité du Wi-Fi gratuit dans la rue, au café ou dans le bus est-elle trop tentante ? Vous l’ignorez peut-être, mais les entreprises qui exploitent ces point d’accès sans fil ont la possibilité de voir toutes les données qui y transitent. Toutes les données […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Best of Record Nations 2018: Top 15 Blogs

Record Nations

Throughout 2018, records management has become increasingly important as companies work to become more efficient. The following blog posts were the most popular in 2018. Records Management Compliance Three of our top blogs help you know the regulations for keeping records. Managing Record Retention Requirements in the Office Don’t be confused by record retention requirements. […].

article thumbnail

UK: EDPB adopts “Information note on GDPR data transfers”

DLA Piper Privacy Matters

The European Data Protection Board (EDPB) last week adopted a paper clarifying the position in relation to data transfers between the EU and UK in the event of a no deal Brexit. The EDPB confirmed that if the UK exits the EU without a deal, then with effect from 30 March 2019 the UK will be regarded as a “third country” for the purposes of the GDPR and any transfers of personal data from the EU to the UK from that point.

GDPR 40
article thumbnail

Educating today’s information professionals to meet tomorrow’s challenges

IG Guru

Master of Archives and Records Administration (MARA) Celebrates its 10th Anniversary By Dr. Patricia C. Franks The Master of Archives and Records Administration (MARA) degree was launched in August 2008 in what is now the School of Information at San José State University. The journey of this degree mirrors the transformation of record and information […].

article thumbnail

The Business of Data newsletter – Issue 11

Information Matters

If you are not already a subscriber and would like to subscribe to this newsletter please CLICK HERE. Data is not the new oil – Venture Beat, 10 February 2019 “Data may have been tantamount to petroleum when the internet was virgin wilderness. But the evolution of digital business long since rendered that notion obsolete. Today, those who believe moats of data will keep rivals at bay risk becoming overrun.” [link].

IoT 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Robots Are Here; Real World Applications of Machine Learning and Artificial Intelligence

IG Guru

With more than 2.5 quintillion bytes of data created every day, challenges with unstructured data and an increasingly complex regulatory landscape prompts a need for change to the old approach to information management. Many complex analytical problems are unsolvable by human effort alone due to data volumes and complexity involved. Machine learning and artificial intelligence are […].

article thumbnail

No Bad Faith Means No Sanctions for Failing to Preserve Video of Altercation: eDiscovery Case Law

eDiscovery Daily

In Stovall v. Brykan Legends, LLC, No. 17-2412-JWL (D. Kan. Feb. 7, 2019) , Kansas Magistrate Judge James P. O’Hara denied the plaintiff’s motion for sanctions based on the defendant’s alleged spoliation of a surveillance video that shows an altercation between the plaintiff and her supervisor, stating that “plaintiff has failed to meet the requirements of Fed.

article thumbnail

How to Protect Your Sensitive Information

Quest Software

Learn how to identify your risks, which systems contain sensitive data and make appropriate decisions on how to ensure your data is secure. ( read more ).

Risk 40
article thumbnail

When Cyberattacks Pack a Physical Punch

Threatpost

79
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

One of the County’s Earliest African-American Radio Programs on WNYC 1929-1930

Archives Blogs

WNYC was one of the earliest broadcasters of a regularly scheduled program aimed at African-Americans. Every Wednesday between November 20, 1929 and July 16, 1930 the station opened its schedule to the National Association for the Advancement of Colored People (NAACP) for talks by black leaders on a variety of topics focusing on African-Americans and their views on race relations, women, workers, entertainment, politics, literature, and the economy.

article thumbnail

The Magic of Modern MDM: Making Data Work for Healthcare and Life Sciences

Reltio

Ankur Gupta, Sr. Product Marketing Manager, Reltio. Digital transformation, big data analytics, and machine learning – the buzzwords echoing the Healthcare & Life Sciences industry signify a new era of delivering connected and personalized customer experience through 360 customer profile. If you are rethinking customer engagement and planning a better customer experience, we have a very special event lined up for you.

MDM 53
article thumbnail

Gnosticplayers round 3 – 92 Million fresh accounts from 8 unreported security breaches available for sale

Security Affairs

Gnosticplayers hacker is offering in a third round a new set of databases containing millions of hacked accounts from unreported data breaches. Last week, the hacker who goes by online with the moniker Gnosticplayers disclosed the existence of some massive unreported data breaches in two rounds. The experts offered for sale the huge trove of data for a limited period of time.

Sales 52