Mon.May 13, 2019

article thumbnail

Equifax's Data Breach Costs Hit $1.4 Billion

Data Breach Today

Massive 2017 Breach Continues to Bite the Credit Reporting Giant's Bottom Line Equifax has reported a loss in its latest quarter due to ongoing incident response, legal, investigative and corporate information security overhaul costs resulting from its 2017 data breach. The credit reporting giant says that so far, it's spent $1.4 billion as a result of the massive breach.

article thumbnail

The Quality Coach, Developer’s Friend, Product Owner’s Helper and All-Round Great Quality Engineer

AIIM

As a project manager that specializes in digital software products, I will let you in on a secret about a new role, a new type of person that is emerging in the ranks—and it’s all good news for your project. This particular role actually inspired this series of articles about new roles that were emerging in the project life cycle due to digital disruption.

IoT 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nigerian BEC Scammers Use Malware to Up the Ante

Data Breach Today

Business Email Compromise Schemes Get More Sophisticated A growing area of concern for security researchers is a new crop of business email compromise schemes originating from Nigeria, with scammers upping their game by using new malware. The biggest of the crime gangs is SilverTerrier, according to Palo Alto Network's Unit 42.

Security 231
article thumbnail

Reverse Engineering a Chinese Surveillance App

Schneier on Security

Human Rights Watch has reverse engineered an app used by the Chinese police to conduct mass surveillance on Turkic Muslims in Xinjiang. The details are fascinating, and chilling. Boing Boing post.

Privacy 100
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Anthem Cyberattack Indictment Provides Defense Lessons

Data Breach Today

Security Experts Say Prosecution's Document Offers Critical Cybersecurity Insights The indictment of two Chinese men for a 2014 cyberattack on health insurer Anthem that compromised information on nearly 80 million individuals contains extensive details about the incident that security professionals can use to help with their breach prevention strategies.

Insurance 189

More Trending

article thumbnail

Passwordless MongoDB Database Exposes 275 Million Records

Data Breach Today

Practitioners Warn Against More Unprotected Servers on MongoDB Security practitioners are warning enterprises using MongoDB to ensure proper authentication mechanisms are in place after a researcher discovered a MongoDB database containing information on 275 million Indians was exposed on the internet for at least two weeks and then it was apparently taken over by hackers.

article thumbnail

Expert discovered how to brick all Samsung mobile phones

Security Affairs

The popular French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. French white hat hacker Robert Baptiste (aka @fs0c131y) discovered how to brick all Samsung mobile phones. I just published "How to brick all Samsung phones" on @Medium [link] — Elliot Alderson (@fs0c131y) May 12, 2019.

article thumbnail

IRS Gives Hacked Accounting Software Customers a Reprieve

Data Breach Today

7-Day Extension Offered to Users of Wolters Kluwer CCH Software After Attack Good news for customers of accounting software vendor Wolters Kluwer: The IRS has given you a 7-day extension to submit several different types of filings. Bad news: It's because the accounting software giant was hacked, knocking its cloud-based CCH software suite offline.

Cloud 170
article thumbnail

CVE-2019-11815 Remote Code Execution affects Linux Kernel prior to 5.0.8

Security Affairs

Security experts have found a race condition vulnerability (CVE-2019-11815) in Linux Kernel Prior to 5.0.8 that expose systems to remote code execution. Linux systems based on kernel versions prior to 5.0.8 are affected by a race condition vulnerability leading to a use after free that could be exploited by hackers to get remote code execution. Attackers can trigger the race condition issue that resides in the rds_tcp_kill_sock TCP/IP implementation in net/rds/tcp.c to cause a denial-of-service

Cleanup 91
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ThreatList: Top 5 Most Dangerous Attachment Types

Threatpost

From ZIP attachments spreading Gandcrab, to DOC files distributing Trickbot, researchers tracked five widescale spam campaigns in 2019 that have made use of malicious attachments.

article thumbnail

The power of combining AI and analytics for manufacturers

OpenText Information Management

Artificial Intelligence (AI) has become one of the hottest topics in manufacturing today. The range of business and operational applications that it can be put to is almost limitless. Yet, it’s fair to say that we’re still very early in the AI adoption curve. Success with AI implementation comes through evolution not revolution. Combining AI … The post The power of combining AI and analytics for manufacturers appeared first on OpenText Blogs.

article thumbnail

Over 10k+ GPS trackers could be abused to spy on individuals in the UK

Security Affairs

A vulnerability in a GPS tracker used by elderly people and kids could be exploited by an attacker to spy on individuals using it. Researchers at Fidus Information Security discovered a vulnerability in GPS trackers used by elderly people and kids could be exploited to spy on them. Experts discovered that the safety device can be completely controlled by miscreants through a text message.

article thumbnail

O365, iOS and Jamf: Best login ever

Jamf

If you want to take full advantage of Microsoft Outlook (an app within Office 365) on iOS, here’s a fast and easy way to set it up for your users and avoid confusing configuration help desk tickets.

IT 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Attacks on JavaScript Services Leak Info From Websites

Dark Reading

Three marketing tools, including the Best Of The Web security logomark, were compromised in supply chain attacks, allegedly leaving website customers leaking their users' sensitive information.

article thumbnail

Want great digital leaders in your organization? Look for these traits

DXC Technology

Enterprise leaders spend a lot of time trying to determine which technologies will best enable digital transformation. Likewise, they give a lot of thought to the types of skills employees need now and in the future to help their organizations meet strategic business objectives, often devoting considerable time and expense to recruiting and/or training.

article thumbnail

How Open Testing Standards Can Improve Security

Dark Reading

When creating security metrics, it's critical that test methodologies cover multiple scenarios to ensure that devices perform as expected in all environments.

article thumbnail

Promoting Threat Modeling Work

Adam Shostack

Quick: are all the flowers the same species? People regularly ask me to promote their threat modeling work, and I’m often happy to do so, even when I have questions about it. There are a few things I look at before I do, and I want to share some of those because I want to promote work that moves things forward, so we all benefit from it. Some of the things I look for include: Specifics.

Paper 61
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

LockerGoga, MegaCortex Ransomware Share Unlikely Traits

Dark Reading

New form of ransomware MegaCortex shares commonalities with LockerGoga, enterprise malware recently seen in major cyberattacks.

article thumbnail

Facebook sues data analytics firm Rankwave over alleged data misuse

Security Affairs

Facebook sues South Korean data analytics firm Rankwave over alleged data misuse and violation of social network’s rules. Facebook filed a lawsuit against Rankwave in a California State court in Silicon Valley to verify if the analytics firm is violating the rules of the social network giant. Facebook is asking the court to audit the activities conducted by Rankwave to verify which data were obtained and how they have been used. “Today Facebook filed a lawsuit in California state cou

article thumbnail

Korean APT Adds Rare Bluetooth Device-Harvester Tool

Dark Reading

ScarCruft has evolved into a skilled and resourceful threat group, new research shows.

84
article thumbnail

Unprotected DB exposed PII belonging to nearly 90% of Panama citizens

Security Affairs

Personally identifiable information belonging to roughly 90% of Panama citizens were exposed on a poorly configured Elasticsearch server. Security researcher Bob Diachenko discovered an unprotected Elasticsearch server exposing personally identifiable information belonging to nearly 90% of Panama citizens. Exposed data includes full names, birth dates, national ID numbers, medical insurance numbers, and other personal data.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Poorly Configured Server Exposes Most Panama Citizens' Data

Dark Reading

Compromised information includes full names, birth dates, national ID numbers, medical insurance numbers, and other personal data.

article thumbnail

Yee Haw! Texas lawyers must be competent in technology under revised rule 1.01

OpenText Information Management

The Texas Bar recently became the 36th State to codify what the American Bar Association (ABA) Model Rules of Professional Responsibility did in 2012 by adding very specific language about attorney competency and technology. In the newly revised Texas Rule 1.01, Paragraph 8 states: “Because of the vital role of lawyers in the legal process, … The post Yee Haw!

article thumbnail

Twitter Leaks Apple iOS Users’ Location Data to Ad Partner

Threatpost

A Twitter glitch "inadvertently" leaked iOS users' location data to an unnamed partner.

article thumbnail

Thrangrycat Claws Cisco Customer Security

Dark Reading

A linked pair of vulnerabilities could allow an attacker to take over many different types of Cisco networking components.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Biggest eDiscovery Challenges Facing Plaintiff’s Attorneys

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars. Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Why Does Production Have to be Such a Big Production?

article thumbnail

Pair of Cisco Bugs, One Unpatched, Affect Millions of Devices

Threatpost

The two high-severity bugs impact a wide array of enterprise, military and government networks.

article thumbnail

78% of Consumers Say Online Companies Must Protect Their Info

Dark Reading

Yet 68% of agree they also must do more to protect their own information.

70