Wed.Oct 07, 2020

article thumbnail

Key life sciences trends as the world emerges from COVID-19 

OpenText Information Management

The COVID-19 pandemic has wrought havoc on clinical trials, with thousands being suspended or stopped due to difficulties in continuing under lockdown condition. Research suggests that 80% of clinical research participants indicated that they were unwilling to visit the trial site for study appointments. The clinical trials sector has had to pivot quickly.

115
115
article thumbnail

DHS: Russia Poses Greatest Threat to Election

Data Breach Today

Yet Another Report Warns of Nation-State Influence Operations In the latest in a series of election security reports from government agencies, the U.S. Department of Homeland Security says Russia poses the most serious nation-state disruption threat to the U.S. presidential election, with China and Iran also posing threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Promising Infusions of Cash, Fake Investor John Bernard Walked Away With $30M

Krebs on Security

September featured two stories on a phony tech investor named John Bernard , a pseudonym used by a convicted thief named John Clifton Davies who’s fleeced dozens of technology companies out of an estimated $30 million with the promise of lucrative investments. Those stories prompted a flood of tips from Davies’ victims that paint a much clearer picture of this serial con man and his cohorts, including allegations of hacking, smuggling, bank fraud and murder.

article thumbnail

CISA Warns of Emotet Attacks Against Government Agencies

Data Breach Today

Botnet Called 'One of the Most Prevalent Ongoing Threats' The U.S. Cybersecurity and Infrastructure Security Agency is warning about a recent spike in Emotet botnet attacks - designed to spread other malware - that are targeting state and local government agencies.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Kraken fileless attack technique abuses Microsoft Windows Error Reporting (WER)

Security Affairs

An unidentified group of hackers is using a new fileless attack technique, dubbed Kraken, that abuses the Microsoft Windows Error Reporting (WER). Malwarebytes researchers Hossein Jazi and Jérôme Segura have documented a new fileless attack technique, dubbed Kraken, that abuses the Microsoft Windows Error Reporting (WER) service. The hacking technique was employed by an unidentified hacking group to avoid detection. “On September 17th, we discovered a new attack called Kraken that injected

Phishing 124

More Trending

article thumbnail

New HEH botnet wipes devices potentially bricking them

Security Affairs

A new botnet, tracked as HEH, discovered botnet implements a disk-wiping feature that allows it to wipe all data from the infected systems. Researchers from from Netlab, the network security division of Chinese tech giant Qihoo 360, have discovered a new botnet, tracked as HEH, that contains the code to wipe all data from infected systems, such as routers, IoT devices, and servers.

IoT 114
article thumbnail

'Heh' Botnet Targets Telnet on IoT Devices

Data Breach Today

Researchers Say Bot Code Could Wipe Disks Clean Security researchers with the Chinese company Qihoo say they've spotted a new IoT botnet that brute forces telnet ports on routers and other devices and is coded with a command to erase infected devices.

IoT 231
article thumbnail

Catches of the month: Phishing scams for October 2020

IT Governance

In our latest round-up of phishing scams, we look at how and why the rise in remote working has made us more susceptible to fraud. We also explain why you should be careful if you receive an email telling you to complete a staff awareness training course, and discuss a new SMS scam that offers you an iPhone 12. Working from home increases the threat of phishing.

Phishing 111
article thumbnail

Fileless Malware Injected in Windows Error Reporting Service

Data Breach Today

Malwarebytes Describes Defense Evasion Mechanism Malwarebytes researchers have spotted a fresh attack tactic that involves threat actors directly injecting fileless malware into the Windows Error Reporting service as a defense evasion mechanism.

134
134
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

IRS COVID-19 Relief Payment Deadlines Anchor Convincing Phish

Threatpost

The upcoming deadlines for applying for coronavirus relief are the lure for a phish that gets around email security gateways by using a legitimate SharePoint page for data-harvesting.

Phishing 103
article thumbnail

Indonesia Soon to Become the Fifth ASEAN Country to Adapt Data Privacy Laws

Security Affairs

Earlier this year, Indonesia joined the ranks with the first four ASEAN countries including Malaysia, Singapore, Philippines and Thailand to have enacted laws relating to personal data protection. On January 28th, Indonesia’s Ministry of Communication and Information Technology announced that the final draft for the Personal Data Protection Act has been submitted to the president of Indonesia.

article thumbnail

Google’s Chrome 86: Critical Payments Bug, Password Checker Among Security Notables

Threatpost

Google is rolling out 35 security fixes, and a new password feature, in Chrome 86 versions for Windows, Mac, Android and iOS users.

Passwords 120
article thumbnail

ICO provides guidance on calculating monetary penalties

Data Protection Report

On 1 October 2020, the UK Information Commissioner’s Office (ICO) published draft statutory guidance , providing clarity about how it will regulate and enforce data protection legislation in the UK. The guidance, which sits alongside the ICO’s Regulatory Action Policy , covers the ICO’s range of enforcement powers, but of most interest is the section on how the ICO will calculate fines under the Data Protection Act 2018 and the EU General Data Protection Regulation (GDPR).

GDPR 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Department for Education’s handling of pupil data ruled illegal

The Guardian Data Protection

Data watchdog finds ministry broke GDPR by mishandling national database for England The Department for Education broke the law in its mishandling of the national database containing details of every school pupil in England, the Information Commissioner’s Office has concluded in a highly critical report. The report marks the second time in less than a year that the DfE has been publicly rebuked by the privacy watchdog for failing to adhere to data protection laws.

Education 100
article thumbnail

Webinar: Privacy & Data Security Regulation: Implications for RIM & IG October 22, 2020 12:00 MST

IG Guru

Click on an image or click here to register. The post Webinar: Privacy & Data Security Regulation: Implications for RIM & IG October 22, 2020 12:00 MST appeared first on IG GURU.

Privacy 97
article thumbnail

Comcast TV Remote Hack Opens Homes to Snooping

Threatpost

Researchers disclosed the 'WarezTheRemote' attack, affecting Comcast's XR11 voice remote control.

IoT 126
article thumbnail

The New War Room: Cybersecurity in the Modern Era

Dark Reading

The introduction of the virtual war room is a new but necessary shift. To ensure its success, security teams must implement new systems and a new approach to cybersecurity.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Rolls Out Fixes for High-Severity Android System Flaws

Threatpost

The most serious bugs are elevation-of-privilege issues in the Android System component (CVE-2020-0215 and CVE-2020-0416).

Security 112
article thumbnail

Cyber Intelligence Suffers From 'Snobby' Isolationism, Focus on Rare Threats

Dark Reading

Cyber-threat intelligence groups need to more often investigate their organization's specific threats and better integrate with other business groups, experts say.

97
article thumbnail

PoetRAT Resurfaces in Attacks in Azerbaijan Amid Escalating Conflict

Threatpost

Spear-phishing attacks targeting VIPs and others show key malware changes and are likely linked to the current conflict with Armenia.

article thumbnail

Alabama town’s new excuse for hiding public records: We don’t have to look for them via AL.com

IG Guru

Check out this very interesting article about FOIA and public records. The post Alabama town’s new excuse for hiding public records: We don’t have to look for them via AL.com appeared first on IG GURU.

FOIA 76
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Feds Sound Alarm Over Emotet Attacks on State, Local Govs

Threatpost

CISA warned already-strained public-sector entities about disturbing spikes in Emotet phishing attacks aimed at municipalities.

article thumbnail

Open Source Threat Intelligence Searches for Sustainable Communities

Dark Reading

As long as a community is strong, so will be the intelligence it shares on open source feeds. But if that community breaks down.

IT 123
article thumbnail

BAHAMUT Spies-for-Hire Linked to Extensive Nation-State Activity

Threatpost

Researchers uncovered a sophisticated, incredibly well-resourced APT that has its fingers in wide-ranging espionage and disinformation campaigns.

IT 87
article thumbnail

European Court of Justice Applies Free Movement Rules of E-Commerce Directive to Advertising by Mail-Order Pharmacy

Data Matters

In its judgment from October 1, the European Court of Justice (ECJ) ruled that an EU Member State cannot restrict a mail-order pharmacy, established in another Member State, from using paid referencing on search engines and price-comparison websites to promote its service, unless the Member State clearly establishes that the restriction is appropriate, and does not go beyond what is necessary, to protect public health.

Sales 68
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Belgian Data Protection Authority Releases 2019 Annual Report

Hunton Privacy

On September 30, 2020, the Belgian Data Protection Authority (the “Belgian DPA”) released its 2019 Annual Report (the “Report”). Notably, 2019 was the year of the Belgian DPA’s first fines under the EU General Data Protection Regulation (the “GDPR”) and the release of the Belgian DPA’s 2019-2025 Strategic Plan. Relevant Initiatives in 2019. In May 2019, the Belgian DPA imposed its first fine under the GDPR for abusive use of personal data in violation of the GDPR purpose limitation principle.

GDPR 71
article thumbnail

'Bahamut' Threat Group Targets Government & Industry in Middle East

Dark Reading

Researchers say the cyber espionage group was involved in several attacks against government officials and businesses in the Middle East and South Asia.

article thumbnail

Nor Is This All

The Texas Record

In late September, we lost an iconic figure in the library and archives field. TSLAC Director Mark Smith shared his thoughts on the Director’s Report blog , but we wanted to add a little more context on how Dr. David Gracy impacted our work in the records management unit. Andrew’s Thoughts: The legacy that Dr. Gracy left on the records and information management community in Texas is unparalleled.