Sun.Mar 03, 2019

article thumbnail

The Wireshark Foundation released Wireshark 3.0.0

Security Affairs

The Wireshark Foundation released Wireshark 3.0.0, the latest release of the popular open-source packet analyzer. The Wireshark Foundation announced the release of Wireshark 3.0.0, the latest release of the popular open-source packet analyzer. The new version addresses several bugs and introduces tens of new features, it also improved existing features.

article thumbnail

The Air Force Wants to Give You Its Credit Card

WIRED Threat Level

Will Roper, acquisition executive for the US Air Force, talks to WIRED's editor-in-chief about making the military more adaptive, the role of AI, and what he worries about every day.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The operator of DDoS-for-hire service pleads guilty

Security Affairs

Sergiy P. Usatyuk (20), from Orland Park, Illinois pleaded guilty for owning, administrating, and supporting an illegal DDo-for-hire service. According to the U.S. Department of Justice, the booting service operated by Sergiy P. Usatyuk (20) was used to carry out millions of distributed denial of service attacks. Usatyuk developed and operated other DDoS-for-hire services with a co-conspirator between August 2015 and November 2017. “An Orland Park, Illinois man pleaded guilty today to one

article thumbnail

How the Dark Web Data Bazaar Fuels Enterprise Attacks

Threatpost

What does the age of near-ubiquitous data breaches, deep fakes, and fallible biometric authentication mean for enterprise security?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A Cobalt Strike flaw exposed attackers’ infrastructure

Security Affairs

According to security experts at Fox-IT, a recently addressed flaw in the Cobalt Strike penetration testing platform could be exploited to identify attacker servers. Security experts at Fox-IT discovered that a recently addressed vulnerability in the Cobalt Strike penetration testing platform could be exploited to identify attacker servers. The vulnerability was addressed in Cobalt Strike 3.13, Fox-IT experts argue the flaw was in the platform for almost 7 years, since the platform has been usin

More Trending

article thumbnail

Threat actors using FrameworkPOS malware in POS attacks

Security Affairs

Security experts at Morphisec observed a wave of attacks against point-of-sale (PoS) thin clients using card data scraping malware and the Cobalt Strike beacon. Over the past 8-10 weeks, security experts at Morphisec observed multiple sophisticated attacks targeting PoS thin clients worldwide. Most of the indicators collected by the experts point to the FIN6 hacking group, even if some of them are also tied to the EmpireMonkey group.

article thumbnail

Trusting your supply chain with personal information

CGI

Trusting your supply chain with personal information. pooja.cs@cgi.com. Mon, 03/04/2019 - 22:50. Companies vary in how they work with their suppliers. A consequence of the information age is that we’re sharing more and more information. Where sensitive information is exchanged, it is important that responsibility for cyber security is also shared. Without agreements and a clear understanding of each company’s security role, your supplier could become the weakest security link in your ecosystem.

GDPR 45
article thumbnail

Security Affairs newsletter Round 203 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Kindle Edition. Paper Copy. Once again thank you! 70000 Pakistani banks cards with PINs go on sale on the dark web. CVE-2019-9019 affects British Airways Entertainment System on Boeing 777-36N(ER). Duo Labs presents CRXcavator Service that analyzes Chrome Extensions.

article thumbnail

At RSA: Focus on Cyber in the Public Interest

The Security Ledger

Congress, non profits and government agencies could all use technology and cyber security expertise. The RSA Conference is pondering what it will take to foster cyber security pros to work in the public interest. The post At RSA: Focus on Cyber in the Public Interest appeared first on The Security Ledger. Related Stories Following Security Ledger at RSA Conference: Monday Three Decades On: RSA Labs Sets Course for Future Spotlight Podcast: Arctic Wolf on Nurturing Talent for the Evolved SOC.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Understanding Blockchain and its Impact on Legal Technology, Part Four

eDiscovery Daily

Editor’s Note: Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. He has also been a great addition to our webinar program, participating with me on several recent webinars. Tom has also written several terrific informational overview series for CloudNine, including his most recent one, Will Lawyers Ever Embrace Technology?

article thumbnail

Following Security Ledger at RSA Conference: Monday

The Security Ledger

The Security Ledger will be in San Francisco for the 28th RSA Security Conference this week. Check us out if you're at the show or follow us on social media @securityledger or via the #SLRSA hash tag. I'll be tweeting and sharing images (and video?) from the show floor. The post Following Security Ledger at RSA Conference: Monday appeared first on. Read the whole entry. » Related Stories Research finds Sextortion Scams Expand in Scope, Sophistication In Granite State: Industry Groups Paint

article thumbnail

The states at the forefront of consumer privacy legislation

Information Management Resources

California and others have passed consumer privacy laws, and lawmakers in Congress are beginning to address the issue.

Privacy 35
article thumbnail

Banks won’t be able to remain on sidelines of privacy debate

Information Management Resources

Equifax's massive breach and Facebook's scandals have made data privacy a big issue for state and federal lawmakers. Here's why banks need to be worried.

Privacy 29
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.