Tue.Dec 28, 2021

article thumbnail

A Year in Microsoft Bugs: The Most Critical, Overlooked & Hard to Patch

Dark Reading

Severe flaws in Microsoft Exchange and Windows Print Spooler stood out amid a wide range of vulnerabilities security teams were forced to prioritize in 2021.

Security 117
article thumbnail

That Toy You Got for Christmas Could Be Spying on You

Threatpost

Security flaws in the recently released Fisher-Price Chatter Bluetooth telephone can allow nearby attackers to spy on calls or communicate with children using the device.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Log4j Flaw Will Take Years to be Fully Addressed

Dark Reading

Over 80% of Java packages stored on Maven Central Repository have log4j as an indirect dependency, with most of them burying the vulnerable version five levels deep, says Google's Open Source Insights Team.

134
134
article thumbnail

Threat actors are abusing MSBuild to implant Cobalt Strike Beacons

Security Affairs

Experts warn of malicious campaigns abusing Microsoft Build Engine (MSBuild) to execute a Cobalt Strike payload on compromised systems. Security expert from Morphus Labs recently observed several malicious campaigns abusing Microsoft Build Engine ( MSBuild ) to execute a Cobalt Strike payload on compromised machines. MSBuild is a free and open-source build toolset for managed code as well as native C++ code and was part of.NET Framework.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Introducing One Page Quick Reference Guides

The Texas Record

The records management assistance unit has launched a Records Management Guidance Library , consisting of one page quick guides on hot topics and frequently asked questions. [link]. The first three topics covered in this newly launched training library are: Social Media Records Email Records Imaging & Scanning. New guides will be published based on popular demand.

More Trending

article thumbnail

FTC Announces it May Pursue Rulemaking to Combat Discrimination in AI

Data Matters

On December 10, the Federal Trade Commission (FTC) announced it is considering a rulemaking on commercial Artificial Intelligence (AI). The purpose of the rulemaking, according to an advanced notice of proposed rulemaking (ANPRM) titled “ Trade Regulation in Commercial Surveillance ,” would be “to curb lax security practices, limit privacy abuses, and ensure that algorithmic decision-making does not result in unlawful discrimination.”.

article thumbnail

After Google's Landmark Settlement, How Ad Networks Should Tackle Child Privacy

Dark Reading

To comply with the updated COPPA Rule, online ad platforms need to change how they handle viewers who might be children.

Privacy 112
article thumbnail

DoubleFeature, post-exploitation dashboard used by Equation Group APT

Security Affairs

Researchers analyzed the DoubleFeature logging tool of DanderSpritz Framework that was used by the Equation Group APT group. Check Point researchers have published a detailed analysis of the DoubleFeature tool used to log post-exploitation activities in attacks conducted by the Equation Group and involving the DanderSpritz malware framework. DanderSpritz made the headlines on April 14, 2017, when it was leaked by the Shadow Broker hacking group along with other tools and exploits belonging to NS

article thumbnail

2021 Wants Another Chance (A Lighter-Side Year in Review)

Threatpost

The year wasn't ALL bad news. These sometimes cringe-worthy/sometimes laughable cybersecurity and other technology stories offer schadenfreude and WTF opportunities, and some giggles.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Logistics giant D.W. Morgan exposed 100 GB worth of clients’ data, including Fortune 500 Clients

Security Affairs

The Website Planet security team discovered a data breach suffered by the multinational logistics giant D.W. Morgan. The Website Planet security team discovered an Amazon S3 bucket owned by logistics giant D.W. Morgan that was left unsecured online. The S3 bucket contained more than 100 GB of sensitive data relating to shipments and the company’s clients, including some Fortune 500 companies such as Cisco and Ericsson.

article thumbnail

An Adaptive Security Strategy Is Critical for Stopping Advanced Attacks

Dark Reading

Ransomware demands a new approach to incident response.

article thumbnail

Shutterfly hit by a Conti ransomware attack

Security Affairs

Shutterfly, an online platform for photography and personalized products, has been affected by a ransomware attack. Shutterfly , is American photography, photography products, and image sharing company that owns multiple brands such as BorrowLenses, GrooveBook, Lifetouch, Shutterfly, Snapfish, Spoonflower, and Tiny Prints. The service allows users to create personalized photo gifts such as smartphone cases, photo books, wall art, and home décor).

article thumbnail

Versatile Retention™ and Consulting Case Study: More Than a Vendor – Why Zasio is a Trusted Partner for this Global Pharmaceutical Company

IG Guru

Check out the case study post here. The post Versatile Retention™ and Consulting Case Study: More Than a Vendor – Why Zasio is a Trusted Partner for this Global Pharmaceutical Company appeared first on IG GURU.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AV-Comparatives Reveals Results of Long-Term Tests of 19 Leading Endpoint Security Solutions

Dark Reading

The Business Security Test is a comprehensive investigation of corporate endpoint security solutions on the market.

article thumbnail

Open Records Requests 101

Gimmal

The History of Records Requests. Many public entities are legally required to disclose information in response to requests from their constituents, media, or other interested parties. These laws and supporting regulations are enacted to provide transparency into government dealings and to improve accountability of the process. The laws are known by many names, including: Freedom of Information Open Records Right-to-Know Sunshine.

FOIA 52
article thumbnail

Rocket’s Commitment to DEI Now and in the Future

Rocket Software

In 2020, we saw a surge in companies strengthening their messaging and actions around diversity, equity and inclusion amidst the movement for racial justice. For some organizations, this seemed to trail off as protests slowed and news cycles changed. But at Rocket, we are standing firm-footed in this moment to reaffirm our commitment to DEI now and in the future as we look ahead into the new year. .

Risk 52
article thumbnail

How-to: Azure Conditional Access and Jamf Connect

Jamf

Finding "failed" login attempts in Azure sign-in logs?

Access 52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.