Mon.Apr 25, 2022

article thumbnail

The Global Threat Landscape 1 Year After SolarWinds

Data Breach Today

In this episode of "Cybersecurity Unplugged," Roger Sels, vice president, solution, EMEA at BlackBerry, discusses the global threat landscape one year after SolarWinds, including cyberthreats from Russia and China; the cyber impact of the Russia-Ukraine war; and the cyber call to action.

article thumbnail

Colorado AG Provides Insights on the Colorado Privacy Act Rulemaking Process

Hunton Privacy

On April 12, 2022, Colorado Attorney General Phil Weiser made remarks at the International Association of Privacy Professionals Global Privacy Summit in Washington, D.C., where he invited stakeholders to provide informal public comments on the Colorado Privacy Act (“CPA”) rulemaking. In addition to this informal public comment, the Colorado Department of Law (“Department”) will begin the formal notice-and-comment rulemaking phase in fall 2022 by announcing a notice of rulemaking and accompanyi

Privacy 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Synopsys, Checkmarx Top Gartner MQ for App Security Testing

Data Breach Today

Veracode, Micro Focus, and HCL Software Were Also Recognized as Leaders by Gartner Gartner heaped praise on Synopsys for having the most complete vision and strongest execution ability around application security testing, while Checkmarx took the silver. Veracode was awarded bronze for its execution ability, while HCL Software took the bronze for completeness of vision.

Security 254
article thumbnail

SMS Phishing Attacks are on the Rise

Schneier on Security

SMS phishing attacks — annoyingly called “smishing” — are becoming more common. I know that I have been receiving a lot of phishing SMS messages over the past few months. I am not getting the “Fedex package delivered” messages the article talks about. Mine are usually of the form: “thank you for paying your bill, here’s a free gift for you.

Phishing 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Raising the Bar on Premarket Medical Device Cybersecurity

Data Breach Today

The Food and Drug Administration's decision to incorporate "quality systems regulations" into its new draft guidance for premarket medical device cybersecurity is an important development in the scope of the agency's expectations for manufacturers, says Dr. Suzanne Schwartz of the FDA.

More Trending

article thumbnail

FBI Alert: Have You Been Bitten by BlackCat Ransomware?

Data Breach Today

Feds Seek Intelligence to Disrupt the Ransomware Group Also Known as Alphv Has your organization been bitten by BlackCat ransomware, aka Alphv? If so, the FBI wants to hear details about how attackers broke in, cryptocurrency wallet addresses used to receive ransoms and other information that could help law enforcement authorities better track and block future attacks.

article thumbnail

Experts warn of a surge in zero-day flaws observed and exploited in 2021

Security Affairs

The number of zero-day vulnerabilities exploited in cyberattacks in the wild exploded in the last years, security firm report. Google and Mandiant have published two reports that highlight a surge in the discovery of zero-day flaws exploited by threat actors in attacks in the wild. Google’s Project Zero researchers reported that 58 zero-day were discovered in 2021 (28 zero-day were detected in 2020), which marks a record for the company since it started tracking these issues in mid 2014. “

article thumbnail

Atlassian Patches Critical Jira Authentication Bypass Bug

Data Breach Today

2 Atlassian Products Affected: Jira and Jira Service Management Australian software firm Atlassian has issued fixes for a critically rated vulnerability in its Jira software that could allow an unauthenticated attacker to remotely bypass authentication protections in place. Both Jira and Jira Service Management are vulnerable to this bug.

article thumbnail

Why you should apply to the Data Intelligence Masterclass

Collibra

We are thrilled to introduce the Data Intelligence Masterclass. This seven-part thought-leadership series is unlike any other masterclass in the market. . Why you might ask? It is because we have brought together some of the most influential “game changers” in the world of data to teach these classes. Here are the top three reasons you should apply today!

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Celebrating 32 Years of Rocket Software with Community Day

Rocket Software

On April 14, Rocketeers from across the globe celebrated Rocket Software’s 32 nd anniversary and our annual Community Day! The world has faced immense challenges and struggles over the last few months, so we encouraged all Rocketeers to exemplify our core values of Empathy, Humanity, Trust, and Love, and take paid time off to give back to their communities and volunteer with charitable organizations they care deeply about.

article thumbnail

Ukraine Invasion Driving DDoS Attacks to All-Time Highs

Dark Reading

Unprecedented numbers of DDoS attacks since February are the result of hacktivists' cyberwar against Russian state interests, researchers say.

102
102
article thumbnail

Community Associations Confront Social Engineering

KnowBe4

It’s not just deep-pocketed corporations that prove attractive targets for social engineering. Any organization that holds information that can fetch a good price in the criminal marketplace will draw the attention of social engineers.

article thumbnail

Overlapping ICS/OT Mandates Distract From Threat Detection and Response

Dark Reading

It's time for regulators of critical infrastructure — including industrial control systems and operational technology — to focus more on operational resiliency.

IT 91
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

ARMA releases Information Governance Implementation Model v2.0

IG Guru

The ARMA Information Governance Implementation Model is a useful tool to connect the various stakeholders of information governance. From risk mitigation through to value generation, the ARMA Information Governance Implementation Model helps bring a common understanding and unified implementation series that bridges policy and technology through eight critical areas.

article thumbnail

When Security Meets Development: The DevSecOps Conundrum

Dark Reading

The DevSecOps journey is well worth undertaking because it can improve communication, speed up development, and ensure quality products.

article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

How to protect healthcare and life-sciences data from a cyber attack pandemic. divya. Tue, 04/26/2022 - 05:19. Once slow to adopt new technologies, healthcare-related industries have been rapidly embracing digitalization to enable patient-centric care that is more effective for patients and safer for patients, healthcare professionals and researchers.

article thumbnail

North Korean State Actors Deploying Novel Malware to Spy on Journalists

Dark Reading

Spear-phishing campaign loaded with new "Goldbackdoor" malware targeted journalists with NK News, analysts found.

Phishing 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Lapsus$ Hackers Target T-Mobile

Threatpost

No government and customer data was accessed.

article thumbnail

What the ECDSA Flaw in Java Means for Enterprises

Dark Reading

This Tech Tip reminds developers and security teams to check what version of Java they are running. Whether they are vulnerable to the ECDSA flaw boils down to the version number.

article thumbnail

The US Saw a Spike in Child Sexual Abuse URLs in 2021

WIRED Threat Level

CSAM hosting in the United States rose 64 percent last year, putting the country second in the world, a new report found.

Privacy 79
article thumbnail

Iranian Hacking Group Among Those Exploiting Recently Disclosed VMWare RCE Flaw

Dark Reading

Threat actor is using the flaw to deliver Core Impact backdoor on vulnerable systems, security vendor says.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

4 steps to migrate from OpenText MediaBin to OpenText Media Management

OpenText Information Management

Maybe you are considering moving from OpenTextTM MediaBin to OpenTextTM Media Management (OTMM) but you’re not sure where to start? My recommendation would be to firstly understand the potential benefits to your organization of migrating to OpenText Media Management. Understanding the benefits OTMM provides will allow you to provide justification for the migration effort and … The post 4 steps to migrate from OpenText MediaBin to OpenText Media Management appeared first on OpenText Blogs.

article thumbnail

Trend Micro Launches New Security Platform

Dark Reading

An ecosystem of native and third-party integrations provides visibility and control across the entire attack surface.

article thumbnail

Addressing Privacy, Compliance and Customer Experience in Retail

HID Global

Addressing Privacy, Compliance and Customer Experience in Retail. rfournier. Mon, 04/25/2022 - 12:55.

article thumbnail

Mastercard Launches Next-Generation Identity Technology with Microsoft

Dark Reading

New 'trust' tool improves online experience and helps tackle digital fraud.

77
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

8 Top Unified Threat Management (UTM) Software & Hardware Vendors

eSecurity Planet

Unified threat management (UTM) offers something approaching total security in a box for small and midsize enterprises (SMEs), combining multiple network security functions in a single appliance. In addition to standard firewalls , features in UTMs often include intrusion detection and prevention systems (IDPS) , secure web gateways , secure email gateways , remote access , routing and WAN connectivity.

Cloud 103
article thumbnail

Iran announced to have foiled massive cyberattacks on public services

Security Affairs

State television announced that Iran has foiled massive cyberattacks that targeted public services operated by both government and private organizations. According to the Iran state television, the attack attempts took place in recent days and aimed at the infrastructure of more than 100 public sector agencies. The report did not name entities that were targeted by the cyberattacks.