Mon.Apr 25, 2022

article thumbnail

The Global Threat Landscape 1 Year After SolarWinds

Data Breach Today

In this episode of "Cybersecurity Unplugged," Roger Sels, vice president, solution, EMEA at BlackBerry, discusses the global threat landscape one year after SolarWinds, including cyberthreats from Russia and China; the cyber impact of the Russia-Ukraine war; and the cyber call to action.

article thumbnail

SMS Phishing Attacks are on the Rise

Schneier on Security

SMS phishing attacks — annoyingly called “smishing” — are becoming more common. I know that I have been receiving a lot of phishing SMS messages over the past few months. I am not getting the “Fedex package delivered” messages the article talks about. Mine are usually of the form: “thank you for paying your bill, here’s a free gift for you.

Phishing 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Synopsys, Checkmarx Top Gartner MQ for App Security Testing

Data Breach Today

Veracode, Micro Focus, and HCL Software Were Also Recognized as Leaders by Gartner Gartner heaped praise on Synopsys for having the most complete vision and strongest execution ability around application security testing, while Checkmarx took the silver. Veracode was awarded bronze for its execution ability, while HCL Software took the bronze for completeness of vision.

Security 254
article thumbnail

Colorado AG Provides Insights on the Colorado Privacy Act Rulemaking Process

Hunton Privacy

On April 12, 2022, Colorado Attorney General Phil Weiser made remarks at the International Association of Privacy Professionals Global Privacy Summit in Washington, D.C., where he invited stakeholders to provide informal public comments on the Colorado Privacy Act (“CPA”) rulemaking. In addition to this informal public comment, the Colorado Department of Law (“Department”) will begin the formal notice-and-comment rulemaking phase in fall 2022 by announcing a notice of rulemaking and accompanyi

Privacy 110
article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

Raising the Bar on Premarket Medical Device Cybersecurity

Data Breach Today

The Food and Drug Administration's decision to incorporate "quality systems regulations" into its new draft guidance for premarket medical device cybersecurity is an important development in the scope of the agency's expectations for manufacturers, says Dr. Suzanne Schwartz of the FDA.

More Trending

article thumbnail

FBI Alert: Have You Been Bitten by BlackCat Ransomware?

Data Breach Today

Feds Seek Intelligence to Disrupt the Ransomware Group Also Known as Alphv Has your organization been bitten by BlackCat ransomware, aka Alphv? If so, the FBI wants to hear details about how attackers broke in, cryptocurrency wallet addresses used to receive ransoms and other information that could help law enforcement authorities better track and block future attacks.

article thumbnail

Experts warn of a surge in zero-day flaws observed and exploited in 2021

Security Affairs

The number of zero-day vulnerabilities exploited in cyberattacks in the wild exploded in the last years, security firm report. Google and Mandiant have published two reports that highlight a surge in the discovery of zero-day flaws exploited by threat actors in attacks in the wild. Google’s Project Zero researchers reported that 58 zero-day were discovered in 2021 (28 zero-day were detected in 2020), which marks a record for the company since it started tracking these issues in mid 2014. “

article thumbnail

Atlassian Patches Critical Jira Authentication Bypass Bug

Data Breach Today

2 Atlassian Products Affected: Jira and Jira Service Management Australian software firm Atlassian has issued fixes for a critically rated vulnerability in its Jira software that could allow an unauthenticated attacker to remotely bypass authentication protections in place. Both Jira and Jira Service Management are vulnerable to this bug.

article thumbnail

Celebrating 32 Years of Rocket Software with Community Day

Rocket Software

On April 14, Rocketeers from across the globe celebrated Rocket Software’s 32 nd anniversary and our annual Community Day! The world has faced immense challenges and struggles over the last few months, so we encouraged all Rocketeers to exemplify our core values of Empathy, Humanity, Trust, and Love, and take paid time off to give back to their communities and volunteer with charitable organizations they care deeply about.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

Ukraine Invasion Driving DDoS Attacks to All-Time Highs

Dark Reading

Unprecedented numbers of DDoS attacks since February are the result of hacktivists' cyberwar against Russian state interests, researchers say.

102
102
article thumbnail

Community Associations Confront Social Engineering

KnowBe4

It’s not just deep-pocketed corporations that prove attractive targets for social engineering. Any organization that holds information that can fetch a good price in the criminal marketplace will draw the attention of social engineers.

article thumbnail

Overlapping ICS/OT Mandates Distract From Threat Detection and Response

Dark Reading

It's time for regulators of critical infrastructure — including industrial control systems and operational technology — to focus more on operational resiliency.

IT 91
article thumbnail

ARMA releases Information Governance Implementation Model v2.0

IG Guru

The ARMA Information Governance Implementation Model is a useful tool to connect the various stakeholders of information governance. From risk mitigation through to value generation, the ARMA Information Governance Implementation Model helps bring a common understanding and unified implementation series that bridges policy and technology through eight critical areas.

article thumbnail

10 Rules for Managing Apache Kafka

Without proper guidance, it’s easy to miss out on Kafka’s full capabilities. While not the easiest technology to optimize, Kafka rewards those willing to explore its depths. Under the hood, it is an elegant system for stream processing, event sourcing, and data integration. Download this white paper to learn the 10 critical rules that will help you optimize your Kafka system and unlock its full potential.

article thumbnail

When Security Meets Development: The DevSecOps Conundrum

Dark Reading

The DevSecOps journey is well worth undertaking because it can improve communication, speed up development, and ensure quality products.

article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

How to protect healthcare and life-sciences data from a cyber attack pandemic. divya. Tue, 04/26/2022 - 05:19. Once slow to adopt new technologies, healthcare-related industries have been rapidly embracing digitalization to enable patient-centric care that is more effective for patients and safer for patients, healthcare professionals and researchers.

article thumbnail

North Korean State Actors Deploying Novel Malware to Spy on Journalists

Dark Reading

Spear-phishing campaign loaded with new "Goldbackdoor" malware targeted journalists with NK News, analysts found.

Phishing 100
article thumbnail

Why you should apply to the Data Intelligence Masterclass

Collibra

We are thrilled to introduce the Data Intelligence Masterclass. This seven-part thought-leadership series is unlike any other masterclass in the market. . Why you might ask? It is because we have brought together some of the most influential “game changers” in the world of data to teach these classes. Here are the top three reasons you should apply today!

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

What the ECDSA Flaw in Java Means for Enterprises

Dark Reading

This Tech Tip reminds developers and security teams to check what version of Java they are running. Whether they are vulnerable to the ECDSA flaw boils down to the version number.

article thumbnail

Lapsus$ Hackers Target T-Mobile

Threatpost

No government and customer data was accessed.

article thumbnail

Iranian Hacking Group Among Those Exploiting Recently Disclosed VMWare RCE Flaw

Dark Reading

Threat actor is using the flaw to deliver Core Impact backdoor on vulnerable systems, security vendor says.

article thumbnail

The US Saw a Spike in Child Sexual Abuse URLs in 2021

WIRED Threat Level

CSAM hosting in the United States rose 64 percent last year, putting the country second in the world, a new report found.

Privacy 81
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

4 steps to migrate from OpenText MediaBin to OpenText Media Management

OpenText Information Management

Maybe you are considering moving from OpenTextTM MediaBin to OpenTextTM Media Management (OTMM) but you’re not sure where to start? My recommendation would be to firstly understand the potential benefits to your organization of migrating to OpenText Media Management. Understanding the benefits OTMM provides will allow you to provide justification for the migration effort and … The post 4 steps to migrate from OpenText MediaBin to OpenText Media Management appeared first on OpenText Blogs.

article thumbnail

Trend Micro Launches New Security Platform

Dark Reading

An ecosystem of native and third-party integrations provides visibility and control across the entire attack surface.

article thumbnail

Addressing Privacy, Compliance and Customer Experience in Retail

HID Global

Addressing Privacy, Compliance and Customer Experience in Retail. rfournier. Mon, 04/25/2022 - 12:55.

article thumbnail

Mastercard Launches Next-Generation Identity Technology with Microsoft

Dark Reading

New 'trust' tool improves online experience and helps tackle digital fraud.

77
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

8 Top Unified Threat Management (UTM) Software & Hardware Vendors

eSecurity Planet

Unified threat management (UTM) offers something approaching total security in a box for small and midsize enterprises (SMEs), combining multiple network security functions in a single appliance. In addition to standard firewalls , features in UTMs often include intrusion detection and prevention systems (IDPS) , secure web gateways , secure email gateways , remote access , routing and WAN connectivity.

Cloud 118
article thumbnail

Iran announced to have foiled massive cyberattacks on public services

Security Affairs

State television announced that Iran has foiled massive cyberattacks that targeted public services operated by both government and private organizations. According to the Iran state television, the attack attempts took place in recent days and aimed at the infrastructure of more than 100 public sector agencies. The report did not name entities that were targeted by the cyberattacks.