Wed.Aug 21, 2019

article thumbnail

Forced Password Reset? Check Your Assumptions

Krebs on Security

Passwords 216
article thumbnail

Fake VPN Website Delivers Banking Trojan

Data Breach Today

Reseachers Discover Attackers Cloned NordVPN Site Researchers at the security firm Doctor Web have uncovered a fake website for a VPN provider that's designed to spread a Trojan that can steal credentials to bank accounts.

Security 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Six Steps to Digital Transformation

AIIM

At the heart of any digital transformation journey is information. Information is the currency that fuels and funds innovation, process improvements, and organizational performance. As a result, an organization’s information is its most valuable asset; the common denominator in customer experience, business agility, operational excellence, and automation.

article thumbnail

Why Did Federal Agencies See Fewer Breaches in 2018?

Data Breach Today

White House Report: No 'Major' Breaches Reported; Incidents Down 12 Percent Federal government agencies experienced 12 percent fewer cyber incidents in 2018, when there were no "major" data breaches, according to a new White House report. But the report notes there's still plenty of risk mitigation work to be done.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Thousands credit card numbers of MoviePass customers were exposed online

Security Affairs

A security expert discovered that the popular movie ticket subscription service MoviePass has exposed thousands of customer card numbers and personal credit cards. The security expert Mossab Hussein from cybersecurity firm SpiderSilk , discovered that MoviePass exposed a database containing the credit card data on one of its subdomains. The archive was containing 161 million records and the amount of data continues to grow in real-time.

More Trending

article thumbnail

Backdoor Found in Utility for Linux, Unix Servers

Threatpost

Backdoor was intentionally planted in 2018 and found during the DEF CON 2019 security conference when researchers stumbled upon malicious code.

Security 102
article thumbnail

Is Apple's Top $1 Million Bug Bounty Too Much?

Data Breach Today

Why One Bug-Hunting Expert Says Big Bounties May Actually Undermine Security Programs Progressive companies seeking to improve their security are increasingly adopting bug bounty programs. The theory is that rewarding outside researchers improves security outcomes. But in practice, bug bounty programs can be messy and actually create perverse incentives, says bug-hunting expert Katie Moussouris.

Security 149
article thumbnail

Google Finds 20-Year-Old Microsoft Windows Vulnerability

Schneier on Security

There's no indication that this vulnerability was ever used in the wild, but the code it was discovered in -- Microsoft's Text Services Framework -- has been around since Windows XP.

IT 90
article thumbnail

7 steps to highly effective GDPR compliance

IT Governance

The GDPR (General Data Protection Regulation) hasn’t exactly crept up unnoticed over the past year or so, but it’s still caught many organisations by surprise. Some mistakenly thought that it would only affect large organisations, others doubted that the much-discussed massive fines would ever be issued, and a few thought that Brexit would save them from the EU regulation.

GDPR 86
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DoS attacks against most used default Tor bridges could be very cheap

Security Affairs

Researchers explained that carrying out attacks against the most used default Tor bridges would cost threat actors $17,000 per month. According to security researchers Rob Jansen from the U.S. Naval Research Laboratory, and Tavish Vaidya and Micah Sherr from Georgetown University, launching denial-of-service ( DoS ) attacks against most commonly used default Tor bridges would cost attackers $17,000 per month.

Paper 84
article thumbnail

Navigating the CCPA’s ‘Notice and Cure’ Provision

Data Matters

*This article was first published by Bloomberg Law in August 2019. Companies doing business with California consumers are impacted by the California Consumer Privacy Act (effective Jan. 1, 2020). The CCPA’s private right of action provision gives California residents the right to sue companies when their personal information is subject to unauthorized access and exfiltration, theft, or disclosure due to a company’s failure “to implement and maintain reasonable security procedures and

article thumbnail

The Cost of Dealing With a Cybersecurity Attack in These 4 Industries

Security Affairs

A cybersecurity issue can cause unexpected costs in several different areas, which is the cost of Dealing with an attack in 4 Industries? A cybersecurity issue can cause unexpected costs in several different areas. In addition to the monetary costs associated with things like lost productivity and improving network security to reduce the likelihood of future incidents, affected companies have to deal with the costs tied to reduced customer trust and damaged reputations.

article thumbnail

Adult Content Site Exposed Personal Data of 1M Users

Threatpost

The personal email addresses - some indicating user names or government official status - of more than a million pornography website users were exposed.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Ransomware Hits Fortnite Players

Dark Reading

Ransomware masquerading as game "cheats" is hitting Fortnite players. Fortunately, there are ways to recover without paying a ransom.

article thumbnail

Researcher Discloses Second Steam Zero-Day After Valve Bug Bounty Ban

Threatpost

After Valve banned him from its bug bounty program, a researcher has found a second zero-day vulnerability affecting the Steam gaming client.

IT 85
article thumbnail

eSentire Blends Managed Detection Response With Machine Learning

Dark Reading

While many infosec pros believe they're getting managed detection response (MDR) from their managed security service providers, that's not necessarily the case, according to Eldon Sprickerhoff, Founder and Chief Innovation Officer of eSentire. Adding machine learning to the mix helps automate MDR, strengthening an organization's security posture.

article thumbnail

The Texas Ransomware Attacks: A Gamechanger for Cybercriminals

Threatpost

Security researchers worry that this weekend's coordinated attacks on more than 20 Texas governments mark a change in how ransomware attacks will be launched in the future.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online

Dark Reading

Thousands of customers' credit card numbers, MoviePass card numbers, and sensitive data were left in an unprotected database.

article thumbnail

How to avoid the security mistakes that cost an estate agency £80,000 in fines

IT Governance

Last month, Life at Parliament View was fined £80,000 by the ICO (Information Commissioner’s Office) after security errors exposed 18,610 customers’ personal data for almost two years. The incident occurred when the London-based estate agency transferred personal data from its server to a partner organisation but failed to implement access controls.

article thumbnail

New FISMA Report Shows Progress, Gaps in Federal Cybersecurity

Dark Reading

No major incidents mixed with continuing gaps in implementation paint an improving, but still muddy, picture of cybersecurity in the federal government.

article thumbnail

Harnessing structured and unstructured data for digital transformation

Information Management Resources

As executives look to evolve, the common thread amongst these objectives is the critical importance of analyzing data – both structured and unstructured – to attaining lasting success.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Silence APT Group Broadens Attacks on Banks, Gets More Dangerous

Dark Reading

Over the past year, the financial damage linked to the Russian-speaking threat group has spiked fivefold, Group-IP says.

83
article thumbnail

Cisco Patches Six Critical Bugs in UCS Gear and Switches

Threatpost

Six bugs found in Cisco’s Unified Computing System gear and its 220 Series Smart switches can allow unauthenticated remote hackers to take over equipment.

IT 65
article thumbnail

7 Big Factors Putting Small Businesses At Risk

Dark Reading

Small organizations still face a long list of security threats. These threats and vulnerabilities should be top of mind.

Risk 82
article thumbnail

Firefox and Chrome Fight Back Against Kazakhstan's Spying

WIRED Threat Level

The Central Asian country’s government has repeatedly threatened to monitor its citizens’ internet activities. Google and Mozilla aren’t having it.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to Avoid Technical Debt in Open Source Projects

Dark Reading

Engineering teams have only a certain amount of capacity. Cutting down the volume of rework inherent in the open source business model begins with three best practices.

67
article thumbnail

3 skills a data scientist needs to set them apart from the competition

Information Management Resources

In order to be a great data scientist and to land the job you want, you have to think about what your employer is looking for.

63
article thumbnail

State-Sponsored Cyberattacks Target Medical Research

Dark Reading

Cancer research is a particular target among Chinese espionage groups, says security firm FireEye.