Fri.Oct 11, 2019

article thumbnail

Capital One Hacking Trial Delay Likely

Data Breach Today

Prosecutors, Defense Attorneys Ask Judge for Delay, Citing Massive Amounts of Data to Review Defense and prosecution attorneys are asking for a delay in the trial of alleged Capital One hacker Paige A. Thompson, citing the overwhelming amount of digital evidence in the case and the ongoing forensics investigation. Prosecutors also expect to file additional charges.

191
191
article thumbnail

Top cybersecurity certifications to consider for your IT career

Security Affairs

With the right cybersecurity certifications, you can attain your goals seamlessly and in a fast way and speed up your career. Cyber attacks are making headlines almost every day in today’s era. The attacks have increased both in number and complexity. Because of this natural demand, it is now crucial for companies and specialized firms to reinforce and invest in professionals to face a problem that technology can’t solve.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacked Off: Lawsuit Alleges CafePress Used Poor Security

Data Breach Today

23 Million Victims Across US, UK, EU and Australia Receive Breach Notifications Personalized product retailer CafePress has been hit with a lawsuit alleging that it failed to notify 23 million customers about a data breach in a timely manner or follow security best practices. The company was allegedly still using outdated SHA-1 to hash passwords, which can be easily cracked.

Retail 174
article thumbnail

Researchers released a free decryptor for the Nemty Ransomware

Security Affairs

Good news for the victims of the Nemty Ransomware , security researchers have released a free decryptor that could be used to recover files. I have great news for the victims of the recently discovered Nemty Ransomware , security researchers have released a free decryptor tool that could be used to recover files. In mid-August, the Nemty ransomware appeared in the threat landscape, the name of the ransomware comes after the extension it adds to the encrypted file names.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Nation-State Hackers Greatest Threat to 5G Networks: Report

Data Breach Today

New EU Report Sidesteps Concerns About Huawei's Role Nation-state attackers from outside the European Union pose the greatest threat to the continent's upcoming 5G networks, according to a new security assessment, which sidesteps the issue of Chinese firm Huawei's role in building these networks.

Security 164

More Trending

article thumbnail

Singapore Man Charged in Large-Scale Cryptomining Scheme

Data Breach Today

Prosecutors Say Suspect Stole IDs and Cloud Resources to Mine Virtual Currencies A Singapore man allegedly ran a large-scale cryptocurrency mining scheme that involved using stolen identities to access Amazon and Google cloud computing resources, according to a 14-count U.S. Justice Department indictment.

Mining 153
article thumbnail

I Have a New Book: We Have Root

Schneier on Security

I just published my third collection of essays: We Have Root. This book covers essays from 2013 to 2017. (The first two are Schneier on Security and Carry On.). There is nothing in this book is that is not available for free on my website; but if you'd like these essays in an easy-to-carry paperback book format, you can order a signed copy here. External vendor links, including for ebook versions, here.

article thumbnail

On The Frontlines: Patch Management

Data Breach Today

Chris Hallenbeck of Tanium Discusses Critical Risk Management Strategies Significant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene improvement, especially patch management, is so essential.

Risk 149
article thumbnail

Close the Gap Between Cyber-Risk and Business Risk

Dark Reading

Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk.

Risk 82
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Analysis: Twitter's Phone Number Repurposing 'Mistake'

Data Breach Today

The latest edition of the ISMG Security Report analyzes Twitter's repurposing of user phone numbers for targeted advertising. Plus: A discussion of 5G security issues and findings of the Internet Organized Crime Threat Assessment.

Security 142
article thumbnail

FBI: Phishing Can Defeat Two-Factor Authentication

Dark Reading

A recent Privacy Industry Notification points to two new hacker tools that can turn a victim's browser into a credential-stealing zombie.

article thumbnail

British Airways data breach: class action lawsuit approved

IT Governance

The 2018 British Airways data breach was one of the first to occur under the GDPR (General Data Protection Regulation) , so the ICO (Information Commissioner’s Office)’s investigation into the incident was seen as a test case. It was therefore unsurprising that when the regulator announced its intention to fine British Airways a record £183.4 million for breaching the GDPR, businesses around the world reacted with consternation.

article thumbnail

Details on Uzbekistan Government Malware: SandCat

Schneier on Security

Kaspersky has uncovered an Uzbeki hacking operation, mostly due to incompetence on the part of the government hackers. The group's lax operational security includes using the name of a military group with ties to the SSS to register a domain used in its attack infrastructure; installing Kaspersky's antivirus software on machines it uses to write new malware, allowing Kaspersky to detect and grab malicious code still in development before it's deployed; and embedding a screenshot of one of its de

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Tens of million PCs potentially impacted by a flaw in HP Touchpoint Analytics

Security Affairs

SafeBreach experts discovered that the HP Touchpoint Analytics service is affected by a potentially serious vulnerability. Security researchers at SafeBreach have discovered that the HP Touchpoint Analytics service is affected by a serious flaw tracked as CVE-2019-6333. The vulnerability received a CVSS score of 6.7 (medium severity). The TouchPoint Analytics is a service that allows the vendor to anonymously collect diagnostic data about hardware performance, it comes pre-installed on most HP P

article thumbnail

Celebrating COBOL at 60 with the next generation of developers

Micro Focus

My colleague Guy Sofer had the opportunity to catch up with Shira Israeli -a friend and COBOL programmer at the forefront of her development career. The conversation provided some interesting insights on both the future of software engineering and the opportunity ahead for those willing to learn older programming languages such as COBOL. September 2019.

IT 69
article thumbnail

How to build smarter data integration in a multicloud world

IBM Big Data Hub

Let’s say you’re the Chief Technology Officer of a bank or retailer struggling to infuse AI that aims to improve customer experiences.

article thumbnail

Fin7 Cybergang Retools With New Malicious Code

Threatpost

A new dropper and payload show that Fin7 isn't going anywhere despite a crackdown on the infamous group by law enforcement in 2018.

76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How an integrated customer data and analytics platform can boost email marketing

Information Management Resources

By integrating your organization’s customer information database with analytics tools, you can potentially save on cost for implementing targeted marketing campaigns.

article thumbnail

Iran-Linked ‘Charming Kitten’ Touts New Spearphishing Tactics

Threatpost

A campaign first observed last year has ramped up its attack methods and appears to be linked to activity targeting President Trump’s 2020 re-election campaign.

IT 67
article thumbnail

How To Tell Which Storage Service Is Best For You

Record Nations

You have a number of options when it comes to choosing which storage service is best for you, and knowing which to choose can be difficult. Watch the video or read the transcript below to learn more about what those options are, what they can do for you, and when you should choose one over […]. The post How To Tell Which Storage Service Is Best For You appeared first on Record Nations.

IT 69
article thumbnail

Click2Mail Suffers Data Breach

Dark Reading

Mail provider discovered customer data being used in spam messages.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to tell if an artificial intelligence company is worth buying

Information Management Resources

Before jumping into an AI investment, it’s critical for business leaders to take a step back and form a deeper understanding of the technology to make sure it’s as good as promised.

article thumbnail

A Murderers' Row of Poisoning Attacks

Dark Reading

Poisoning can be used against network infrastructure and applications. Understanding how DNS cache poisoning, machine learning model poisoning and other attacks work can help you prepare the proper antidote.

54
article thumbnail

Imperva: Data Breach Caused by Cloud Misconfiguration

Threatpost

Hackers were able to steal an AWS administrative API key housed in a compute instance left exposed to the public internet.

article thumbnail

Build Your Cybersecurity Toolkit at Black Hat Europe in December

Dark Reading

Now's the time to start planning what to see and do at Black Hat Europe, which is jam-packed with relevant Briefings and Arsenal demos.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Software, Supply-Chain Dangers Top List of 5G Cyber Risks

Threatpost

Without naming Huawei, the EU warns on state-backed 5G suppliers.

Risk 70
article thumbnail

INSIGHT: DASHBOARD Act Could Be Unintended Game Changer for Data Breach Valuation

Privacy and Cybersecurity Law

Senators Mark Warner (D-Va.) and Josh Hawley (R-Mo.) have proposed the Designing Accounting Safeguards to Help Broaden Oversight and Regulations on Data Act, or “DASHBOARD Act.” The bipartisan legislation seeks to impose a series of new regulations on major commercial data operators. Among the new requirements, the proposed legislation will mandate that commercial data operators disclose their internal valuations of consumer data.

article thumbnail

California AG Releases Proposed CCPA Regulations

HL Chronicle of Data Protection

On October 10, California Attorney General Xavier Becerra (CA AG) released proposed regulations to implement certain provisions of the California Consumer Privacy Act (CCPA). The CA AG also released a Notice of Proposed Rulemaking and Initial Statement of Reasons that provide drafting insights and outline considerations that likely will continue to guide the rulemaking process.

Sales 40