Wed.Sep 19, 2018

article thumbnail

Mirai Botnet Authors Avoid Jail Time

Krebs on Security

Citing “extraordinary cooperation” with the government, a court in Alaska on Tuesday sentenced three men to probation, community service and fines for their admitted roles in authoring and using “ Mirai ,” a potent malware strain used in countless attacks designed to knock Web sites offline — including an enormously powerful attack in 2016 that sidelined this Web site for nearly four days.

IoT 185
article thumbnail

Perth Mint Says 3,200 Customers Affected By Data Breach

Data Breach Today

Leaked Data Includes Passport Numbers, Addresses, Bank Account Details If you're going to hack, why not go for the gold? That appears to have been the impetus behind an unusual data breach at the government-owned Perth Mint in Western Australia, which says personal details for 3,200 customers stored in an old database were compromised.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[Podcast] Behind the Scenes at AIIM's Leadership Council Summit

AIIM

For over 10 years now, AIIM's Leadership Council (LC) summit series has been the go-to event where the forward-thinking professionals in information management gather to delve into matters impacting the future of the industry. These member-only events offer a collaborative space for the dynamic conversations that help shape the role of the information management industry in a new era of business.

article thumbnail

GDPR: The Global Impact on Privacy

Data Breach Today

Richard Henderson of Infosec Global Sizes Up the EU Law's Influence So Far Richard Henderson of Infosec Global discusses the impact of the European Union's General Data Protection Regulation and how the law is influencing privacy frameworks globally.

Privacy 168
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How to improve the efficiency of your physical records storage – Part 1

TAB OnRecord

Could you be using you space more effectively? Are you spending too much on storage? Is your storage enhancing your workflow? Is it designed to enhance retrieval time and speed information access? With filing systems taking up 20 percent of office space on average, the volume of paper records increasing every year, and the cost of real estate square footage rising almost everywhere, these are questions records and facilities managers need to be asking themselves.

More Trending

article thumbnail

What to do when you suffer a data breach

IT Governance

If you’re among the seemingly small number of organisations that hasn’t yet suffered a data breach, you should be preparing for the inevitable. You can’t count on your cyber security defences to continue repelling attacks, because even the most secure systems contain vulnerabilities. Criminals are constantly looking for new opportunities, and it’s only a matter of time before they exploit even the smallest crack in your organisation.

article thumbnail

New Hacker Exploits and How to Fight Them

Data Breach Today

Dan Larson of Crowdstrike on Battling New Attack Techniques Hackers are constantly developing new exploits, and updating defenses is not an easy task. Dan Larson of Crowdstrike discusses some the new techniques hackers are using and how to fight them off.

150
150
article thumbnail

If Software Is Eating the World, What Will Come Out the Other End?

John Battelle's Searchblog

So far, it’s mostly s**t. Seven or so years ago, a famous VC penned a manifesto of sorts. Writing at a time the world was still skeptical of the dominance to which his industry has now ascended (to think, such a time existed, and so few years ago!), Marc Andreessen had a message for the doubters, the naysayers, and the Wall St. analysts who were (credibly!

article thumbnail

GDPR Compliance: Common Misconceptions

Data Breach Today

Attorney Elizabeth Harding clears up confusion about certain provisions of the EU's General Data Protection Regulation, including the issue of when organizations need to obtain a European consumer's consent to process their data.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Your biggest cyber security threat is inside your organisation

IT Governance

Organisations usually spend most of their security budget on technologies intended to keep cyber criminals out of their systems, but this overlooks their biggest vulnerability: human error. More often than not, data breaches are caused by – or directly linked to – an organisation’s employees. Studies repeatedly show that an organisation is more likely to be breached from an employee misplacing, stealing or being tricked into handing over sensitive information than from a criminal breaking into i

article thumbnail

The Need for Security Collaboration

Data Breach Today

Saba Shariff of Symcor on Improving Anti-Fraud Efforts Today's cybercriminals don't operate in silos, so why do companies? Saba Shariff of Symcor discusses techniques for greater collaboration on security.

Security 146
article thumbnail

Access to over 3,000 compromised sites sold on Russian black marketplace MagBo

Security Affairs

Security experts at Flashpoint discovered the availability of the access to over 3,000 compromised sites sold on Russian black marketplace MagBo. A new report published by researchers at Flashpoint revealed the availability on an underground hacking forum for Russian-speaking users of access to over 3,000 breached websites. “Access to approximately 3,000 breached websites has been discovered for sale on a Russian-speaking underground marketplace called MagBo.

Access 97
article thumbnail

John Deere Just Cost Farmers Their Right to Repair

WIRED Threat Level

The California Farm Bureau has given away the right of farmers to fix their equipment without going through a dealer.

Security 109
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Dissecting the first Gafgyt bot implementing the “Non Un-Packable” NUP technique

Security Affairs

Experts at the CSE Cybsec Z-Lab have found a Gafgyt variant implementing the “Non Un-Packable” technique recently presented in a cyber security conference. A new variant of the Gafgyt botnet is spreading in the last hours and experts of the CSE Cybsec Z-Lab have found it with the support of the Italian cyber security experts @Odisseus and GranetMan.

article thumbnail

How the HTC Exodus Blockchain Phone Plans to Secure Your Cryptocurrency

WIRED Threat Level

HTC starts filling in the details of its so-called blockchain smartphone, expected to launch later this year.

article thumbnail

Flaw in Western Digital My Cloud exposes the content to hackers

Security Affairs

An authentication bypass vulnerability in Western Digital My Cloud NAS could allow hackers to access the content of the storage. Researchers at security firm Securify have discovered an elevation of privilege vulnerability in the Western Digital My Cloud platform that could be exploited by attackers to gain admin-level access to the device via an HTTP request.

Cloud 90
article thumbnail

FBI: Phishing Attacks Aim to Swap Payroll Information

Dark Reading

Social engineering scams target employees' payroll credentials so attackers can access and change their bank account data.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Adobe issued a critical out-of-band patch to address CVE-2018-12848 Acrobat flaw

Security Affairs

Adobe releases a critical out-of-band patch for CVE-2018-12848 Acrobat flaw, the security updates address a total of 7 vulnerabilities. Adobe address seven vulnerability in Acrobat DC and Acrobat Reader DC, including one critical vulnerability that could be exploited by attackers to execute arbitrary code. “Adobe has released security updates for Adobe Acrobat and Reader for Windows and MacOS.

article thumbnail

How to improve the efficiency of your physical records storage

TAB OnRecord

Could you be using you space more effectively? Are you spending too much on storage? Is your storage enhancing your workflow? Is it designed to enhance retrieval time and speed information access? With filing systems taking up 20 percent of office space on average, the volume of paper records increasing every year, and the cost of real estate square footage rising almost everywhere, these are questions records and facilities managers need to be asking themselves.

article thumbnail

Evolution of threat landscape for IoT devices – H1 2018

Security Affairs

Security experts from Kaspersky have published an interesting report on the new trends in the IoT threat landscape. What is infecting IoT devices and how? The researchers set up a honeypot to collect data on infected IoT devices, the way threat actors infect IoT devices and what families of malware are involved. The first data that emerged from the study is that threat actors continue to look at the IoT devices with increasing interest.

IoT 84
article thumbnail

Cryptojackers Grow Dramatically on Enterprise Networks

Dark Reading

A new report shows that illicit cryptomining malware is growing by leaps and bounds on the networks of unsuspecting victims.

79
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Magecart cybercrime group stole customers’ credit cards from Newegg electronics retailer

Security Affairs

Magecart hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. The Magecart cybercrime group is back, this time the hackers have stolen customers’ credit card data from the computer hardware and consumer electronics retailer Newegg. Magecart is active since at least 2015, recently the group hacked the websites of Ticketmaster , British Airways , and Feedify to inject a skimmer script used to siphon users’ payment

Retail 80
article thumbnail

WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication

Dark Reading

New standards offer protection against hacking, credential theft, phishing attacks, and hope for the end of an era of passwords as a security construct.

article thumbnail

Mirai authors avoid the jail by helping US authorities in other investigations

Security Affairs

Three men who admitted to being the authors of the Mirai botnet avoided the jail after helping the FBI in other cybercrime investigations. I’m following the evolution of Mirai botnet since MalwareMustDie shared with me the findings of its investigation in August 2016. Now three individuals who admitted to being the authors of the infamous botnet avoided the jail after helping feds in another cybercrime investigations.

IoT 76
article thumbnail

XBash Malware Packs Double Punch: Destroys Data and Mines for Crypto Coins

Threatpost

A newly discovered malware has different capabilities for Windows and Linux systems, including ransomware and cryptomining.

Mining 79
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO

Dark Reading

Suit underscores longtime battle between vendors and labs over control of security testing protocols.

article thumbnail

Critical Out-of-Band Patch Issued for Adobe Acrobat Reader

Threatpost

Overall seven flaws were patched - including one critical vulnerability that could lead to arbitrary code execution.

article thumbnail

Mirai Hackers' Sentence Includes No Jail Time

Dark Reading

The trio behind Mirai sentenced to probation and public service in return for cooperation with law enforcement and researchers.

75