Mon.Aug 20, 2018

article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

The popular malware researchers Marco Ramilli has analyzed a malware that remained under the radar for more than two years. Today I’d like to share the following reverse engineering path since it ended up to be more complex respect what I thought. The full path took me about hours work and the sample covers many obfuscation steps and implementation languages.

article thumbnail

Judge Approves Final $115 Million Anthem Settlement

Data Breach Today

But Most Victims of the Health Insurer's Data Breach Will See No Cash A federal judge in California has given final approval to a $115 million settlement involving health insurer Anthem over its 2015 data breach. The settlement is the largest ever reached in a data-breach related class action suit, but most victims will see no money.

Insurance 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: 6 best practices that will help protect you company’s digital assets in the cloud

The Last Watchdog

More businesses than ever before are choosing to move their IT infrastructure and systems to cloud solutions such as Amazon Web Services and Microsoft Azure. There are many reasons to choose a cloud solution including increased flexibility and scalability, as well as reduced cost. In fact, a recent study of nearly 200 businesses and entrepreneurs found that 76% are looking to cloud solutions in order to increase the efficiency of their business.

Cloud 119
article thumbnail

Messy Insider Breach Impacts 258,000 Over Five Year Span

Data Breach Today

Keylogging Software Allegedly Used to Gain Unauthorized Systems Access A messy insider incident - allegedly involving an elected official in Wisconsin who is suspected of installing keylogging software to inappropriately access county systems over a five-year span - has impacted more than 258,000 individuals.

Access 140
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Mid-sized organisations are the most vulnerable to phishing attacks

IT Governance

Mid-sized organisations are at the ‘sweet spot’ of cyber security, according to Coalfire’s Penetration Risk Report. Unfortunately, that sweet spot applies to both organisations and cyber criminals in different contexts. . After studying the most common vulnerabilities in small, medium and large organisations, Coalfire concluded that mid-sized organisations are generally the most secure.

More Trending

article thumbnail

Flaw in SOLEO IP Relay Service potentially exposed over 30 million Canadian records

Security Affairs

Major Internet service providers (ISPs) in Canada were impacted by a local file disclosure flaw in the SOLEO IP Relay service that was recently addressed. Almost all major Internet service providers (ISPs) in Canada were impacted by a local file disclosure vulnerability in the SOLEO IP Relay service that was recently addressed. Telecommunications relay services (TRSs) developed by Soleo Communications are IP relay services used by major Internet service providers (ISPs) in Canada.

article thumbnail

James Mickens on the Current State of Computer Security

Schneier on Security

James Mickens gave an excellent keynote at the USENIX Security Conference last week, talking about the social aspects of security -- racism, sexism, etc. -- and the problems with machine learning and the Internet. Worth watching.

article thumbnail

Anonymous collective brought down Spain sites to support Catalonia

Security Affairs

Anonymous targeted many governments websites in Spain to protest against the Government’s efforts to block Catalonia ‘s separatist wave. Members of the notorious Anonymous collective claimed responsibility for bringing down several government websites in Spain on Monday to protest against the decision of the government to block Catalonia’s separatist drive.

article thumbnail

The Uncertain Fate of WHOIS, & Other Matters of Internet Accountability

Dark Reading

Paul Vixie discusses the uncertain fate of WHOIS in the age of GDPR, the risks of domain name homographs, and other underpinnings of the Internet that are hard to trust and harder to fix.

GDPR 42
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Twitch bug may have exposed some users messages to others

Security Affairs

A glitch in the live streaming platform Twitch may have exposed some of its users’ private messages to other users. The company is notifying affected users. The live streaming platform Twitch warning users that a glitch may have exposed some of their private messages to other users. The company sent out the notifications to some broadcasters informing them that a software bug could have changed access permissions to older messages allowing other users to download them and read them.

article thumbnail

How Better Intel Can Reduce, Prevent Payment Card Fraud

Dark Reading

Royal Bank of Canada machine learning researcher and Terbium Labs chief scientist discuss how they use intelligence about the carding market to predict the next payment card fraud victims.

article thumbnail

Canadian Telcos Patch an APT-Ready Flaw in Disability Services

Threatpost

An attacker could escalate privileges on the server, further penetrating the network, harvesting customer information or mounting credible social-engineering campaigns.

41
article thumbnail

Stop Medical Records Offshoring

IG Guru

Why You Should Care? Your Medical Information Could Be in India, Pakistan, and/or the Philippines! Why is it important that medical records remain with a workforce located in the United States? The Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules exist to protect your “individually identifiable health information” held or transmitted by […].

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Daymark Volunteers Support Habitat for Humanity

Daymark

During two hot July days a team of dedicated Daymark employees traded a couple of days in the office for a great cause at the build site of the current Habitat for Humanity project in Boston. The Daymark group of volunteers worked tirelessly on the construction of Habitat Greater Boston’s newest location, a five-unit condominium on Balina Place in Dorchester, MA.

40
article thumbnail

A flexible energy system – the end of the beginning?

CGI

A flexible energy system – the end of the beginning? pallavi.m@cgi.com. Mon, 08/20/2018 - 06:25. I was talking to someone recently and they asked me whether, with the publication of the “Upgrading our energy system: Smart systems and flexibility plan” and the “Clean Growth Strategy”, there was still a need for discussions about flexibility – the direction of travel is, after all, set.

article thumbnail

Podcast Episode 109: What’s The US Freedom Army? Ask Russia.

The Security Ledger

In this week’s episode of the Security Ledger Podcast (#109): What lurks in the dark recesses of online information operations? How about a secret “US Freedom Army” organized by Russia linked online “info ops?” Dave Aitel of Cyxtera joins us to talk about it. Also: hacking critical infrastructure isn’t just for. Read the whole entry. » Related Stories As Election Threats Mount, Voting Machine Hacks are a Distraction Episode 106: Election Trolls Are Afoot.

article thumbnail

P3iD Technologies Incorporates

Info Source

SILICON VALLEY, CA (August 17, 2018) – P3iD Technologies, Inc. , has completed its filing and establishment as a private, closely held corporation duly formed under the laws of the State of California. Formerly known as P3iD Cloud, this is the next step in the evolution of the company as a platform developer for capture, extraction, and storage of highly secure documents and data. .

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google Updates: Cloud HSM Beta, Binary Authorization for Kubernetes

Dark Reading

Google's latest cloud security rollouts include early releases of its cloud-hosted security module and a container security tool to verify signed images.

Cloud 42
article thumbnail

Darkhotel Exploits Microsoft Zero-Day VBScript Flaw

Threatpost

The recently-patched flaw could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

article thumbnail

Real Estate Industry Remains Rich Target for Cybercrime

Dark Reading

Trojans, file downloaders, stolen credentials, and BEC scams, hitting the real estate sector.

55
article thumbnail

To succeed at digital transformation, do a better job of data governance

Information Management Resources

To set the stage for initiatives like AI and machine learning, companies need a rock-solid governance framework.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Augusta University Health Reports Major Data Breach

Dark Reading

Over 400K individuals affected by the breach, which was the result of a successful phishing attack that occurred in September 2017.

article thumbnail

GandCrab’s Rotten EGGs Hatch Ransomware in South Korea

Threatpost

This could mark yet another reinvention for the VenusLocker group, which has mostly been focused on cryptomining this year.

article thumbnail

Ohio Man Sentenced to 15 Years for BEC Scam

Dark Reading

Olumuyiwa Adejumo and co-conspirators targeted CEOs, CFOs, and other enterprise leaders in the US with fraudulent emails.

45
article thumbnail

Side-Channel PoC Attack Lifts Private RSA Keys from Mobile Phones

Threatpost

Researchers launched a Proof-of-Concept attack on two Android mobile phones and an embedded system board.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Data Privacy Careers Are Helping to Close the IT Gender Gap

Dark Reading

There are three main reasons why the field has been more welcoming for women. Can other tech areas step up?

article thumbnail

10 critical steps in the safe disposal of data devices

Information Management Resources

OCR guidance urges organizations to take extreme care in decommissioning devices and memory media.

article thumbnail

Ohio Man Sentenced To 15 Months For BEC Scam

Dark Reading

Olumuyiwa Adejumo and co-conspirators targeted CEOs, CFOs, and other enterprise leaders in the US with fraudulent emails.

41