Mon.Sep 21, 2020

article thumbnail

Congress Questions NASA on Cybersecurity Efforts

Data Breach Today

Space Agency Still a Prime Target for Hackers, Officials Say Foreign and domestic hacking activity targeting NASA continues to grow at a time when many staffers are working at home, space agency officials testified at a Friday Congressional hearing where they were questioned about risk mitigation efforts.

article thumbnail

US House Passes IoT Cybersecurity Improvement Act

Security Affairs

The U.S. House of Representatives passed the IoT Cybersecurity Improvement Act, a bill that aims at improving the security of IoT devices. The U.S. House of Representatives last week passed the IoT Cybersecurity Improvement Act, a bill designed to improve the security of IoT devices. The IoT Cybersecurity Improvement Act First was first introduced in 2017, and later in 2019, a new version was introduced.

IoT 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Android Malware Bypasses 2FA And Targets Telegram, Gmail Passwords

Threatpost

A new Android malware strain has been uncovered, part of the Rampant Kitten threat group's widespread surveillance campaign that targets Telegram credentials and more.

Passwords 120
article thumbnail

Alleged Activision hack, 500,000 Call Of Duty players impacted

Security Affairs

Over 500,000 Activision accounts may have been hacked in a new data breach that the gaming firm suffered on September 20. More than 500,000 Activision accounts may have compromised as a result of a data breach suffered by the gaming firm on September 20, reported the eSports site Dexerto. According to Dexerto, the login for Activision accounts been publicly leaked and threat actors also changed accounts’ details to prevent easy recovery by the legitimate owners.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

ABC Analysis

Ascent Innovations

What is ABC Analysis? ABC analysis is the process of classifying the inventory into A, B and Cclassesbased on their relative significance to business, either by theirmonitory value, utilization, carrying cost, and other factors.This allows leaders to allocate the company’s resources to maximize the efficiency. Class A: Very important for an organization.

Sales 105

More Trending

article thumbnail

Mimecast Cyber Resilience Summit 2020 – Key Takeaways

Daymark

Mimecast held their 2020 Cyber Resilience Summit remotely this year, providing some interesting updates to their suite of cyber security tools. As a leading Email Security Gateway, Mimecast has expanded their portfolio over the last few years into a more robust and comprehensive framework that they have dubbed “Email Security 3.0”. The Email Security 3.0 Framework can be broken out into three zones of protection: Zone 1: Perimeter – This is your traditional email delivery path and is saturated w

Security 105
article thumbnail

The Cheating Scandal That Ripped the Poker World Apart

WIRED Threat Level

Mike Postle was on an epic winning streak at a California casino. Veronica Brill thought he had to be playing dirty. Let the chips fall where they may.

Security 109
article thumbnail

Discount Rules for WooCommerce WordPress plugin gets patch once again

Security Affairs

It has happened again, users of the Discount Rules for WooCommerce WordPress plugin have to install a third patch to fix 2 high-severity XSS flaws. Developers of the Discount Rules for WooCommerce WordPress plugin have revealed for the third time a security patch to address two high-severity cross-site scripting (XSS) flaws that could be exploited by an attacker to hijack a targeted site.

article thumbnail

Cambridgeshire crowned the UK’s cyber crime capital

IT Governance

Cambridgeshire has the unwanted distinction of being the UK’s fastest-growing hotspot for cyber crime, after the number of attacks in the county increased by 49% over a three-year period. Figures from the ONS (Office of National Statistics) show that security incidents in Cambridgeshire increased from 2,789 in 2016 to 4,155 in 2018. Although the total number of attacks trails the Thames Valley – which saw 11,232 attacks per year on average – Cambridgeshire had the fastest rate of increase and la

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Remote Work Exacerbating Data Sprawl

Dark Reading

More than three-quarters of IT executives worry that data sprawl puts their data at risk, especially with employees working from insecure home networks, survey finds.

Risk 135
article thumbnail

Fileless Malware Tops Critical Endpoint Threats for 1H 2020

Threatpost

When it comes to endpoint security, a handful of threats make up the bulk of the most serious attack tools and tactics.

Security 117
article thumbnail

5 Steps to Greater Cyber Resiliency

Dark Reading

Work from home isn't going away anytime soon, and the increased vulnerability means cyber resiliency will continue to be critical to business resiliency.

104
104
article thumbnail

Unsecured Microsoft Bing Server Leaks Search Queries, Location Data

Threatpost

Data exposed included search terms, location coordinates, and device information - but no personal data.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hacking Yourself: Marie Moe and Pacemaker Security

Dark Reading

Future consumer devices, including pacemakers, should be built with security from the start.

Security 110
article thumbnail

New Rules on CFIUS Mandatory Filings

Data Matters

On September 15, 2020, the U.S. Department of the Treasury published a final rule modifying the types of foreign investments that would trigger a mandatory filing before the Committee on Foreign Investment in the United States (CFIUS). The final rule largely tracks a proposed rule published by CFIUS on May 21, 2020. The final rule will come into effect on October 15, 2020, and will apply only to transactions that take place on or after that date.

article thumbnail

Firefox for Android Bug Allows ‘Epic Rick-Rolling’

Threatpost

Anyone on the same Wi-Fi network can force websites to launch, with no user interaction.

article thumbnail

Patch by Tonight: CISA Issues Emergency Directive for Critical Netlogon Flaw

Dark Reading

The directive requires all federal agencies to apply a patch for Windows Netlogon vulnerability CVE-2020-1472 by midnight on Sept. 21.

86
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DHS Issues Dire Patch Warning for ‘Zerologon’

Threatpost

The deadline looms for U.S. Cybersecurity and Infrastructure Security Agency’s emergency directive for federal agencies to patch against the so-called ‘Zerologon’ vulnerability.

article thumbnail

Former NSA Director Keith Alexander Joins Amazon’s Board of Directors

Schneier on Security

This sounds like a bad idea.

Privacy 134
article thumbnail

'Dark Overlord' Cyber Extortionist Pleads Guilty

Dark Reading

Nathan Wyatt was sentenced to five years in prison after changing a previously not guilty plea.

89
article thumbnail

Explaining “as-a-service” using Pizza via 4PSA

IG Guru

Check out this clever post and diagram explaining “as-a-service” with Pizza. The post Explaining “as-a-service” using Pizza via 4PSA appeared first on IG GURU.

Cloud 55
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Manage Your Child’s Paperwork During Online School

Record Nations

While as the name implies with online school the majority of things are handled digitally, just like any other industry paper still is and probably always will be used with education. As a result now with parents being forced to convert their kitchens and living rooms into mini classrooms, it’s easier than ever for paper […]. The post How to Manage Your Child’s Paperwork During Online School appeared first on Record Nations.

Paper 52
article thumbnail

Archive-It Partner News, September 2020

Archive-It

by the Archive-It team. Archive-It 2020 Virtual Partner Meeting. Register here to join Archive-It partners, Internet Archive staff, and digital preservation peers for an online conference of web archiving ideas and collaborations. It’s more than a Zoom call! This year’s meeting will be hosted in an interactive digital space for talks, discussions, and networking.

article thumbnail

Think Twice Before Using Facebook, Google, or Apple to Sign In Everywhere

WIRED Threat Level

So-called single sign-on options offer a lot of convenience. But they have downsides that a good old fashioned password manager doesn't.

Passwords 117
article thumbnail

Legacy Systems: The Bottom-Line Advantage

Rocket Software

In the technology world, you can’t go more than 10 minutes without someone using the word “disruptive.” But you can’t go more than 30 seconds without hearing the word “new.” Absolutely everything in hardware and software is about novelty, and yesterday’s innovation is tomorrow’s doorstop. That 40MB hard drive you bought for $3000 is literally in a museum , alongside your old flip phone and Colecovision console.

Paper 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

As TikTok Negotiations Continue, US App Ban Gets Delayed

Data Breach Today

Oracle and Walmart Could Take 20% Pre-IPO Share of US 'TikTok Global' Spinoff TikTok and WeChat both received reprieves over the weekend that helped avert U.S. blocks of their social media apps. President Donald Trump says he has given his "blessing" to a deal that would see Oracle and Walmart take a stake in TikTok's U.S. operations. Separately, a federal judge suspended a WeChat ban.

216
216