Mon.Sep 21, 2020

article thumbnail

Congress Questions NASA on Cybersecurity Efforts

Data Breach Today

Space Agency Still a Prime Target for Hackers, Officials Say Foreign and domestic hacking activity targeting NASA continues to grow at a time when many staffers are working at home, space agency officials testified at a Friday Congressional hearing where they were questioned about risk mitigation efforts.

article thumbnail

US House Passes IoT Cybersecurity Improvement Act

Security Affairs

The U.S. House of Representatives passed the IoT Cybersecurity Improvement Act, a bill that aims at improving the security of IoT devices. The U.S. House of Representatives last week passed the IoT Cybersecurity Improvement Act, a bill designed to improve the security of IoT devices. The IoT Cybersecurity Improvement Act First was first introduced in 2017, and later in 2019, a new version was introduced.

IoT 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

As TikTok Negotiations Continue, US App Ban Gets Delayed

Data Breach Today

Oracle and Walmart Could Take 20% Pre-IPO Share of US 'TikTok Global' Spinoff TikTok and WeChat both received reprieves over the weekend that helped avert U.S. blocks of their social media apps. President Donald Trump says he has given his "blessing" to a deal that would see Oracle and Walmart take a stake in TikTok's U.S. operations. Separately, a federal judge suspended a WeChat ban.

212
212
article thumbnail

Android Malware Bypasses 2FA And Targets Telegram, Gmail Passwords

Threatpost

A new Android malware strain has been uncovered, part of the Rampant Kitten threat group's widespread surveillance campaign that targets Telegram credentials and more.

Passwords 120
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Alleged Activision hack, 500,000 Call Of Duty players impacted

Security Affairs

Over 500,000 Activision accounts may have been hacked in a new data breach that the gaming firm suffered on September 20. More than 500,000 Activision accounts may have compromised as a result of a data breach suffered by the gaming firm on September 20, reported the eSports site Dexerto. According to Dexerto, the login for Activision accounts been publicly leaked and threat actors also changed accounts’ details to prevent easy recovery by the legitimate owners.

More Trending

article thumbnail

Mimecast Cyber Resilience Summit 2020 – Key Takeaways

Daymark

Mimecast held their 2020 Cyber Resilience Summit remotely this year, providing some interesting updates to their suite of cyber security tools. As a leading Email Security Gateway, Mimecast has expanded their portfolio over the last few years into a more robust and comprehensive framework that they have dubbed “Email Security 3.0”. The Email Security 3.0 Framework can be broken out into three zones of protection: Zone 1: Perimeter – This is your traditional email delivery path and is saturated w

Security 104
article thumbnail

Cambridgeshire crowned the UK’s cyber crime capital

IT Governance

Cambridgeshire has the unwanted distinction of being the UK’s fastest-growing hotspot for cyber crime, after the number of attacks in the county increased by 49% over a three-year period. Figures from the ONS (Office of National Statistics) show that security incidents in Cambridgeshire increased from 2,789 in 2016 to 4,155 in 2018. Although the total number of attacks trails the Thames Valley – which saw 11,232 attacks per year on average – Cambridgeshire had the fastest rate of increase and la

article thumbnail

The Cheating Scandal That Ripped the Poker World Apart

WIRED Threat Level

Mike Postle was on an epic winning streak at a California casino. Veronica Brill thought he had to be playing dirty. Let the chips fall where they may.

Security 107
article thumbnail

FERC, NERC joint report on cyber incident response at electric utilities

Security Affairs

The US FERC and NERC published a study on cyber incident response at electric utilities that also includes recovery best practices. The U.S. Federal Energy Regulatory Commission (FERC) and the North American Electricity Reliability Corporation (NERC) released a study on cyber incident response and recovery best practices for electric utilities. The report is based on information shared by experts at eight U.S. electric utilities.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Remote Work Exacerbating Data Sprawl

Dark Reading

More than three-quarters of IT executives worry that data sprawl puts their data at risk, especially with employees working from insecure home networks, survey finds.

Risk 135
article thumbnail

Fileless Malware Tops Critical Endpoint Threats for 1H 2020

Threatpost

When it comes to endpoint security, a handful of threats make up the bulk of the most serious attack tools and tactics.

Security 117
article thumbnail

5 Steps to Greater Cyber Resiliency

Dark Reading

Work from home isn't going away anytime soon, and the increased vulnerability means cyber resiliency will continue to be critical to business resiliency.

104
104
article thumbnail

Discount Rules for WooCommerce WordPress plugin gets patch once again

Security Affairs

It has happened again, users of the Discount Rules for WooCommerce WordPress plugin have to install a third patch to fix 2 high-severity XSS flaws. Developers of the Discount Rules for WooCommerce WordPress plugin have revealed for the third time a security patch to address two high-severity cross-site scripting (XSS) flaws that could be exploited by an attacker to hijack a targeted site.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Unsecured Microsoft Bing Server Leaks Search Queries, Location Data

Threatpost

Data exposed included search terms, location coordinates, and device information - but no personal data.

article thumbnail

Hacking Yourself: Marie Moe and Pacemaker Security

Dark Reading

Future consumer devices, including pacemakers, should be built with security from the start.

Security 110
article thumbnail

New Rules on CFIUS Mandatory Filings

Data Matters

On September 15, 2020, the U.S. Department of the Treasury published a final rule modifying the types of foreign investments that would trigger a mandatory filing before the Committee on Foreign Investment in the United States (CFIUS). The final rule largely tracks a proposed rule published by CFIUS on May 21, 2020. The final rule will come into effect on October 15, 2020, and will apply only to transactions that take place on or after that date.

article thumbnail

Former NSA Director Keith Alexander Joins Amazon’s Board of Directors

Schneier on Security

This sounds like a bad idea.

Privacy 138
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Firefox for Android Bug Allows ‘Epic Rick-Rolling’

Threatpost

Anyone on the same Wi-Fi network can force websites to launch, with no user interaction.

article thumbnail

Patch by Tonight: CISA Issues Emergency Directive for Critical Netlogon Flaw

Dark Reading

The directive requires all federal agencies to apply a patch for Windows Netlogon vulnerability CVE-2020-1472 by midnight on Sept. 21.

86
article thumbnail

DHS Issues Dire Patch Warning for ‘Zerologon’

Threatpost

The deadline looms for U.S. Cybersecurity and Infrastructure Security Agency’s emergency directive for federal agencies to patch against the so-called ‘Zerologon’ vulnerability.

article thumbnail

'Dark Overlord' Cyber Extortionist Pleads Guilty

Dark Reading

Nathan Wyatt was sentenced to five years in prison after changing a previously not guilty plea.

89
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Explaining “as-a-service” using Pizza via 4PSA

IG Guru

Check out this clever post and diagram explaining “as-a-service” with Pizza. The post Explaining “as-a-service” using Pizza via 4PSA appeared first on IG GURU.

Cloud 55
article thumbnail

Legacy Systems: The Bottom-Line Advantage

Rocket Software

In the technology world, you can’t go more than 10 minutes without someone using the word “disruptive.” But you can’t go more than 30 seconds without hearing the word “new.” Absolutely everything in hardware and software is about novelty, and yesterday’s innovation is tomorrow’s doorstop. That 40MB hard drive you bought for $3000 is literally in a museum , alongside your old flip phone and Colecovision console.

Paper 52
article thumbnail

How to Manage Your Child’s Paperwork During Online School

Record Nations

While as the name implies with online school the majority of things are handled digitally, just like any other industry paper still is and probably always will be used with education. As a result now with parents being forced to convert their kitchens and living rooms into mini classrooms, it’s easier than ever for paper […]. The post How to Manage Your Child’s Paperwork During Online School appeared first on Record Nations.

Paper 52
article thumbnail

Archive-It Partner News, September 2020

Archive-It

by the Archive-It team. Archive-It 2020 Virtual Partner Meeting. Register here to join Archive-It partners, Internet Archive staff, and digital preservation peers for an online conference of web archiving ideas and collaborations. It’s more than a Zoom call! This year’s meeting will be hosted in an interactive digital space for talks, discussions, and networking.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Think Twice Before Using Facebook, Google, or Apple to Sign In Everywhere

WIRED Threat Level

So-called single sign-on options offer a lot of convenience. But they have downsides that a good old fashioned password manager doesn't.

Passwords 114