Tue.Nov 23, 2021

article thumbnail

European General Court Judgment in Google Shopping: Key Takeaways

Data Matters

On November 10, 2021, the European General Court (Court) issued its judgment in Case T-612/17 Google and Alphabet v Commission (Google Shopping). The Court dismissed almost in its entirety the action brought by Google and Alphabet against the decision by the European Commission (Commission) of June 27, 2017, which found that Google had abused its dominant market position by favoring its own comparison shopping service (CSS) on its general results pages while demoting the results from compet

article thumbnail

How to Get Executive Support for Your Next Information Governance Initiative

AIIM

Back in 2017, I called up a few of the information governance friends I’d made through the AIIM Community to better understand the challenges they were up against. As we engaged in a bit of Socratic dialogue, it became clear to us all that the perceived role of information governance had to shift from a singular focus on risk and cost reduction. If they don't, they will NEVER change the status of information management within their organizations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Android.Cynos.7.origin trojan infected +9 million Android devices

Security Affairs

Researchers spotted dozens of games on Huawei’s AppGallery catalog containing the Android.Cynos.7.origin trojan. Researchers from Dr. Web AV discovered 190 games on Huawei’s AppGallery catalog (i.e. simulators, platformers, arcades, strategies, and shooters) that were containing the Android.Cynos.7.origin trojan. They estimated that the malicious apps were installed on at least 9.300.00 Android devices.

Metadata 128
article thumbnail

The EDPB Issues Guidelines Clarifying What Constitutes an International Data Transfer Under the GDPR

Hunton Privacy

On November 19, 2021, the European Data Protection Board (“EDPB”) published its draft Guidelines 05/2021 (the “Guidelines”) on the interplay between the application of Article 3 of the EU General Data Protection Regulation (“GDPR”), which sets forth the GDPR’s territorial scope, and the GDPR’s provisions on international data transfers. The Guidelines aim to assist organizations subject to the GDPR in identifying whether a data processing activity constitutes an international data transfer under

GDPR 125
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Expert released PoC exploit code for Microsoft Exchange CVE-2021-42321 RCE bug

Security Affairs

A researcher has released a proof-of-concept exploit code for an actively exploited vulnerability affecting Microsoft Exchange servers. The researcher Janggggg has published on Sunday a proof-of-concept exploit code for an actively exploited vulnerability, tracked as CVE-2021-42321 , in Microsoft Exchange servers. The CVE-2021-42321 is a high-severity remote code execution issue that occurs due to improper validation of cmdlet arguments.

More Trending

article thumbnail

Expert disclosed an exploit for a new Windows zero-day local privilege elevation issue

Security Affairs

A researcher publicly disclosed an exploit for a new Windows zero-day local privilege elevation that can allow gaining admin privileges. A security researcher has publicly disclosed an exploit for a new Windows zero-day local privilege elevation vulnerability that can be exploited by threat actors to achieve admin privileges in Windows 10, Windows 11, and Windows Server, BleepingComputer reported.

Security 112
article thumbnail

Common Cloud Misconfigurations Exploited in Minutes, Report

Threatpost

Opportunistic attackers instantly exploited insecurely exposed services deployed in honeypots by Unit 42 researchers, demonstrating the immediate danger of these typical mistakes.

Honeypots 108
article thumbnail

How Sun Tzu's Wisdom Can Rewrite the Rules of Cybersecurity

Dark Reading

The ancient Chinese military strategist Sun Tzu would agree: The best defense is to avoid an attack in the first place.

Military 134
article thumbnail

HONG KONG: New anti-doxxing provisions now in force

DLA Piper Privacy Matters

With the coming into effect of the Personal Data (Privacy) (Amendment) Ordinance 2021 (“ Amendment Ordinance ”) on 8 October 2021, a new anti-doxxing law is now in force in Hong Kong. The below sets out a summary of the key aspects of the anti-doxxing law: New offences of doxxing; new penalties. The Amendment Ordinance introduces two new offences of doxxing and corresponding penalties.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Malware are already attempting to exploit new Windows Installer zero-day

Security Affairs

Vxers are already attempting to use the proof-of-concept exploit code targeting a new Microsoft Windows Installer zero-day publicly disclosed on Sunday. Malware authors are already attempting to use the proof-of-concept exploit code targeting a new Microsoft Windows Installer zero-day publicly disclosed on Sunday. The security researcher Abdelhamid Naceri has publicly disclosed the exploit for a new Windows zero-day local privilege elevation vulnerability that can be exploited by threat actors w

Security 106
article thumbnail

The McDonald’s Ice Cream Machine Hacking Saga Has a New Twist

WIRED Threat Level

The cold war between a startup and a soft-serve machine manufacturer is heating up, thanks to a newly released trove of internal emails.

article thumbnail

Attackers Will Flock to Crypto Wallets, Linux in 2022: Podcast

Threatpost

That’s just the start of what cyberattackers will zero in on as they pick up APT techniques to hurl more destructive ransomware & supply-chain attacks, says Fortinet’s Derek Manky.

article thumbnail

Holiday Scams Drive SMS Phishing Attacks

Dark Reading

Attackers typically target consumers with malicious text messages containing obfuscated links, but experts say businesses are threatened as well.

Phishing 142
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Experts warn of RCE flaw in Imunify360 security platform

Security Affairs

A flaw in CloudLinux’s Imunify360 security product could have been exploited by an attacker for remote code execution. Cisco’s Talos researchers discovered a remote code execution vulnerability, tracked as CVE-2021-21956, in CloudLinux’s Imunify360 security product. Imunify360 is a security platform for web-hosting servers that allows to implement real-time protection for website and web servers.

article thumbnail

Why Should I Adopt a Zero Trust Security Strategy?

Dark Reading

Zero Trust is the right approach for protecting your end users. Executing it in the right way will also help you comply with the NIST standards and upcoming federal mandates.

article thumbnail

GovQA Launches 2022 Annual Peers in Public Records Survey: Tasked with Identifying Public Records Priorities

IG Guru

GovQA has launched the largest survey of public records managers in the U.S., capturing data on emerging trends in the public records space. The annual survey helps state and local prioritize key decisions across governments in 2022. The data we receive from your members is priceless in helping us navigate public priorities in the next […]. The post GovQA Launches 2022 Annual Peers in Public Records Survey: Tasked with Identifying Public Records Priorities appeared first on IG GURU.

article thumbnail

Federal Regulators Issue New Cyber Incident Reporting Rule for Banks

Hunton Privacy

On November 18, 2021, the Federal Reserve, Federal Deposit Insurance Corporation, and Office of the Comptroller of the Currency issued a new rule regarding cyber incident reporting obligations for U.S. banks and service providers. The final rule requires a banking organization to notify its primary federal regulator “as soon as possible and no later than 36 hours after the banking organization determines that a notification incident has occurred.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Apple Sues NSO Group for Spyware Use

Dark Reading

The company seeks to hold Israeli firm NSO Group liable for the targeting of Apple users and requests a permanent injunction to ban its use of Apple products and services.

IT 82
article thumbnail

Indian Joint Parliamentary Committee Adopts Report on Personal Data Protection Bill

Hunton Privacy

On November 22, 2021, according to India Today , the Indian Joint Parliamentary Committee (the “JPC”) responsible for reviewing the Personal Information Protection Bill 2019 (“PDPB”) issued its report on the proposed law. The report comes nearly two years after the bill was first referred to the JPC. The JPC’s report will likely be presented with the PDPB 2019 in the Winter Session of Parliament, which begins on November 29, 2021.

article thumbnail

How to Defend Against Mobile App Impersonation

Threatpost

Despite tight security measures by Google/Apple, cybercriminals still find ways to bypass fake app checks to plant malware on mobile devices. Dave Stewart, CEO of Approov, discusses technical approaches to defense against this.

article thumbnail

Baffle's Data Privacy Cloud Protects Data for Amazon Redshift Customers

Dark Reading

Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

And the category is … seamless digital experience

OpenText Information Management

As the new Industry Strategist for the U.S. Public Sector at OpenText™, I want to bring you some insights that I think really define how I view the market. And a lot of these thoughts come from being a citizen, just like you. My one-year anniversary as a homeowner is approaching, and I’ve been reflecting … The post And the category is … seamless digital experience appeared first on OpenText Blogs.

article thumbnail

US banking regulators promulgate a final rule for 36-hour notice of breach

Data Protection Report

On November 18, 2021, the US federal banking regulators Office of the Comptroller of the Currency, Federal Reserve Board and Federal Deposit Insurance Corporation jointly announced a final rule that will require banking organizations (which includes the U.S. operations of foreign banking organizations) to notify their regulators as soon as possible but no later than 36 hours of identifying a significant “computer-security incident” that results in “actual harm” and rises to the level of a “noti

FOIA 62
article thumbnail

The Future of Work and the Distributed Organization

OpenText Information Management

The future of work will be a combination of where you work and how you work. Organizations are struggling with the Great Attrition. Workers are rethinking their priorities and leaving their jobs in record numbers and for new reasons. In my new position paper, I explore the transformative opportunities of the emerging distributed organization and … The post The Future of Work and the Distributed Organization appeared first on OpenText Blogs.

Paper 68
article thumbnail

How Automation Complements the Human Side of eDiscovery Review

eDiscovery Daily

If there’s one constant throughout human history, it’s that change is inevitable. In the legal world, some law firms and legal service providers often keep the status quo hoping they won’t be affected by the changes around them. For the rest, they adapt and integrate new eDiscovery technologies to include features like automation to find successful ways to overcome these changes. .

IT 70
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Additional roles in connected engineering

OpenText Information Management

The partnership between OpenText™ and Dassault Systemes is bringing connected engineering solutions to you like never before, built on Dassault’s CATIA computer-aided design products and supporting by OpenText’s cloud-based managed services. CATIA 5 for everyone in applications tailored for anyone As a designer, it’s important to have software that makes your job easier.

Cloud 68
article thumbnail

New Android Spyware Variants Linked to Middle Eastern APT

Dark Reading

The new variants, improved for stealth and persistence, share code with other malware samples attributed to the C-23 APT.

82
article thumbnail

AI and ML fight security threats in retail industry as holiday shopping ramps up

DXC Technology

Online retailers are once again getting ready for the annual Black Friday to Cyber Monday surge in shopping traffic. Every year they prepare to combat the cybersecurity threats that go into overdrive during the holiday season. Increasingly, they’re getting help from cloud-based artificial intelligence (AI) and machine learning (ML) technology to fight back against the […].

Retail 59