Mon.May 04, 2020

article thumbnail

Fake Labor Department Emails Designed to Spread TrickBot

Data Breach Today

IBM: Spam Leverages Interest in Family and Medical Leave Act In an apparent attempt to spread TrickBot malware, cybercriminals are sending fake emails designed to look like notifications from the Labor Department concerning changes to the Family and Medical Leave Act, according to IBM X-Force.

265
265
article thumbnail

StopCovid: the French contact-tracing app

Data Protection Report

Following the example of many European countries, the French government plans to introduce a contact tracing app, known as “StopCovid”. The app is designed to be used by people once they leave the confinement of their homes with the aim of preventing the spread of COVID-19. StopCovid is being developed within the INRIA, the French national research institute for digital sciences and technologies.

Risk 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GAO: HHS Has Failed to Act on Security Recommendations

Data Breach Today

Watchdog Report Spotlights Steps Agency Has Not Yet Taken The Department of Health and Human Services has yet to implement dozens of "high priority" recommendations, including several related to enhancing its cybersecurity and reducing the risk of fraud, according to a new report from the GAO, which made the recommendations.

Security 261
article thumbnail

Update on Jamf Training courses and Training Passes

Jamf

Over the last few weeks, our Curriculum and Content Development team has been hard at work to adapt our curriculum and course infrastructure to a remote delivery format. Read an update on these courses and Training Pass extensions.

110
110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Account Takeovers: Why Fraud Losses Are Growing

Data Breach Today

Krista Tedder of Javelin Strategy Analyzes Results of New Study Krista Tedder of Javelin Strategy analyzes key findings from a new report on identity fraud that shows that while account takeover incidents are decreasing, losses are growing.

233
233

More Trending

article thumbnail

Nintendo Source Code for N64, Wii and GameCube Leaked

Data Breach Today

Nintendo Was Likely Anticipating the Dump After 2018 Intrusion Gamers are poring over a massive leak of Nintendo data, including source code for older gaming systems, prototypes of games and extensive software and hardware documentation. The data likely dates from a 2018 network intrusion at Nintendo.

216
216
article thumbnail

Hackers are scanning the internet for vulnerable Salt installs, Ghost blogging platform hacked

Security Affairs

Hackers are conducting a mass-scanning the Internet for vulnerable Salt installs that could allow them to hack the organizations, the last victim is the Ghost blogging platform. Experts warn of hacking campaign that is targeting organization using the Salt platform for the management of their infrastructure, the last victim is the Ghost blogging platform.

Mining 105
article thumbnail

Digital Contact-Tracing Apps: Hype or Helpful?

Data Breach Today

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.

Privacy 194
article thumbnail

Manage enterprise data at scale with IBM Cloud Pak for Data 3.0

IBM Big Data Hub

Data is the fuel, cloud is the vehicle, AI is the destination. The intersection of these three pillars of IT has been the focus of IBM. Through the launch of IBM Cloud Pak for Data , our modern data and AI platform, we have containerized numerous offerings and delivered them as microservices to accelerate client’s journey to AI. Clients have successfully been able to collect, organize and analyze data in order to infuse AI across their business – on any cloud of their choice.

Cloud 94
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Identity: The Future is Now

Data Breach Today

SecureAuth's Bil Harmer Reflects on Virtual Roundtable Discussion Series Over the course of three days, ISMG and SecureAuth teamed up for a series of virtual roundtable discussions on the future of identity security. Bil Harmer of SecureAuth reflects on these discussions and how they inform his view of the factors influencing both the present and future of identity.

Security 175
article thumbnail

What’s New in Jamf Pro

Jamf

Jamf Pro 10.21 will improve your management workflows and enhance day-to-day life including better policy deferral, continued restyling of the user interface and more.

95
article thumbnail

Denmark, Sweden, Germany, the Netherlands and France SIGINT Alliance

Schneier on Security

This paper describes a SIGINT and code-breaking alliance between Denmark, Sweden, Germany, the Netherlands and France called Maximator: Abstract: This article is first to report on the secret European five-partner sigint alliance Maximator that started in the late 1970s. It discloses the name Maximator and provides documentary evidence. The five members of this European alliance are Denmark, Sweden, Germany, the Netherlands, and France.

Paper 127
article thumbnail

Microsoft spotted multiple malspam campaigns using malware-laced ISO and IMG files

Security Affairs

Microsoft warns of threat actors targeting organizations with malware-laced ISO and IMG files aimed at delivering a remote access trojan. Microsoft advanced machine learning threat detection models detected multiple malspam campaigns distributing malware-laced ISO. Last week experts from Microsoft detected a COVID-19-themed spam campaign, the messages are crafted to trick users into downloading and mounting ISO or IMG file attachments.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Airplane Hack Exposes Weaknesses of Alert and Avoidance Systems

Threatpost

Researchers warn commercial airplane systems can be spoofed impacting flight safety of nearby aircraft.

121
121
article thumbnail

Analytics on the edge using IBM Cloud Pak for Data

IBM Big Data Hub

As we grow smarter and more sophisticated, thanks to rapidly enhancing technological innovations, enterprise data management and analytics have to keep pace to ensure organizations continue to remain effective and data- and insights-driven.

article thumbnail

LineageOS servers hacked, attackers exploited unpatched Salt issues

Security Affairs

On Saturday, at around 8 pm (US Pacific coast), hackers have breached the LineageOS servers by exploiting an unpatched vulnerability. On Saturday, at around 8 pm (US Pacific coast), hackers have breached the LineageOS servers by exploiting an unpatched vulnerability. LineageOS is a free and open-source operating system for smartphones, tablet computers, and set-top boxes, based on the Android mobile platform.

article thumbnail

Streamlining the AI model risk management process

IBM Big Data Hub

Many financial firms are increasing their use of AI models because they can represent the real world more accurately, and they can deliver better projections than traditional, rule-based models. But some AI models can add complexity and risk. You can minimize that risk and also streamline the process of model validation by using IBM Cloud Pak for Data , a data and AI platform that includes IBM Watson Studio, Watson Machine Learning, Watson OpenScale and other services.

Risk 85
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DHS CISA alert provides recommendations on securing Office 365 installs

Security Affairs

The US DHS CISA agency issued a new alert that includes recommendations on how organizations should properly secure Microsoft Office 365 installs. The current COVID-19 pandemic is pushing organizations to adopt a growing number of cloud-based services, for this reason, the DHS CISA published a new alert that provides recommendations to secure Office 365 deployments.

article thumbnail

IBM Cloud Pak for Data enhances DataOps services to deliver business agility with cost savings and risk reduction

IBM Big Data Hub

Today’s market conditions elevate the need to put trusted data into the right hands almost in real-time. The market has been experiencing a dramatic demand for near-frictionless, fact-based decision-making processes. With business continuity top of mind, leaders are turning to DataOps programs to deliver trusted data quickly by creating trusted data pipelines between data sources and data users mapped to their critical business objectives.

article thumbnail

Google and Apple Reveal How Covid-19 Alert Apps Might Look

WIRED Threat Level

As contact tracing plans firm up, the tech giants are sharing new details for their framework—and a potential app interface.

Privacy 102
article thumbnail

Stay At Home Orders May Have Killed California’s Ballot Initiative to Expand CCPA

Data Matters

The California Privacy Rights Act (CPRA), the ballot initiative that aimed to amend and significantly expand the California Consumer Privacy Act (CCPA), including by creating the California’s very own data protection authority, the nation’s first, appears to be dead–at least for this ballot season. To qualify for November’s ballot, the CPRA’s supporters needed to submit for verification more than 620,000 signatures by April 21st.

B2B 74
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Nation-state actors are targeting UK universities to steal info on COVID-19 research

Security Affairs

The UK’s National Cyber Security Centre (NCSC) is warning of cyber attacks against UK universities and scientific institutes involved in COVID-19 research. . The UK’s National Cyber Security Centre (NCSC) warned of targeted attacks against UK universities and scientific facilities that are involved in the COVID-19 research. . The NCSC reported that nation-state actors are carrying out cyber espionage campaigns aimed at gathering intelligence on studies conducted by UK organizations r

article thumbnail

So, you want to search your own documents for eDiscovery?

OpenText Information Management

When organizations ask, “Can’t we collect our documents ourselves?” the answer is simple. You can, and not only can it cost less (on the face of it, at least) and go more quickly, but you get to tell the judge all about it when you become a witness. Even with the availability of off-the-shelf collection … The post So, you want to search your own documents for eDiscovery?

IT 75
article thumbnail

Zoom Installers Used to Spread WebMonitor RAT

Dark Reading

Researchers warn the installers are legitimate but don't come from official sources of the Zoom app, including the Apple App Store and Google Play.

115
115
article thumbnail

Oracle: Unpatched Versions of WebLogic App Server Under Active Attack

Threatpost

CVE-2020-2883 was patched in Oracle's April 2020 Critical Patch Update - but proof of concept exploit code was published shortly after.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How InfoSec Pros Can Help Healthcare During the Coronavirus Pandemic

Dark Reading

Security pros are banding together to ensure healthcare facilities can focus on saving lives instead of defending against cyber attacks. Here are a few places you can volunteer your services.

article thumbnail

How to process employees’ health data in France after lockdown: dos and don’ts for employers

Data Protection Report

A few weeks ago, we provided you with a summary of the rights and obligations of employers with regard to the personal data of their employees during lockdown. On 11 May, many employees will return to their workplaces. Below you will find answers to the main questions you may have ahead as the end of the lockdown approaches. Could an employer require its employees to use StopCovid or a similar private app and require to see the results?

article thumbnail

7 Tips for Security Pros Patching in a Pandemic

Dark Reading

The shift to remote work has worsened patch management challenges and created new ones. Security pros share insights and best practices.