Mon.Jun 01, 2020

article thumbnail

TrickBot Update Makes Malware Harder to Detect: Report

Data Breach Today

Updated Module Runs on System Memory, Leaving Little Trace The developers behind TrickBot have updated it to run from an infected device's memory to help better avoid detection, according to researchers at Palo Alto Network's Unit 42. The use of this malware has increased during the COVID-19 pandemic.

IT 275
article thumbnail

Selling and utilising personal data in an insolvency situation

Data Protection Report

Many businesses are suffering serious financial difficulties as a result of COVID-19, particularly those in the retail, hospitality and tourism sectors. For many of these businesses the one asset that will undoubtedly retain value, despite the pandemic, will be their customer database. This valuable commodity could help attract potential purchasers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researcher Discloses 'Sign in with Apple' Zero-Day Flaw

Data Breach Today

Bug Bounty Hunter Reveals Critical Issue Affecting Third-Party Applications An independent security researcher disclosed a zero-day vulnerability contained in the "Sign in with Apple" feature that, if exploited, could have resulted in a full account takeover. The vulnerability has been patched, and Apple says it found no account misuse tied to it.

Security 200
article thumbnail

A time to modernize

Micro Focus

Introduction Digital transformation is today’s key business imperative to ensure organizations remain relevant in a constantly evolving and competitive landscape. That landscape is changing almost daily as the eclipsing effects of the pandemic sweep across the commercial sector, disrupting everything in its path. It is a time of unprecedented change.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analysis: Verizon's Latest Data Breach Investigation Report

Data Breach Today

Verizon's Data Breach Investigations Report 2020 highlights the leading causes of breaches last year, including credential theft, phishing, ransomware as well as issues linked to cloud implementations and web applications. In an interview, Verizon's Ashish Thapar offers an in-depth analysis.

More Trending

article thumbnail

Inside Job at Clinics: Mobile Phone Used for Fraud

Data Breach Today

Worker Sentenced in Case Involving Theft of Patient Data A former administrative employee of a medical marijuana clinic and several other clinics was recently sentenced to serve time in federal prison after pleading guilty to identity theft and wire fraud. The case illustrates the potential risks posed by employees inappropriately using personal devices.

Risk 179
article thumbnail

The team behind the Joomla CMS discloses a data breach

Security Affairs

Maintainers at the Joomla open-source content management system (CMS) announced a security breach that took place last week. Last week a member of the Joomla Resources Directory (JRD) team left an unencrypted full backup of the JRD site ( resources.joomla.org ) on an unsecured Amazon Web Services S3 bucket operated by the company. The company did not reveal is third-parties have found and accessed to the S3 bucket. “JRD full site backups (unencrypted) were stored in a third-party company A

CMS 94
article thumbnail

The Micro Focus INSPIRE 20 podcast series

Micro Focus

Shine a light Working in tech, you get to experience and be involved in so many interesting and exciting initiatives whether that be learning about new technologies or seeing how technologies can help make a difference in the lives of customers and consumers around the world. Today, I am excited to share something inspirational. Today, View Article.

86
article thumbnail

KingNull leaks DB of Daniel’s Hosting dark web hosting provider

Security Affairs

Earlier this year a hacker breached Daniel’s Hosting, the largest free web hosting provider for dark web hidden services and now leaked its DB. A threat actor has leaked the database of Daniel’s Hosting (DH) , the largest free web hosting provider for dark web hidden services. The hacker has stolen the data in March when he breached the hosting provider, almost 7,600 dark web portals have been taken offline following the security breach.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Adapting lending in a time of crisis to alleviate customer hardship and bank pressures

CGI

Adapting lending in a time of crisis to alleviate customer hardship and bank pressures. The global impact of the COVID-19 pandemic on the financial industry far exceeds anything we have seen in our lifetime. Record unemployment, voluminous requests for hardship support, and the likelihood that loan defaults will significantly increase. Along with higher net charge-off rates and other financial impacts, there is significant pressure on banks to rethink their lending programs and practices to not

Risk 85
article thumbnail

This Bot Hunts Software Bugs for the Pentagon

WIRED Threat Level

Mayhem emerged from a 2016 government-sponsored contest at a Las Vegas casino hotel. Now it's used by the military—and Netflix.

article thumbnail

Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them

Dark Reading

The Sandworm group -- behind disinformation and election-hacking campaigns and responsible for a 2016 power outage in the Ukraine -- is now targeting e-mail servers.

91
article thumbnail

Expert earns $100,000 for ‘Sign in with Apple’ authentication bypass bug

Security Affairs

The expert Bhavuk Jain received an award of $100,000 for reporting a severe security issue in ‘Sign in with Apple’ authentication bypass bug that could allow the takeover of third-party user accounts. . The bug hunter Bhavuk Jain received an award of $100,000 by Apple, as part of its bug bounty program, for reporting a severe vulnerability that could allow the takeover of third-party user accounts. .

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

German BGH Ruling On Consent For Cookies And Third-Party Advertising

Hunton Privacy

On May 29, 2020, the German Federal Court of Justice ( Bundesgerichtshof, “BGH”), Germany’s highest court for civil and criminal matters, issued its ruling on case Planet49 (I ZR 7/16) regarding consent requirements for the use of cookies and telemarketing activities. In October 2017, the BGH suspended its proceedings and submitted questions to the Court of Justice of the European Union (“CJEU”) for a preliminary ruling regarding the effectiveness of obtaining consent for the use of cookies thro

article thumbnail

VMware addresses Fusion flaw introduced in the attempt to fix CVE-2020-3950 issue

Security Affairs

VMware has released an update to address a privilege escalation flaw in VMware for the macOS version of Fusion that was introduced by a previous patch. In March, VMware patched a high-severity privilege escalation vulnerability ( CVE-2020-3950 ) in Fusion, Remote Console (VMRC) and Horizon Client for Mac. The CVE-2020-3950 is a privilege escalation vulnerability caused by the improper use of setuid binaries, it could be exploited by attackers to escalate privileges to root.

article thumbnail

Minneapolis Police Department Hack Likely Fake, Says Researcher

Threatpost

Troy Hunt said that the supposed data breach perpetrated by Anonymous is most likely a hoax.

article thumbnail

Password Changing After a Breach

Schneier on Security

This study shows that most people don't change their passwords after a breach, and if they do they change it to a weaker password. Abstract: To protect against misuse of passwords compromised in a breach, consumers should promptly change affected passwords and any similar passwords on other accounts. Ideally, affected companies should strongly encourage this behavior and have mechanisms in place to mitigate harm.

Passwords 104
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Apple Pays $100K Bounty for Critical ‘Sign in With Apple’ Flaw

Threatpost

Apple has fixed a critical flaw in its Sign in with Apple feature, which could have been abused by attackers to takeover victims' third-party applications.

IT 79
article thumbnail

Learning to fly: Managing an external and internal workforce

OpenText Information Management

Guest blog by Mike Theaker, VP, HR Advisory & Digital Transformation, SAP SuccessFactors Remember when careers were linear? A workforce comprised of full-time employees moving through a series of sequential promotions doing defined jobs. Managing a known talent pool on a predictable trajectory was straightforward.

article thumbnail

26 IoT Flaws Enable Denial-of-Service Attacks, Privilege Escalation

Dark Reading

Research details vulnerabilities in the Zephyr Real Time Operating Systems and MCUboot, both used in IoT devices and sensors.

IoT 106
article thumbnail

Time to Act

OpenText Information Management

COVID-19 has made all our worlds smaller, but for the Black American community, the world gets even smaller. For many, this is a crisis within a crisis within a crisis. For Black Americans: The unemployment rate has doubled to near 17% The death rate from COVID-19 is 3x the rate of white people 25% cannot … The post Time to Act appeared first on OpenText Blogs.

71
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Joomla CMS Discloses Data Leak

Adam Levin

Administrators of the open source Joomla content management system announced a data incident that potentially compromised the information of 2,700 developers. A database containing the personal data of users of Joomla Resources Directory website was discovered on an unprotected Amazon Web Services bucket following an internal audit. Leaked information included names, addresses, email addresses, phone numbers, encrypted passwords, and IP addresses. “ Data that would be typically used for the purp

CMS 58
article thumbnail

How AI and Automation Can Help Bridge the Cybersecurity Talent Gap

Dark Reading

Without the right tools and with not enough cybersecurity pros to fill the void, the talent gap will continue to widen.

article thumbnail

Hosting Provider’s Database of Crooked Customers Leaked

Threatpost

Database of sensitive info, including emails and passwords, from owners of Daniel’s Hosting portals could be incriminating.

article thumbnail

Data on Indian Mobile Payments App Reportedly Exposed via Open S3 Bucket

Dark Reading

Over 7 million records exposed, according to vpnMentor, but app maker says there is no sign of malicious use.

106
106
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Adapting lending in a time of crisis to alleviate customer hardship and bank pressures

CGI

Adapting lending in a time of crisis to alleviate customer hardship and bank pressures. The global impact of the COVID-19 pandemic on the financial industry far exceeds anything we have seen in our lifetime. Record unemployment, voluminous requests for hardship support, and the likelihood that loan defaults will significantly increase. Along with higher net charge-off rates and other financial impacts, there is significant pressure on banks to rethink their lending programs and practices to not

52
article thumbnail

Apple Pays Researcher $100,000 for Critical Vulnerability

Dark Reading

Apple has fixed a flaw in the "Sign in with Apple" feature that could have enabled attackers to break into user accounts for third-party services.

69
article thumbnail

ADAPTURE Named to CRN’s 2020 Solution Provider 500 List

Adapture

Atlanta-based IT solutions provider recognized on prestigious CRN 2020 Solution Provider 500 list for the fifth consecutive year. Atlanta, GA, June 1, 2020 – ADAPTURE announced today that CRN ® a brand of The Channel Company , has named ADAPTURE to its 2020 Solution Provider 500 list. Each year, CRN releases its list of top 500 solution providers, a ranking of the leading IT channel partner organizations across North America by revenue.