Mon.Jan 13, 2020

article thumbnail

Why Penetration Tests Are So Essential

Data Breach Today

Avoiding the Massive Potential Costs of a Data Breach Corporate network security breaches, which can prove costly to remediate and expose a company to lawsuits, are frequently the result of vulnerabilities that could have been fixed for a relatively low cost. A a brute force penetration test is a critical first step in finding those vulnerabilities.

article thumbnail

6 cybersecurity trends driven by identity authentication challenges

Information Management Resources

Insufficient identity verification has led to limitless account takeover, extensive phishing attempts, hacks of IoT devices and even election interferences.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5G – The Future of Security and Privacy in Smart Cities

Security Affairs

5G technology is here, it is the right time to discuss security and privacy in smart cities and their possible evolution. After a long talk and eagerly waiting, finally, 5G technology is here. The 5G tech is fast – really fast, and now, ‘true’ smart cities are just about time to turn into reality. But what makes a smart city? Or what’s the role of 5G in this transformation?

Privacy 53
article thumbnail

Cryptic Rumblings Ahead of First 2020 Patch Tuesday

Krebs on Security

Sources tell KrebsOnSecurity that Microsoft Corp. is slated to release a software update on Tuesday to fix an extraordinarily serious security vulnerability in a core cryptographic component present in all versions of Windows. Those sources say Microsoft has quietly shipped a patch for the bug to branches of the U.S. military and to other high-value customers/targets that manage key Internet infrastructure, and that those organizations have been asked to sign agreements preventing them from dis

Military 262
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Albany Airport Pays Off Sodinokibi Ransomware Gang: Report

Data Breach Today

Same Crypto-Locking Malware Recently Crippled Currency Exchange Firm Telenex Officials at the Albany International Airport paid a ransom to cybercriminals after the facility's systems were hit with Sodiniokibi ransomware strain, according to local media reports. It's the same crypto-locking malware that has crippled currency exchange firm Telenex since the start of the year.

More Trending

article thumbnail

Severe Citrix Flaw: Proof-of-Concept Exploit Code Released

Data Breach Today

Attackers Probe for Vulnerable Systems, as Citrix Races to Develop Patches Proof-of-concept code has been released to exploit a severe Citrix vulnerability present in tens of thousands of enterprises. Citrix says it is developing permanent patches but that enterprises should use its mitigation guidance. In the meantime, attackers are hunting for vulnerable machines.

IT 189
article thumbnail

China-linked APT40 group hides behind 13 front companies

Security Affairs

A group of anonymous security researchers that calls itself Intrusion Truth have tracked the activity of a China-linked cyber – e spionage group dubbed APT40. A group of anonymous security researchers that calls itself Intrusion Truth has discovered that a China-linked cyberespionage group, tracked as APT40, uses 13 front companies operating in the island of Hainan to recruit hackers.

article thumbnail

'Cable Haunt' Modem Flaw Leaves 200 Million Devices at Risk

Data Breach Today

Researchers: Buffer Overflow Allows Attackers to Seize Full Control of Unpatched Devices A flaw in a Broadcom chip built into many cable modems means hundreds of millions of the devices are vulnerable to a buffer overflow exploit, dubbed Cable Haunt, that attackers can use to take full control of a cable modem, researchers say. Only some ISPs have begun pushing firmware updates to fix the flaw.

Risk 147
article thumbnail

New Guidance Published on Cybersecurity and Medical Devices

Data Matters

New European medical device guidance will require manufacturers to carefully review cybersecurity and IT security requirements in relation to their devices and in their product literature. This new guidance comes at the same time as a draft guidance on privacy by design has been published by the European Data Protection Board requiring product developers to implement privacy into the design of their products.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Class Action Breach Lawsuits: The Impact of Data for Sale

Data Breach Today

After a data breach, if individuals' stolen information is offered for sale on the dark web, that potentially bolsters class action lawsuits filed by plaintiffs against the breached organization, says technology attorney Steven Teppler of the law firm Mandelbaum Salsburg P.C.

Sales 113
article thumbnail

Microsoft Ignite The Tour: Worth the Trip

Daymark

Microsoft has a well-known yearly user conference in Orlando called Ignite. But did you know there is a smaller, free version of this conference? Microsoft Ignite The Tour is set to hit 30 cities around the world in 2020, including two U.S. cities: Washington DC, Feb 6-7th and Chicago, April 15-16 th. I had the benefit of attending the first 2020 event in Toronto earlier this month.

81
article thumbnail

US officials meet UK peers to remark the urgency to ban Huawei 5G tech

Security Affairs

U.S. officials responsible for national security and telecommunications were meeting their peers in Britain ahead of the final decision on Huawei 5G technology. U.S. officials responsible for national security and telecommunications were meeting their peers in Britain in the attempt to convince U.K. Prime Minister Boris Johnson’s government to ban Huawei 5G technology from its networks.

article thumbnail

Texas School District Loses $2.3M to Phishing Attack

Dark Reading

The Manor Independent School District is investigating a phishing email scam that led to three separate fraudulent transactions.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Welcoming the Danish Government to Have I Been Pwned

Troy Hunt

In a continued bid to make breach data available to the government departments around the world tasked with protecting their citizens, I'm very happy to welcome the first country onto Have I Been Pwned for 2020 - Denmark! The Danish Centre for Cyber Security (CFCS) joins the existing 7 governments who have free and unbridled API access to query and monitor their gov domains.

article thumbnail

Four tips to optimize your EIM systems in 2020

OpenText Information Management

EIM solutions are becoming more and more pivotal to the success of today’s digital business. The challenge is on to make sure your EIM systems are fully optimized. The post Four tips to optimize your EIM systems in 2020 appeared first on OpenText Blogs.

Cloud 73
article thumbnail

Telemarketing company suspends business following ransomware attack

IT Governance

Days before Christmas, employees at telemarketer The Heritage Company were told that they should start looking for new jobs. The bombshell came two months after the organisation was infected with ransomware , which heavily affected its already struggling operations. Whether an organisation pays the ransom or not ( although we always advise against it ), it can take anywhere from a few days to a few weeks to get back up and running.

article thumbnail

Activation Lock: The Benefits, the Challenges and the Solution

Jamf

Learn about the benefits and challenges of Apple's Activation Lock, and how to address them with device supervision.

90
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hacker that hit UK National Lottery in 2016 was sentenced to prison

Security Affairs

The alleged hacker behind the credential stuffing attacks on UK National Lottery accounts has been sentenced to nine months in prison. Anwar Batson (29) of London has been sentenced to nine months in prison for fraud and four violations under the Computer Misuse Act of 1990. The sentence was announced by the UK’s National Crime Agency on Friday, the authorities arrested Batson in May 2017.

article thumbnail

Microsoft to Officially End Support for Windows 7, Server 2008

Dark Reading

Windows 7 and Server 2008 will continue to work after Jan. 14, 2020, but will no longer receive security updates.

article thumbnail

Top 4 Modern data catalog must-have capabilities

Collibra

Due to the rapid growth and diversity of data sources, a growing number of organizations are turning to data catalogs as their primary tool for data management. A modern data catalog allows business users to better understand, trust, and ultimately, use their data to increase business value. However, not all data catalogs fit into a company’s broader metadata strategy.

article thumbnail

Washington State to Try Again for a Comprehensive Privacy Law

HL Chronicle of Data Protection

Washington State is already shaping up as a center of state privacy legislation for 2020. Last year, SB 5376 (also known as the Washington Privacy Act, or WPA) gained significant traction in the legislature, passing the state Senate almost unanimously but ultimately failing in the House due to discussions around facial recognition and compliance challenges.

Privacy 59
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Serious Fraud Office partners with AI to fight crime

OpenText Information Management

Artificial intelligence (AI) is a transformative technology that has the potential to both complement and advance human effort. Law enforcement is just one of the industries to have discovered the potential for AI to support its human workforce. A prime example is the UK’s Serious Fraud Office (SFO). The SFO is a branch of the … The post Serious Fraud Office partners with AI to fight crime appeared first on OpenText Blogs.

article thumbnail

Cut Undersea Cable Plunges Yemen Into Days-Long Internet Outage

WIRED Threat Level

The fragility of global internet structure has left the entire Red Sea region struggling to connect.

article thumbnail

Las Vegas Successfully Averted a Cyberattack

Adam Levin

The City of Las Vegas successfully averted what could have been a disastrous cyberattack earlier this month. City officials detected a cyberattack January 7, and in response immediately took several services offline, including its public-facing website. . “We do not believe any data was lost from our systems and no personal data was taken. We are unclear as to who was responsible for the compromise, but we will continue to look for potential indications,” the city announced on its Twitter feed.

article thumbnail

Tales from the archive The John Lewis Partnership (ep 1)

Preservica

Hannah Raeburn is the Digital Archivist at The John Lewis Partnership, the Partnership owns and operates two of Britain's best-loved retail brands - John Lewis & Partners and Waitrose & Partners. Established nearly a century ago, the Partnership is now the largest employee-owned business in the UK, with more than 80,000 employees who are all Partners in the business and share in its profits.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Washington State to Try Again for a Comprehensive Privacy Law

HL Chronicle of Data Protection

Washington State is already shaping up as a center of state privacy legislation for 2020. Last year, SB 5376 (also known as the Washington Privacy Act, or WPA) gained significant traction in the legislature, passing the state Senate almost unanimously but ultimately failing in the House due to discussions around facial recognition and compliance challenges.

Privacy 52
article thumbnail

Scammers Dupe Texas School District Out of $2.3M

Threatpost

The wide-scale phishing scam reportedly started in early November and continued through December, before it was discovered by the Texas school district.

article thumbnail

State of the Union: CCPA and Beyond in 2020

Data Protection Report

On New Year’s Day, you may have received emails from numerous companies saying their privacy policies have changed, or noticed a link at the bottom of many companies’ homepages stating “Do Not Sell My Info.” These are two of the more visible requirements of the California Consumer Protection Act (CCPA) and companies are still in the process of rolling out other requirements.

Privacy 49