Fri.Feb 21, 2020

article thumbnail

Defense Department Agency Reports Data Breach

Data Breach Today

Defense Information Systems Agency Has a Security Mission A U.S. Defense Department agency that's responsible for providing secure communications and IT equipment for the president and other top government officials says a data breach of one of its systems may have exposed personal data, including Social Security numbers.

article thumbnail

MY TAKE: PKI, digital certificates now ready to take on the task of securing digital transformation

The Last Watchdog

Just five years ago, the Public Key Infrastructure, or PKI , was seriously fraying at the edges and appeared to be tilting toward obsolescence. Things have since taken a turn for the better. Related: Why PKI is well-suited to secure the Internet of Things PKI is the authentication and encryption framework on which the Internet is built. The buckling of PKI a few years back was a very serious matter, especially since there was nothing waiting in the wings to replace PKI.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SMS Phishing Campaign Used to Spread Emotet: Report

Data Breach Today

IBM Says Mobile Banking Customers Targeted With Fakes Messages and Domains Mobile banking customers are being targeted by yet another SMS phishing campaign, according to new research from IBM X-Force. This time, however, in addition to trying to steal usernames and credentials, the attackers are also attempting to install Emotet malware.

Phishing 199
article thumbnail

Inrupt, Tim Berners-Lee's Solid, and Me

Schneier on Security

For decades, I have been talking about the importance of individual privacy. For almost as long, I have been using the metaphor of digital feudalism to describe how large companies have become central control points for our data. And for maybe half a decade, I have been talking about the world-sized robot that is the Internet of Things, and how digital security is now a matter of public safety.

IoT 128
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Attack on EHR Vendor Impacts Home Health Chain

Data Breach Today

Personal Touch Home Care Explains Effect on Its Patients A home healthcare company has filed 17 breach reports after a ransomware attack on its cloud-based electronic health records vendor last December, illustrating once again how a vendor breach can have a wide impact.

More Trending

article thumbnail

Facilities Maintenance Firm Recovering From Malware Attack

Data Breach Today

ISS World Says 'Root Cause' Has Been Identified ISS World, a global facilities maintenance company based in Denmark, says it's gradually restoring its systems after a malware attack on Monday. The company says it has identified the root cause but has not said if ransomware was involved.

article thumbnail

DOD DISA US agency discloses a security breach

Security Affairs

The Defense Information Systems Agency (DISA) US agency in charge of secure IT and communication for the White House has disclosed a data breach. The Defense Information Systems Agency (DISA), the DoD agency that is in charge of the security of IT and telecommunications for the White House and military troops has suffered a cyber attack. The agency sent a data breach notification to its employees last week informing them of a security breach that took place last year between May and July.

Military 113
article thumbnail

US, UK Blame Russia for Cyberattack in Country of Georgia

Data Breach Today

Allies Say GRU Hackers Crippled and Defaced Thousands of Websites U.S. and U.K. officials are blaming the Russian military for launching an October 2019 cyberattack on the country of Georgia that crippled at least 2,000 government, news media and court websites over the course of one day.

Military 162
article thumbnail

VMware addresses serious flaws in vRealize Operations for Horizon Adapter

Security Affairs

VMware has addressed serious vulnerabilities in vRealize Operations for Horizon Adapter, including remote code execution and authentication bypass flaws. VMware vRealize Operations is a software product that provides operations management across physical, virtual and cloud environments, it supports environments based on vSpher e, Hype r-V or Amazon Web Services.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

What to Look for at RSA 2020 Conference

Data Breach Today

This special edition of the ISMG Security Report offers a preview of top keynote presentations at the RSA 2020 conference, plus a look at important themes and health tips for attendees.

Security 162
article thumbnail

Haken Malware Family Infests Google Play Store

Threatpost

Eight apps - mostly camera utilities and children's games - were discovered spreading a new malware strain that steals data and signs victims up for expensive premium services.

Security 111
article thumbnail

Exclusive: Pakistan and India to armaments: Operation Transparent Tribe is back 4 years later

Security Affairs

Exclusive: Pakistan and India to armaments. Researchers from Cybaze-Yoroi ZLab gathered intelligence on the return of Operation Transparent Tribe is back 4 years later. Introduction. The Operation Transparent Tribe was first spotted by Proofpoint Researchers in Feb 2016, in a series of espionages operations against Indian diplomats and military personnel in some embassies in Saudi Arabia and Kazakhstan.

Military 108
article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Welcome to the Age of the Internet of Bodies. A company in Wisconsin had a “chipping party” in 2017 to implant microchips in some of its employees to make it easier for them to access the buildings and systems and to buy food in the company break room. [1]. Those employees joined a growing number of workers in other countries – Belgium, the UK, and Sweden, to name a few – who use microchips for workplace security, convenience, and commuting.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Russia Doesn't Want Bernie Sanders. It Wants Chaos

WIRED Threat Level

The point of Kremlin interference has always been to find democracy’s loose seams, and pull.

IT 145
article thumbnail

Weekly Update 179

Troy Hunt

On reflection, I feel this week's update was dominated by having a laugh at an IoT candle ?? And that's fair, too, even though I then went and bought one because hey, this is gonna be great conference talk material! Delivery is going to be much later this year so don't hold your breath, but it could be really, uh, "interesting" once it lands. Stay tuned for that one but until then, here's this week's update: References If you're not pwned, you may be an anomaly (I'd actually like to write this u

IoT 102
article thumbnail

Jamf announces support for new Google Cloud secure LDAP service

Jamf

As a Google Premier Partner, Jamf now offers a native Jamf Pro integration with Google LDAP. Whether using G Suite Enterprise or Cloud Identity Premium, Jamf Pro's unified authentication process is easy to set up.

Cloud 98
article thumbnail

Tame eDiscovery document review costs without increasing risk

OpenText Information Management

Demands on legal services within the enterprise have never been greater, extending beyond litigation and regulatory compliance to privacy, data security, and risk and crisis management. At the same time, budgets are being squeezed and legal departments are being asked to do more with less. When substantial eDiscovery document review surpasses the bandwidth of in-house … The post Tame eDiscovery document review costs without increasing risk appeared first on OpenText Blogs.

Risk 87
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

European Commission Publishes Plans for Regulation of AI

Hunton Privacy

On February 19, 2020, the European Commission (“the Commission”) published a White Paper entitled “a European Approach to Excellence and Trust” on artificial intelligence (“AI”). This followed an announcement in November 2019, from the Commission’s current President, Ursula von der Leyen, that she intended to propose rules to regulate AI within the first 100 days of her Presidency, which commenced on December 1, 2019.

Paper 87
article thumbnail

ISS World Hit with Malware Attack that Shuts Down Global Computer Network

Threatpost

The incident cut off access to e-mail and shared IT services across customer sites of the multinational Denmark-based facility-management firm.

Access 93
article thumbnail

Security Now Merges With Dark Reading

Dark Reading

Readers of Security Now will join the Dark Reading community, gaining access to a wide range of cybersecurity content.

article thumbnail

Active Attacks Target Popular Duplicator WordPress Plugin

Threatpost

When patched last week, the bug affected at least 1 million websites. Zero-day exploits were going on then.

Security 104
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

California Man Arrested for Politically Motivated DDoS

Dark Reading

The distributed denial-of-service attacks took a congressional candidate's website offline for a total of 21 hours during the campaign for office.

86
article thumbnail

Lawsuit Claims Google Collects Minors’ Locations, Browsing History

Threatpost

A new lawsuit alleges that Google’s G Suite for Education program covertly collects data from students, violating both COPPA and other data privacy regulations.

article thumbnail

NRC Health Ransomware Attack Prompts Patient Data Concerns

Dark Reading

The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed.

article thumbnail

RSAC 2020: Editors’ Preview of Hottest Sessions, Speakers and Themes

Threatpost

From data privacy to industrial IoT cybersecurity concerns, Threatpost editors discuss the top stories they expect to see at this year's RSA Conference, which kicks off next week in San Francisco.

IoT 75
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Olympics Could Face Disruption from Regional Powers

Dark Reading

Destructive attacks and disinformation will likely target the Summer Olympics in Tokyo, two groups of threat experts say.

109
109
article thumbnail

Cybersecurity Maturity Model Certification Version 1.0 (CMMC v1.0)

HL Chronicle of Data Protection

On January 31 the U.S. Department of Defense (DoD) issued CMMC v1.0, a new unified cybersecurity standard coupled with a certification program for all DoD contractors and subcontractors. CMMC contains maturity processes and cybersecurity best practices progressing across five maturity levels, from basic cyber hygiene to advanced/progressive. CMMC is instrumental in establishing cybersecurity as a foundation for future DoD procurements, as it addresses the need to protect DoD’s unclassified infor

article thumbnail

Emotet Malware Rears Its Ugly Head Again

Dark Reading

A resurgence in Emotet malware may make it one of the most pervasive security threats of 2020.

IT 89