Wed.Aug 19, 2020

article thumbnail

Marriott Hit With Class-Action Data Breach Lawsuit

Data Breach Today

UK Claim Seeks Damages Under GDPR Over Long-Running Starwood Reservation System Hack Marriott faces a new class-action lawsuit, filed in Britain, over the breach of its Starwood guest reservation system. The breach ran from 2014 to 2018 - Marriott acquired Starwood in 2016 - and exposed personal information for an estimated 7 million customers in the U.K.

article thumbnail

Voice Phishers Targeting Corporate VPNs

Krebs on Security

The COVID-19 epidemic has brought a wave of email phishing attacks that try to trick work-at-home employees into giving away credentials needed to remotely access their employers’ networks. But one increasingly brazen group of crooks is taking your standard phishing attack to the next level, marketing a voice phishing service that uses a combination of one-on-one phone calls and custom phishing sites to steal VPN credentials from employees.

Phishing 352
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Biometric Technology: Assessing the Risks

Data Breach Today

The growing use of biometric technology is raising concerns about privacy as well as identity theft and fraud, says attorney Paul Hales, who reviews recent legal and legislative developments.

Risk 309
article thumbnail

Let’s Social Distance Together, Register Now for erwin Insights 2020

erwin

I’m thrilled to officially announce that registration is open for our first global conference as erwin, Inc. erwin Insights 2020 is a free, virtual, two-day event being held October 13-14. Social distancing doesn’t mean we should stop connecting. In fact, opportunities for personal and professional growth are more important than ever. That’s why we look forward to bringing together erwin’s global community of users, partners, prospects and friends to engage and explore ideas, experiences, trends

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How COVID-19 Is Changing CISOs' Approaches to Security

Data Breach Today

'Zero Trust' Model, More Frequent Risk Assessments Are Among the Priorities The COVID-19 pandemic is forcing big businesses to rethink their security plans. For example, the National Football League is experimenting with "zero trust" architectures, while Jet Blue is focusing on more frequent risk assessments.

Security 305

More Trending

article thumbnail

Twitter Hack: Incident Response Lessons

Data Breach Today

Attorney Sadia Mirza Emphasizes Importance of Being Well Prepared Twitter's communication with the public in the wake of a recent hacking incident provides lessons to others on the value of an incident response plan, says attorney Sadia Mirza.

article thumbnail

10 Resume and Interview Tips from Security Pros

Dark Reading

Experts from the DEF CON Career Hacking Village explain how job seekers can build a resume and rock an interview.

Security 141
article thumbnail

Securing Remote Access With Risk-Based Authentication

Data Breach Today

Implementing an adaptive, risk-based authentication process for remote system access is proving effective as more staff members work from home during the COVID-19 pandemic, says Ant Allan, a vice president and analyst at Gartner.

article thumbnail

Researchers Warn of Flaw Affecting Millions of IoT Devices

Threatpost

A patch has been issued for the flaw in a widely-used module, and researchers are urging IoT manufacturers to update their devices ASAP.

IoT 116
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

'FritzFrog' P2P Botnet Targets SSH Servers

Data Breach Today

Researchers: Botnet Is Mining for Monero Cryptocurrency A P2P botnet dubbed "FritzFrog" has breached about 500 SSH servers, infecting universities in the U.S. and Europe and a railway company in an effort to plant cryptomining malware, Guardicore Labs reports. The botnet has also tried to infect banks, medical centers, governmental offices and others.

Mining 179
article thumbnail

Airline DMARC Policies Lag, Opening Flyers to Email Fraud

Threatpost

Up to 61 percent out of the IATA (International Air Transport Association) airline members do not have a published DMARC record.

article thumbnail

Cryptomining Botnet Steals AWS Credentials

Data Breach Today

Researchers Say 'TeamTNT' Targeting Docker and Kubernetes Installations A recently uncovered cryptomining botnet now also has the capability to steal Amazon Web Services user credentials, according to the security firm Cado.

Security 179
article thumbnail

Looking for a Virtual CRA or CRM study group? Check out the latest WiredIn Podcast

IG Guru

Maria Martinez-Carey interviews Richard Gureski from ARMA Milwaukee on how his ARMA chapter is adapting to virtual meetings, and how they set up a growing virtual ICRM CRA and CRM study group available to anyone who contributes to the profession. The post Looking for a Virtual CRA or CRM study group? Check out the latest WiredIn Podcast appeared first on IG GURU.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Data controller vs data processor: what’s the difference?

IT Governance

The concept of data controllers and data processors has been around for years, but the roles come with clearly defined responsibilities under the GDPR (General Data Protection Regulation). In this blog, we take a close look at what a data controller and processor does and how they fit into your organisation. What is a data controller? A data controller determines the purposes for which an organisation collects and uses personal data.

GDPR 95
article thumbnail

How Financial Apps Get You to Spend More and Question Less

WIRED Threat Level

You should never invest without fully understanding the risks, but tax prep and stock trading services often obfuscate the things you really need to know.

Risk 98
article thumbnail

It pays to pick the right metrics when proving the value of electronic records management systems

TAB OnRecord

It has always been a challenge for records and information management (RM) professionals to demonstrate the value of their work to an organization. Anyone who has been working in the field for long will be familiar with the refrain, “senior management does not understand why records management is important!” In recent years, the challenge of demonstrating the value of RM has been compounded by the emergence of electronic document and records management systems (EDRMS).

article thumbnail

Newly Patched Alexa Flaws a Red Flag for Home Workers

Dark Reading

Alexa could serve as an entry point to home and corporate networks. Security experts point to the need for manufacturers to work closely with enterprise security teams to spot and shut down IoT device flaws.

IoT 94
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

INSPIRE 20 – Summer Break

Micro Focus

With five outstanding INSPIRE 20 podcasts under our belt, our team is taking a few weeks break to relax, refresh, and build up some more exciting and informative podcasts for you with more top leaders in the tech Inclusion and Diversity space. But just because we don’t have a podcast release this week, it doesn’t. View Article.

IT 84
article thumbnail

How digital transformation increases operational uptime

OpenText Information Management

Neptune Energy is an international oil-and-gas focused exploration and production business. Its objective is to find and develop new energy reserves, a process that requires substantial amounts of maintenance and process documentation. As a highly collaborative company, information management and process harmony are key. Neptune Energy works all around the world and involves a huge … The post How digital transformation increases operational uptime appeared first on OpenText Blogs.

article thumbnail

Stolen Data: The Gift That Keeps on Giving

Dark Reading

Users regularly reuse logins and passwords, and data thieves are leveraging that reality to breach multiple accounts.

Passwords 133
article thumbnail

FritzFrog Botnet Attacks Millions of SSH Servers

Threatpost

The unique, advanced worming P2P botnet drops backdoors and cryptominers, and is spreading globally.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Historic Charges: First Enforcement Action Filed by New York Department of Financial Services Under Cybersecurity Regulation

Data Matters

On July 21, 2020, the New York State Department of Financial Services (NYDFS or the Department) issued a statement of charges and notice of hearing (the Statement) against First American Title Insurance Company (First American) for violations of the Department’s Cybersecurity Requirements for Financial Services Companies, 23 N.Y.C.R.R. Part 500 (Cybersecurity Regulation or Regulation).

article thumbnail

How to Control Security Costs During a Down Economy

Dark Reading

Three key areas security professionals should watch when managing their budgets.

Security 107
article thumbnail

Marriott International faces class action suit over mass data breach

The Guardian Data Protection

Technology consultant leads legal action after hackers stole personal details of 300m guests Hotel group Marriott International is facing a class action lawsuit in London’s high court from millions of customers, who are seeking compensation after their personal details were stolen in one of the world’s largest data breaches. Martin Bryant, a technology consultant, is leading the legal action on behalf of people living in England or Wales who made a reservation to stay at one of Marriott Internat

article thumbnail

Fuzzing Services Help Push Technology into DevOps Pipeline

Dark Reading

As part of a continuous testing approach, fuzzing has evolved to provide in-depth code checks for unknown vulnerabilities before deployment.

113
113
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

CISA’s MAR warns of North Korean BLINDINGCAN RAT

Security Affairs

US CISA published an alert related to a new North Korean malware, dubbed BLINDINGCAN, used in attacks on the US defense and aerospace sectors. The US Cybersecurity and Infrastructure Security Agency (CISA) has published a Malware Analysis Report (MAR) that includes technical details about a new strain of malware, tracked as BLINDINGCAN, that was attributed to North Korea.

article thumbnail

CISA Warns of New RAT Aimed at US Defense Contractors

Dark Reading

Hidden Cobra, an APT group associated with the government of North Korea, is thought to be behind the campaign.

article thumbnail

Actively exploited CVE-2020-1464 Windows Spoofing flaw was known since 2018

Security Affairs

The actively exploited Windows spoofing vulnerability (CVE-2020-1464) recently patched by Microsoft has been known for more than two years. The actively exploited Windows spoofing flaw, tracked as CVE-2020-1464 and patched last week by Microsoft, has been known for more than two years, researchers revealed. Microsoft’s August 2020 Patch Tuesday security updates addressed 120 vulnerabilities, including two zero-days that have been exploited in attacks in the wild.