Sun.Feb 27, 2022

article thumbnail

Anonymous breached the internal network of Belarusian railways

Security Affairs

The Anonymous hacker collective claims to have breached the Belarusian Railway’s data-processing network. The Anonymous collective announced that the internal network of Belarusian railways has been compromised, the group claims to have blocked all services and will deactivate them until Russian troops will leave the territory of Belarus. The internal network of Belarusian railways has been attacked, all services are out of order and will soon be deactivated until Russian troops leave the

Military 109
article thumbnail

From investment to innovation engine: Cloud technology and DevOps strategy are drivers of digital transformation

OpenText Information Management

The benefits of moving to cloud are well-documented. Decision makers surveyed by 451 Research cited improved operational efficiency, greater security, and cost savings as key benefits of cloud-native technology. Leveraging a DevOps strategy – that strategically combines software development with IT operations – is central to this transformation. By balancing operational needs with continuous delivery, … The post From investment to innovation engine: Cloud technology and DevOps strategy are

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list

Security Affairs

Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian entities. Ukraine is recruiting a volunteer IT army of cyber security experts and white hat hackers to launch cyberattacks on a list of Russian entities. The list is composed of 31 targets including Russian critical infrastructure, government agencies, banks, hosting prividers.

IT 103
article thumbnail

The data game: what Amazon knows about you and how to stop it

The Guardian Data Protection

The tech giant has many ways of gathering information about its users’ activity – from Prime to Alexa. But how much can it collect and what can you do to keep your life private? From selling books out of Jeff Bezos’s garage to a global conglomerate with a yearly revenue topping $400bn (£290bn), much of the monstrous growth of Amazon has been fuelled by its customers’ data.

IT 98
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Feb 7- Feb 27 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective. Below is the timeline of Russia – Ukraine cyber dispute. February 27 – Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list. Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian entities.

article thumbnail

Chipmaker giant Nvidia hit by a ransomware attack

Security Affairs

The chipmaker giant Nvidia was the victim of a ransomware attack that took down some of its systems for two days. The chipmaker giant Nvidia was victim of a ransomware attack that impacted some of its systems for teo days. The security breach is not connected to the ongoing crisis in Ukraine, according to a person familiar with the incident. The incident also impacted the company’s developer tools and email systems, but business and commercial activities were not affected.