Mon.Nov 11, 2019

article thumbnail

Microsoft Warns Users: Beware of Damaging BlueKeep Attacks

Data Breach Today

Software Giant Says Exploits Could Expand Beyond Cryptomining Now that security researchers have located the first exploits that take advantage of the BlueKeep vulnerability in Windows, Microsoft is warning users to apply patches the company issued for this flaw before more dangerous exploits merge.

Security 210
article thumbnail

Retailer Orvis.com Leaked Hundreds of Internal Passwords on Pastebin

Krebs on Security

Orvis , a Vermont-based retailer that specializes in high-end fly fishing equipment and other sporting goods, leaked hundreds of internal passwords on Pastebin.com for several weeks last month, exposing credentials the company used to manage everything from firewalls and routers to administrator accounts and database servers, KrebsOnSecurity has learned.

Retail 169
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Election Interference Notification Protocols Unveiled

Data Breach Today

White House Describes Framework for Notifying Public of 2020 Election Interference The White House has developed protocols for notifying the public of nation-state hacking or other interference during the 2020 presidential election cycle. But the full framework has not yet been released.

198
198
article thumbnail

Bugcrowd paid over $500,000 in bug bounty rewards in one week

Security Affairs

Crowdsourced security platform Bugcrowd announced it paid over $500,000 in bug bounty rewards during the last week of October. Bug bounty program could represent an excellent opportunity to monetize your passion, in just one week crowdsourced security platform Bugcrowd announced it paid over $500,000 in bug bounty rewards at the end of October. Bugcrowd is used by many enterprises, it allows them to manage bug bounty programs, penetration testing, and vulnerability disclosure.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Sen. Warner Asks HHS for Answers on Unsecured Medical Images

Data Breach Today

Questions HIPAA Enforcement Agency in Wake of Millions of Patient Files Discovered Online Senator Mark Warner, D-Va., is scrutinizing the Department of Health and Human Services' Office for Civil Rights' response to the recent discovery by German researchers of millions of patients' medical image files being exposed on the internet - including by a U.S. company.

149
149

More Trending

article thumbnail

Despite Instagram Changes, Minors Are Still at Risk

Data Breach Today

Minors With Business Profiles Can Shield Contact Information, But May Be Unaware In June, I wrote an in-depth story about how millions of Instagram users worldwide under 18 years old were exposing their email addresses, phone numbers or both. Instagram has finally made a change to address the issue - but it doesn't go far enough.

Risk 125
article thumbnail

Fooling Voice Assistants with Lasers

Schneier on Security

Interesting : Siri, Alexa, and Google Assistant are vulnerable to attacks that use lasers to inject inaudible­ -- and sometimes invisible­ -- commands into the devices and surreptitiously cause them to unlock doors, visit websites, and locate, unlock, and start vehicles, researchers report in a research paper published on Monday. Dubbed Light Commands, the attack works against Facebook Portal and a variety of phones.

article thumbnail

Insider Threat: Greater Risk Mitigation Required

Data Breach Today

Make Insider Threat Defenses 'Top of the Agenda' Says Veriato's Chris Gilkes Too many organizations are still failing to prioritize mitigating the risk posed by insiders, whether they're malicious actors or model employees who make mistakes that unintentionally lead to a data breach, says Veriato's Chris Gilkes.

Risk 113
article thumbnail

Bringing security closer to the data

OpenText Information Management

OpenText is the global leader in Enterprise Information Management (EIM), and the leading provider of content services to the modern enterprise. Simply put, OpenText knows how to manage information in order to deliver a competitive advantage. OpenText also understands that security must be job number one. The company acquired Guidance Software in 2017 and with … The post Bringing security closer to the data appeared first on OpenText Blogs.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Take Two: Why Organizations Are Reviewing GDPR Efforts

Data Breach Today

PwC's Polly Ralph on Data Breach Preparation and Remediation Trends The EU's General Data Protection Regulation rewrote the rules of the data privacy and breach notification game when it went into full effect last year. Now, however, numerous organizations are revisiting and refining their GDPR compliance efforts around preparation and remediation, says PwC's Polly Ralph.

GDPR 113
article thumbnail

Want to plan 80% faster? According to Forrester, IBM can help.

IBM Big Data Hub

Forrester, a leading IT analyst firm, has constructed a Total Economic Impact (TEI) framework with a focus on how IBM Planning Analytics compares to the competition across a variety of metrics—from ROI, to time, to value—and much more. They consulted several current IBM Planning Analytics customers to determine the value and cost associated with purchasing, using and implementing the solution.

article thumbnail

UAE Forms Defense Firm to Help Tackle Cyberthreats

Data Breach Today

Government and Private Sector Collaborate on Initiative A new defense company has been formed in United Arab Emirates, combining three government-owned and 22 independent companies in an effort to develop technologies to help thwart cyberattacks and repel military drones.

Military 113
article thumbnail

ZoneAlarm forum site hack exposed data of thousands of users

Security Affairs

This is really an embarrassing incident, ZoneAlarm forum site has suffered a data breach exposing data of its discussion forum users. ZonaAlarm , the popular security software firm owned by Check Point Technologies, has suffered a data breach. According to the post published by The Hacker News, the security breach exposed the data of ZonaAlarm discussion forum users.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Privacy Nirvana: Some Assembly Still Required

Data Breach Today

Life Post-GDPR: Veteran CISO Thom Langford Sees Room for Improvement Data privacy discussions must focus not just on collecting, storing and securing data, but also the impetus for doing so - and whether it is being done in an ethical manner, says consultant Thom Lagford, a former CISO, who addresses GDPR compliance issues.

Privacy 113
article thumbnail

Australian Govt agency ACSC warns of Emotet and BlueKeep attacks

Security Affairs

The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) warns businesses and netizens of Emotet and BlueKeep attacks in the wild. The ACSC is warning organizations and people of a wave of cyberattacks exploiting the Windows BlueKeep vulnerability to deliver crypto-currency miners. “The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), with its state and territory partners, is continuing to respond to the widespread malware campaign known as Emot

article thumbnail

DDoS Attacks Target Amazon, SoftLayer and Telecom Infrastructure

Threatpost

The specific type of TCP attack used in the recent spate of DDoS efforts were TCP SYN-ACK reflection attacks.

article thumbnail

Researchers Find New Approach to Attacking Cloud Infrastructure

Dark Reading

Cloud APIs' accessibility over the Internet opens a new window for adversaries to gain highly privileged access to cloud assets.

Cloud 70
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Creating Compliance in Chaos: A Consultant's Story

Gimmal

Records and Information Management (RIM) is constantly changing and evolving as record managers begin to realize the benefits of automation in their daily operations. In my 6 years of consulting, I have seen everything from heavily manual business processes to highly adaptable, integrated document management.? Even as time goes by, information professionals continue to face the long-standing hardship of trying to get end users to comply with either internal or external regulations when it comes

article thumbnail

CERTrating a new Tool to evaluate CERT/CSIRT maturity level

Security Affairs

The Global Cyber Security Center has developed a tool named CERTrating to evaluate the Maturity Level of CERTs and services provided to the Constituency. Cyber-attacks that have occurred in recent years have fully confirmed that Cybersecurity is an increasingly complex challenge that represents a priority for all companies both in terms of development and investments.

article thumbnail

You May Soon Be Told to “Go Jump in a Lake” for Your ESI: eDiscovery Trends

eDiscovery Daily

A data lake, that is. So, what is it and why should you care? Let’s take a look. Leave it to Rob Robinson and his excellent Complex Discovery blog to provide links to several useful articles to help better understand data lakes and the potential they have to impact the business world (which, in turn, impacts the eDiscovery world). Here’s one example: In this article in BizTech ( Data Lakes Prove Key to Modern Data Platforms , written by Jennifer Zaino), the author defines data lakes as “ stor[

article thumbnail

Data Intelligence at Big Data LDN

Collibra

In today’s digital world, you would be hard-pressed to find a successful company that disagrees with the view that data is important. It seems new articles pop up weekly claiming how data has become one of the most valued commodities in the world. It’s true: treated as a strategic asset, data can become a competitive advantage and help propel success.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

4 top trends shaping information management

Information Management Resources

Information is the life blood of any business or organization. It helps dictate how businesses form strategies, implement processes and drive results.

IT 52
article thumbnail

Account Fraud Harder to Detect as Criminals Move from Bots to 'Sweat Shops'

Dark Reading

Cheap labor, frequent data breaches, and better fraud detection technology are fueling frustrating changes in attackers' methods.

article thumbnail

Encrypted Emails on macOS Found Stored in Unprotected Way

Threatpost

Apple is investigating an issue raised by a Mac specialist discovered to be storing emails that are supposed to be S/MIME-encrypted as readable files.

article thumbnail

New: 2019 State of the Internet / Security: Media Under Assault

Dark Reading

It can't be overstated: Web attacks and credential stuffing are real, long-term threats. This white paper, sponsored by Akamai, focuses on how they are impacting the high-tech, video media, and entertainment sectors.

Paper 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Tales from the archive Transport for London (episode 2)

Preservica

Tamara Thornhill is the Corporate Archivist at Transport for London (TfL) , the local government body responsible for the day-to-day operation and planning of London’s public transport network. TfL are custodians of the Underground, the famous red buses and the capital's main roads. In this second episode of the podcast Tamara shares her view on the role of technology in supporting the archive in providing value back to the business and staying on top of the explosion of digital content.

article thumbnail

Data Intelligence at Big Data LDN

Collibra

In today’s digital world, you would be hard-pressed to find a successful company that disagrees with the view that data is important. It seems new articles pop up weekly claiming how data has become one of the most valued commodities in the world. It’s true: treated as a strategic asset, data can become a competitive advantage and help propel success.

article thumbnail

Episode 167: Made in America? Trade Tensions highlight Supply Chain Risk

The Security Ledger

In this episode of the podcast (#167): two stories this week - one from Pittsburgh and one from New York - have highlighted anxiety about Chinese made cameras and other security gear deployed in U.S. government agencies and in cities and towns. We're joined by Terry Dunlap the co-founder of ReFirm Labs to talk about why software supply chain risks. Read the whole entry. » Related Stories From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military Ep

Risk 40