Fri.Jan 03, 2020

article thumbnail

Promiscuous Cookies and Their Impending Death via the SameSite Policy

Troy Hunt

Cookies like to get around. They have no scruples about where they go save for some basic constraints relating to the origin from which they were set. I mean have a think about it: If a website sets a cookie then you click a link to another page on that same site, will the cookie be automatically sent with the request? Yes. What if an attacker sends you a link to that same website in a malicious email and you click that link, will the cookie be sent?

Passwords 113
article thumbnail

Top 10 Data Governance Trends for 2020: Data’s Real Value Comes Into Focus

erwin

Understanding the data governance trends for the year ahead will give business leaders and data professionals a competitive edge … Happy New Year! Regulatory compliance and data breaches have driven the data governance narrative during the past few years. While these will remain big data governance trends for 2020, we anticipate organizations will finally begin tapping into the true value of data as the foundation of the digital business model.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Data Sharing: A Federal Progress Report

Data Breach Today

Audit Finds Agencies Still Have Plenty of Work to Do Certain federal agencies, especially units within the Department of Defense, still have plenty of work to do when it comes to sharing cybersecurity information and threat intelligence among themselves as well as with the private sector, according to a report recently sent to Congress.

article thumbnail

Predicting the top 7 trends in manufacturing for 2020

OpenText Information Management

After starting the year strongly, manufacturing left 2019 faced with shrinking production and global uncertainty. Deloitte suggests manufacturers should increase the resilience in their operations while building and improving their ‘digital muscle’. So how will this translate into the major technology trends in manufacturing for 2020? Manufacturers will have to navigate the data tsunami From … The post Predicting the top 7 trends in manufacturing for 2020 appeared first on OpenText Blogs.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US Conflict With Iran Sparks Cybersecurity Concerns

Data Breach Today

Homeland Security Reminds CISOs to Protect Critical Systems After an Iranian general was killed in a U.S. drone strike in Baghdad late Thursday night, security experts and the Department of Homeland Security warned of possible retaliatory cyber strikes from Iran that could target critical infrastructure, government agencies as well as private businesses.

More Trending

article thumbnail

Malware Infects Small Hospital's Medical Imaging Server

Data Breach Today

Data on 29,000 Patients Potentially Exposed A breach stemming from malware infecting a medical imaging server at a small, rural New Mexico hospital serves as a reminder of medical equipment data security and privacy vulnerabilities and risks faced by facilities of all sizes.

Privacy 162
article thumbnail

Ransomware Attack Topples Telemarketing Firm, Leaving Hundreds Jobless

Threatpost

Days before Christmas, employees found out that The Heritage Company had been hit by a ransomware attack and was "temporarily suspending operations.".

article thumbnail

Researcher Spots New Tricks in Web Payment Card Skimmers

Data Breach Today

Cybercriminals Turn to Steganography, WebSocket Connections E-commerce sites have been under siege from cybercriminals who seek to sneak malicious code into checkout processes. A researcher has now found two new methods that payment card number thieves are using to try to stay under the radar.

162
162
article thumbnail

Cisco addresses several flaws in its DCNM product

Security Affairs

Cisco has released software updates for its Data Center Network Manager (DCNM) product to address several critical and high-severity issues. Cisco has released software updates that address several critical and high-severity vulnerabilities in it s Data Center Network Manager (DCNM) product. All the vulnerabilities were reported to Cisco through Trend Micro’s Zero Day Initiative (ZDI) and Accenture’s iDefense service by the security researcher Steven Seeley of Source Incite and Harrison Neal fro

IT 61
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Maze Ransomware Victim Sues Anonymous Attackers

Data Breach Today

Southwire Also Obtains Irish Court Injunction, Forcing Blackmail Site Offline The Maze gang crypto-locked Georgia cable and wire manufacturer Southwire's systems and publicly dumped stolen data to try to force it to pay a ransom. In response, Southwire has sued its attackers and obtained a court order in Ireland that knocks the gang's "name and shame" site offline.

article thumbnail

Remote Command Execution and Information disclosure flaws affect dozens of D-Link routers

Security Affairs

Experts disclosed PoC exploits for remote command execution and information disclosure vulnerabilities affecting many D-Link routers. Security researchers Miguel Méndez Zúñiga and Pablo Pollanco from Telefónica Chile recently published Proof-of-concept (PoC) exploits for remote command execution and information disclosure vulnerabilities affecting many D-Link routers.

Access 61
article thumbnail

Analysis: Countering Nation-State Attacks in 2020

Data Breach Today

The latest edition of the ISMG Security Report discusses countering the threat of nation-state cyberattacks in 2020. Also featured: an update on France's experiment with facial recognition technology and sorting out what "zero trust" really means.

Security 113
article thumbnail

Travelex currency exchange suspends services after malware attack

Security Affairs

The Travelex currency exchange has been forced offline following a malware attack launched on New Year’s Eve. . This week, the UK-based currency exchange Travelex announced that it has shut down its services as a “precautionary measure” following a malware attack. Statement on IT issues affecting Travelex Services pic.twitter.com/rpKagJLykn — Travelex UK (@TravelexUK) January 2, 2020.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Travelex Knocked Offline by System-Wide Malware Attack

Threatpost

The foreign-currency-exchange giant said that it has been hit by a virus, affecting retail customers and banking partners alike.

Retail 71
article thumbnail

Weekly Update 172

Troy Hunt

I couldn't get 2 days into the new decade without without having to deal with ridiculous password criteria from Tik Tok followed by my phone automatically associating with what it thought was my washing machine whilst in a grocery store on the other side of the world (yep, you read that correctly). It somehow seems to just be reflective of how crazy online security is becoming in the modern era.

article thumbnail

How Iran's Hackers Might Strike Back After Soleimani's Assassination

WIRED Threat Level

From data-destroying wipers to industrial control system hacking, Iran has a potent arsenal of cyberattacks at its disposal.

IT 75
article thumbnail

Archives*RM Testimonial #6

The Schedule

This testimonial about the intersections of archives and records management comes from Lori Eaton, Archivist at Found Archives, LLC. At a meeting of foundation archivists in June 2019, Darren Walker, president of the Ford Foundation, spoke about the value he found in the margin notes past presidents had made on letters, reports, board materials and other documents preserved in the foundation’s archives.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

3 Critical Bugs Allow Remote Attacks on Cisco NX-OS and Switches

Threatpost

Cisco patched three authentication bypass bugs tied to its DCNM platform used to manages NX-OS.

article thumbnail

The Edge Cartoon Caption Contest: Latest Winners, New Toon 'Like a Boss'

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

57
article thumbnail

Cybercriminals Fill Up on Gas Pump Transaction Scams Ahead of Oct. Deadline

Threatpost

Gas stations will become liable for card-skimming at their pay-at-the-pump mechanisms starting in October.

Sales 63
article thumbnail

Top jobs for the next decade are behavioral scientist, data analyst

Information Management Resources

Brexit, climate change, an economic slowdown and technology are among the factors that could have the greatest impact on jobs in the 2020s, a new study says.

57
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Organizations May 'Uncloud' Over Security, Budgetary Concerns

Dark Reading

While most cloud vendors forecast continued adoption and growth, some customers are taking a harder look at the cloud services they're using

Cloud 72
article thumbnail

Google Boots Security Camera Maker From Nest Hub After Private Images Go Public

Threatpost

The issue came to light after a Reddit user claimed being able to see strangers on his Xiaomi Mijia smart camera.

article thumbnail

Continental Drift: Is Digital Sovereignty Splitting Global Data Centers?

Dark Reading

The recent proposal by Germany, backed by France, to fuse the infrastructures of Europe's cloud providers could challenge every data center storing a European's data.

Cloud 45
article thumbnail

TikTok's First Transparency Report Doesn't Tell the Full Story

WIRED Threat Level

The app says it didn’t receive any requests for user information from China during the first half of 2019. That might not reassure skeptics.

IT 48
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Data privacy fight continues in California, D.C. and beyond

Information Management Resources

California’s new law gives people the right to learn what personal data companies have collected and for them to request those companies refrain from selling that information.

article thumbnail

The ICRM announces updated exams and prep material

IG Guru

The ICRM has announced updates to exam parts and resources for passing the exam. Check out their exam prep page here. The post The ICRM announces updated exams and prep material appeared first on IG GURU.

article thumbnail

JPMorgan Chase moves to block fintechs from screen scraping customer data

Information Management Resources

The bank is leaning on its direct API relationships with the major data aggregators rather than letting third parties ask customers for usernames and passwords to access account information.