Mon.Jan 18, 2021

article thumbnail

Biden's $10 Billion Cybersecurity Proposal: Is It Enough?

Data Breach Today

Security Experts Say Proposal Amounts to a 'Down Payment' President-elect Joe Biden's $1.9 trillion plan for COVID-19 relief includes nearly $10 billion in cybersecurity and IT spending. Some security experts hope the amount as just a "down payment" toward a broader effort.

article thumbnail

OpenWRT forum hacked, intruders stole user data

Security Affairs

The OpenWRT forum, the community behind the open-source project for embedded operating systems based on Linux, disclosed a data breach. OpenWrt is an open-source project for embedded operating systems based on Linux, primarily used on embedded devices to route network traffic. The main components are Linux, util-linux, musl, and BusyBox. All components have been optimized to be small enough to fit into the limited storage and memory available in home routers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

COVID-19 Vaccine Themes Persist in Fraud Schemes

Data Breach Today

Fraudsters Impersonate Vaccine Manufacturers, WHO, DHL Researchers at the security firm Proofpoint are tracking several fraud schemes leveraging COVID-19 vaccine-themed emails. The schemes include business email compromise scams, messages with malicious attachments and phishing emails designed to harvest credentials.

article thumbnail

Why OpenText has so much to offer the Healthcare sector

OpenText Information Management

This is a pivotal moment for the Healthcare sector. We have just gone through a period of incredible disruption. Content will be increasingly critical as organizations strive to improve operations and better understand and personalize the patient journey. COVID-19 has added fuel to the fire in Healthcare’s move toward digital transformation. Many of the significant changes we need to make because of the pandemic are forcing us to embrace new solutions quickly.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

NZ Reserve Bank Governor Says He 'Owns' Breach

Data Breach Today

Flaw in Accellion's File Transfer Appliance Likely Led to Incident The governor of New Zealand's Reserve Bank says he "personally owns" responsibility for a data breach that exposed private and sensitive stakeholder information. The breach came after a serious vulnerability was disclosed in December in Accellion's File Transfer Appliance, which the bank uses.

More Trending

article thumbnail

Iranian Cyber Operation Posts Threats

Data Breach Today

FBI: 'Enemies of the People' Campaign Threatens US Officials Through Emails, Text Messages The FBI is warning that an Iranian-linked cyber operation called "Enemies of the People" continues to threaten federal and state officials as well U.S. civilians via emails and text messages.

193
193
article thumbnail

Trump’s Worst, Most Bizarre Statements About ‘the Cyber’

WIRED Threat Level

Over the course of his presidency, he managed to be consistently wrong, outrageous, and dangerous in equal measure. We look back at his most notorious remarks.

Security 113
article thumbnail

Is a U.S. National Privacy Law on the Horizon?

Data Breach Today

The prospects for passing a U.S. privacy law will improve under the Biden administration, predicts attorney Kirk Nahra, who offers a legislative outlook.

Privacy 173
article thumbnail

Rob Joyce is the new NSA Cyber Director

Security Affairs

The U.S. National Security Agency has appointed Rob Joyce as the agency’s new director of cybersecurity, who has long experience in US cybersecurity. The National Security Agency (NSA) has appointed US cybersecurity official Rob Joyce as the new chief of the Cybersecurity Directorate. Joyce served as the NSA’s top representative in the UK since 2018, he is the successor of Anne Neuberger, who recently appointed Deputy National Security Advisor for Cyber and Emerging Technology for the Na

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Medical Device Security: Diagnosis Critical

Threatpost

Medical-device security has long been a challenge, suffering the same uphill management battle that the entire sprawling mess of IoT gadgets has faced.

IoT 106
article thumbnail

Hidden map on your phone shows everywhere you’ve been and the photos you took there via USA TODAY

IG Guru

Check out the article here. The post Hidden map on your phone shows everywhere you’ve been and the photos you took there via USA TODAY appeared first on IG GURU.

Risk 98
article thumbnail

Apple paid a $50,000 bounty to two bug bounty hunters for hacking its hosts

Security Affairs

A duo of white hat hackers claims to have earned $50,000 from Apple for reporting serious flaws that allowed them to company’s servers. The Indian white hat hackers Harsh Jaiswal and Rahul Maini claim to have discovered multiple flaws that allowed them to access Apple servers. The duo started focusing on Apple’s infrastructure in an attempt to emulate the success of a team of researchers composed of Sam Curry, Brett Buerhaus, Ben Sadeghipour, Samuel Erb and Tanner Barnes that reporte

IT 93
article thumbnail

Key lessons from the first major GDPR fines for cyber breaches

Privacy and Cybersecurity Law

The first headlines on the future threat of “mega fines” under the EU General Data Protection Regulation (GDPR) appeared as far back as 2016, when the text of the GDPR was first adopted by the European Parliament. Back then, major cyber and data security breaches were mentioned as prime candidates for mega fines approaching the 4% maximum. This era seemed to have finally arrived when, in 2019, the UK Information Commissioner’s Office (ICO) signalled its intention to levy fines against British Ai

GDPR 52
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

500K+ records of C-level people from Capital Economics leaked online

Security Affairs

Experts from Cyble recently found a leak of 500K+ records of C-level people from Capital Economics on a Russian-speaking forum. During a routine Darkweb monitoring, researchers from Cyble found a leak of 500K+ records of C-level people from Capital Economics on a Russian-speaking forum. CapitalEconomics.com is one of the leading independent economic research companies in the world that provides macroeconomic, financial market and sectoral forecasts and consultancy. “Upon analysis of the da

article thumbnail

Weezy gets second wind from $20m investment

Information Matters

Grocery delivery company, Weezy has raised $20m (£14.7m) in Series A funding led by Left Lane Capital. The firm offers 15 minute deliveries and will use the investment to expand Read more. The post Weezy gets second wind from $20m investment appeared first on Information Matters - Data-Driven Innovation in the UK.

52
article thumbnail

Joker’s Stash Carding Market to Call it Quits

Krebs on Security

Joker’s Stash , by some accounts the largest underground shop for selling stolen credit card and identity data, says it’s closing up shop effective mid-February 2021. The announcement came on the heels of a turbulent year for the major cybercrime store, and just weeks after U.S. and European authorities seized a number of its servers. A farewell message posted by Joker’s Stash admin on Jan. 15, 2021.

Marketing 226
article thumbnail

Why Regression Testing Matters

ForAllSecure

Regression testing is the practice of re-running functional and non-functional tests to ensure that previously developed and tested software still performs after new code commits are submitted. Inevitably, as more functions are added and more code is integrated into existing codebases, this integration of the old and new can result in new mistakes. When previously tested software does not perform successfully against previously run tests, it is called a “regression” While the practic

B2B 52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

MY TAKE: With disinformation running rampant, embedding ethics into AI has become vital

The Last Watchdog

Plato once sagely observed, “A good decision is based on knowledge and not on numbers.” . Related: How a Russian social media site radicalized U.S. youth. Th at advice resonates today, even as we deepen our reliance on number crunching — in the form of the unceasing machine learning algorithms whirring away in the background of our lives , setting in motion many of the routine decisions each of us make daily.

Education 215
article thumbnail

FBI: Disinformation Campaigns Seek to Exploit Capitol Siege

Data Breach Today

Domestic Extremists Remain Principal Threat Ahead of Biden Inauguration, FBI Warns The U.S. Capitol siege and the impeachment of President Trump are being exploited for disinformation purposes ahead of inauguration day by Russia, Iran and China, a U.S. joint threat assessment reportedly warns. But in terms of violence, domestic extremists are the principal threat.

278
278
article thumbnail

Belgium: Digital fingerprints on ID cards – no violation of the right to privacy according to the Belgian Constitutional Court

DLA Piper Privacy Matters

Heidi Waem , Emma Stockman. On 14 January 2021, the Belgian Constitutional Court delivered a highly anticipated judgment on the legality of the integration of the digital format of two fingerprints in ID cards, introduced through Article 27 of the Belgian law of 25 November 2018. After a balancing of interests, the Court ruled that the inclusion of digital fingerprints on ID cards does not violate the fundamental right to respect for private life, thereby providing clarity on a heavily criticize

Privacy 98