Wed.Feb 23, 2022

article thumbnail

Driving business transformation in a digital-first world

Collibra

Recent changes have transformed both the accumulation of and demand for critical business data. In the last few years, the available pool of data has grown exponentially, both in the raw amount and in the variety of sources. At the same time, driven by both Covid and the desire to improve the work/life balance of employees, the variety of employee work situations has grown far more complex and challenging.

article thumbnail

Three Ways to Protect Unfixable Security Risks

eSecurity Planet

How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive recertification rack with control software that only runs on Windows XP? These are not uncommon risks. The devices themselves can’t be secured, but that doesn’t mean we can’t use basic IT techniques to reduce our security risks.

Risk 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bypassing Apple’s AirTag Security

Schneier on Security

A Berlin-based company has developed an AirTag clone that bypasses Apple’s anti-stalker security systems. Source code for these AirTag clones is available online. So now we have several problems with the system. Apple’s anti-stalker security only works with iPhones. (Apple wrote an Android app that can detect AirTags, but how many people are going to download it?

Security 115
article thumbnail

Researchers shared technical details of NSA Equation Group’s Bvp47 backdoor

Security Affairs

Pangu Lab researchers disclosed details of the Bvp47 backdoor that was used by the US NSA Equation Group. Researchers from The China’s Pangu Lab have disclosed details of a Linux top-tier APT backdoor, tracked as Bvp47, which is associated with the U.S. National Security Agency (NSA) Equation Group. The name “ Bvp47 ” comes form numerous references to the string “Bvp” and the numerical value “0x47” used in the encryption algorithm.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How to Protect Company Data & Assets When Employees Leave

eSecurity Planet

The Great Resignation has left many companies reeling, experiencing a higher turnover rate than ever before. And while this is causing major problems for HR, it could also lead to underlying security issues. Employees carry with them a lot of knowledge about how to access company systems, and that knowledge doesn’t just go away when they leave. Around 58 percent of IT and security professionals are concerned about the knowledge former employees have about accessing company infrastructure.

Access 109

More Trending

article thumbnail

Hiding Devices Using Port Knocking or Single-Packet Authorization (SPA)

eSecurity Planet

Invisibility sounds like something out of a fantasy novel, but if done properly, we can use it to hide computers, gateways, or individual PCs by implementing specific firewall techniques like port knocking or single-packet authorization (SPA). The effectiveness of the technique has a lot in common with the traditional fantasy concept of invisibility and will be more effective in some situations and less effective in others.

Honeypots 105
article thumbnail

Texas Attorney General Investigates TikTok for Potential Child Privacy Violations and Facilitation of Human Trafficking

Hunton Privacy

On February 18, 2022, the Texas Attorney General’s Office (the “Texas AG”) announced that it had issued two Civil Investigative Demands (“CIDs”) to TikTok Inc. The Texas AG’s investigation focuses on TikTok’s alleged violations of children’s privacy and facilitation of human trafficking, along with other potential unlawful conduct. In relevant part, the CIDs seek information and documents related to TikTok’s policies and practices with respect to how the company identifies, addresses and prevent

Privacy 102
article thumbnail

California Privacy Agency: CPRA Regs Not Likely Until Late 2022

Data Matters

Final regulations implementing the California Privacy Rights Act (CPRA) may not be issued until Q3 or Q4 2022, as reported by Executive Director Soltani of the California Privacy Protection Agency (“CalPPA”) at its February 17th Board meeting. This means that businesses subject to CPRA will not have regulatory guidance on how to implement the CPRA until just months, or possibly weeks, before the law goes into effect on January 1, 2023, assuming the regulations are finalized before the effective

Privacy 88
article thumbnail

Horde Webmail Software is affected by a dangerous bug since 2012

Security Affairs

Experts found a nine-year-old unpatched flaw in the Horde Webmail software that could allow access to email accounts. A feature in the Horde Webmail is affected by a nine-year-old unpatched security vulnerability that could be abused to gain complete access to email accounts simply by previewing an attachment. Horde Webmail is a free, enterprise-ready, and browser-based communication suite developed by the Horde project.

Access 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Samsung Shattered Encryption on 100M Phones

Threatpost

One cryptography expert said that 'serious flaws' in the way Samsung phones encrypt sensitive material, as revealed by academics, are 'embarrassingly bad.'.

article thumbnail

EU Regulatory Data Protection: A first appraisal of the European Commission’s proposal for a ‘Data Act’

DLA Piper Privacy Matters

By: Heidi Waem, Simon Verschaeve. The European Commission today presented its second instrument in the European Data Strategy; a “Regulation on harmonised rules on fair access to and use of data”, better known as the Data Act. After the adoption of the Digital Governance Act (DGA) at the end of 2021, which essentially defines the data-sharing architecture, this proposal seeks to introduce rules regarding data sharing, access to and reuse of data, contractual terms for data sharing and use, compe

GDPR 97
article thumbnail

Sophos linked Entropy ransomware to Dridex malware. Are both linked to Evil Corp?

Security Affairs

The code of the recently-emerged Entropy ransomware has similarities with the one of the infamous Dridex malware. The recently-emerged Entropy ransomware has code similarities with the popular Dridex malware. Experts from Sophos analyzed the code of Entropy ransomware employed in two distinct attacks. “A pair of incidents at different organizations in which attackers deployed a ransomware called Entropy were preceded by infections with tools that provided the attackers with remote access —

article thumbnail

Why Passwordless Is at an Impasse

Dark Reading

Many widely used business applications aren't built to support passwordless login because identity and authentication remain siloed.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

US and UK link new Cyclops Blink malware to Russian state hackers?

Security Affairs

UK and US cybersecurity agencies linked Cyclops Blink malware to Russia’s Sandworm APT. US and UK cybersecurity and law enforcement agencies published a joint security advisory about a new malware, dubbed Cyclops Blink, that has been linked to the Russian-backed Sandworm APT group. Sandworm (aka BlackEnergy and TeleBots) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST).

article thumbnail

Ransomware Trained on Manufacturing Firms Led Cyberattacks in Industrial Sector

Dark Reading

Meanwhile, a few "alarming" infiltrations of OT networks by previously unknown threat groups occurred last year as well.

article thumbnail

Collecting multiple community viewpoints after a crime

IBM Big Data Hub

Seeing George Floyd have his breath forcibly taken from him in 2020 left me with a strong urge to act. But what could I do? Inside of IBM, the Black community and allies decided to use data and technology to turn the frustration of #BlackLivesMatter into something that can actually make a difference. I felt compelled to join in. Through a design thinking workshop, I got enthused about the idea of using AI to gather and process the various viewpoints that occur after a crime in a community.

article thumbnail

Russia’s Sandworm Hackers Have Built a Botnet of Firewalls

WIRED Threat Level

Western intelligence services are raising alarms about Cyclops Blink, the latest tool at the notorious group’s disposal.

Security 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

What Does Least Privilege Access Mean for Cloud Security?

Dark Reading

While traditional security controls are necessary at the perimeter, organizations also need to prevent malicious privileged access.

Access 89
article thumbnail

Inside the Lab Where Intel Tries to Hack Its Own Chips

WIRED Threat Level

Researchers at iSTARE have to think like the bad guys, finding critical flaws before processors go to production.

IT 90
article thumbnail

CISA Warns of New Malware Framework Used by Russian 'Sandworm' Hacking Team

Dark Reading

Russian General Staff Main Intelligence Directorate (GRU) hacking team appears to have swapped its VPNFilter malware platform for the so-called Cyclops Blink malware framework.

IT 79
article thumbnail

Creaky Old WannaCry, GandCrab Top the Ransomware Scene

Threatpost

Nothing like zombie campaigns: WannaCry's old as dirt, and GandCrab threw in the towel years ago. They're on auto-pilot at this point, researchers say.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Tales from the Dark Web, Part 3: How Criminals Monetize Ransomware

Dark Reading

Ransomware operators rely on cryptocurrency and other payment schemes to keep their activities under the radar and harder to trace.

article thumbnail

Legal Operations and KPIs: Where to Start via JDSupra

IG Guru

Check out the article here. The post Legal Operations and KPIs: Where to Start via JDSupra appeared first on IG GURU.

article thumbnail

New Data-Wiping Malware Discovered on Systems in Ukraine

Dark Reading

Researchers were scrambling to analyze a newly discovered piece of data-wiping malware found in the wild.

97
article thumbnail

Sextortion Rears Its Ugly Head Again

Threatpost

Attackers are sending email blasts with malware links in embedded PDFs as a way to evade email filters, lying about having fictional "video evidence.

IT 66
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Automakers Need to Lock Their Doors Against Ransomware

Dark Reading

Issues with patch management and other security practices leave auto manufacturers open to attacks.

article thumbnail

Gartner identifies Jamf + ZTNA to keep your network communications safe

Jamf

In Gartner’s Market Guide for Zero Trust Network Access (ZTNA) , the consulting firm identifies the growth of ZTNA technology and a motivation to replace legacy VPN solutions to further reduce risk. Discover how Jamf Private Access achieves this while providing flexible, secure connectivity for modern computing devices and remote/hybrid environments.

article thumbnail

Microsoft Debuts Unified Service for Multicloud ID Management

Dark Reading

With nine in 10 companies adopting a multicloud strategy, service providers are focused on finding ways to support the management and security efforts of businesses that rely on multiple cloud resources.

Cloud 84