Fri.May 08, 2020

article thumbnail

Zoom's NY Settlement Spells Out Security Moves

Data Breach Today

Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption Company Zoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company.

Security 249
article thumbnail

Meant to Combat ID Theft, Unemployment Benefits Letter Prompts ID Theft Worries

Krebs on Security

Millions of Americans now filing for unemployment will receive benefits via a prepaid card issued by U.S. Bank , a Minnesota-based financial institution that handles unemployment payments for more than a dozen U.S. states. Some of these unemployment applications will trigger an automatic letter from U.S. Bank to the applicant. The letters are intended to prevent identity theft, but many people are mistaking these vague missives for a notification that someone has hijacked their identity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hackers Try to Sell 26 Million Breached Records: Report

Data Breach Today

Data Apparently Obtained From Three Breaches, ZeroFox Reports Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.

article thumbnail

Report: Microsoft’s GitHub Account Gets Hacked

Threatpost

The Shiny Hunters hacking group said it stole 500 GB of data from the tech giant’s repositories on the developer platform, which it owns.

IT 143
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Data Breach Today

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.

More Trending

article thumbnail

Testing Medical Device Security During COVID-19 Crisis

Data Breach Today

As manufacturers - including companies such as automakers that do not typically produce healthcare devices - race to help fill medical equipment shortages during the COVID-19 crisis, steps must be taken to ensure adequate security testing, says Fairuz Rafique of cybersecurity services firm EmberSec.

article thumbnail

Massive cyber attack forced Ruhr University Bochum (RUB) to shut down its IT infrastructure

Security Affairs

Ruhr University Bochum (RUB) shuts down a large portion of its central IT infrastructure between May 6 and May 7, 2020. The Ruhr University Bochum (RUB), German, announced today that it was forced to shut down parts of its central IT infrastructure due to a cyber attack that took place overnight, between May 6 and May 7. “Due to considerable technical problems in the IT infrastructure, a large number of systems have not been available since around 8 a.m. on Thursday, May 7, 2020.

IT 105
article thumbnail

Analysis: The Contact-Tracing Conundrum

Data Breach Today

The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.

Privacy 185
article thumbnail

'What have we got to lose?': Isle of Wight responds to NHS app

The Guardian Data Protection

Reactions on Covid-19 contact-tracing app range from wanting to help to worries over digital knowledge Coronavirus – latest updates See all our coronavirus coverage It has been billed as key to getting Britain back on its feet to help navigate a future way of life post-lockdown. But before the new Covid-19 contact-tracing app is rolled out across the UK this month, it must pass a pilot on the Isle of Wight where it appears to have got off to a bumpy start – with emerging signs of a generational

IT 88
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft investigates claims that its GitHub account has been hacked

Security Affairs

Microsoft confirmed that it is investigating claims that its GitHub account has been hacked after some of its files were leaked online. Microsoft launched an investigation into the claims that its GitHub account has been hacked. Recently some files allegedly stolen from the Microsoft Github account have been leaked online, and they appear to be legitimate.

IT 97
article thumbnail

Used Tesla Components Contain Personal Information

Schneier on Security

Used Tesla components, sold on eBay, still contain personal information , even after a factory reset. This is a decades-old problem. It's a problem with used hard drives. It's a problem with used photocopiers and printers. It will be a problem with IoT devices. It'll be a problem with everything, until we decide that data deletion is a priority.

IoT 118
article thumbnail

Hackers Breach 3.5 Million MobiFriends Dating App Credentials

Threatpost

The emails, hashed passwords and usernames of 3.5 million users of the dating app MobiFriends were put up for sale on an underground forum.

Sales 97
article thumbnail

Cisco fixes High Severity issues in ASA and FTD products

Security Affairs

Cisco addresses tens of flaws in multiple products, including 12 high severity issues in Adaptive Security Appliance and Firepower Threat Defense. Cisco released security updates to address 34 flaws in multiple products , including 12 high severity vulnerabilities that affect Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD). Most of the vulnerabilities fixed by Cisco are denial of service.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Defcon Is Canceled

WIRED Threat Level

For real this time. Its sister conference, Black Hat, has also been called off.

IT 118
article thumbnail

COVID-19 – Return to Work: European and U.S. Privacy and Employment Law Issues

Data Matters

The novel COVID-19 global pandemic continues to raise numerous issues for employers and consequences for employees across all industries. This situation is without precedent in modern times and is extremely dynamic with rapidly occurring new developments, guidance and issues that will impact employers. In this webinar, we consider the privacy and employment law issues for employees returning to work, and discuss strategies to deal with this situation in a holistic and coordinated manner.

Privacy 68
article thumbnail

Podcast: Shifting Cloud Security Left With Infrastructure-as-Code

Threatpost

Companies are looking to "shift left" with Infrastructure-as-Code (IaC) security capabilities to improve developer productivity, avoid misconfigurations and prevent policy violations.

Cloud 71
article thumbnail

How EnCase + AI computer vision makes investigations faster

OpenText Information Management

The sheer volume of video and image content shared online is staggering. CISCO estimates that this year there will be close to a million minutes of video crossing the internet per second. By 2022, online videos will make up more than 82% of all consumer internet traffic (an increase of 15x in just 5 years). … The post How EnCase + AI computer vision makes investigations faster appeared first on OpenText Blogs.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Companies Struggle for Effective Cybersecurity

Dark Reading

The money companies are spending on cybersecurity tools doesn't necessarily result in better security, a new survey shows.

article thumbnail

Webinar on the Key Privacy Considerations for Reopening Businesses in the EU

Hunton Privacy

Join us on May 19, 2020, for an in-depth webinar on the Key Privacy Considerations for Reopening Businesses in the EU. Our featured speakers, Hunton Brussels lawyers Claire François and Laura Léonard , will highlight key data protection issues that arise in connection with the measures employers may take to limit or prevent the spread of COVID-19, including: The types of health information that may be collected from employees and visitors; Measures to consider when processing that information; a

Privacy 62
article thumbnail

As Remote Work Becomes the Norm, Security Fight Moves to Cloud, Endpoints

Dark Reading

A majority of firms expect to keep more employees working remotely post-pandemic, forcing businesses to undertake more comprehensive digital and cloud transformations.

Cloud 97
article thumbnail

Data Citizens ‘20: A message from Fleur Sohtz, CMO

Collibra

To our Collibra community, Each year, I look forward to our flagship Data Citizens event because I love connecting with our community, learning from each other and sharing experiences. While I will miss the opportunities in-person events offer, we have seen incredible responses to our virtual events and I’m looking forward to seeing you online at Data Citizens ‘20: A Digital Experience.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

DocuSign Phishing Campaign Uses COVID-19 as Bait

Dark Reading

The newly discovered campaign lures victims with a supposed file concerning the coronavirus pandemic.

article thumbnail

COUNTDOWN TO IBM THINK WITH IBM CHAMPION SAGHI AMIRSOLEYMANI

Rocket Software

This year, a record-breaking number of Rocket employees were named as 2020 IBM Champions—13 to be exact. To celebrate our ongoing partnership with IBM, and our dedication to innovation, legacy technologies and legendary results, we want to highlight them. . Over the next weeks, we will count down to IBM THINK with each of the 2020 Champions, and celebrate what we love about our partnership with IBM!

article thumbnail

Planning Ahead for a Secure SAP S/4HANA Migration

Dark Reading

Experts say that the pressure to move to SAP's next-gen platform can be a big opportunity to move the needle on ERP cybersecurity.

article thumbnail

Recorded Webinar Available Cybersecurity in an Uncertain World: New Ways to Confront New Ransomware Threats” via GovTech

IG Guru

Thank you for recently attending the Government Technology Webinar entitled “Cybersecurity in an Uncertain World: New Ways to Confront New Ransomware Threats” If you’d like to view the recorded session or pass the link along to any colleagues that you might feel would be interested as well, access the session here: [link] We hope to […].

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why DevSecOps Is Critical for Containers and Kubernetes

Dark Reading

DevSecOps is a big and sometimes difficult shift for organizations. The key to success? Take small steps.

103
103
article thumbnail

Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders

Information Governance Perspectives

Earlier this month I had the honor and privilege of speaking at the MERv conference with Dr. Gregory S. Hunter, Dr. Tao Jin, Dr. Patricia Franks, Rae Lynn Haliday, Cheryl Pederson, and Wendy McLain on the topic of Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders. In response to requests, below are some excerpts from my transcribed remarks.

article thumbnail

CELEBRATING OUR IBM CHAMPIONS: SAGHI AMIRSOLEYMANI

Rocket Software

This year, a record-breaking number of Rocket employees were named as 2020 IBM Champions—13 to be exact. To celebrate our ongoing partnership with IBM, and our dedication to innovation, legacy technologies and legendary results, we want to highlight them. . Over the next weeks, we will count down to IBM THINK with each of the 2020 Champions, and celebrate what we love about our partnership with IBM!