Mon.Nov 04, 2019

article thumbnail

BlueKeep Attacks Arrive, Bearing Cryptomining Malware

Data Breach Today

Exploit Isn't a Worm, but Experts Remain Braced for Mayhem The cybersecurity community had been holding its breath in anticipation of mass attacks targeting the severe BlueKeep vulnerability in Windows, which Microsoft has patched. The first in-the-wild exploits have now been seen, although they don't appear to constitute an emergency - at least yet.

article thumbnail

NEW TECH: Can an ‘operational system of record’ alleviate rising knowledge worker frustrations?

The Last Watchdog

An undercurrent of discontent is spreading amongst knowledge workers in enterprises across the United States and Europe. Related: Phishing-proof busy employees White collar employees today have amazingly capable communications and collaboration tools at their beck and call. Yet the majority feel unsatisfied with narrow daily assignments and increasingly disconnected from the strategic goals of their parent organization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese APT Group Targets Mobile Networks: FireEye Mandiant

Data Breach Today

New Malware 'Messagetap' Intercepts Communications for Espionage, Researchers Say The Chinese advanced threat group APT41 is using a new espionage tool to intercept SMS messages from specific phone numbers by infecting mobile telecommunication networks, according to the security firm FireEye Mandiant.

article thumbnail

Website Cookie Consent: Is the Cookie Starting to Crumble?

Data Matters

Two important decisions have recently occurred relating to website operators’ use of cookies. First, the Court of Justice of the European Union (the “ CJEU ” or the “ Court ”) has issued its judgement in Planet49, a case which looked at the standards of consent and transparency for the use of cookies and similar technologies in the context of the e-Privacy Directive and the GDPR and determined that opt-out consent, by way of a pre-ticked checkbox, was insufficient to obtain GDPR-standard consen

GDPR 76
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

ICO: UK Police Should Go Slow on Facial Recognition

Data Breach Today

Commissioner Elizabeth Denham Also Calls for Creating a 'Code of Practice' Elizabeth Denham, the U.K.'s chief privacy watchdog, is urging police to go slow when it comes to using live facial recognition. She also calls on the government to create a statutory code of practice for police use of the technology.

Privacy 133

More Trending

article thumbnail

Italy's UniCredit: Breach Went Undetected for Four Years

Data Breach Today

Incident Exposed Contact Information for 3 Million Italians, Bank Reports UniCredit, an Italian banking and financial services company, sustained a data breach exposing information on 3 million customers that went undetected for four years, the company has acknowledged. Find out what data was exposed.

article thumbnail

Addressing the skills shortage in security

OpenText Information Management

Cybersecurity incidents currently represent one of the biggest threats to organizations. Yet in today’s enterprise security landscape, security leaders have the impossible job of providing security to an organization with increasingly limited resources – including a skills shortage that seems to be on the rise. Cybersecurity Ventures predicts that there will be an astounding 3.5 … The post Addressing the skills shortage in security appeared first on OpenText Blogs.

article thumbnail

Ransomware Gangs' Not-So-Secret Attack Vector: RDP Exploits

Data Breach Today

But RDP Attack Overuse Leads Other Hackers Back to Botnets, Researchers Find Many ransomware-wielding attackers continue to hack into organizations via remote desktop protocol. But some Sodinokibi ransomware-as-a-service affiliates have shifted instead to targeting victims via botnets, saying hackers' use of RDP exploits has grown too common.

article thumbnail

QSnatch malware already infected thousands of QNAP NAS devices

Security Affairs

Security experts warn of a new piece of malware dubbed QSnatch that already infected thousands of QNAP NAS devices worldwide. A new piece of malware dubbed QSnatch is infecting thousands of NAS devices manufactured by the Taiwanese vendor QNAP. The name comes after the target vendor and the “snatching” activity the malware performs. According to the German Computer Emergency Response Team (CERT-Bund), over 7,000 devices have been infected in Germany alone.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Norsk Hydro Breach: Update on Insurance Coverage

Data Breach Today

So Far, Insurance Has Paid $3.6 Million, But More Anticipated So far, Norweigan aluminum company Norsk Hydro has received just $3.6 million from its cyber insurer to cover expenses related to the LockerGoga ransomware attack it suffered in March that led to losses of $50 million to $71 million, the company revealed in its third quarter report.

Insurance 124
article thumbnail

Off the Record: Texting

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes. No, we didn’t write these articles —hence the name of this series, “Off the Record”— but fortunately, we didn’t need to in order to share the knowledge with our subscribers.

article thumbnail

Eye Clinic Notifies Thousands About 2018 Breach

Data Breach Today

Patient Portal Incident Involved Third-Party Vendor A Utah eye clinic began notifying thousands of patients last week about a 2018 breach involving a third-party portal provider. What should other healthcare organizations learn from this incident?

113
113
article thumbnail

How AI is helping to rethink citizen services

OpenText Information Management

Everyone knows what it’s like to deal with a government contact center: listening to recorded messages and being pushed from pillar to post without any resolution. Today, people expect better from their government agencies, but governments and public sector bodies must balance shrinking budgets with these rising expectations. Transforming services without increasing resources means working … The post How AI is helping to rethink citizen services appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How HR and IT Can Partner to Improve Cybersecurity

Dark Reading

With their lens into the human side of business, human resources can be an effective partner is the effort to train employees on awareness and keep an organization secure.

article thumbnail

Hackers Can Use Lasers to ‘Speak’ to Your Amazon Echo or Google Home

WIRED Threat Level

By pointing lasers tuned to a precise frequency at a smart assistant, researchers could force it to unlock cars, open garage doors, and more.

IT 79
article thumbnail

Top Application Security Products

eSecurity Planet

Application security is a widespread problem. These security tools can help find and fix application vulnerabilities before hackers exploit them.

article thumbnail

New Gartner reports provide essential insight into evolving Content Services landscape

OpenText Information Management

The respected analysts at Gartner have just released their annual assessments of the ECM/content services sector: 2019 Gartner Magic Quadrant for Content Services Platforms 2019 Gartner Critical Capabilities for Content Services Platforms Both are highly recommended reading for everyone involved in content management. The Magic Quadrant for Content Services Platforms offers a higher-level view—assessing 18 … The post New Gartner reports provide essential insight into evolving Content Servi

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

‘Human-friendly’ organizations will thrive in the digital age

DXC Technology

Automation and intelligent machines are an increasing presence in the workplace, yet organizations still need humans as much as ever to engage with customers, make business decisions, manage supply chains, do community outreach, and more. Indeed, there is a growing awareness in the enterprise world that successful organizations must strive to be as “human-friendly” as […].

56
article thumbnail

Two unpatched RCE flaws in rConfig software expose servers to hack

Security Affairs

The popular rConfig network configuration management utility is affected by two critical remote code execution flaws that have yet to be patched. rConfig is a completely open-source, network configuration management utility used to validate and manage network devices, including switches, routers, firewalls, and load-balancer. The cyber security expert Mohammad Askar has discovered two critical remote code execution vulnerabilities in the rConfig utility, it also published proof-of-concept expl

article thumbnail

Assessing the impact of GDPR on traditional data management practices

Information Management Resources

By being aware of the state of regulatory issues, teams can remain innovative with how they use underlying data while still having the processes in place to stay compliant.

GDPR 59
article thumbnail

Flaws in Able2Extract Professional tool allow hacking targeted machine with malicious image files

Security Affairs

Researchers found serious flaws in Investintech’s Able2Extract Professional tool that could be exploited to execute arbitrary code using specially crafted image files. The Able2Extract Professional has over 250,000 licensed users across 135 countries, it allows them to view, convert and edit PDF files. Cisco Talos experts discovered two high-severity memory corruption vulnerabilities that can be exploited to execute arbitrary code on the targeted machine. “Cisco Talos recently discovered t

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

To Secure Multicloud Environments, First Acknowledge You Have a Problem

Dark Reading

Multicloud environments change rapidly. Organizations need a security framework that is purpose-built for the cloud and that aligns with their digital transformation strategy.

article thumbnail

GitLab plans to ban hires in China and Russia due to espionage concerns

Security Affairs

The popular code hosting platform GitLab is considering to block new hires from China and Russia due to espionage concerns. GitLab is a popular code hosting platform GitLab that is currently used by several major tech companies including IBM, Sony, NASA, Alibaba, Oracle, Invincea, Boeing, and SpaceX. The news was confirmed by Eric Johnson, VP of Engineering at GitLab, companies using GitLab fear that employees in China and Russia could operate under the control of their governments to steal thei

Access 54
article thumbnail

Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam

Threatpost

Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands.

IoT 66
article thumbnail

Ocala City in Florida lost $742,000 following BEC attack

Security Affairs

Business email compromise scam (BEC) continues to target organizations worldwide, crooks stole $742,000 from Ocala City in Florida. The City of Ocala in Florida is the last victim in order of time of a profitable business email compromise scam (BEC) attack, fraudsters redirected over $742,000 to a bank account under their control. Attackers’ emails posed as an employee of a construction company, Ausley Construction, that is providing its services to the city for the building of a new termi

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Homemade TEMPEST Receiver

Schneier on Security

Tom's Guide writes about home brew TEMPEST receivers: Today, dirt-cheap technology and free software make it possible for ordinary citizens to run their own Tempest programs and listen to what their own -- and their neighbors' -- electronic devices are doing. Elliott, a researcher at Boston-based security company Veracode, showed that an inexpensive USB dongle TV tuner costing about $10 can pick up a broad range of signals, which can be "tuned" and interpreted by software-defined radio (SDR) app

article thumbnail

Everis and Spain’s radio network Cadena SER hit by ransomware

Security Affairs

NTT DATA-owned firm Everis? is one of Spain’s largest managed service providers (MSP), it has suffered a ransomware attack, and it was not the only case. Systems at Spain’s largest managed service providers (MSP) Everis have been infected by a ransomware, and it was not alone because the also Spain’s largest radio station Cadena SER (Sociedad Española Radiodifusión) was a victim of a similar attack.

article thumbnail

Time for Another Murder (Possibly) Witnessed by Alexa: eDiscovery Trends

eDiscovery Daily

It’s been a while since we covered a good murder case with Internet of Things (IoT) implications. Here’s a new case in Florida where police have submitted a search warrant to Amazon for recordings from an Echo device in a household where a man was charged with killing his partner with a spear(!). In People ( After Fla. Woman Is Impaled by a Spear, Police Seek Clues From Amazon Alexa Recordings , written by KC Baker), the author reports that Florida police are trying to find out what – if anythi

IoT 54