Thu.Jun 25, 2020

article thumbnail

US Now Accuses Assange of Conspiring With Hacking Groups

Data Breach Today

Superseding Indictment Expands Scope of Case, But Doesn't Add Charges The U.S Department of Justice unsealed a superseding indictment against WikiLeaks founder Julian Assange that expands the scope of the government's case against him. Federal prosecutors now allege that Assange conspired with the Anonymous and LulzSec groups to obtain classified information to publish.

article thumbnail

Microsoft issues guidance to defend Exchange servers under attack

Security Affairs

Microsoft researchers are warning of attacks against Exchange servers and published guidance on how to defend them. Microsoft’s Defender ATP Research Team released guidance on how to defend against attacks targeting Exchange servers with the use of behavior-based detection. Microsoft researchers analyzed multiple campaigns targeting Exchange servers in early April which showed how the malicious actors deploying web shells them.

Access 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker Group Stole $200 Million From Cryptocurrency Exchanges

Data Breach Today

Researchers: 'CryptoCore' Group Used Spear-Phishing Emails to Lure Victims A hacking group dubbed CryptoCore has stolen more than $200 million in virtual currency from several cryptocurrency exchanges over the past two years, the security firm ClearSky Cyber Security reports.

Phishing 262
article thumbnail

I think, therefore I modernize: introducing Enterprise Suite 6.0

Micro Focus

I need to change – IT needs to change Rapid and large-scale IT change is a very costly exercise. Worse still, it is fraught with risk, the IT world beset with uncomfortable stories of failed transformational programs. CIOs can ill-afford such risk. By reusing valuable, trusted core applications and data, a smarter approach is available. View Article.

Risk 128
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

European Bank Targeted in Massive Packet-Based DDoS Attack

Data Breach Today

Akamai Describes Unusual Approach Taken in This Incident A massive DDoS attack generating 809 million packets per second was recently directed against a large European bank, according to the security firm Akamai, which describes in a new report the unusual approach the attackers took.

Security 252

More Trending

article thumbnail

IBM’s Cloud Pak for Data helps Wunderman Thompson build guideposts for reopening

IBM Big Data Hub

As communities and businesses worldwide look to understand the economic impact of COVID-19 and prepare for an eventual recovery, the biggest test of decision-making will be the data that will inform the business decisions. Was it trusted? Was it timely? Was it enough? To date, there are many efforts to release COVID-19 dashboards that can give us a hint on what to do next.

Cloud 120
article thumbnail

Nvidia Warns Windows Gamers of Serious Graphics Driver Bugs

Threatpost

Several high-severity flaws in Nvidia's GPU display drivers for Windows users could lead to code-execution, DoS and more.

Security 145
article thumbnail

Interview: Streamlining the student experience with Jamf and AppConfig

Jamf

This interview with Matt Green, is an Apple System Administrator at Lubbock-Cooper ISD, outlines his use of a powerful yet rarely-discussed feature of MDM: Managed App Configuration. We sat down with Matt to discuss the apps that are helping in this time of distance learning, and the power that AppConfig brings to admins.

MDM 105
article thumbnail

Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

Threatpost

Threat actors shift focus from COVID-19 to employee coronavirus training and current events like Black Lives Matter as cyber-attacks continue to rise.

Phishing 115
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Akamai mitigated the largest ever PPS DDoS attack

Security Affairs

Akamai announced to have mitigated a record distributed denial-of-service (DDoS) attack that hit a European bank. Akamai revealed that a bank in Europe was hit by a massive distributed denial-of-service (DDoS) attack that peaked a record 809 million packets per second (PPS). “On June 21, 2020, Akamai mitigated the largest packet per second (PPS) distributed denial-of-service (DDoS) attack ever recorded on the Akamai platform.

Cloud 108
article thumbnail

BREAKING: The CPRA Is Eligible for the November 2020 Ballot

Hunton Privacy

According to a memorandum issued by the California Secretary of State on June 24, 2020, the California Privacy Rights Act (“CPRA”) has garnered enough signatures to be placed on the State’s General Election ballot this November 3, 2020. As we previously reported , the CPRA would amend the California Consumer Privacy Act of 2018 (“CCPA”) to create new and additional privacy rights and obligations in California.

B2B 104
article thumbnail

Maze ransomware operators claim to have breached LG Electronics

Security Affairs

Maze ransomware operators claims to have breached the South Korean multinational electronics company LG Electronics. Researchers at Cyble discovered a data leak of LG Electronics published by Maze ransomware operators. “As part of our regular darkweb monitoring, our researchers came across the data leak of LG Electronics been published by the Maze ransomware operators.

article thumbnail

Now is the Time for “Moments-Based Marketing”

Reltio

Have a moment? That’s exactly what your customers want. Customers expect companies with which they do business to be quick, timely, and helpful in the precise moment of interaction. Your ability to make that happen relies on identifying and understanding individual customers to provide well-timed, relevant value across any channel, device, or touchpoints to the consumer.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

EU: EU Commission publishes its evaluation of GDPR

DLA Piper Privacy Matters

Rachel de Souza and Anne-Gabrielle Haie. On 24 June, the European Commission published its evaluation report of the GDPR, just over two years after the GDPR become applicable. The Commission’s report, indicates that the GDPR has met most of its objectives, in particular in relation to individual enforceable rights and by creating a new European system of governance and enforcement.

GDPR 98
article thumbnail

Businesses to Assist NHS Test and Trace Efforts

Hunton Privacy

The UK Prime Minister, Boris Johnson, announced on June 23, 2020, that restrictions relating to COVID-19 would be eased as of July 4. Although many measures remain in place to prevent the virus’ spread, certain businesses, including restaurants and pubs, will be able to reopen in the UK, with the recommendation that staff-customer contact be minimized.

article thumbnail

GERMANY: Federal Court summary judgment: FCO achieves stage victory against Facebook

DLA Piper Privacy Matters

In the eagerly awaited decision in the proceedings against Facebook for abuse of a dominant position ( KVR 69/19 – decision of 23 June 2020 ), the German Federal Court of Justice (“FCJ”) provisionally confirmed the decision of the German Federal Cartel Office (“FCO”). According to the FCJ, there were no serious doubts that Facebook was abusing its dominant position with the terms of use prohibited by the FCO.

article thumbnail

WikiLeaks founder Julian Assange faces superseding indictment for conspiring with LulzSec hackers

Security Affairs

WikiLeaks founder Julian Assange attempted to recruit hackers at conferences in Europe and Asia who could have stolen info for his anti-secrecy site, states DoJ. US Department of Justice claims Julian Assange tried to recruit hackers at conferences in Europe and Asia to steal classified information on his behalf and that could have been published on his anti-secrecy website.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

UK: New COVID-19 rules for the hospitality industry on collecting visitor contact information : Data protection considerations

DLA Piper Privacy Matters

Andrew Dyson, Alexa Smith. The hospitality industry has been hard hit by COVID-19. Measures introduced this week by the UK government to ease restrictions for the sector come with a condition – if you open a pub, restaurant or other hospitality venue for business you must keep a record of patrons who visit and be ready to help with the national test and trace effort.

GDPR 98
article thumbnail

Analyzing IoT Security Best Practices

Schneier on Security

New research: " Best Practices for IoT Security: What Does That Even Mean? " by Christopher Bellman and Paul C. van Oorschot: Abstract: Best practices for Internet of Things (IoT) security have recently attracted considerable attention worldwide from industry and governments, while academic research has highlighted the failure of many IoT product manufacturers to follow accepted practices.

IoT 124
article thumbnail

BARC names IBM a market leader in integrated planning & analytics

IBM Big Data Hub

The Business Application Research Center ( BARC ) is an independent company and guarantees neutrality towards all software vendors.

Analytics 101
article thumbnail

Nationwide Facial Recognition Ban Proposed By Lawmakers

Threatpost

Lawmakers proposed a new bill that would ban the use of facial recognition by law enforcement nationwide.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

French Council of State Upholds €50m CNIL Fine against Google

Data Matters

On June 19, 2020, the French Conseil d’État (“ Council of State ”) issued a decision upholding the €50 Million fine imposed against Google LLC by the French Supervisory Authority (the “ CNIL ”). On January 21, 2019, the French CNIL had issued a fine against Google’s U.S. headquarters for failure to comply with the EU General Data Protection Regulation’s (“ GDPR ”) fundamental principles of transparency and legitimacy.

GDPR 74
article thumbnail

Golang Worm Widens Scope to Windows, Adds Payload Capacity

Threatpost

A first-stage malware loader spotted in active campaigns has added additional exploits and a new backdoor capability.

article thumbnail

How Thousands of Misplaced Emails Took Over This Engineer's Inbox

WIRED Threat Level

Kenton Varda gets dozens of messages a day from Spanish-speakers around the world, all thanks to a Gmail address he registered 16 years ago.

article thumbnail

Another Record-Breaking DDoS Attack Signals Shift in Criminal Methods

Dark Reading

Malicious botnet sources explode in new attacks that push boundaries in terms of volume and duration.

102
102
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What’s new in OpenText Media Management Cloud Edition (CE) 20.2

OpenText Information Management

All organizations are faced with increasing demands for images and video for marketing and operational purposes. Managing higher volumes, larger file sizes, more diverse formats, new content providers and proliferating distribution channels requires robust and efficient processes. The need for a highly capable and versatile Digital Asset Management platform has never been greater.

Cloud 67
article thumbnail

Vulnerabilities Declining in Open Source, But Slow Patching Still a Problem

Dark Reading

Even as more code is produced, indirect dependencies continue to undermine security.

Security 140
article thumbnail

Senator Brown Unveils Discussion Draft of Comprehensive Privacy Bill

Hunton Privacy

On June 18, 2020, Senator Sherrod Brown (OH) released a discussion draft of a privacy bill entitled the Data Accountability and Transparency Act of 2020 (“the Bill”). The Bill would provide individuals with several new rights regarding their personal data; implement rules limiting how personal data is collected, used or shared; and establish a new federal agency called the Data Accountability and Transparency Agency to protect individuals’ privacy and enforce those rules.

Privacy 65