Tue.Jul 14, 2020

article thumbnail

UK Reverses Course, Bans Huawei Gear From 5G Networks

Data Breach Today

U.S. Sanctions Against Chinese Firms a Factor in Decision The British government has officially reversed course and will now ban Huawei's telecom gear from its 5G networks. The ban on use of the Chinese firm's equipment, based in part on U.S. sanctions against the manufacturer, goes into effect at year's end.

article thumbnail

‘Wormable’ Flaw Leads July Microsoft Patches

Krebs on Security

Microsoft today released updates to plug a whopping 123 security holes in Windows and related software, including fixes for a critical, “wormable” flaw in Windows Server versions that Microsoft says is likely to be exploited soon. While this particular weakness mainly affects enterprises, July’s care package from Redmond has a little something for everyone.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LiveAuctioneers Confirms Breach After Records Posted for Sale

Data Breach Today

CloudSEK: 3.4 Million Customers' Records Being Marketed on Darknet Auction website LiveAuctioneers has acknowledged that it sustained a data breach in June. The announcement came after threat intelligence firm CloudSEK reported that it discovered about 3.4 million LiveAutioneers customers' records had been posted for sale on a darknet forum.

Sales 266
article thumbnail

Can You Add Teasers to Add Attention?

AIIM

Think back to middle school English classes. You were taught that your titles should summarize your main points. People should be able to get the gist of what you’re talking about by just reading the title. The problem is that what you learned in English class is wrong. You don’t want your executives or stakeholders believing they know what you’re going to say without reading what you’ve said, do you?

Sales 117
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Israeli Court Dismisses Complaint Against NSO Group

Data Breach Today

Amnesty International Accused Tech Company of Violating Human Rights An Israeli court has dismissed a petition filed by Amnesty International that sought to revoke the security export license of NSO Group, a tech firm that's been accused of selling hacking tools to governments for targeting dissidents, journalists and lawyers.

More Trending

article thumbnail

Leveraging Analytics for Fraud Audits

Data Breach Today

Forensics Expert Vincent Walden on Using Risk Scoring Data analytics can help auditors identify high-risk areas - a far better approach than relying on random samples, says forensics expert Vincent Walden.

Analytics 214
article thumbnail

CIPL Submits White Paper on Data Subject Rights

Hunton Privacy

On July 8, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth submitted its White Paper (the “Paper”) as input for the European Data Protection Board’s (the “EDPB”) future guidelines on data subject rights (“DSRs”) (the “Guidelines”). The Paper, titled “Data Subject Rights under the GDPR in a Global Data Driven and Connected World,” was drafted following the EDPB stakeholders’ event on DSR in Brussels on November 4, 2019.

Paper 108
article thumbnail

Yet Again, Vulnerabilities Found in a Router

Data Breach Today

This Time, Random Pentest Finds Five Flaws in Tenda Router It's common for security researchers to be ignored when reporting a software vulnerability. The latest example - vulnerabilities found by Independent Security Evaluators in a router made by China-based Tenda.

Security 189
article thumbnail

Leaked Details of 142 Million MGM Hotel Guests Found for Sale on Dark Web

Threatpost

Last summer’s data leak at the hotel chain appears to be far more expansive than previously thought -- or the credentials could come from a hack of DataViper.

Sales 108
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

3.4 Million user records from LiveAuctioneers hack available for sale

Security Affairs

Auctions platform LiveAuctioneers admitted to have suffered a data breach that likely impacted approximately 3.4 million users. Auctions platform LiveAuctioneers disclosed a a data breach that might have impacted approximately 3.4 million users. LiveAuctioneers is one of the world’s largest art, antiques & collectibles online marketplace that was founded in 2002.

Sales 94
article thumbnail

Critical DNS Bug Opens Windows Servers to Infrastructure Takeover

Threatpost

Microsoft gives the ‘wormable’ flaw a security rating of 10 – the most severe warning possible.

Security 119
article thumbnail

New Mirai variant includes exploit for a flaw in Comtrend Routers

Security Affairs

Researchers spotted a new version of the Mirai IoT botnet that includes an exploit for a vulnerability affecting Comtrend routers. Malware researchers at Trend Micro have discovered a new version of the Mirai Internet of Things (IoT) botnet that includes an exploit for the CVE-2020-10173 vulnerability impacting Comtrend routers. The Mirai botnet was first discovered in August 2016 by the MalwareMustDie researcher Mirai source code , two months later its source code was leaked online.

IoT 88
article thumbnail

Microsoft Warns of a 17-Year-Old ‘Wormable’ Bug

WIRED Threat Level

The SigRed vulnerability exists in Windows DNS, used by practically every small and medium-sized organization in the world.

Security 102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft Tackles 123 Fixes for July Patch Tuesday

Threatpost

Eighteen critical bugs, impacting Windows Server, Office and Outlook, were fixed as part of the patch roundup.

Libraries 107
article thumbnail

Google Moves to Secures the Cloud From Itself

WIRED Threat Level

Confidential Virtual Machines allows Google Cloud Services Customers to keep data secret—even when it's being actively processed.

Cloud 94
article thumbnail

Critical SAP Recon vulnerability exposes thousands of system to full take over

Security Affairs

IT giant SAP addressed a critical flaw, tracked as CVE-2020-6287 and dubbed RECON, that could allow attackers to take over corporate servers. SAP has released security patches to address a critical vulnerability, tracked as CVE-2020-6287 and dubbed RECON (Remotely Exploitable Code On NetWeaver), that could be exploited by attackers to take over corporate servers.

article thumbnail

Most Companies Are Ignoring Your Most Vulnerable Endpoint…and It’s Not the Laptop

Threatpost

Cybercriminals know that mobile devices are less secure, so it’s no surprise that last year Verizon found that 4 in 10 companies were breached through a mobile device.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Schrems II – Live Reaction to the Key Landmark Decision on the Future of International Data Transfers

Data Matters

Join Us for Post-Decision Coverage of the Schrems II Case. On July 16, the Court of Justice of the European Union will release its much anticipated decision in the Schrems II case, evaluating the validity of key data transfer mechanisms, including Standard Contractual Clauses. The decision could impact the future of international data flows and your business.

Privacy 68
article thumbnail

99% of Websites at Risk of Attack Via JavaScript Plug-ins

Dark Reading

The average website includes content from 32 different third-party JavaScript programs, new study finds.

Risk 101
article thumbnail

Litigating Spoliation Claims in Trade Secret Cases via JD Supra

IG Guru

Check out the article here. The post Litigating Spoliation Claims in Trade Secret Cases via JD Supra appeared first on IG GURU.

article thumbnail

Google Cloud Unveils 'Confidential VMs' to Protect Data in Use

Dark Reading

Confidential Virtual Machines, now in beta, will let Google Cloud customers keep data encrypted while it's in use.

Cloud 94
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Adobe Discloses Critical Code-Execution Bugs in July Update

Threatpost

The software giant released patches for four critical vulnerabilities and five different platforms.

Cloud 90
article thumbnail

Microsoft Patches Wormable RCE Flaw in Windows DNS Servers

Dark Reading

Patch Tuesday security updates address a critical vulnerability in Windows DNS Servers, which researchers believe is likely to be exploited.

article thumbnail

What everyone should know about moving 5 million documents – fast

OpenText Information Management

As a Canadian energy provider, NAL Resources remains committed to meeting current needs without compromising the needs of future generations. This endeavor demands a constant stream of secure data and informed decisions – outcomes that were elusive with an ill-fitting content management system. As part of its digital transformation, NAL – a company of 300 … The post What everyone should know about moving 5 million documents – fast appeared first on OpenText Blogs.

article thumbnail

Adobe fixes over a dozen flaws in Media Encoder, Download Manager

Security Affairs

Adobe has addressed over a dozen flaws in its Creative Cloud, Media Encoder, Genuine Service, ColdFusion and Download Manager products. Adobe has addressed over a dozen vulnerabilities in its Creative Cloud, Media Encoder, Genuine Service, ColdFusion, and Download Manager products. “Adobe has published security bulletins for Adobe Creative Cloud Desktop Application ( APSB20-33 ), Adobe Media Encoder ( APSB20-36 ), Adobe Genuine?

Cloud 65
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

NIST Privacy Framework – A focus on the identify function

OpenText Information Management

Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). From a practical perspective, leveraging a risk-based best practice framework that focuses on improving capabilities is a great approach to address an ever-changing compliance landscape … The post NIST Privacy Framework – A focus on the identify function appeared first on OpenText Bl

Privacy 64
article thumbnail

Survey data shows insurance consumers are clamoring for better digital experiences

DXC Technology

The digital landscape is now so all-encompassing that most consumers expect a digital experience in everything they do. That’s certainly true when it comes to insurance, as evidenced by the findings of our recent consumer survey. Based on responses from more than 2,000 individuals in the United States, the 2020 DXC Insurance Survey Report presents […].

article thumbnail

Get Cutting-Edge Healthcare Cybersecurity Insights at Black Hat USA

Dark Reading

Bad actors are on the lookout for ways to attack healthcare organizations, so it's important for cybersecurity pros to stay informed about the latest trends and threats in the industry.