Thu.Jul 16, 2020

article thumbnail

Twitter Hack: A Sign of More Troubles Ahead?

Data Breach Today

Some Experts Say the Platform's Security Failures Could Lead to Bigger Attacks While the Wednesday hijacking of several high-profile and verified Twitter accounts appears to have been confined to a cryptocurrency scam, security experts are warning that the platform's security failures could lead to bigger attacks down the road.

Security 312
article thumbnail

Iranian Spies Accidentally Leaked Videos of Themselves Hacking

WIRED Threat Level

IBM's X-Force security team obtained five hours of APT35 hacking operations, showing exactly how the group steals data from email accounts—and who it's targeting.

Security 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malicious Chat App Targets Android Users in Middle East

Data Breach Today

Report: 'Welcome Chat' Advertised as 'Safe' for Users A malicious app called Welcome Chat has been spotted targeting Android users in Middle Eastern countries - where chat apps are illegal, according to new report by security firm ESET.

Security 222
article thumbnail

What Is TOGAF? The Open Group Architecture Framework

erwin

The Open Group Architecture Framework (TOGAF) is a type of enterprise architecture (EA) framework. In this post, we’ll cover: What Is TOGAF? History of TOGAF. TOGAF ADM. The Benefits of TOGAF. Is TOGAF Free? TOGAF vs. DODAF vs. MODAF vs. NAF. Implementing an EA Framework. What Is TOGAF? TOGAF is one example of an enterprise architecture framework. Enterprise architecture frameworks help organizations regulate the methods and language used to create, describe and administer changes to an enterpri

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Using Digital IDs to Fight Financial Fraud

Data Breach Today

IIF's Matthew Ekberg Describes Benefits of Digital IDs The Institute of International Finance, a global association of financial institutions, is focusing on strategies for using digital identification and machine learning to combat financial crime, says Matthew Ekberg, a senior policy adviser at the institute.

216
216

More Trending

article thumbnail

US, UK, Canada: Russian Hackers Targeting COVID-19 Research

Data Breach Today

Officials Say Attackers Aim to Steal Vaccine Development Intellectual Property Government officials in the U.S., U.K. and Canada issued a joint advisory Thursday warning that a Russian hacking group is targeting various research organizations in those countries involved in COVID-19 vaccine development.

article thumbnail

BREAKING: Unexpected Outcome of Schrems II Case: CJEU Invalidates EU-U.S. Privacy Shield Framework but Standard Contractual Clauses Remain Valid

Hunton Privacy

On July 16, 2020, the Court of Justice of the European Union (the “CJEU”) issued its landmark judgment in the Schrems II case ( case C-311/18 ). In its judgment, the CJEU concluded that the Standard Contractual Clauses (the “SCCs”) issued by the European Commission for the transfer of personal data to data processors established outside of the EU are valid.

Privacy 108
article thumbnail

Users Urged to Patch Critical Flaw in SAP NetWeaver AS

Data Breach Today

If Exploited, Attackers Could Gain Full Control of Sensitive Operations Cybersecurity experts are pushing organizations to immediately patch a critical zero-day vulnerability in SAP's NetWeaver Application Server because threat actors are likely searching for networks that are susceptible to the flaw.

article thumbnail

Police and CPS scrap digital data extraction forms for rape cases

The Guardian Data Protection

Exclusive: Case of two complainants funded by Equality and Human Rights Commission forces U-turn The CPS and police have been forced to scrap controversial “digital strip searches” of rape complainants, following a legal threat from two survivors of sexual abuse and sustained campaigning from privacy and human rights groups. Little more than a year after a new policy around the disclosure of private information was introduced, the police and CPS have made a major U-turn and will withdraw digital

Privacy 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Zoom Addresses Vanity URL Zero-Day

Threatpost

An attacker could pose as a company employee, invite customers or partners to meetings, then use socially engineered conversation to extract sensitive information.

Cloud 104
article thumbnail

Tech firms like Facebook must restrict data sent from EU to US, court rules

The Guardian Data Protection

Long-running legal saga finds inadequate protections against snooping on personal data by US intelligence agencies Tech companies like Facebook could be prevented from sending data back to the US, after the latest ruling in a long-running European legal saga found that there are not enough protections against snooping by US intelligence agencies. The ruling of the court of justice of the European Union (CJEU) does not immediately end such transfers, but requires data protection authorities (DPAs

GDPR 105
article thumbnail

Hackers Look to Steal COVID-19 Vaccine Research

Threatpost

The Russia-linked APT29 has set its sights on pharma research in Western nations in a likely attempt to get ahead on a cure for coronavirus.

IT 113
article thumbnail

UK Supreme Court Grants Google Permission to Appeal Class Action Claim in Lloyd vs Google LLC

Data Matters

The Supreme Court has recently granted Google permission to appeal the Court of Appeal’s decision in the case of Lloyd v Google LLC ([2019]) EWCA Civ 1599). The class action brought against Google by Richard Lloyd, the former editor of consumer protection rights group “Which?”, relates to the alleged tracking of personal data by Google of 4.4 million iPhone users and subsequent selling of the users’ data to advertisers, without the users’ knowledge and consent.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

LokiBot Redux Attacks Massive List of Common Android Apps

Threatpost

BlackRock, based on the Xerxes source code, can steal info not only from financial apps but also TikTok, Tinder, Instagram, Uber and many others.

102
102
article thumbnail

Cybersecurity Leaders: Invest In Your People

Dark Reading

Training, especially cross-training, is insanely powerful when team members are able to experience, train, and work together. It also builds trust.

article thumbnail

Threat Actors Introduce Unique ‘Newbie’ Hacker Forum

Threatpost

CryptBB becomes more inclusive by inviting less experienced hackers to learn from expert cybercriminals and one another.

Security 111
article thumbnail

Empowering the data-driven manufacturer

OpenText Information Management

The global manufacturing sector is facing a crisis on a scale not seen before. At one point, according to BCG1, more than 90% of manufacturing plants in Europe and 65% in the U.S. were closed because of COVID-19. Plant closures were initially due to part shortages from China, but as the virus moved globally, the … The post Empowering the data-driven manufacturer appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Twitter Hack Could Have Been Much Worse—and Maybe Was

WIRED Threat Level

The meltdown appears to be part of a bitcoin scam and not something more nefarious, but security experts are troubled that it happened at all.

Security 101
article thumbnail

8 Signs of a Smartphone Hack

Dark Reading

A rapidly dwindling battery life or sudden spike in data usage could indicate your iOS or Android device has been compromised.

110
110
article thumbnail

Cisco fixes 5 critical flaws that could allow router firewall takeover

Security Affairs

Cisco addresses a critical remote code execution (RCE), authentication bypass, and static default credential flaws that could lead to full router takeover. Cisco has released security updates to address critical remote code execution (RCE), authentication bypass, and static default credential vulnerabilities affecting multiple router and firewall devices.

article thumbnail

Major Flaws Open the Edge to Attack

Dark Reading

Attackers are using critical exploits for flaws in VPN appliances, app-delivery services, and other network-edge hardware and software to punch through corporate perimeters. What can companies do?

120
120
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Android BlackRock malware targets hundreds of apps

Security Affairs

Researchers spotted a new Android banking trojan dubbed BlackRock malware that steals credentials and credit card data from hundreds of apps. Security experts from ThreatFabric have discovered a new Android banking trojan dubbed BlackRock that steals credentials and credit card data from a list of 337 apps. The BlackRock malware borrows the code from the Xerxes banking malware, which is a strain of the popular LokiBot Android trojan.

article thumbnail

Enterprise Data Security: It’s Time to Flip the Established Approach

Threatpost

Companies should forget about auditing where data resides and who has access to it.

Security 117
article thumbnail

Russian Cyberattacks Target COVID-19 Research, Vaccine Development

Dark Reading

Government agencies in the US, UK, and Canada report Russian group Cozy Bear is targeting organizations developing coronavirus vaccines.

article thumbnail

UK NCSC blames Russia-linked APT29 for attacks on COVID-19 vaccine research

Security Affairs

The UK National Cyber Security Centre says that Russia-linked APT29 group is attempting to steal research data related to potential COVID-19 vaccines. The British National Cyber Security Centre revealed that Russia-linked group APT29 is conducting cyberespionage campaigns targeting UK, US, and Canadian organizations working of the development of a COVID-19 vaccine. “RUSSIAN cyber actors are targeting organisations involved in coronavirus vaccine development, UK security officials have re

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift

Dark Reading

The only entities equipped to safeguard Internet of Things devices against risks are the IoT device manufacturers themselves.

IoT 97
article thumbnail

A New Gadget Stops Voice Assistants From Snooping on You

WIRED Threat Level

Meet LeakyPick, the low-cost audio spy detector for your Amazon Alexa, Google Home, and other network-connected devices.

Privacy 93
article thumbnail

How information governance helps reduce IT budgets

OpenText Information Management

A volatile economy and massive disruptions to business models have many IT planners scrambling to allocate budget and keep up with the changes. At the same time, they’re also realizing that nominal procedures cannot assure productivity and stability when the entirety of the supply chain, customer interaction and even employee communications have been turned upside … The post How information governance helps reduce IT budgets appeared first on OpenText Blogs.