Thu.Sep 10, 2020

article thumbnail

Hackers Use Cloud Monitoring Tool to Install Cryptominers

Data Breach Today

Reports: TeamTNT Using Weave Scope Tool to Target Cloud Platforms TeamTNT, a recently uncovered hacking group, is weaponizing Weave Scope, a legitimate cloud monitoring tool, to help install cryptominers in cloud environments, according to reports from Intezer and Microsoft.

Cloud 299
article thumbnail

[Podcast] Achieving Cloud Content Harmony – Access with Control

AIIM

Cloud Content Management has the power to change the game for businesses of all sizes and types. This powerful technology and its massively scalable storage and operational power can crunch large sets of data, use analytics to understand it, and provide the security needed to lock it all down. But this great power needs balance! There must be harmony between access to the information and control of the information.

Cloud 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Warns of Increased DDoS Attacks

Data Breach Today

Security Experts Say Remote Workforce, Online Learning Create Opportunities The U.S. Cybersecurity and Infrastructure Security Agency is warning of an increase in targeted distributed denial-of-service attacks against financial and government organizations worldwide. And security firms also are tracking the incidents in these and other sectors.

article thumbnail

Why You Need End-to-End Data Lineage

erwin

Not Documenting End-to-End Data Lineage Is Risky Busines – Understanding your data’s origins is key to successful data governance. Not everyone understands what end-to-end data lineage is or why it is important. In a previous blog , I explained that data lineage is basically the history of data, including a data set’s origin, characteristics, quality and movement over time.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Palo Alto Networks Patches 6 Firewall Vulnerabilities

Data Breach Today

Positive Technologies Describes the Risks Posed by Flaws The security firm Positive Technologies discovered six vulnerabilities in Palo Alto Networks' PAN-OS, the software that runs the company's next-generation firewalls. The firewall developer has issued patches.

Risk 254

More Trending

article thumbnail

Cybersecurity Leadership: The New Threat Landscape

Data Breach Today

CEOs and CISOs on How to Respond to Disruption, Distortion and Deterioration Disruption, distortion and deterioration - these cybersecurity threats are amplified by the ongoing pandemic. Which poses the greatest threat and why? We asked this exclusive panel of CEOs and CISOs, and their responses might surprise you.

article thumbnail

Ransomware And Zoom-Bombing: Cyberattacks Disrupt Back-to-School Plans

Threatpost

Cyberattacks have caused several school systems to delay students' first day back - and experts warn that new COVID-related delays could be the new "snow days.".

article thumbnail

Fed Studies Development of Digital Dollar

Data Breach Today

The pandemic has accelerated the shift to e-commerce and raised new concerns about the use of paper money. Jim Cunha of the Federal Reserve Bank of Boston describes a collaborative research project with the Massachusetts Institute of Technology to determine the feasibility of a digital alternative.

Paper 185
article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

ESET researchers discovered a new piece of malware dubbed CDRThief targets a specific Voice over IP system to steal call data records (CDR). Security experts from ESET discovered a new piece of malware, tracked as CDRThief, that targets the Linux VoIP platform, Linknat VOS2009/3000 softswitches, to steal call data records (CDR) from telephone exchange equipment.

Metadata 114
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Newcastle University becomes latest ransomware victim as education sector fails to heed warnings

IT Governance

Newcastle University is being held to ransom after its systems were infected with malware earlier this month. The DoppelPaymer ransomware gang breached the university’s systems on 4 September , and later that day stole backup files. The university has apologised for the “ongoing” disruption and added that it would take “a number of weeks” to get its systems back online.

Education 110
article thumbnail

Portland, Oregon Becomes First Jurisdiction in U.S. to Ban the Commercial Use of Facial Recognition Technology

Hunton Privacy

On September 9, 2020, Portland, Oregon became the first jurisdiction in the country to ban the commercial use of facial recognition technology in public places within the city, including stores, restaurants and hotels. The city Ordinance was unanimously passed by the Portland City Council and will take effect on January 1, 2021. The City Council cited as rationale for the Ordinance documented instances of gender and racial bias in facial recognition technology, and the fact that marginalized com

article thumbnail

Think You're Spending Enough on Security?

Dark Reading

While the amount will vary from organization to organization, here are four ways for everyone to evaluate whether they're allocating the right amount of money and resources.

Security 107
article thumbnail

Colocation data centers giant Equinix data hit by Netwalker Ransomware

Security Affairs

Equinix, one of the world’s largest providers of colocation data centers and Internet connection announced it was hit by Netwalker Ransomware. Equinix, one of the leaders in the global colocation data center market share, with 205 data centers in 25 countries on five continents, was hit by Netwalker ransomware operators. The popular cybercrime gang is demanding a $4.5 million ransom for a decryptor and to prevent the release of the stolen data.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks

Threatpost

The "BLURtooth" flaw allows attackers within wireless range to bypass authentication keys and snoop on devices utilizing implementations of Bluetooth 4.0 through 5.0.

article thumbnail

Two Years on from GDPR: Has It Driven Growth in Cybersecurity Insurance?

Dark Reading

Whilst GDPR has put the spotlight on data privacy and cyber issues, there are other more prominent trends that are driving a greater take-up of cyber insurance, says Ben Maidment, Class Underwriter - Cyber, Physical & Technology at Brit Insurance.

Insurance 103
article thumbnail

Razer Gaming Fans Caught Up in Data Leak

Threatpost

A cloud misconfiguration at the gaming-gear merchant potentially exposed 100,000 customers to phishing and fraud.

Phishing 126
article thumbnail

EDPB Publishes Guidelines on the Concepts of Controller and Processor in the GDPR

Hunton Privacy

On September 7, 2020, the European Data Protection Board (“EDPB”) released draft Guidelines 07/2020 on the concepts of controller and processor in the EU General Data Protection Regulation (“GDPR”) (the “Guidelines”). The Guidelines aim to (1) clarify the concepts of controller, joint controllers, processor, third party and recipient under the GDPR by providing concrete examples with respect to each, and (2) specify the consequences attached to the different roles of controller, joint controller

GDPR 95
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Russia’s Fancy Bear Hackers Are Hitting US Campaign Targets Again

WIRED Threat Level

Microsoft says the GRU hacking group has attacked hundreds of organizations over the past year, many of them tied to the upcoming election.

Security 107
article thumbnail

How emerging markets are embracing the post-COVID reality

OpenText Information Management

Innovation is borne out of necessity, opportunity, or both. And that has never been more true than during the pandemic and national lockdowns. What I have seen in Africa and the Middle East over the past few months is that the measures taken to address COVID-19 have been a catalyst for digital transformation and innovation. … The post How emerging markets are embracing the post-COVID reality appeared first on OpenText Blogs.

article thumbnail

Kids' Smartwatches Are a Security Nightmare Despite Years of Warnings

WIRED Threat Level

Five out of six brands tested by researchers would have allowed hackers to track kids—and in some cases eavesdrop on them.

Security 113
article thumbnail

California Legislature Passes Bill Requiring Social Media Companies to Obtain Parental Consent for California-based Children Under 13

Hunton Privacy

On September 8, 2020, AB 1138 , the Parent’s Accountability and Child Protection Act, was enrolled and presented to the California Governor for signature. If signed into law by the Governor, the bill would require a business that operates a social media website or application, beginning July 1, 2021, to obtain verifiable parental consent for California-based children that the business “actually knows” are under 13 years of age (hereafter, “Children”).

Privacy 84
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Palo Alto Networks fixes severe Code Execution and DoS flaws in PAN-OS

Security Affairs

Palo Alto Networks addressed critical and high-severity denial-of-service (DoS) and arbitrary code execution vulnerabilities in its PAN-OS firewall software. Palo Alto Networks has released security updates to patch critical and high-severity denial-of-service (DoS) and arbitrary code execution vulnerabilities in its PAN-OS firewall software. The most severe flaw is a buffer overflow issue can be exploited by a remote, unauthenticated attacker to disrupt system processes and possibly to execute

article thumbnail

6 Lessons IT Security Can Learn From DevOps

Dark Reading

DevOps has taken over enterprise software development. The discipline has lessons for IT security -- here are a quick half-dozen.

IT 99
article thumbnail

BLURtooth flaw allows attacking Bluetooth encryption process

Security Affairs

Bluetooth 4.0 through 5.0 versions are affected by the vulnerability dubbed BLURtooth which allows hackers to defeat Bluetooth encryption. A vulnerability dubbed BLURtooth affects certain implementations of Bluetooth 4.0 through 5.0 affects “dual-mode” Bluetooth devices, like modern smartphones. The vulnerability could be exploited by attackers to overwrite or lower the strength of the pairing key, defeating the protocol encryption.

article thumbnail

Extending our Microsoft partnership with iOS Device Compliance

Jamf

Jamf and Microsoft's partnership addresses iOS Device Compliance and security to better serve organizations.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The Third Edition of Ross Anderson’s Security Engineering

Schneier on Security

Ross Anderson’s fantastic textbook, Security Engineering , will have a third edition. The book won’t be published until December, but Ross has been making drafts of the chapters available online as he finishes them. Now that the book is completed, I expect the publisher to make him take the drafts off the Internet. I personally find both the electronic and paper versions to be incredibly useful.

article thumbnail

Cyber-Risks Explode With Move to Telehealth Services

Dark Reading

The hasty shift to online delivery of primary care services since the COVID-19 outbreak has attracted significant attacker interest.

Risk 92
article thumbnail

Govt.-Backed Contact-Tracing Apps Raise Privacy Hackles

Threatpost

New opt-in COVID-19 Exposure Notifications Express systems baked into Apple’s iOS and available on Android need privacy guardrails, say privacy advocates.

Privacy 75