Fri.Apr 16, 2021

article thumbnail

Unscripted: 3 Security Leaders Dissect Today's Top Trends

Data Breach Today

Edna Conway, Wendy Nather and Michelle Dennedy on SASE, CIAM and Supply Chain Risk No script, no filter: Just Microsoft’s Edna Conway and Cisco’s Wendy Nather gathering with privacy leader Michelle Dennedy to discuss the impact of the SolarWinds supply chain attack and to play "Buzzword Mystery Date" with SASE, CIAM and "passwordless" authentication - are these trends dreamboats or duds?

article thumbnail

Updating your data protection documentation following Brexit

IT Governance

The UK data protection landscape is a lot more complex following Brexit. Many organisations are now subject to both the EU GDPR (General Data Protection Regulation) and the UK GDPR (General Data Protection). The UK version was born out of the EU GDPR, so you might think that there are only cosmetic differences and that minor actions are required to adjust your documentation and compliance practices.

GDPR 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Live Webinar | Software Security: Prescriptive vs. Descriptive

Data Breach Today

Effective software security means enabling the development team with the tools and training it needs to fix what they find. Join this session to find out best practices in remediating software vulnerabilities in smart ways.

Security 307
article thumbnail

Data Governance Maturity and Tracking Progress

erwin

Data governance is best defined as the strategic, ongoing and collaborative processes involved in managing data’s access, availability, usability, quality and security in line with established internal policies and relevant data regulations. erwin recently hosted the third in its six-part webinar series on the practice of data governance and how to proactively deal with its complexities.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Houston Rockets Investigate Ransomware Attack

Data Breach Today

Babuk Ransomware Gang Reportedly Posted Exfiltrated Team Data The NBA's Houston Rockets reported on Wednesday that the organization was recently hit with a ransomware attack for which the Babuk cyber gang has taken responsibility. Babuk ransomware is known to be buggy and cannot always be decrypted - even with the proper key.

More Trending

article thumbnail

Ireland’s Privacy Watchdog Launches GDPR Probe of Facebook

Data Breach Today

Data Protection Commission Sees Likely Violations in Wake of Latest Mega-Breach Ireland's privacy regulator has launched an investigation into Facebook after personal information for 533 million of the social network's users appeared for sale online. It will analyze whether Facebook violated the country's data protection law or the EU's General Data Protection Regulation.

Privacy 275
article thumbnail

Mirai code re-use in Gafgyt

Security Affairs

Uptycs’ threat research team recently detected several variants of the Linux-based botnet malware family, “ Gafgyt ,”some of them re-used Mirai code. . Uptycs’ threat research team recently detected several variants of the Linux-based botnet malware family, “ Gafgyt ”, via threat intelligence systems and our in-house osquery-based sandbox.

IoT 116
article thumbnail

Attack on Codecov Affects Customers

Data Breach Today

Company Warns Clients' Information May Have Been Exfiltrated Codecov, a company that tests software code prior to release, has notified customers that attackers had access to its network for a month and placed malware in one of its systems, which may have led to the exfiltration of customers' information.

Access 254
article thumbnail

iOS Kids Game Morphs into Underground Crypto Casino

Threatpost

A malicious ‘Jungle Run’ app tricked security protections to make it into the Apple App Store, scamming users out of money with a casino-like functionality.

Security 119
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ISMG Editors’ Panel: The Facebook Breach and More

Data Breach Today

Discussion Also Tackles Fraud Trends, Weak Passwords Four editors at Information Security Media Group discuss important cybersecurity issues, including Facebook’s latest data leak and how adversaries continue to innovate and evolve.

Passwords 228
article thumbnail

6 out of 11 EU agencies running Solarwinds Orion software were hacked

Security Affairs

SolarWinds supply chain attack also impacted six European Union institutions, European Commissioner for Budget and Administration confirmed. European Commissioner for Budget and Administration Johannes Hahn confirmed the hack of some EU agencies as result of the SolarWinds supply chain attack in a response to a question filed by an EU Parliament member in February 2021.

article thumbnail

A Holistic Approach to Cybersecurity and Compliance

Data Breach Today

In a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance.

article thumbnail

Cybersecurity Experts to Follow on Twitter

Schneier on Security

Security Boulevard recently listed the “Top-21 Cybersecurity Experts You Must Follow on Twitter in 2021.” I came in at #7. I thought that was pretty good, especially since I never tweet. My Twitter feed just mirrors my blog. (If you are one of the 134K people who read me from Twitter, “hi.”).

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Does FBI Exchange Remediation Action Set a Precedent?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends.

Security 209
article thumbnail

NSA: 5 Security Bugs Under Active Nation-State Cyberattack

Threatpost

Widely deployed platforms from Citrix, Fortinet, Pulse Secure, Synacor and VMware are all in the crosshairs of APT29, bent on stealing credentials and more.

Security 116
article thumbnail

EDPB cautiously welcomes UK adequacy finding

Data Protection Report

Yesterday, the European Data Protection Board (EDPB) published its opinion on the European Commission’s draft Decision that the UK ensures an adequate level of protection for personal data (the Opinion). The Opinion was adopted by the EDPB on 13 April 2021, a couple of days before the Opinion’s official publication on 15 April 2021. The EDPB recognises that the UK’s adequacy assessment is unique given it was an EU Member State until very recently and therefore acknowledges there are many areas

article thumbnail

NSA Discloses Vulnerabilities in Microsoft Exchange

Schneier on Security

Amongst the 100+ vulnerabilities patch in this month’s Patch Tuesday , there are four in Microsoft Exchange that were disclosed by the NSA.

109
109
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

BazarLoader Malware Abuses Slack, BaseCamp Clouds

Threatpost

Two cyberattack campaigns are making the rounds using unique social-engineering techniques.

Cloud 130
article thumbnail

High-Level Admin of FIN7 Cybercrime Group Sentenced to 10 Years in Prison

Dark Reading

Fedir Hladyr pleaded guilty in 2019 to conspiracy to commit wire fraud and conspiracy to commit computer hacking.

117
117
article thumbnail

Mandiant Front Lines: How to Tackle Exchange Exploits

Threatpost

Matt Bromiley, senior principal consultant with Mandiant, offers checklists for how small- and medium-sized businesses (SMBs) can identify and clear ProxyLogon Microsoft Exchange infections.

72
article thumbnail

Security Gaps in IoT Access Control Threaten Devices and Users

Dark Reading

Researchers spot problems in how IoT vendors delegate device access across multiple clouds and users.

IoT 90
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Project Zero Cuts Bug Disclosure Timeline to a 30-Day Grace Period

Threatpost

The zero-day flaw research group has revised its disclosure of the technical details of vulnerabilities in the hopes of speeding up the release and adoption of fixes.

IT 70
article thumbnail

Pandemic Drives Greater Need for Endpoint Security

Dark Reading

Endpoint security has changed. Can your security plan keep up?

Security 106
article thumbnail

Episode 211: Scrapin’ ain’t Hackin’. Or is it?

The Security Ledger

Is scraping the same as hacking or just an example of “zealous” use of a social media platform? And if it isn’t considered hacking…should it be? As more and more online platforms open their doors to API-based access, do we need more rules and oversight of how APIs are used to prevent wanton abuse? The post Episode 211: Scrapin’ ain’t. Read the whole entry. » Related Stories Episode 206: What Might A Federal Data Privacy Law Mean In the US?

IT 52
article thumbnail

Apple updates both XProtect and MRT

Jamf

Bringing XProtect to version 2144 and MRT to version 1.77, respectively.

52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

US Pulls Back Curtain on Russian Cyber Operations

Data Breach Today

Foreign Intelligence Service's Techniques, Partners Revealed While the Biden administration is betting that the latest round of sanctions aimed at Russia and its economy will help deter the country's cyber operations, several U.S. agencies used the sanctions announcement as an opportunity to pull back the curtain on the tactics of Russia's Foreign Intelligence Service.

IT 337
article thumbnail

Friday Squid Blogging: Blobs of Squid Eggs Found Near Norway

Schneier on Security

Divers find three-foot “blobs” — egg sacs of the squid Illex coindetii — off the coast of Norway. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

Security 122
article thumbnail

National Archive facing huge backlog via The Daily Standard

IG Guru

Davidson, who represents Ohio's 8th District, and U.S. Reps. Deborah Ross, D-North Carolina, and Mike Bost, R-Illinois, this week wrote a letter to President Joe Biden and Archivist of the United States David Ferriero. They call for the end of a backlog of roughly 480,000 records requests at the National Personnel Records Center in St. Louis, Missouri.