Wed.Apr 28, 2021

article thumbnail

FluBot Spyware Spreads Across Europe

Data Breach Today

Proofpoint: Malware's Operators Rebound After Arrests FluBot Android spyware is once again spreading throughout Europe following a temporary dip in activity in March after police arrested four suspects allegedly involved in the campaign, according to researchers at Proofpoint.

261
261
article thumbnail

Portuguese DPA Orders Suspension of U.S. Data Transfers by Agency That Relied on SCCs

Hunton Privacy

On April 27, 2021, the Portuguese Data Protection Authority ( Comissão Nacional de Proteção de Dados , the “CNPD”) ordered the National Institute of Statistics (the “INE”) to suspend, within 12 hours, any international transfers of personal data to the U.S. or other third countries that have not been recognized as providing an adequate level of data protection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Ghostwriter' Disinformation Campaign Targets NATO Allies

Data Breach Today

FireEye: Effort Leverages Compromised Social Media Accounts An ongoing disinformation campaign dubbed "Ghostwriter," which leverages compromised social media accounts, is targeting several NATO member countries in Europe, attempting to undermine confidence in the defensive organization as well as spread discord in Eastern Europe, according to FireEye.

246
246
article thumbnail

Making sustainability a differentiator in global trade finance (part 1)

CGI

Making sustainability a differentiator in global trade finance (part 1). This CGI blog post discusses making sustainability a differentiator in global trade finance. dharini.s@cgi.com. Wed, 04/28/2021 - 07:34.

102
102
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Tips on Enhancing Supply Chain Security

Data Breach Today

NIST, CISA Highlight Key Steps to Take The U.S. Cybersecurity and Infrastructure Security Agency and the National Institute of Standards and Technology have released a report providing insights on how to enhance supply chain security in the wake of the SolarWinds attack.

Security 233

More Trending

article thumbnail

Case Study: Tackling CIAM Challenges During the Pandemic

Data Breach Today

The federal ban on funding for a national unique patient identifier adds to the complexity of customer identity and access management, especially when dealing with new patients during the COVID-19 pandemic, says Aaron Miri, CIO at UT Health Austin.

Access 176
article thumbnail

Archives: Turning Collective Wisdom into Strength

Information Governance Perspectives

If there’s one thing I admire the most among the younger members of our field, it is their dedication to recognizing the path that is the worthiest… to their colleagues, to the collections, to the world they work and live in. The post Archives: Turning Collective Wisdom into Strength appeared first on Rafael Moscatel.

article thumbnail

Cybersecurity Leadership: It’s About Cloud Security

Data Breach Today

CEOs and CISOs on Managing Visibility, Accessibility and Risk Almost every organization has adopted cloud computing to some extent, and with this great power comes great responsibility. How are cybersecurity leaders managing visibility, access and risk? We asked this exclusive panel of CEOs and CISOs, and they shared frank and thoughtful advice.

Cloud 173
article thumbnail

UK rail network Merseyrail hit by ransomware gang

Security Affairs

UK rail network Merseyrail was hit by a cyberattack, ransomware operators breached the corporate email system to disclose the attack to employees and journalists. UK rail network Merseyrail, which operates rail services across Merseyside, announced it was a victim of a cyber attack. A ransomware gang has also compromised the email system of the organization to inform employees and journalists about the attack.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Webinar: Analytics, AI and Records Management: The Revolution Will Not Be Televised via ARMA Dallas on May 10th at 12pm Central

IG Guru

REGISTER HERE Change sometimes comes charging in as on a big black dragon, breathing fire and alerting whole communities to its disruptive effect. Other times, it sneaks its way into our lives like a stray kitten who shows up at your door one day, gradually lets you scritch it and feed it, and later feels […]. The post Webinar: Analytics, AI and Records Management: The Revolution Will Not Be Televised via ARMA Dallas on May 10th at 12pm Central appeared first on IG GURU.

article thumbnail

Cloud misconfiguration, a major risk for cloud security

Security Affairs

Misconfigured cloud-based databases continue to cause data breaches, millions of database servers are currently exposed across cloud providers. Fugue’s new State of Cloud Security 2020 report reveals that misconfigured cloud-based databases continue to pose a severe security risk to organizations. Cloud misconfiguration remains the top cause of data breaches in the cloud, and the ongoing COVID-19 pandemic is is exacerbating the situation.

Cloud 98
article thumbnail

The Washington Privacy Act fails to pass for the third straight year

DLA Piper Privacy Matters

Click here to view an article about the 2021 Washington Privacy Act legislative developments. DLA Piper follows the evolving state privacy landscape more closely than any other law firm. As of the date of this post, the most likely states to pass an Omnibus privacy bill later this year are Florida, Colorado and Ohio. For more on these bills as they move closer to potential passage, please continue to monitor our Privacy Matters blog.

Privacy 94
article thumbnail

FluBot Malware's Rapid Spread May Soon Hit US Phones

Dark Reading

The FluBot Android malware has spread throughout several European countries through an SMS package delivery scam.

119
119
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google addresses a high severity flaw in V8 engine in Chrome

Security Affairs

Google released updates for Chrome 90 that address a new serious issue, tracked as CVE-2021-21227 , in the V8 JavaScript engine used by the web browser. Google has released security updates for Chrome 90 that address a new high severity vulnerability, tracked as CVE-2021-21227, that resides in the V8 JavaScript engine used by the web browser. The CVE-2021-21227 vulnerability is an insufficient data validation issue that could be exploited by remote attackers to achieve code execution within the

article thumbnail

FBI Works With 'Have I Been Pwned' to Notify Emotet Victims

Dark Reading

Officials shared 4.3 million email addresses with the HIBP website to help inform companies and individuals if Emotet compromised their accounts.

104
104
article thumbnail

Microsoft Office SharePoint Targeted With High-Risk Phish, Ransomware Attacks

Threatpost

SharePoint servers are being picked at with high-risk, legitimate-looking, branded phish messages and preyed on by a ransomware gang using an old bug.

article thumbnail

Welcoming the Luxemburg Government CERT to Have I Been Pwned

Troy Hunt

Continuing my efforts to make more breach data available to governments after data breaches impact their domains, I'm very happy to welcome Luxemburg aboard Have I Been Pwned. More specifically, the CERT of the Grand Duchy of Luxemburg ( govcert.lu ) now has free API level access to query their national government domains. This now brings the government count to 14 and I look forward to welcoming more national CERTs in the future.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Chrome V8 Bug Allows Remote Code-Execution

Threatpost

The internet behemoth rolled out the Chrome 90 stable channel release to address this and eight other security vulnerabilities.

article thumbnail

Adobe Open Sources Tool for Anomaly Research

Dark Reading

The One-Stop Anomaly Shop (OSAS) project packages machine-learning algorithms into a Docker container for finding anomalies in security log data.

Security 105
article thumbnail

What’s new in OpenText Core Share and Core Signature

OpenText Information Management

The latest announcement by OpenText of Cloud Editions includes some great updates to both OpenText™ Core Share and OpenText™ Core Signature. Check out the latest updates below. April 2021: What’s new in OpenText Core Share 21.2 and Core Signature 21.2 Update 1: Core Share Collections Collections in Core Share are a great way to organize … The post What’s new in OpenText Core Share and Core Signature appeared first on OpenText Blogs.

Cloud 63
article thumbnail

Is Your Cloud Raining Sensitive Data?

Dark Reading

Learn common Kubernetes vulnerabilities and ways to avoid them.

Cloud 97
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Chase Bank Phish Swims Past Exchange Email Protections

Threatpost

Two phishing attacks elude Exchange security protections and spoof real-life account scenarios in an attempt to fool victims.

article thumbnail

Attacks Targeting ADFS Token Signing Certificates Could Become Next Big Threat

Dark Reading

New research shows how threat actors can steal and decrypt signing certificates so SAML tokens can be forged.

77
article thumbnail

macOS Security Compliance Project

Jamf

Standardize your organization's endpoint security and management workflows by leveraging the macOS Security Compliance Project, which provides guidance from leading government Information Security agencies for organizations to enhance and maintain a strong security posture to protect endpoints and data.

article thumbnail

CILIP and CILIP in Scotland strengthen support for members in Scotland

CILIP

CILIP and CILIP in Scotland strengthen support for members in Scotland. The Trustee Boards of CILIP and CILIP in Scotland have unanimously approved a new Partnership Agreement which further strengthens support for CILIP members in Scotland. The Agreement also coincides with the news of significant growth in membership numbers in Scotland. The Partnership Agreement, which replaces the earlier ?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How to Secure Employees' Home Wi-Fi Networks

Dark Reading

Businesses must ensure their remote workers' Wi-Fi networks don't risk exposing business data or secrets due to fixable vulnerabilities.

article thumbnail

RFID Journal Live! 2021

RFID Global Solution, Inc.

See you September 26-28 at RFID Journal in Phoenix, AZ. The post RFID Journal Live! 2021 appeared first on RFID Global Solution.

52
article thumbnail

74% of Financial Institutions See Spike in COVID-Related Threats

Dark Reading

Financial losses have also increased among organizations in the last year, with the average cost reaching $720,000.

57