Fri.Feb 18, 2022

article thumbnail

CVE-2021-44731 Linux privilege escalation bug affects Canonical’s Snap Package Manager

Security Affairs

Qualys experts found a new Linux privilege escalation vulnerability, tracked as CVE-2021-44731, in Canonical’s Snap Package Manager. Canonical’s Snap software packaging and deployment system are affected by multiple vulnerabilities, including a privilege escalation flaw tracked as CVE-2021-44731 (CVSS score 7.8). Snap is a software packaging and deployment system developed by Canonical for operating systems that use the Linux kernel.

Security 112
article thumbnail

French CNIL Releases 2022 Enforcement Priorities

Hunton Privacy

On February 15, 2022, the French Data Protection Authority (the “CNIL”) published its enforcement priority topics for 2022. Each year, the CNIL conducts numerous investigations in response to complaints, data breach notifications and ongoing events, or based on previously established enforcement priorities. For 2022, the CNIL indicated that it will focus on three major strategic priorities: Direct Marketing.

Cloud 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iran-linked TunnelVision APT is actively exploiting the Log4j vulnerability

Security Affairs

Iran-linked TunnelVision APT group is actively exploiting the Log4j vulnerability to deploy ransomware on unpatched VMware Horizon servers. Researchers from SentinelOne have observed the potentially destructive Iran-linked APT group TunnelVision is actively exploiting the Log4j vulnerability to deploy ransomware on unpatched VMware Horizon servers. TunnelVision’s TTPs overlap with the ones associated with Iran-linked nation-state actors Phosphorus , Charming Kitten and Nemesis Kitten.

article thumbnail

What is metadata management and why is it important?

Collibra

Metadata management is a cross-organizational agreement on how to define informational assets for converting data into an enterprise asset. As data volumes and diversity grow, metadata management is even more critical to derive business value from the gigantic amounts of data. . What is Metadata? Managing metadata begins with defining metadata correctly.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google Privacy Sandbox promises to protect user privacy online

Security Affairs

Google introduces Privacy Sandbox on Android aimed at leading to more private advertising solutions for mobile users. Google announced Privacy Sandbox on Android to limit user data sharing and prevent the use of cross-app identifiers. The company states that the Privacy Sandbox technologies are still in development. “Privacy Sandbox on Android will strengthen privacy, while providing tools app developers need to support and grow their businesses.

Privacy 98

More Trending

article thumbnail

5 Reasons a Paperless Office Makes Sense

Record Nations

A paperless office is no longer a pipe dream. With advancements in technology, like the cloud or document management systems, reducing your paper output is more achievable than ever. While it may be impossible for some industries to eliminate paper entirely, there are a number of ways it can be significantly reduced. Top 5 Reasons […]. The post 5 Reasons a Paperless Office Makes Sense appeared first on Record Nations.

Paper 97
article thumbnail

Why You Need An Adversary-First Approach to Threats in the Cloud

Dark Reading

Security teams need an adversary-focused approach that automates security controls and compliance and provides visibility into the cloud environment.

Cloud 103
article thumbnail

Researchers created a PoC exploit for recently disclosed critical Magento CVE-2022-24086 bug

Security Affairs

Researchers developed an exploit code for CVE-2022-24086 vulnerability affecting Adobe?Commerce and?Magento Open Source. Positive Technologies researchers have created a working PoC exploit for the recently patched CVE-2022-24086 vulnerability affecting its Commerce and Magento Open Source products. An attacker could use the exploit to achieve remote code execution from an unauthenticated user.

article thumbnail

How Steganography Allows Attackers to Evade Detection

eSecurity Planet

Steganography, derived from Greek words meaning “covered” and “writing,” has been used for centuries to hide secret messages inside regular documents. In cybersecurity, steganography mainly consists of hiding malicious payloads or secret information inside seemingly harmless files such as images, PDFs, audios, videos, and many other document types. While steganography is often considered something of a joke in capture-the-flag (CTF) events and other cybersecurity defense activities, it can happe

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ransomware Adds New Wrinkle in Russian Cybercrime Market

Dark Reading

Government crackdowns may destabilize Russian crime rings and strengthen their ties to Chinese allies.

Marketing 117
article thumbnail

AIIM Announces New CEU Tracking and Recertification Updates for the CIP

IG Guru

In an email sent to members, AIIM announced on February 10, 2022, they were going to implement the following: We trust you. We know that, if you care enough about the Information Management practice to keep current with your CIP designation, you’ll naturally be engaging in continuing education and networking activities. AIIM has tons of […]. The post AIIM Announces New CEU Tracking and Recertification Updates for the CIP appeared first on IG GURU.

article thumbnail

Key Application Security Metrics Show Few Signs of Improvement

Dark Reading

A new study shows that organizations continued to take an inordinately long time to fix vulnerabilities and fixed fewer known issues in their environments last year than in 2020.

article thumbnail

Iranian State Broadcaster Clobbered by ‘Clumsy, Buggy’ Code

Threatpost

Researchers said a Jan. 27 attack that aired footage of opposition leaders calling for assassination of Iran’s Supreme Leader was a clumsy and unsophisticated wiper attack.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Enterprises Look Beyond Antivirus Software for Remote Workers

Dark Reading

Priorities are shifting, with growing emphasis on endpoint detection and response (EDR) software and multifactor authentication (MFA), a recent survey of IT professionals shows.

article thumbnail

New Critical RCE Bug Found in Adobe Commerce, Magento

Threatpost

Adobe updated its recent out-of-band security advisory to add another critical bug, while researchers put out a PoC for the one it emergency-fixed last weekend.

article thumbnail

If the Cloud Is More Secure, Then Why Is Everything Still Broken?

Dark Reading

The sooner we discover sources of risk, the better equipped we will be to create effective mitigations for them.

Cloud 92
article thumbnail

US State Privacy Update: California AG Targets Financial Incentives For CCPA Enforcement

Privacy and Cybersecurity Law

On January 28, the California Attorney General (AG) announced his office was initiating an investigative sweep of businesses that operate loyalty programs and do not adequately provide a notice of financial incentive, as required under the California Consumer Privacy Act of 2018 (CCPA). This announcement by the AG is significant because it marks the first time the AG has publicly announced a targeted enforcement effort under the CCPA since releasing a general list of enforcement case examples th

Privacy 52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Ukraine DDoS: 'Cyberattack' or Not?

Dark Reading

The country was hit by a DDoS attack earlier this week, but some say that doesn't rise to the level of "cyberattack." Here's why they're wrong.

77
article thumbnail

Severe WordPress Plug-In UpdraftPlus Bug Threatens Backups

Threatpost

An oversight in a WordPress plug-in exposes PII and authentication data to malicious insiders.

article thumbnail

Free Cybersecurity Tools and Services List Published by CISA

Dark Reading

The Cybersecurity & Infrastructure Security Agency (CISA) says this "living repository" is a mix of popular open source and free tools and services from both the private and public sectors.

article thumbnail

Emerson Creek Pottery v. Emerson Creek Events (W.D. Va. 2022)

eDiscovery Law

Key Insight: Plaintiff moved for spoliation sanctions against defendants relying on (1) an inadvertently disclosed email between defendant and his counsel discussing the preservation of emails, and (2) defendants did not produce a “mirror image” of the emails produced by third parties. Plaintiff contended the content of the email between defendant and his counsel is […].

40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Axiomatics Introduces Orchestrated Authorization

Dark Reading

New enhancements and capabilities help enterprises embrace cloud-native technologies.

Cloud 66
article thumbnail

BTI Names Hunton Partners as Client Service All-Stars for 2022

Hunton Privacy

On February 8, 2022, BTI Consulting Group honored Hunton partners Aaron Simpson and Lisa Sotto as BTI Client Service All-Stars for 2022. Aaron and Lisa join a select group of lawyers identified as client service leaders by corporate counsel at the world’s leading organizations. Lisa, also recognized as a Super All-Star, breaks BTI records by being nominated by six clients, the highest number of nominations so far.

IT 81
article thumbnail

Friday Squid Blogging: South American Squid Stocks Threatened by Chinese Fishing

Schneier on Security

There’s a lot of fishing going on : The number of Chinese-flagged vessels in the south Pacific has surged 13-fold from 54 active vessels in 2009 to 707 in 2020, according to the SPRFMO. Meanwhile, the size of China’s squid catch has grown from 70,000 tons in 2009 to 358,000. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.