Fri.Jun 17, 2022

article thumbnail

Cops Will Be Able to Scan Your Fingerprints With a Phone

WIRED Threat Level

Contactless fingerprinting uses a smartphone camera to capture your prints—and opens up a whole new set of privacy concerns.

Privacy 98
article thumbnail

Threat Watch: Russia-Ukraine War Remains Top CISO Risk

Data Breach Today

DXC Technology's Michael Baker on Top Threats, Recruitment Tips, Career Advice Threat watch: The ongoing Russia-Ukraine war continues to pose both direct and indirect risks to enterprise networks, says Michael Baker, vice president and IT CISO of IT services and consulting firm DXC Technology. He also discusses recruiting and retaining new talent.

Risk 344
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese DriftingCloud APT exploited Sophos Firewall Zero-Day before it was fixed

Security Affairs

China-linked threat actors exploited the zero-day flaw CVE-2022-1040 in Sophos Firewall weeks before it was fixed by the security vendor. Volexity researchers discovered that the zero-day vulnerability, tracked as CVE-2022-1040 , in Sophos Firewall was exploited by Chinese threat actors to compromise a company and cloud-hosted web servers it was operating.

CMS 137
article thumbnail

ISMG Editors: Are We Closing in on a Federal Privacy Law?

Data Breach Today

The State of Passwordless in 2022, New Identity Technologies In the latest weekly update, Jeremy Grant, coordinator of the Better Identity Coalition, joins three editors at ISMG to discuss important cybersecurity issues, including where we are with passwordless, if we are getting closer to a U.S. federal privacy law, and next-gen authentication technologies.

Privacy 313
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Tracking People via Bluetooth on Their Phones

Schneier on Security

We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not enough. Computer scientists at the University of California San Diego proved in a study published May 24 that minute imperfections in phones caused during manufacturing create a unique Bluetooth beacon , one that establishes a digital signature or fingerprint di

More Trending

article thumbnail

Spotlight on Women in Privacy – Hattie Davison

Data Matters

Hattie Davison, UK Government, Department for Digital, Culture, Media and Sport, Head of Data Reform Policy. The post Spotlight on Women in Privacy – Hattie Davison appeared first on Data Matters Privacy Blog.

Privacy 88
article thumbnail

Hackers Clone Crypto Wallets to Steal Users' Funds

Data Breach Today

Backdoored Apps Allow Normal Functioning of Wallet While Exfiltrating Master Key A "technically sophisticated" threat campaign is cloning cryptocurrency apps to steal funds from web3 wallet users, security researchers at Confiant say. The campaign, dubbed SeaFlower, uses cloned wallet apps offered by MetaMask, Coinbase, imToken and TokenPocket to carry out the theft.

Security 268
article thumbnail

Nathaniel Cooper on Juneteenth and opportunities for impact

Collibra

The son of Jamaican parents, Nathaniel Cooper was born and raised in New Jersey, USA. When it was time for college, he chose one of the most prestigious HBCU’s (Historical Black College & University) to attend, Howard University. . “Black people are so often stereotyped and being at Howard University opened my mind to the black diaspora and the many contributions to society that Black intellectuals have made around the world.

article thumbnail

How XDR Is Fulfilling the Promise that SIEM Never Did

Data Breach Today

SentinelOne President Nick Warner on How Attivo and Scalyr Advanced the XDR Mission SentinelOne has expanded its detection and response capabilities beyond the endpoint in recent years with the acquisition of data analytics tech developer Scalyr and identity and deception technology vendor Attivo Networks, says Nicholas Warner, president of security.

Analytics 260
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Atlassian Confluence Server Bug Under Active Attack to Distribute Ransomware

Dark Reading

Most of the attacks involve the use of automated exploits, security vendor says.

article thumbnail

US Bipartisan Privacy Proposal Has Cybersecurity Mandates

Data Breach Today

Lawmakers Impatient With Hands-Off Approach to Industry Cybersecurity Practices A bipartisan U.S. proposal for a national privacy law also imposes new cybersecurity regulatory mandates onto the private sector. The inclusion of a data security section in draft privacy legislation shows the Washington consensus for voluntary industry measures is wearing thin.

Privacy 254
article thumbnail

A Microsoft 365 feature can ransom files on SharePoint and OneDriveCould

Security Affairs

Experts discovered a feature in Microsoft 365 suite that could be abused to encrypt files stored on SharePoint and OneDrive and target cloud infrastructure. Researchers from Proofpoint reported that a feature in the in Microsoft 365 suite could be abused to encrypt files stored on SharePoint and OneDrive. “Proofpoint has discovered a potentially dangerous piece of functionality in Office 365 or Microsoft 365 that allows ransomware to encrypt files stored on SharePoint and OneDrive in a way

Libraries 101
article thumbnail

The Push on Capitol Hill for Passwordless Authentication

Data Breach Today

Okta's Sean Frazier on Securing the Supply Chain, Software Development Life Cycle Interest in passwordless authentication architecture continues to grow among U.S. government agencies and departments as they embrace more modern approaches to identity and access management, says Sean Frazier, federal chief security officer at Okta.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Can We Make a Global Agreement to Halt Attacks on Our Energy Infrastructure?

Dark Reading

The energy sector remains susceptible to both espionage between nation-states and cybercrime, and recent developments keep pointing toward more attacks.

91
article thumbnail

Why the Physical Russia-Ukraine War Might Become a Cyberwar

Data Breach Today

SecurityScorecard CEO Aleksandr Yampolskiy on Why This War Is Personal The war between Russia and Ukraine isn't an abstract concern for SecurityScorecard CEO Aleksandr Yampolskiy. It's a deeply personal one since Yampolskiy, who is now a U.S. citizen, grew up in Russia and rode the train to Ukraine every summer to visit his grandmother.

IT 236
article thumbnail

DeadBolt Ransomware Actively Targets QNAP NAS Devices — Again

Dark Reading

The QNAP network-connected devices, used to store video surveillance footage, are a juicy target for attackers, experts warn.

article thumbnail

Why Zero-Day Attacks on Open-Source Libraries Are Surging

Data Breach Today

Contrast Security CPO Steve Wilson on Why Log4j Hack Is a Sign of Things to Come The discovery and subsequent exploitation of a critical zero-day vulnerability in Apache's Log4j open-source library has highlighted the importance of code security in today's threat landscape, according to Contrast Security Chief Product Officer Steve Wilson.

Libraries 236
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Experts link Hermit spyware to Italian surveillance firm RCS Lab and a front company

Security Affairs

Experts uncovered an enterprise-grade surveillance malware dubbed Hermit used to target individuals in Kazakhstan, Syria, and Italy since 2019. Lookout Threat Lab researchers uncovered enterprise-grade Android surveillance spyware, named Hermit, used by the government of Kazakhstan to track individuals within the country. The latest samples of this spyware were detected by the researchers in April 2022, four months after a series of nation-wide protests against government policies that were viol

article thumbnail

WordPress Plug-in Ninja Forms Issues Update for Critical Bug

Dark Reading

The code injection vulnerability is being actively exploited in the wild, researchers say.

110
110
article thumbnail

China-linked APT Flew Under Radar for Decade

Threatpost

Evidence suggests that a just-discovered APT has been active since 2013.

article thumbnail

Ransomware and Phishing Remain IT's Biggest Concerns

Dark Reading

Security teams — who are already fighting off malware challenges — are also facing renewed attacks on cloud assets and remote systems.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Here’s Why You’re Still Stuck in Robocall Hell

WIRED Threat Level

Despite major progress fighting spam and scams, the roots of the problem go far deeper than your phone company’s defenses.

article thumbnail

Focus on employee experiences to master modern work 

OpenText Information Management

One of the most striking facts about the ‘Great Resignation’ is just how many people are willing to walk out of their current job with nowhere else to go. Workers are no longer willing to settle for poor experiences simply to guarantee an income. As people search for more fulfilling roles and career paths, companies … The post Focus on employee experiences to master modern work appeared first on OpenText Blogs.

article thumbnail

ACEDS writes about the new Information Governance ISO Standard

IG Guru

Check out their post here. The post ACEDS writes about the new Information Governance ISO Standard appeared first on IG GURU.

article thumbnail

Support eDiscovery at scale to master modern work

OpenText Information Management

Remote and hybrid work environments are here to stay and as corporate legal teams begin to reassess their needs in a post-pandemic environment, they are uniformly looking for ways to improve their prospects and transform their eDiscovery practices. The volumes of litigation, investigations and regulatory compliance matters continue to increase while data privacy regulations, cybersecurity … The post Support eDiscovery at scale to master modern work appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Tackling 5 Challenges Facing Critical National Infrastructure Today

Dark Reading

The stakes are high when protecting CNI from destructive malware and other threats.

83
article thumbnail

Master modern work with stronger information protection  

OpenText Information Management

Collaboration in a trustworthy and reliable information management process is paramount to the future of work. New regulatory and privacy requirements continue to emerge as new content-sharing technology and hybrid work models pose new security and privacy challenges. With a highly distributed workforce, the information they need must find them, not create new opportunities for … The post Master modern work with stronger information protection appeared first on OpenText Blogs.

Privacy 57
article thumbnail

UK Approves WikiLeaks Chief Julian Assange's Extradition to the US

WIRED Threat Level

The WikiLeaks founder will appeal the UK Home Office's decision to extradite him to the US.