Fri.Dec 23, 2022

article thumbnail

Biden Signs Law to Safeguard IT Against Quantum Computing

Data Breach Today

Federal Agencies Told to Prepare to Move Quickly Once Standards Get Identified U.S. President Joe Biden signed into law the Quantum Computing Cybersecurity Preparedness Act, designed "to encourage the migration of federal government IT systems to quantum-resistant cryptography" by ensuring they prepare strategies now for implementing forthcoming cryptography standards.

IT 270
article thumbnail

Container Verification Bug Allows Malicious Images to Cloud Up Kubernetes

Dark Reading

A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes pod to steal data and inject malware.

Cloud 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Christopher Ahlberg on Recorded Future's Work to Aid Ukraine

Data Breach Today

Recorded Future Co-Founder & CEO on How to Defend Ukraine from Russian Cyberattacks Recorded Future has signed an agreement with Ukraine's Ministry of Digital Transformation to help protect the county's critical infrastructure against Russian physical and cyberattacks. The company can help detect novel strains of malware and command-and-control infrastructure run by the Russians.

article thumbnail

TikTok parent company ByteDance revealed the use of TikTok data to track journalists

Security Affairs

ByteDance admitted that its employees accessed TikTok data to track journalists to identify the source of leaks to the media. TikTok parent company ByteDance revealed that several employees accessed the TikTok data of two journalists to investigate leaks of company information to the media. . According to an email from ByteDance’s general counsel Erich Andersen which was seen by the AFP news agency, the Chinese company was attempting to discover who shared company information with a Financ

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Belgian Bank Suspects Data Leak Traces to Ex-Employee

Data Breach Today

Stock Option Plan Details for Employees of Hundreds of Clients Exposed, Bank Warns Belgian banking giant Degroof Petercam is warning hundreds of clients that their employees are at risk of fraud after personal details tied to their stock option plans were accessed, potentially by an ex-employee. The bank has reported the data breach to the Belgian Data Protection Authority.

More Trending

article thumbnail

Rate of Compromised Accounts up 300% in 3 Years!

Data Breach Today

TeleSign's Seth Gilpin on Fraud and Risk Management in Customer Account and Device Security. Digital transformation we all have experienced over the last few years, everything online is at risk of fraud – fraudsters will try to take advantage over customer digital footprint at any time and access point. Telesign's Seth Gilpin shares insights.

article thumbnail

Hacking the JFK Airport Taxi Dispatch System

Schneier on Security

Two men have been convicted of hacking the taxi dispatch system at the JFK airport. This enabled them to reorder the taxis on the list; they charged taxi drivers $10 to cut the line.

80
article thumbnail

Commvault, Rubrik, Cohesity Lead Data Resilience: Forrester

Data Breach Today

Data Protection and Security Converge; Veritas and Veeam Fall in Latest Rankings Data resilience stalwarts Commvault, Rubrik and Cohesity have pulled ahead of rivals Veeam Software and Veritas atop the latest Forrester Wave. Commvault, Rubrik and Veritas took the gold, silver and bronze, respectively, for the strength of their current data resilience offerings.

Security 130
article thumbnail

Videoconferencing Worries Grow, With SMBs in Cyberattack Crosshairs

Dark Reading

Securing videoconferencing solutions is just one of many IT security challenges small businesses are facing, often with limited financial and human resources.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Advancing Standards-Based, Secure Health Data Exchange

Data Breach Today

Plans to merge together two health data exchange standards organizations - DirectTrust and the Electronic Healthcare Network Accreditation Commission - will help support healthcare sector efforts to advance secure, health data exchange, says Scott Stuewe, CEO of DirectTrust.

Security 130
article thumbnail

Fool Me Thrice? How to Avoid Double and Triple Ransomware Extortion

Dark Reading

To stay safer, restrict access to data, monitor for breaches in the supply chain, track relevant data that is sold on the Dark Web, and implement best safety practices.

article thumbnail

ISMG Editors: Why Zero Trust Isn't the Answer to Everything

Data Breach Today

Also: Saluting CISO Marene Allison's Achievements; Regulating Digital Assets A salute to the career of Johnson & Johnson CISO Marene Allison leads this week's Information Security Media Group Editors' Panel, which also reviews essentials for implementing a zero trust strategy and the use of banking standards to regulate blockchain-based digital assets.

article thumbnail

Google: With Cloud Comes APIs & Security Headaches

Dark Reading

APIs are key to cloud transformation, but two Google surveys find that cyberattacks targeting them are reaching a tipping point, even as general cloud security issues abound.

Cloud 95
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

LastPass Breach: Attacker Stole Encrypted Password Vaults

Data Breach Today

While Unencrypted Data Also Stolen, Experts Urge Continued Use of Password Managers The attack earlier this year that compromised systems and data at LastPass is more extensive than the password management software provider previously revealed. LastPass says the attacker downloaded from the cloud backups of multiple users' encrypted password vaults, as well as unencrypted URLs.

Passwords 130
article thumbnail

LastPass Cops to Massive Breach Including Customer Vault Data

Dark Reading

The follow-on attack from August's source-code breach could fuel future campaigns against LastPass customers.

87
article thumbnail

BetMGM discloses security breach impacting 1.5 Million customers

Security Affairs

Online sports betting company BetMGM suffered a data breach and threat actors offered for sale a database containing the data of 1.5 million customers. On December 21, the online sports betting company BetMGM disclosed a data breach while threat actors offered for sale a database containing the information of 1,569,310 million BetMGM customers. “ We breached BetMGM’s casino database current as of Nov 2022.

article thumbnail

LexisNexis Practice Note – “E-discovery: Planning for and Conducting E-discovery (WA)”

eDiscovery Law

Focusing on procedural rules and case law particular to Washington, Julie Anne Halter (Partner and e-DAT Practice Group Co-Chair) and Bree Kelly (e-DAT Senior Staff Lawyer) provide practical guidance for the state’s legal practitioners on each step of the e-discovery process in their recent LexisNexis Practice Note. The Practice Note identifies relevant superior court civil rules […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

TikTok parent company ByteDance revealed the use of TikTok data to track journalists

Security Affairs

ByteDance admitted that its employees accessed TikTok data to track journalists to identify the source of leaks to the media. TikTok parent company ByteDance revealed that several employees accessed the TikTok data of two journalists to investigate leaks of company information to the media. . According to an email from ByteDance’s general counsel Erich Andersen which was seen by the AFP news agency, the Chinese company was attempting to discover who shared company information with a Financ

article thumbnail

IRS mistakenly publishes 112,000 taxpayer records for the second time | IT PRO

IG Guru

Check out the article here.

IT 73
article thumbnail

LastPass revealed that encrypted password vaults were stolen

Security Affairs

The data breach suffered by LastPass in August 2022 may have been more severe than previously thought. In August password management software firm LastPass disclosed a security breach, threat actors had access to portions of the company development environment through a single compromised developer account and stole portions of source code and some proprietary technical information.

article thumbnail

Friday Squid Blogging: Injured Giant Squid and Paddleboarder

Schneier on Security

Here’s a video —I don’t know where it’s from—of an injured juvenile male giant squid grabbing on to a paddleboard. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

An Iranian group hacked Israeli CCTV cameras, defense was aware but didn’t block it

Security Affairs

An Iranian group hacked dozens of CCTV cameras in Israel in 2021 and maintained access for a long period of time. An Iranian group of hackers, known as Moses Staff, had seized control of dozens of Israeli CCTV cameras, the hack was known to the authorities that did nothing to stop it, reported The Times of Israel which had access to a preview of the full investigative report. “In a preview of a full investigative report set to be aired on Tuesday, the Kan public broadcaster said officials

IT 85