Fri.Jul 03, 2020

article thumbnail

Digital IDs: A Progress Report

Data Breach Today

The latest edition of the ISMG Security Report discusses global progress on adopting standard digital identifiers. Plus, a former cybercriminal discusses emerging fraud trends, and an update on the evolution of e-signatures.

Security 293
article thumbnail

The Worst Hacks and Breaches of 2020 So Far

WIRED Threat Level

Iran, China, Russia—the gang was all here in the first half of this year. Oh, and also an unprecedented pandemic that’s been a boon for hackers.

Security 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Operators Behind Valak Malware Expand Malicious Campaign

Data Breach Today

Financial, Manufacturing, Healthcare and Insurance Firms Victimized The operators behind the Valak malware strain have expanded their malicious campaigns to other parts of the world, targeting financial, manufacturing, healthcare and insurance firms, according to Cisco Talos. Attackers are now using existing email threads and ZIP files to spread the information stealer.

article thumbnail

Cybersecurity's Lament: There are No Cooks in Space

Dark Reading

Cybersecurity staff are on edge for the same reason that there are no cooks on the ISS: Organizations are carefully watching expenses for jobs that don't require dedicated team members.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Detecting Network Security Incidents

Data Breach Today

ENISA's Rossella Mattioli Reviews New Report Rossella Mattioli, a network and information security expert at ENISA, the European Union Agency for Cybersecurity, discusses a new report offering insights on detecting network security incidents.

Security 230

More Trending

article thumbnail

Apache Guacamole Vulnerable to Reverse RDP Vulnerabilities

Data Breach Today

Researchers: Attackers Can Steal Data or Run Remote Code Execution Apache Guacamole, an open-source application that allows for remote connections to devices, contains several vulnerabilities that could allow attackers to steal data or run remote code execution, Check Point Research found. These bugs come at a time when many employees are still working remotely.

185
185
article thumbnail

Hackers are targeting unsecured MongoDB database

Security Affairs

A new wave of attacks is targeting unsecured MongoDB database servers and wiping their content attempting to extort a ransom to the victims. The popular security expert Victor Gevers from the non-profit GDI Foundation reported a new wave of attacks that are targeting unsecured MongoDB database servers exposed online. Threat actors are wiping the content of the databases and are demanding the payment of a ransom, they are threatening to leak the stolen data and report the owners for a violation o

GDPR 103
article thumbnail

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity

CGI

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity. This CGI blog post discusses monitoring horticulture assets from space to help insurers reduce risks and ensure business continuity. dharini.s@cgi.com. Fri, 07/03/2020 - 02:22.

article thumbnail

Hacked by Police

Schneier on Security

French police hacked EncroChat secure phones, which are widely used by criminals: Encrochat's phones are essentially modified Android devices, with some models using the "BQ Aquaris X2," an Android handset released in 2018 by a Spanish electronics company, according to the leaked documents. Encrochat took the base unit, installed its own encrypted messaging programs which route messages through the firm's own servers, and even physically removed the GPS, camera, and microphone functionality from

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Introducing 'Secure Access Service Edge'

Dark Reading

The industry's latest buzzword is largely a repackaging exercise that bundles a collection of capabilities together and offers them as a cloud-delivered service.

Access 95
article thumbnail

E.U. Authorities Crack Encryption of Massive Criminal and Murder Network

Threatpost

Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money.

article thumbnail

NARA’s three-legged stool to transform records management

IG Guru

Check out the article and video here. The post NARA’s three-legged stool to transform records management appeared first on IG GURU.

article thumbnail

Weekly Update 198

Troy Hunt

Well, no surprises here: this week's update is dominated by Thursday's blog post about sustaining performance under extreme stress. The feedback on that post has been absolutely phenomenal; tweets, comments, DMs, emails, phone calls, all enormously supportive. Many of them also shared people's own personal struggles, ones which I think we all know are out there but it's a very different thing to actually hear it from someone personally.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Keep calm – you have good bones

Rocket Software

For some time now, we have increasingly heard about the need for disruption and disruptive technologies to drive a wave of innovation across industries and governments. That is often interpreted as management-speak for “replace all of that old ‘legacy’ stuff with some cool new stuff.” But the reality is that the old ‘legacy’ stuff continues to be an important foundation for transformation in many organizations.

article thumbnail

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity

CGI

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity. This CGI blog post discusses monitoring horticulture assets from space to help insurers reduce risks and ensure business continuity. dharini.s@cgi.com. Fri, 07/03/2020 - 02:22.

article thumbnail

New book tackles the challenges of discovery in the (post-Google) era

CILIP

New book tackles the challenges of discovery in the (post-Google) era. Facet Publishing announce the release of Resource Discovery for the Twenty-First Century Library: Case studies and perspectives on the role of IT in user engagement and empowerment, edited by Simon McLeish. Of all the parts of modern library provision, discovery services are the most clearly affected by developments in IT, from databases to search engines to linked data to machine learning.

article thumbnail

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity

CGI

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity. This CGI blog post discusses monitoring horticulture assets from space to help insurers reduce risks and ensure business continuity. dharini.s@cgi.com. Fri, 07/03/2020 - 02:22.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Alleged cyber attacks caused fire and explosions at nuclear and military facilities in Iran

Security Affairs

The root cause of a series of explosions at important facilities in Iran may be cyberattacks allegedly launched by Israel. A recent sequence of fires and explosions at important Iranian facilities may have been caused by cyber attacks as part of an operation conducted by Israel. Recently several major Iranian industrial facilities suffered a sequence of mysterious incidents.

Military 104
article thumbnail

Friday Squid Blogging: Strawberry Squid

Schneier on Security

Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.