Fri.Jul 03, 2020

article thumbnail

Digital IDs: A Progress Report

Data Breach Today

The latest edition of the ISMG Security Report discusses global progress on adopting standard digital identifiers. Plus, a former cybercriminal discusses emerging fraud trends, and an update on the evolution of e-signatures.

Security 293
article thumbnail

The Worst Hacks and Breaches of 2020 So Far

WIRED Threat Level

Iran, China, Russia—the gang was all here in the first half of this year. Oh, and also an unprecedented pandemic that’s been a boon for hackers.

Security 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Operators Behind Valak Malware Expand Malicious Campaign

Data Breach Today

Financial, Manufacturing, Healthcare and Insurance Firms Victimized The operators behind the Valak malware strain have expanded their malicious campaigns to other parts of the world, targeting financial, manufacturing, healthcare and insurance firms, according to Cisco Talos. Attackers are now using existing email threads and ZIP files to spread the information stealer.

Insurance 238
article thumbnail

Cybersecurity's Lament: There are No Cooks in Space

Dark Reading

Cybersecurity staff are on edge for the same reason that there are no cooks on the ISS: Organizations are carefully watching expenses for jobs that don't require dedicated team members.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Detecting Network Security Incidents

Data Breach Today

ENISA's Rossella Mattioli Reviews New Report Rossella Mattioli, a network and information security expert at ENISA, the European Union Agency for Cybersecurity, discusses a new report offering insights on detecting network security incidents.

Security 230

More Trending

article thumbnail

Apache Guacamole Vulnerable to Reverse RDP Vulnerabilities

Data Breach Today

Researchers: Attackers Can Steal Data or Run Remote Code Execution Apache Guacamole, an open-source application that allows for remote connections to devices, contains several vulnerabilities that could allow attackers to steal data or run remote code execution, Check Point Research found. These bugs come at a time when many employees are still working remotely.

185
185
article thumbnail

Hackers are targeting unsecured MongoDB database

Security Affairs

A new wave of attacks is targeting unsecured MongoDB database servers and wiping their content attempting to extort a ransom to the victims. The popular security expert Victor Gevers from the non-profit GDI Foundation reported a new wave of attacks that are targeting unsecured MongoDB database servers exposed online. Threat actors are wiping the content of the databases and are demanding the payment of a ransom, they are threatening to leak the stolen data and report the owners for a violation o

GDPR 103
article thumbnail

Hacked by Police

Schneier on Security

French police hacked EncroChat secure phones, which are widely used by criminals: Encrochat's phones are essentially modified Android devices, with some models using the "BQ Aquaris X2," an Android handset released in 2018 by a Spanish electronics company, according to the leaked documents. Encrochat took the base unit, installed its own encrypted messaging programs which route messages through the firm's own servers, and even physically removed the GPS, camera, and microphone functionality from

article thumbnail

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity

CGI

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity. This CGI blog post discusses monitoring horticulture assets from space to help insurers reduce risks and ensure business continuity. dharini.s@cgi.com. Fri, 07/03/2020 - 02:22.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Introducing 'Secure Access Service Edge'

Dark Reading

The industry's latest buzzword is largely a repackaging exercise that bundles a collection of capabilities together and offers them as a cloud-delivered service.

Access 95
article thumbnail

E.U. Authorities Crack Encryption of Massive Criminal and Murder Network

Threatpost

Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money.

article thumbnail

NARA’s three-legged stool to transform records management

IG Guru

Check out the article and video here. The post NARA’s three-legged stool to transform records management appeared first on IG GURU.

article thumbnail

Weekly Update 198

Troy Hunt

Well, no surprises here: this week's update is dominated by Thursday's blog post about sustaining performance under extreme stress. The feedback on that post has been absolutely phenomenal; tweets, comments, DMs, emails, phone calls, all enormously supportive. Many of them also shared people's own personal struggles, ones which I think we all know are out there but it's a very different thing to actually hear it from someone personally.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Friday Squid Blogging: Strawberry Squid

Schneier on Security

Pretty. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

article thumbnail

Keep calm – you have good bones

Rocket Software

For some time now, we have increasingly heard about the need for disruption and disruptive technologies to drive a wave of innovation across industries and governments. That is often interpreted as management-speak for “replace all of that old ‘legacy’ stuff with some cool new stuff.” But the reality is that the old ‘legacy’ stuff continues to be an important foundation for transformation in many organizations.

article thumbnail

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity

CGI

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity. This CGI blog post discusses monitoring horticulture assets from space to help insurers reduce risks and ensure business continuity. dharini.s@cgi.com. Fri, 07/03/2020 - 02:22.

article thumbnail

New book tackles the challenges of discovery in the (post-Google) era

CILIP

New book tackles the challenges of discovery in the (post-Google) era. Facet Publishing announce the release of Resource Discovery for the Twenty-First Century Library: Case studies and perspectives on the role of IT in user engagement and empowerment, edited by Simon McLeish. Of all the parts of modern library provision, discovery services are the most clearly affected by developments in IT, from databases to search engines to linked data to machine learning.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity

CGI

Helping insurers monitor horticulture assets from space to reduce risks and ensure business continuity. This CGI blog post discusses monitoring horticulture assets from space to help insurers reduce risks and ensure business continuity. dharini.s@cgi.com. Fri, 07/03/2020 - 02:22.

article thumbnail

Alleged cyber attacks caused fire and explosions at nuclear and military facilities in Iran

Security Affairs

The root cause of a series of explosions at important facilities in Iran may be cyberattacks allegedly launched by Israel. A recent sequence of fires and explosions at important Iranian facilities may have been caused by cyber attacks as part of an operation conducted by Israel. Recently several major Iranian industrial facilities suffered a sequence of mysterious incidents.

Military 104