Wed.Mar 11, 2020

article thumbnail

Windows Alert: Critical SMB_v3 Flaw Requires Workaround

Data Breach Today

Microsoft Recommends Emergency Disabling of SMBv3 Compression, Pending Patches Microsoft has confirmed that a serious flaw in Windows SMB_v3 exists that could be exploited by attackers to remotely seize control of vulnerable systems. While no attacks have been seen in the wild, no patch for the wormable flaw is yet available. A workaround exists for servers, but not clients.

318
318
article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Speed is what digital transformation is all about. Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. Related: The API attack vector expands Speed translates into innovation agility. But it also results in endless ripe attack vectors which threat actors swiftly seek out and exploit.

Cloud 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

State of Privacy: California Takes the Lead With CCPA

Data Breach Today

IAPP's Caitlin Fennessy and Perkins Coie's Dominique Shelton Leipzig Analyze New Law Organizations have been scrambling to comply with the California Consumer Privacy Act before enforcement begins in July, say Caitlin Fennessy, research director of the International Association of Privacy Professionals, and Dominique Shelton Leipzig, a partner at Perkins Coie LLP.

Privacy 263
article thumbnail

Avast disables the JavaScript engine component due to a severe issue

Security Affairs

Antivirus maker Avast has disabled a core component of its antivirus to address a severe vulnerability that would have allowed attackers to control users’ PC. The Antivirus maker Avast has disabled a major component of its antivirus engine to address a severe vulnerability that would have allowed attackers to hack into users’ PCs. The issue was discovered by the popular white-hat hacker and Google vulnerability researcher Tavis Ormandy, it resides in the Avast’s JavaScript engi

Access 114
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

2020 Election Security: Sizing Up Preparedness

Data Breach Today

Security Experts Say US Is Better Prepared This Time Around The U.S. is better prepared to respond to election interference and related cybersecurity issues than it was four years ago, several security professionals, including one of the FBI's top experts, tell Information Security Media Group.

Security 244

More Trending

article thumbnail

Microsoft Disrupts Necurs Botnet

Data Breach Today

Cybercriminals Thwarted From Using Infrastructure for Attacks Microsoft along with its partners from 35 countries has taken coordinated legal and technical action to disrupt Necurs, one of the largest botnets in the world, the company announced in a Tuesday blog post.

IT 208
article thumbnail

I Want to Work in Industrial IoT Security. What Lingo Do I Need to Know?

Dark Reading

Should you happen to be in a meeting with an ICS vendor, here are some terms you will need to know so as to not be laughed out of the room.

IoT 108
article thumbnail

2 RSA Conference Attendees Test Positive for Coronavirus

Data Breach Today

Both Worked for Security Firm Exabeam, Company Confirms Two employees of security firm Exabeam who attended the recent RSA 2020 conference in San Francisco, have tested posted for COVID-19, according to the company. The RSA Conference notes that's it not yet clear if the two contracted the coronavirus at the event or at some other time.

Security 162
article thumbnail

What can a Voice of the Customer program do for you?

OpenText Information Management

In my last blog, I concluded by saying that a good Voice of the Customer (Voc) program is time, money, and effort well spent. By gathering feedback at key points in your customer’s journey and acting on it, your organization can be a market leader in your respective industry. Customer experience is so instrumental to … The post What can a Voice of the Customer program do for you?

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Watchdog Finds Security Weaknesses in NIH's Records System

Data Breach Today

HHS Inspector General Recommends More Safeguards for Patient Data The U.S. National Institutes of Health must do more to ensure that its electronic health records system is secure and that patient data is kept safe and confidential, according to a new audit.

Security 147
article thumbnail

BREAKING: The California Attorney General Has Issued a Second Set of Modified Draft CCPA Regulations

Hunton Privacy

On March 11, 2020, the California Attorney General (“AG”) issued a second set of modified draft regulations implementing the California Consumer Privacy Act of 2018 (“CCPA”). The AG has provided a redline to the initial modified draft regulations about which we previously reported. According to the AG’s website , the second set of modified draft regulations are subject to another public comment period.

Privacy 92
article thumbnail

Ransomware Increasingly Targeting Small Governments

Dark Reading

To get back up and running quickly, and because it's cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware.

article thumbnail

Microsoft’s Patch Tuesday updates for March 2020 fix 115 issues

Security Affairs

Microsoft’s Patch Tuesday updates for March 2020 address 115 vulnerabilities, 26 issues have been rated as critical severity. Microsoft’s Patch Tuesday updates for March 2020 address 115 vulnerabilities, 26 issues affecting Windows, Word, Dynamics Business Central, Edge, and Internet Explorer have been rated as critical severity. Microsoft’s Patch Tuesday updates for March 2020 also address vulnerability Exchange Server, Office, Azure DevOps, Windows Defender, Visual Studio, and Dynamics. 88 vul

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

More Than Half of IoT Devices Vulnerable to Severe Attacks

Threatpost

A full 98 percent of all IoT device traffic is unencrypted, exposing personal and confidential data on the network.

IoT 106
article thumbnail

Why CSP Isn't Enough to Stop Magecart-Like Attacks

Dark Reading

As Magecart and formjacking attacks become more sophisticated, it's essential to address not only what services may interact with users, but what that interaction looks like and how to control it.

IT 112
article thumbnail

LA Covers Up Bad Cybersecurity

Schneier on Security

This is bad in several dimensions. The Los Angeles Department of Water and Power has been accused of deliberately keeping widespread gaps in its cybersecurity a secret from regulators in a large-scale coverup involving the city's mayor.

article thumbnail

Bugs in Avast AntiTrack expose users to cyber attacks

Security Affairs

A flaw in the impacting Avast and AVG AntiTrack privacy software could expose users to browser hijacking and Man-in-The-Middle (MiTM) attacks. Security expert David Eade has discovered a vulnerability ( CVE-2020-8987 ) in Avast and AVG AntiTrack privacy software that could expose end-users to Man-in-The-Middle (MiTM) attacks, browser session hijack, with consequent exposure of sensitive data. “A remote attacker running a malicious proxy could capture their victim’s HTTPS traffic and

Privacy 74
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Wishing won’t solve gender inequality in the workplace. We must act.

DXC Technology

With Women’s History Month underway, I’ve been thinking about a report published a few months ago in Wired magazine. The article examines the progress tech companies have made in diversifying their workforces since they began reporting statistics five years ago. I can describe that progress to you in two words—not much. From 2014 to 2019 […].

IT 78
article thumbnail

COVID-19 Drives Rush to Remote Work. Is Your Security Team Ready?

Dark Reading

A rapid transition to remote work puts pressure on security teams to understand and address a wave of potential security risks.

article thumbnail

Ryan Dolley partners up to facilitate change with analytics

IBM Big Data Hub

This story is part of Analytics Heroes , a series of profiles on leaders transforming the future of business analytics.

article thumbnail

Necurs Botnet in Crosshairs of Global Takedown Offensive

Threatpost

The tech giant will take control of the U.S.-based infrastructure used by the criminals behind the world’s most prolific botnet used to distribute malware and infect victim computers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Gender Equality in Cybersecurity Could Drive Economic Boost

Dark Reading

If the number of women in cybersecurity equaled the number of men, the US would see an economic gain up to $30.4 billion, research shows.

article thumbnail

Phishing Attack Skirts Detection With YouTube

Threatpost

Attackers are using YouTube redirect links, whitelisted by various security defense mechanisms, to evade detection.

article thumbnail

Court Denies Southwest Airlines’ Motion for Rule 11 Sanctions Against Plaintiff: eDiscovery Case Law

eDiscovery Daily

In Houston v. Southwest Airlines, No. 3:17-cv-02610-N-BT (N.D. Tex. Feb. 18, 2020) , Texas Magistrate Judge Rebecca Rutherford “decline[d] to impose sanctions under either Rule 11 or its inherent powers” against the plaintiff for statements she made regarding her response to the defendant’s interrogatories and requests for admission in her summary judgment response.

article thumbnail

The Ultimate Security Budget Excel Template – The Easiest Way to Plan and Monitor Your Security Spending

Threatpost

The Ultimate Security Budget Plan & Track Excel template provides security executives with a clear and intuitive tool to keep track of planned vs. actual spend, ensuring that security needs are addressed while maintaining the budgetary frame.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Rep. Maddock: Burdensome record storage costs would be dialed back with reproduction plan via Michigan GOP House

IG Guru

Proposed new bill could streamline record storage and save municipalities time and money storing records. The post Rep. Maddock: Burdensome record storage costs would be dialed back with reproduction plan via Michigan GOP House appeared first on IG GURU.

article thumbnail

Alternative Data Fatigue: How It Happens and How to Solve It

Import.IO

Organizations often turn to alternative data for relevant and complete datasets, but this route can lead them to alternative data fatigue. Alternative data providers offer datasets for competitive insights, but they often package and sell the same datasets to multiple hedge funds who then spend much of their time preparing. The post Alternative Data Fatigue: How It Happens and How to Solve It appeared first on Import.io.

IT 52
article thumbnail

Balancing Ediscovery with Privacy Compliance

Zapproved

A webinar featuring pragmatic steps that legal counsel can take to manage global privacy, discussed industry best practices for managing requests, and dove into real world strategies to strike the right balance between ediscovery and compliance teams.