Mon.Mar 02, 2020

article thumbnail

Walgreens Mobile App Exposed Health-Related Messages

Data Breach Today

For Six Days, App May Have Shown Private Messages to Other Users Walgreens' mobile app inadvertently disclosed personal messages to other customers due to an internal application error, revealing some health-related information. The company did not say how many people were affected.

261
261
article thumbnail

French Firms Rocked by Kasbah Hacker?

Krebs on Security

A large number of French critical infrastructure firms were hacked as part of an extended malware campaign that appears to have been orchestrated by at least one attacker based in Morocco, KrebsOnSecurity has learned. An individual thought to be involved has earned accolades from the likes of Apple , Dell , and Microsoft for helping to find and fix security vulnerabilities in their products.

Passwords 248
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 'Human Element' in Privacy

Data Breach Today

Gabriel Gumbs of Spirion on Privacy Regulations and Data Classification The RSA 2020 theme was "The Human Element." Gabriel Gumbs of Spirion describes what this means in the era of privacy regulations.

Privacy 244
article thumbnail

NEW TECH: Juicing up SOAR — SIRP inserts risk-based analysis into network defense playbooks

The Last Watchdog

Security information and event management (SIEM) is evolving and integrating with security orchestration, automation, and response (SOAR) to add real value in the cybersecurity space. Related : How SOAR Is Helping to Address the Cybersecurity Skills Gap SIEM is useful for detecting potential security incidents and triggering alerts, but the addition of a SOAR solution brings these alerts to another level by triaging the data and adopting remediation measures where required.

Risk 140
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Redefining Security Analytics

Data Breach Today

Chronicle's Anton Chuvakin on How to Fill the Gaps for Analysts There are glaring holes in how enterprises currently tackle security analytics, and by redefining the approach, the analyst's role can be transformed. Dr. Anton Chuvakin of Chronicle explains how.

Analytics 242

More Trending

article thumbnail

Careless and Malicious Insiders: The Threat Persists

Data Breach Today

SolarWinds' Tim Brown on Managing Complexity and Insider Risks Careless and malicious insiders, overly complex IT infrastructure and having an excess of privileged users continue to pose serious risks to the integrity of corporate cybersecurity practices, says Timothy Brown of SolarWinds.

Risk 162
article thumbnail

SurfingAttack – hacking phones via ultrasonic waves

Security Affairs

SurfingAttack is an attacking technique that allows to wake up mobile device and control them using voice commands encoded in ultrasonic waves. SurfingAttack is a hacking technique that sees voice commands encoded in ultrasonic waves silently activate a mobile phone’s digital assistant. The technique could be used to do several actions such as making phone calls or reading text messages.

Paper 128
article thumbnail

Alleged Ticketfly Hacker Indicted for Extortion

Data Breach Today

2018 Data Breach Exposed 27 Million Records An alleged hacker who's accused of breaching the now defunct Ticketfly site in 2018 and exposing the personal information of about 27 million account holders has been indicted on a federal extortion charge, according to court documents filed by the FBI.

article thumbnail

Nemty ransomware “LOVE_YOU” malspam campaign

Security Affairs

Security experts uncovered an ongoing campaign delivering Nemty Ransomware via emails disguised as messages from secret lovers. Researchers from Malwarebytes and X-Force IRIS have uncovered an ongoing spam campaign distributing the Nemty Ransomware via messages disguised as messages from secret lovers. Secret lover malspam delivers #Nemty #ransomware Nemty: 92.63.197[.]190/nnn.exe 4799d051f0e40b15ec67593ea838df901613018d26b612d6d2447431323d4a01 C2: nemty11[.]hk pic.twitter.com/45DVUVF6cj —

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Inside Webroot 2020 Threat Report

Data Breach Today

Hal Lonas of OpenText Shares Cybersecurity Predictions Webroot just released its 2020 Threat Report. How has the landscape changed, and what cybersecurity predictions are made for 2020? Hal Lonas of OpenText shares insights and outlines the next round of research into artificial intelligence and machine learning.

article thumbnail

Experts warn of mass scans for Apache Tomcat Ghostcat flaw

Security Affairs

Experts warn of ongoing scans for Apache Tomcat servers affected by the Ghostcat flaw that could allow attackers to take over servers. Security experts are warning of ongoing scans for Apache Tomcat servers affected by the recently disclosed Ghostcat vulnerability CVE-2020-1938. The flaw affects all versions of Apache Tomcat, it could be exploited by attackers to read configuration files or install backdoors on vulnerable servers.

Passwords 107
article thumbnail

A New Approach to Application Threat Detection and Response

Data Breach Today

Sameer Malhotra of TrueFort on Filling XDR Visibility Gaps Moving from EDR to XDR creates new visibility gaps for organizations, says Sameer Malhotra of TrueFort, who explains a new approach to application threat detection and response.

147
147
article thumbnail

Venezuela – Power outage knocked out part of the internet connectivity

Security Affairs

A power outage and fluctuations in supply across Venezuela 1 March 2020, knocked out approximately 35% of the country’s telecommunications infrastructure. The NetBlocks internet observatory, which tracks disruptions and shutdowns, reported that yesterday (March 1, 2020) a massive power outage across Venezuela that knocked out a large part of the country’s connectivity to the Internet.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Women on the rise in Data Science

IBM Big Data Hub

IBM Data Science and AI Elite team members Mehrnoosh Vahdat and Rachael Dottle were just one month into their IBM careers when they received their first assignment last July. . The project jettisoned them into the heart of Africa, where their banking client was looking to surface new business opportunities across the subcontinent. Their mission was to generate a proof of concept designed to enhance the value of data science and inject the results into workflows for business users and clients.

article thumbnail

Walgreens Mobile App Leaks Prescription Data

Threatpost

A security error in the Walgreens mobile app may have leaked customers' full names, prescriptions and shipping addresses.

Security 113
article thumbnail

Facebook's Download-Your-Data Tool Is Incomplete

Schneier on Security

Privacy International has the details : Key facts: Despite Facebook claim, "Download Your Information" doesn't provide users with a list of all advertisers who uploaded a list with their personal data. As a user this means you can't exercise your rights under GDPR because you don't know which companies have uploaded data to Facebook. Information provided about the advertisers is also very limited (just a name and no contact details), preventing users from effectively exercising their rights.

article thumbnail

How does better content management help put food on the table?

OpenText Information Management

As a trusted and ethically managed business in the Agro-industry, Betagro places a high emphasis on food quality, safety and sustainability. With operations throughout Asia and Europe currently undergoing expansion, any improvement to its supply chain is welcome, while ensuring it adheres to strict regulations and compliance regimes. This requires meticulous documentation surrounding its approval … The post How does better content management help put food on the table?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Gamer Alert: Serious Nvidia Flaw Plagues Graphics Driver

Threatpost

Several flaws found in Nvidia's graphics drivers could enable denial of service, remote code execution and other malicious attacks.

article thumbnail

A new way to work: How to enable effective remote collaboration amid the coronavirus outbreak

OpenText Information Management

As coronavirus cases increase around the world, businesses are struggling to support the productivity of a growing employee base who are required to work from home in an effort to contain the outbreak. How do companies that have traditionally been rooted in offices accelerate this sudden shift to a remote workforce? Here at OpenText™, we … The post A new way to work: How to enable effective remote collaboration amid the coronavirus outbreak appeared first on OpenText Blogs.

article thumbnail

Karkoff 2020: a new APT34 espionage operation involves Lebanon Government

Security Affairs

Experts from Cybaze/ Yoroi Zlab spotted a new sample of the Karkoff implant that was employed in past campaigns associated with Iran-linked APT34 group. Experts from Cybaze/ Yoroi Zlab spotted a new sample of the Karkoff implant that was employed in past campaigns associated with Iran-linked APT34 group. Introduction. In November 2018, researchers from Cisco Talos tracked and detailed a “ DNSEspionage ” campaign against targets in Lebanon and UAE.

article thumbnail

Why Threat Intelligence Gathering Can Be a Legal Minefield

Dark Reading

In new guidance, the Department of Justice says security researchers and organizations run real risks when gathering threat intelligence or dealing with criminals in underground online marketplaces.

Risk 106
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

WireGuard Gives Linux a Faster, More Secure VPN

WIRED Threat Level

The virtual private network software from security researcher Jason Donenfeld wins fans with its simplicity and ease of auditing.

article thumbnail

Data Center Pandemic-Preparedness

Daymark

The CDC recently requested all businesses to dust off their pandemic preparedness plans amid the spread of the Coronavirus also known as (COVID-19). The global threat has already had a major economic impact in a very short time, as is evidenced in the recent stock market plunges, worldwide flight cancellations and travel bans, and the clothing manufacturing sector to name a few.

article thumbnail

Forrester: Keeping Smart Cities Safe From Hacks

Threatpost

As cities grow more connected, municipal operators must deal with new risks like ransomware, IoT hacks and more.

IoT 84
article thumbnail

Karkoff 2020: a new APT34 espionage operation involves Lebanon Government

Security Affairs

Experts from Cybaze/ Yoroi Zlab spotted a new sample of the Karkoff implant that was employed in past campaigns associated with Iran-linked APT34 group. Experts from Cybaze/ Yoroi Zlab spotted a new sample of the Karkoff implant that was employed in past campaigns associated with Iran-linked APT34 group. Introduction. In November 2018, researchers from Cisco Talos tracked and detailed a “ DNSEspionage ” campaign against targets in Lebanon and UAE.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Good News for TCPA Defendants

Hunton Privacy

The meaning of an “automatic telephone dialing system” (“ATDS”) as defined by the Telephone Consumer Protection Act (“TCPA”) has been hotly contested since the D.C. Circuit invalidated the prior Federal Communications Commission (“FCC”) rulings interpreting the TCPA in 2018. The Ninth Circuit has held that merely calling numbers from a stored list is sufficient to meet the definition of an ATDS, while the Third Circuit has at least indicated that the ability to generate numbers randomly or seque

article thumbnail

How Security Leads at Starbucks and Microsoft Prepare for Breaches

Dark Reading

Executives discuss the security incidents they're most worried about and the steps they take to prepare for them.

article thumbnail

Diversity in Tech Podcast Available

IG Guru

On this podcast, we’ll discover ways to increase representation in tech while sharing everyday stories of people of color in tech. The post Diversity in Tech Podcast Available appeared first on IG GURU.