Wed.Nov 10, 2021

article thumbnail

Webinar Recap: Three Things You Need to Know About Slack’s New Legal Hold

Hanzo Learning Center

If your organization uses Slack for business communications, how are you preserving Slack data for potential litigation?

article thumbnail

SMS About Bank Fraud as a Pretext for Voice Phishing

Krebs on Security

Most of us have probably heard the term “smishing” — which is a portmanteau for traditional ph ishing scams sent through SMS text messages. Smishing messages usually include a link to a site that spoofs a popular bank and tries to siphon personal information. But increasingly, phishers are turning to a hybrid form of smishing — blasting out linkless text messages about suspicious bank transfers as a pretext for immediately calling and scamming anyone who responds via text

Phishing 353
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sophisticated Android spyware PhoneSpy infected thousands of Korean phones

Security Affairs

South Korean users have been targeted with a new sophisticated Android spyware, tracked as PhoneSpy, as part of an ongoing campaign. Researchers from Zimperium zLabs uncovered an ongoing campaign aimed at infecting the mobile phones of South Korean users with new sophisticated android spyware dubbed PhoneSpy. The malware already hit more than a thousand South Korean victims.

Phishing 139
article thumbnail

Critical Citrix DDoS Bug Shuts Down Network, Cloud App Access

Threatpost

The distributed computing vendor patched the flaw, affecting Citrix ADC and Gateway, along with another flaw impacting availability for SD-WAN appliances.

Access 138
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Experts found 14 new flaws in BusyBox, millions of devices at risk

Security Affairs

Researchers have identified a total of 14 new vulnerabilities in BusyBox that expose million of Unix-based devices to cyberattacks. Researchers from software development company JFrog and industrial cybersecurity firm Claroty have identified a total of 14 new critical vulnerabilities in BusyBox. The software is used by many network appliances and embedded devices with limited memory and storage resources.

Risk 122

More Trending

article thumbnail

Researcher Details Vulnerabilities Found in AWS API Gateway

Dark Reading

AWS fixed the security flaws that left the API service at risk of so-called HTTP header-smuggling attacks, says the researcher who discovered them.

Risk 132
article thumbnail

Massive Zero-Day Hole Found in Palo Alto Security Appliances

Threatpost

Researchers have a working exploit for the vulnerability (now patched), which allows for unauthenticated RCE and affects an estimated 70,000+ VPN/firewalls.

Security 127
article thumbnail

Hacking the Sony Playstation 5

Schneier on Security

I just don’t think it’s possible to create a hack-proof computer system, especially when the system is physically in the hands of the hackers. The Sony Playstation 5 is the latest example: Hackers may have just made some big strides towards possibly jailbreaking the PlayStation 5 over the weekend, with the hacking group Fail0verflow claiming to have managed to obtain PS5 root keys allowing them to decrypt the console’s firmware. […].

Paper 118
article thumbnail

4 Tips to Secure the OT Cybersecurity Budget You Require

Dark Reading

OT security engineers and personnel should approach senior management with an emphasis on risk reduction benefits and with a concrete plan to secure budget and funding before it's too late.

Security 113
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ISO 45001: Requirements and structure explained

IT Governance

ISO 45001 is the international standard for occupational health and safety. Its purpose is to reduce injuries and diseases in the workplace, including the promotion and protection of physical and mental health. This is an issue that’s more important than ever, with 1.9 million deaths and 360 million injuries each year from workplace incidents. In this blog, we look at each clause of ISO 45001 to understand how it works and what you must do to achieve compliance.

article thumbnail

Lloyd Court Says No to Class Action-Style Lawsuits in the UK

Hunton Privacy

On November 10, 2021, the UK Supreme Court issued its long-awaited judgment in the Lloyd v Google case. The decision is expected to make it difficult in practice for a future class action lawsuit that is brought on behalf of a class of individuals who have not actively opted in to being represented by the lead claimant to proceed under UK law. The Lloyd case concerned alleged violations by Google in 2011 and 2012 of the UK Data Protection Act 1998 (the “DPA”) in connection with the collection an

GDPR 104
article thumbnail

Citrix addresses a critical flaw in ADC, Gateway

Security Affairs

Citrix addressed two vulnerabilities affecting Citrix ADC, Gateway, and SD-WAN, one of them is a critical issue leading to DoS. Citrix has released security updates to address two vulnerabilities in ADC, Gateway, and SD-WAN, including a critical flaw, tracked as CVE-2021-22955, that can be exploited to trigger a denial of service (DoS) condition. The CVE-2021-22955 DoS vulnerability affects Citrix Application Delivery Controller (ADC) and Gateway devices that have been configured as a VPN (Gatew

article thumbnail

Hacker-for-Hire Group Spied on More Than 3,500 Targets in 18 Months

Dark Reading

Russian-speaking "Void Balaur" group's victims include politicians, dissidents, human rights activists, doctors, and journalists, security vendor discloses at Black Hat Europe 2021.

Security 106
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Good news for data controllers: Lloyd v Google Supreme Court decision

Data Protection Report

On 10 November 2021, the UK Supreme Court handed down the much anticipated judgment in Lloyd v Google LLC [2021] UKSC 50, unanimously allowing Google’s appeal and reversing the decision of the Court of Appeal. In summary, the Supreme Court ruled that damages for “loss of control” are not available for breach of the Data Protection Act 1998 ( DPA 1998 ), and that even if loss of control damages had been available, the claim could not be brought as a representative action as it would still have be

IT 98
article thumbnail

UK: Lloyd v Google – Supreme Court Judgment – report and impacts on data protection and mass claims in the UK

DLA Piper Privacy Matters

On 10 November 2021, the UK Supreme Court, in a unanimous judgment, allowed Google’s appeal against the Court of Appeal decision granting Mr Lloyd permission to continue his representative claim (i.e. a US-style opt-out “class action”) against Google. The judgment brings very welcome clarification in a rapidly evolving area of English law relating to representative “class” actions in general, and in the context of data protection regimes specifically.

IT 98
article thumbnail

Participate in the ARMA IG Maturity Index Survey

IG Guru

Are there gaps in your information governance program? Is your organization leading or falling behind others in your industry? Now in its third year, the IG Maturity Index Survey continues to create the industry-standard benchmark for information governance. The first 200 participants to complete the survey will receive a $5 gift card, and all participants […].

article thumbnail

A flaw in WP Reset PRO WordPress plugin allows wiping the installation DB

Security Affairs

A critical vulnerability in the WP Reset PRO WordPress plugin can allow an authenticated user to wipe the entire database of WordPress sites. Researchers from cybersecurity form Packstack have discovered a critical vulnerability in the WP Reset PRO WordPress plugin that could be exploited by an authenticated user to completely wipe the database of a website.

CMS 91
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New Android Spyware Poses Pegasus-Like Threat

Threatpost

PhoneSpy already has stolen data and tracked the activity of targets in South Korea, disguising itself as legitimate lifestyle apps.

Security 104
article thumbnail

Taiwan Government faces 5 Million hacking attempts daily

Security Affairs

Taiwan ‘s government agencies face around five million cyberattacks and probes every day, most of them from China. Around five million cyber attacks hit Taiwan’s government agencies every day, and most of the hacking attempts are originated from China. Cyber security department director Chien Hung-wei told parliament representatives that government infrastructure faces “five million attacks and scans a day” . “We are strengthening the government’s defensive m

article thumbnail

Firms Will Struggle to Secure Extended Attack Surface in 2022

Dark Reading

Companies are relying more heavily on third parties, remote employees, and partners, expanding their attack surface area beyond traditional boundaries.

Security 119
article thumbnail

Join us at an OpenText World Meet up

OpenText Information Management

OpenText World 2021 kicks off in less than a week and the OpenText Content Cloud™ team is excited for this opportunity to connect with so many of our Content Services customers—and new customers as well. There’s a great line-up of informative sessions within the Content Cloud track at OpenText World, and while we hope you … The post Join us at an OpenText World Meet up appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ChaosDB: Researchers Share Technical Details of Azure Flaw

Dark Reading

Wiz researchers who discovered a severe flaw in the Azure Cosmos DB database discussed the full extent of the vulnerability at Black Hat Europe.

92
article thumbnail

The factory floor comes alive with digital signage

Jamf

Together, Carousel Cloud and Jamf MDM enhance the native capabilities of Apple TV, making it the perfect digital media player for conveying information and inspiration to your workers.

MDM 52
article thumbnail

CISA and State and Local Partners Test Emergency Response Plans at Chevron Salt Lake Refinery

Dark Reading

The exercise included several objectives related to response procedures at the refinery, including evacuation and shelter-in-place decision-making; roles and responsibilities during investigations; communication with first responders; and public messaging before and following an incident.

article thumbnail

Ensure faster, smarter and more trusted analytics with Collibra and Tableau

Collibra

Large enterprises around the world use Tableau to solve some of the hardest business problems. Tableau’s analytics platform helps organizations understand their data so that they can make smart business decisions. But how do Tableau users confidently build dashboards and workbooks without data context and data quality metrics? Collibra helps solve this problem by providing an integrated data governance and data catalog solution that helps Tableau users find the best data, understand its context

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

New Application Security Toolkit Uncovers Dependency Confusion Attacks

Dark Reading

The Dependency Combobulator is an open source Python-based toolkit that helps developers discover malicious software components that may have accidentally been added to their projects.

article thumbnail

Jamf School provides learning continuity for Gordon County students

Jamf

Discover an educational solution that streamlines workflows for teachers, students, parents and administrators. Educators in Georgia used an innovative distributed learning model along with Jamf School to rapidly deploy an iPad fleet and help students to feel a sense of ownership of their devices.

article thumbnail

Defining the Hierarchy of Value in Cyber Intelligence

Dark Reading

One size won't fit all as we try to reconcile the need to demonstrate expertise and value with keeping clients and researchers safe.

78