Thu.Jan 06, 2022

article thumbnail

France fines Google and Facebook €210m over user tracking

The Guardian Data Protection

Data privacy watchdog says websites make it difficult for users to refuse cookies France’s data privacy watchdog has fined Google and Facebook a combined €210m (£176m) for hampering users’ ability to stop the companies tracking their online activity. The Commission Nationale de l’Informatique et des Libertés (CNIL) said on Thursday it had fined Google a record €150m for making it difficult for internet users to refuse cookies – small text files that build up a profile of a person’s web activity

article thumbnail

Norton 360 Now Comes With a Cryptominer

Krebs on Security

Norton 360 , one of the most popular antivirus products on the market today, has installed a cryptocurrency mining program on its customers’ computers. Norton’s parent firm says the cloud-based service that activates the program and allows customers to profit from the scheme — in which the company keeps 15 percent of any currencies mined — is “opt-in,” meaning users have to agree to enable it.

Mining 324
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Going beyond watermarks to protect sensitive documents from illegal access

The Last Watchdog

Cyber threats continue to gain momentum and there are still not enough ways to counter it. Related: Why the ‘Golden Age’ of cyber espionage is upon us. The global threat intelligence market size was estimated at $10.9 billion in 2020 and will grow to $16.1 billion by 2025. Yet, according to the study by the Ponemon Institute, the number of insider leaks has increased by 47 percent in 2020 compared to 2018.

Access 266
article thumbnail

North Korea-linked Konni APT targets Russian diplomatic bodies

Security Affairs

North Korea-linked APT group Konni targets Russian Federation’s Ministry of Foreign Affairs (MID) new versions of malware implants. Security researchers at Cluster25 uncovered a recent campaign carried out by the North Korea-linked Konni APT group aimed at Russian diplomatic entities that used new versions of malware implants. The APT group carried out spear-phishing attacks using New Year’s Eve festivities as a lure.

Phishing 133
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

India’s Draft Data Protection Bill Moves Closer to Passage

Hunton Privacy

Stephen Mathias from Kochhar & Co. reports that on December 16, 2021, the Indian Joint Parliamentary Committee (the “JPC”) submitted its report on India’s draft Data Protection Bill (the “Bill”). The Bill is now likely to be passed by Parliament in its next session, beginning in February 2022, and likely will enter into force in the first half of 2022.

More Trending

article thumbnail

Cybersecurity Outlook 2022: Third-party, Ransomware and AI Attacks Will Get Worse

eSecurity Planet

About the only consensus on cybersecurity in 2022 is that things will get uglier, but in what ways? Third-party security, ransomware , artificial intelligence (AI) and decentralized finance (DeFi) are some of the threats you can expect to see more of this year – with the potential for far worse results than we’ve seen in the past. Here are some of the more interesting predictions for 2022 we’ve seen from cybersecurity researchers.

article thumbnail

Threat actors stole 1.1 million customer accounts from 17 well-known companies

Security Affairs

NY OAG warned 17 companies that roughly 1.1 million of their customers have had their user accounts compromised in credential stuffing attacks. The New York State Office of the Attorney General (NY OAG) has warned 17 companies that roughly 1.1 million accounts of their customers were compromised in credential stuffing attacks. Credential stuffing attacks involve botnets trying stolen login credentials usually obtained through phishing attacks and data breaches.

Retail 123
article thumbnail

New Mac Malware Samples Underscore Growing Threat

Dark Reading

A handful of malicious tools that emerged last year showed threat actors may be getting more serious about attacking Apple macOS and iOS environments.

130
130
article thumbnail

Partially Unpatched VMware Bug Opens Door to Hypervisor Takeover

Threatpost

ESXi version 7 users are still waiting for a full fix for a high-severity heap-overflow security vulnerability, but Cloud Foundation, Fusion and Workstation users can go ahead and patch.

Cloud 115
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Google Docs Comments Weaponized in New Phishing Campaign

Dark Reading

Attackers use the comment feature in Google Docs to email victims and lure them into clicking malicious links.

Phishing 144
article thumbnail

VMware fixed CVE-2021-22045 heap-overflow in Workstation, Fusion and ESXi

Security Affairs

VMware addressed a heap-overflow issue (CVE-2021-22045) in Workstation, Fusion and CVE-2021-22045 products that can lead to code execution on the hypervisor. VMware released security updates to address a heap-overflow vulnerability, tracked as CVE-2021-22045, in its Workstation, Fusion and ESXi products. VMware has addressed the vulnerability with the release of ESXi670-202111101-SG, ESXi650-202110101-SG, Workstation 16.2.0, and Fusion 12.2.0.

Cloud 110
article thumbnail

Attackers Exploit Flaw in Google Docs’ Comments Feature

Threatpost

A wave of phishing attacks identified in December targeting mainly Outlook users are difficult for both email scanners and victims to flag, researchers said.

Phishing 118
article thumbnail

Rethinking Cybersecurity Jobs as a Vocation Instead of a Profession

Dark Reading

The prevailing mindset is that security practitioners are professionals, and thus, require a college degree. But there are some flaws in that logic.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google Voice Authentication Scam Leaves Victims on the Hook

Threatpost

The FBI is seeing so much activity around malicious Google Voice activity, where victims are associated with fraudulent virtual phone numbers, that it sent out an alert this week.

article thumbnail

Google Docs comment feature abused in phishing campaign

Security Affairs

Experts warn of a new phishing technique that abuses the commenting feature of Google Docs to send out emails that appear from a legitimate source. Researchers from security firm Avanan in December uncovered a phishing campaign targeting mainly Outlook users with a new technique that abuses the commenting feature of Google Docs to send out malicious messages.

Phishing 106
article thumbnail

Hybrid Multicloud Strategies Are Keeping the Public Sector at the Forefront of Threat Mitigation

Dark Reading

Zero trust, DevSecOps, and agile methodologies are critical in bridging the power of commercial multicloud environments and the security of private data centers.

Security 108
article thumbnail

2022 and beyond: tech predictions from Jamf CEO Dean Hager

Jamf

2021 taught us to embrace change and proved that technology will play a defining role in the productivity and satisfaction of employees, students and patients. So what's in store for 2022? Let's find out.

98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cyber attack on UK Defence Academy causes “significant” damage

IT Governance

The Defence Academy of the UK was forced to rebuild its network last year after suffering a cyber attack, a high-ranking officer has revealed. Air Marshal Edward Stringer, who retired from the armed forces in August, said the attack caused significant damage and continues to affect the Defence Academy months later. The school, which is based in Shrivenham, Oxfordshire, teaches 28,000 military personnel, diplomats and civil servants a year.

article thumbnail

CDN Cache Poisoning Allows DoS Attacks Against Cloud Apps

Dark Reading

A Romanian researcher discovers more than 70 vulnerabilities in how applications and their content delivery networks handle cache misses that open the doors to denial-of-service attacks.

Cloud 129
article thumbnail

Apple iPhone Malware Tactic Causes Fake Shutdowns to Enable Spying

Threatpost

The 'NoReboot' technique is the ultimate in persistence for iPhone malware, preventing reboots and enabling remote attackers to do anything on the device while remaining completely unseen.

article thumbnail

Enterprises Worry About Increased Data Risk in Cloud

Dark Reading

The 2021 Strategic Security Survey highlights concerns related to the cloud environment, such as the ability to detect breaches and the increasing number of attacks against cloud systems.

Cloud 92
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

NoReboot persistence technique fakes iPhone shutdown

Security Affairs

Researchers devised a sophisticated persistence technique, named NoReboot, for iOS malware that fake shut downs. Researchers from Zecops devised a sophisticated persistence technique, named NoReboot, for iOS malware that fake shut downs while spies on the user. The technique is based on the concept of simulating a shutdown of the iPhone when the victim attempts to turn off their device.

Access 85
article thumbnail

Signal's Cryptocurrency Feature Has Gone Worldwide

WIRED Threat Level

A beta “payments” feature now lets users of the popular encrypted messaging app send MobileCoin around the globe.

article thumbnail

Top information management predictions for the Oil and Gas industry in 2022

OpenText Information Management

After a wild ride in 2020, when prices momentarily went negative, the oil and gas industry rebounded throughout 2021. Bank of America expects Brent Crude to reach $120 per barrel by the end of June 2022. This prediction illustrates an industry in transition that is still trying to process the shockwaves from the global pandemic. The … The post Top information management predictions for the Oil and Gas industry in 2022 appeared first on OpenText Blogs.

74
article thumbnail

Convergence Zone: CNAPP Aids in Integrated Cloud-Native Security

Dark Reading

Cloud Native Application Protection Platforms (CNAPP) allow organizations to secure cloud-native applications across the full application life cycle.

Cloud 79
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Four Tips for Successful Meet and Confers

eDiscovery Daily

When approaching any challenge or goal, it’s often best to start with the big picture before narrowing things down. By working backwards, you can identify the steps needed to achieve the desired result. This type of thinking can be applied to Rule 26(f) conferences (also known as meet and confers). As mandated by Rule 26(f) of the FRCP, both parties must meet at least 21 days before holding a scheduling conference.

article thumbnail

Vital Records Control launches new website

IG Guru

Check out the new website at [link]. The post Vital Records Control launches new website appeared first on IG GURU.

87
article thumbnail

Top predictions for the Utilities industry in 2022

OpenText Information Management

If not such as wild ride as the oil & gas sector, the global Utilities industry witnessed its own share of volatility in 2021. The pandemic caused resource shortages and price hikes that affected residential and industrial customers alike, and it’s likely this environment will continue well into 2022. In response, we’ll see utility companies … The post Top predictions for the Utilities industry in 2022 appeared first on OpenText Blogs.

IT 58