Wed.May 15, 2019

article thumbnail

Intel's 'ZombieLoad' Fixes May Slow Processors by 9 Percent

Data Breach Today

CPUs Shipped From 2011 Onward Have Flaws of the Meltdown and Spectre Variety Newly discovered microarchitectural data sampling flaws in Intel processors - collectively dubbed "ZombieLoad" - could be exploited to steal private data from PCs and servers, including shared cloud environments. Intel, Microsoft, Apple and others have begun to ship patches designed to help mitigate the problems.

Cloud 260
article thumbnail

Attention U.S. Veterans: The CIP Exam Has Been Approved for Reimbursement Under the GI Bill

AIIM

I am very pleased to announce that the Certified Information Professional (CIP) exam has been approved for reimbursement under the Veterans Education Benefit program for Licensing and Certification reimbursements administered by the U.S. Department of Veterans Affairs - aka the GI Bill. This is something that is intensely personal to me. When I got out of the Marine Corps, I wasn't sure what I wanted to do, but I knew that I had the GI Bill to help fund my education and professional development.

Education 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ScarCruft APT Group Targets Bluetooth With Malware: Report

Data Breach Today

Kaspersky Lab Says Korean-Speaking Group Expanding Its Arsenal ScarCruft, a Korean-speaking APT group that has been targeting organizations mainly in Southeast Asia over the past three years, is developing new malware that targets Bluetooth-enabled devices, according to Kaspersky Lab.

IT 211
article thumbnail

IBM Streams: A 10-year anniversary, and what's next

IBM Big Data Hub

Streams v5.0 for IBM Cloud Private for Data (ICP for Data) provides a real-time engine within our data platform. The platform simplifies bringing artificial intelligence (AI) into your enterprise processes.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hack of Japanese Retailer Exposes 460,000 Customer Accounts

Data Breach Today

Fast Retailing Says Credential Stuffing Suspected Fast Retailing, the parent company of several of Japan's biggest retail clothing chains, is warning customers of an attack that exposed email addresses and partial credit card information of more than 460,000 of the company's customers. The attackers apparently used credential stuffing techniques.

Retail 193

More Trending

article thumbnail

The Ride-Along: Intelligence Analysis for Real Time Crime Centers

Data Breach Today

Learn about technologies and methods to more effectively and efficiently combat crime using intelligence analysis. Learn about technologies and methods to more effectively and efficiently combat crime using intelligence analysis.

182
182
article thumbnail

WhatsApp Vulnerability Fixed

Schneier on Security

WhatsApp fixed a devastating vulnerability that allowed someone to remotely hack a phone by initiating a WhatsApp voice call. The recipient didn't even have to answer the call. The Israeli cyber-arms manufacturer NSO Group is believed to be behind the exploit, but of course there is no definitive proof. If you use WhatsApp, update your app immediately.

article thumbnail

A Ransomware Victim Shares His Story

Data Breach Today

President of Healthcare Organization Describes the Aftermath and the Lessons Learned What's it like for a small, not-for-profit healthcare entity to deal with the consequences of a ransomware attack? The president of a substance abuse treatment center shares his first-hand experience - and lessons learned.

article thumbnail

GDPR Drives Changes, but Privacy by Design Proves Elusive

Dark Reading

One year later, the EU mandate's biggest impact has been to focus more attention on data protection and privacy, security analysts say.

Privacy 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

To Prevent Another WannaCry, Microsoft Patches Old OSs

Data Breach Today

Vulnerability in XP, Windows 7 and Server 2008 Could Be 'Wormable' Microsoft has taken the extraordinary step of issuing patches for its old XP, Windows 2003, Windows 7 and Windows Server 2008 operating systems. The problem is an easy-to-exploit Remote Desktop Services vulnerability that could be turned into a worm.

IT 170
article thumbnail

Microsoft Patch Tuesday addresses dangerous RDS flaw that opens to WannaCry-like attacks

Security Affairs

Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including an RDS flaw allowing WannaCry -Like attacks. Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including a Windows zero-day flaw and an RDS vulnerability that can be exploited to carry out WannaCry -like attack. The zero-day vulnerability addressed by Microsoft Patch Tuesday updates for May 2019 is a privilege escalation flaw related to the way the Windows Error Reporting (WER)

article thumbnail

Be Proactive: Fight and Mitigate Future Attacks with Cyber Threat Hunting

Data Breach Today

To prevent future attacks, organizations must identify and investigate attackers after an incident. To prevent future attacks, organizations must identify and investigate attackers after an incident.

164
164
article thumbnail

WhatsApp Compromised by Spyware

Adam Levin

WhatsApp disclosed a major security vulnerability that allowed hackers to remotely install spyware on mobile devices. The vulnerability, discovered earlier this month, allowed third parties to see and intercept encrypted communications. The spyware deployed has been traced back to NSO Group, an Israeli cyber company alleged to have enabled Middle East governments to surveil its citizens.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Intel Vulnerabilities Bring Fresh CPU Attack Dangers

Dark Reading

Four newly discovered vulns from the speculative-execution family bring Meltdown-like threats to Intel's processors.

97
article thumbnail

Connected healthcare: Why mobility matters to the clinician

DXC Technology

by Dr. Shainal Nathoo Technology experts will often talk about the benefits of mobility in healthcare, but to understand why mobility matters and how it might improve both workflow and clinical benefits for patients, it’s vital to get a user’s perspective. As a clinician, my view of mobility is influenced by my own experiences in […].

IT 74
article thumbnail

Two Ransomware Recovery Firms Typically Pay Hackers

Dark Reading

Companies promising the safe return of data sans ransom payment secretly pass Bitcoin to attackers and charge clients added fees.

article thumbnail

Twitter inadvertently collected and shared iOS location data

Security Affairs

Twitter confirmed revealed that a bug in its iOS app it the root cause for an inadvertent collection of location data and sharing it with a third-party. A new story of a violation of the user’s privacy made the lines, Twitter revealed that due to a bug is collected and shared iOS location data with a third-party advertising company, Fortunately, only one partner of the micro-blogging firm was involved and the data collection and sharing occurred in certain circumstances. “We have dis

Privacy 70
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Introducing the Digital Transformation Architect

Dark Reading

Bet-the-company transformation that expands the attack surface requires close alignment and leadership across executive, IT and security teams.

article thumbnail

Feds Break Up Major SIM-Hijacking Ring

Adam Levin

The U.S. Department of Justice announced that it has arrested and charged members of a major cybercriminal ring in connection with $2.4 million worth of wire fraud and identity theft. The hacking group, called “The Community” primarily used social engineering (trickery) and SIM card hijacking to steal funds and cryptocurrency from their victims. SIM swapping or hijacking is an attack that often deploys personal information gleaned from other sources (such as social engineering) to authenticate a

article thumbnail

Windows 10 Migration: Getting It Right

Dark Reading

The transition to Windows 10 doesn't need to be a sprint. Organizations can still take advantage of the security in Windows 7 while gaining added management flexibility from the newer OS.

IT 70
article thumbnail

Things you should know about App Notarization

Jamf

With the release of macOS 10.14.5, Apple introduced an important security enhancement for App Notarization. Get full details in this Q&A blog post.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

SAP Security Patch Day for May 2019 fixes many missing authorization checks

Security Affairs

SAP released SAP Security Patch Day for May 2019 that includes 8 Security Notes, 5 of which are updates to previously released Notes. Five Security Notes included in SAP Security Patch Day for May 2019 addressed missing authorization checks in SAP products, including Treasury and Risk Management, Solution Manager and ABAP managed systems, dbpool administration, and Enterprise Financial Services. . “Today, being the second Tuesday of the month, SAP released May’s Security Notes.

article thumbnail

Why Managed Services?

Daymark

As the IT mandate shifts to innovation, many CIOs are seeking ways to offload operational tasks. Some plan to get out of the data center business all together. Partnering with a Managed Services Provider (MSP) has proved to be an effective strategy that allows IT organizations to provide more value to the business and frees IT staff to focus on digital transformation initiatives.

article thumbnail

Microsoft Builds on Decentralized Identity Vision

Dark Reading

The company elaborates on its plan to balance data control between businesses and consumers by giving more autonomy to individuals.

IT 75
article thumbnail

Most firms see digital transformation as critical, but many need help

Information Management Resources

Top investments to support digital transformation are focused on migrating to the cloud and IT security, as well as artificial intelligence, big data, and the Internet of Things.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Microsoft’s First Windows XP Patch in Years Is a Very Bad Sign

WIRED Threat Level

A very bad vulnerability in Windows XP could have serious ramifications, even with a patch.

article thumbnail

Did you know? AMC Monthly Newsletter

Micro Focus

What’s New in AMC? This month we focus on the most important aspect of our Micro Focus Modernization solution – our customers! And as you might have heard, or even been part of it, we’ve been on a road trip, sharing our Modernization story, and hearing from many of our thousands of customers worldwide. Check. View Article.

IT 55
article thumbnail

Data Citizens of the World, Unite!

Collibra

Our Data Citizens conference is just one week away, and I am excited to announce that we are sold out ! Nearly 600 Data Citizens from around the world – Spain, Switzerland, Norway, Belgium, the Netherlands, Czech Republic, the UK, Costa Rica, Bermuda, Canada, and 31 different states from within the US – representing close to 200 companies are coming to New York for what continues to be the world’s largest gathering of data professionals.