Fri.Aug 30, 2019

article thumbnail

Phishers are Angling for Your Cloud Providers

Krebs on Security

Many companies are now outsourcing their marketing efforts to cloud-based Customer Relationship Management (CRM) providers. But when accounts at those CRM providers get hacked or phished, the results can be damaging for both the client’s brand and their customers. Here’s a look at a recent CRM-based phishing campaign that targeted customers of Fortune 500 construction equipment vendor United Rentals.

Cloud 210
article thumbnail

Apple iPhones Hacked by Websites Exploiting Zero-Day Flaws

Data Breach Today

Watering-Hole Attack Analysis From Google Follows Apple's February Patches Since at least 2016, hacked websites have targeted zero-day flaws in current versions of Apple iOS to surreptitiously implant data-stealing and location-tracking malware, says Google's Project Zero team. Apple patched the latest vulnerabilities in February.

214
214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Dreading Your Content Migration Project? 7 Ways Robotic Process Automation Can Help

AIIM

Every organization has to migrate content from one system to another at some point. It could be to retire a legacy ECM system, to finally take control of the "digital landfill" that represents most organizations' file shares, or maybe it's another reason altogether. No matter the cause, the content migration itself is no small endeavor because of a couple of major challenges: Large Volumes of Data : Consider that the typical system or file share stores tens of thousands to even millions of docum

article thumbnail

Analysis: How Police Disrupted a Cryptomining Malware Gang

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of how French cyber police disrupted a cryptomining malware gang. Also featured: Apple's botched patching of a jailbreaking vulnerability; an industry veteran's insights on battling payment card fraud.

Security 196
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Ethical Hackers: A Business’s Best Friend?

Thales Cloud Protection & Licensing

Originally published in Forbes on July 29, 2019. Brands are under pressure to protect themselves and their customers from increasingly sophisticated cyber attacks. With daily media headlines and new regulations, consumers have never been more aware of the threats out there. As a result, businesses are being forced to take the issue of cybersecurity more seriously, facing it head on and putting in place the necessary steps (e.g., encryption, two-factor authentication and key management) to protec

Cloud 91

More Trending

article thumbnail

Attacking the Intel Secure Enclave

Schneier on Security

Interesting paper by Michael Schwarz, Samuel Weiser, Daniel Gruss. The upshot is that both Intel and AMD have assumed that trusted enclaves will run only trustworthy code. Of course, that's not true. And there are no security mechanisms that can deal with malicious enclaves, because the designers couldn't imagine that they would be necessary. The results are predictable.

article thumbnail

Google revealed how watering hole attacks compromised iPhone devices earlier this year

Security Affairs

Google researchers discovered that iPhone devices could be hacked by tricking owners into visiting specially crafted websites. Researchers at Google Project Zero discovered that it was possible to hack iPhone devices by visiting specially crafted websites. Earlier this year, Google Threat Analysis Group (TAG) experts uncovered an iPhone hacking campaign, initially, they spotted a limited number of hacked websites used in watering hole attacks against iPhone users. “Earlier this year Google

article thumbnail

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking

WIRED Threat Level

For two years, a handful of websites have indiscriminately hacked thousands of iPhones.

Security 111
article thumbnail

BRATA, the Android RAT that infected only Brazilian users

Security Affairs

Security experts at Kaspersky have spotted a new Android remote access tool (RAT) dubbed BRATA used to spy on Brazilian users. Security experts at Kaspersky have discovered a new Android remote access tool (RAT), tracked as BRATA (the name comes from ‘Brazilian RAT Android’), that was used to spy on Brazilian users. The BRATA RAT was first detected in January while spreading via WhatsApp and SMS messages. ““BRATA” is a new Android remote access tool malware family.

Access 86
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google to Pay $150-$200 Million in Fines for Alleged YouTube COPPA Violations

Hunton Privacy

As an update to our previous blog post , according to media reports , Google has reached a settlement with the FTC in the range of $150 to $200 million over the agency’s investigation into the company’s alleged violations of COPPA through its YouTube platform. The settlement has not been announced by the FTC or Google, and the details of the settlement have not been made publicly available.

IT 70
article thumbnail

Foxit Software discloses a data breach that exposed user passwords

Security Affairs

Foxit Software, the company behind the Foxit PDF reader app, disclosed a data breach that exposed customers’ information, including passwords. Foxit Software, the PDF software provider behind the Foxit PDF reader app disclosed a security breach that took place recently exposing customers’ information. The incident exposed personal identification data of ‘My Account’ service users, third parties accessed to client’s information such as email addresses, passwords, rea

article thumbnail

'It Saved Our Community': 16 Realistic Ransomware Defenses for Cities

Dark Reading

Practical steps municipal governments can take to better prevent and respond to ransomware infections.

article thumbnail

Don’t use your data as a doorstop

DXC Technology

Enterprises have access to more data than ever before, data that can provide valuable information about customers, markets, and business processes. Leveraged effectively, data (both structured and unstructured) can be used by enterprises to drive decision-making. But most organizations fail to use data to inform their strategic decisions or innovation initiatives.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Google Uncovers Massive iPhone Attack Campaign

Dark Reading

A group of hacked websites has been silently compromising fully patched iPhones for at least two years, Project Zero reports.

75
article thumbnail

Examining the role of the CDO and their relationship with the CIO

Information Management Resources

Egon Zehnder’s partner Lindsay Trout discusses the new "CDO Decoded" study on the differences and similarities between CDOs and CIOs, and best practices for hiring these roles to create harmony.

article thumbnail

New Credential-Theft Attack Weaponizes DNS

Dark Reading

The recently discovered campaign sends stolen data out of the network as part of a DNS query.

80
article thumbnail

Six Hackers Have Now Pocketed $1M From Bug Bounty Programs

Threatpost

Up to 25 percent of valid vulnerabilities found in bug bounty programs are classified as being of high or critical severity.

68
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

7 Breaches & Hacks That Throw Shade on Biometric Security

Dark Reading

Stolen fingerprints, fake hands, voice synthetization, and other nefarious techniques show biometrics has plenty of challenges.

article thumbnail

Unleash business-ready data to your data citizens

IBM Big Data Hub

How much time do your data scientists and business analysts spend looking for the right data?

76
article thumbnail

Jack Ma saves us from Elon Musk's AI dystopia

Information Management Resources

Tech billionaires Jack Ma and Elon Musk can’t agree whether artificial intelligence is going to take over the world.

article thumbnail

@jack Got Hacked: Twitter CEO's Tweets Hijacked

Dark Reading

Twitter CEO Jack Dorsey's Twitter account was, apparently, hijacked for roughly 20 minutes and used for a racist rant.

58
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Best practices for shaping the new cybersecurity culture

Information Management Resources

All managers understand that both recruiting top talent as well as crafting a winning team and company culture is crucial to high performance.

article thumbnail

iPhone Zero-Days Anchored Watering-Hole Attacks

Threatpost

A new, highly capable spyware payload can monitor everything in a person's digital life.

Privacy 63
article thumbnail

Overburdened SOC Analysts Shift Priorities

Dark Reading

Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows.

56
article thumbnail

Communication, collaboration leadership fuels digital transformation

Information Management Resources

When staff from different sectors know how to communicate and collaborate across traditional divisions, the result is a much smoother digital transformation process.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

News Wrap: Dentist Offices Hit By Ransomware, Venmo Faces Privacy Firestorm

Threatpost

From new ransomware attacks to privacy issues around Venmo and Ring, Threatpost editors break down the top news of this week.

article thumbnail

Privacy and Cybersecurity September 2019 Events

HL Chronicle of Data Protection

Please join us for our September events. September 11. Data and Privacy in the Autonomous Car. Tim Tobin will speak on the webinar, “Data and Privacy in the Autonomous Car, What New Questions Might We Face?” presented by the Privacy + Security Forum. To register, please click here. Location : Webinar. September 13. Medical Technology Executive Forum.

Privacy 40
article thumbnail

Using a 3-2-1 backup strategy to secure your data

Quest Software

Your data is at risk every day. Threats include viruses, ransomware, natural disasters, hardware failure, and corruption, not to mention end-users losing documents or mistakenly deleting them. With all the possible ways your data can be lost, a sing.