Fri.May 17, 2019

article thumbnail

After 2 Years, WannaCry Remains a Threat

Data Breach Today

Poorly Written Ransomware Still Infects Unpatched Systems Two years after WannaCry tore a path of destruction through the world, the ransomware remains a danger, with many systems still vulnerable to the EternalBlue or EternalRomance exploits that started it all.

article thumbnail

How to Foster Collaboration in your Workplace

AIIM

Sometimes a little too much of a good thing can be a bad thing. An overabundance of motivation can lead to stress, fatigue, and burnout. According to the Harvard Business Review, the majority of managers now spend over 85% of their work time checking emails, checking up on meetings, connecting with people over the phone, and checking their phones for important, work-related updates.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity's Week From Hell

Data Breach Today

Fix WhatsApp, Windows, Cisco and CPUs From Intel - Pending Patch Availability Multiple flaws - all serious, exploitable and some already being actively exploited - came to light this week. Big names - including Cisco, Facebook, Intel and Microsoft - build the software and hardware at risk. And fixes for some of the flaws are not yet available. Is this cybersecurity's new normal?

article thumbnail

Why Are Cryptographers Being Denied Entry into the US?

Schneier on Security

In March, Adi Shamir -- that's the "S" in RSA -- was denied a US visa to attend the RSA Conference. He's Israeli. This month, British citizen Ross Anderson couldn't attend an awards ceremony in DC because of visa issues. (You can listen to his recorded acceptance speech.) I've heard of at least one other prominent cryptographer who is in the same boat.

105
105
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Researchers: Aircraft Landing Systems Vulnerable

Data Breach Today

Study Finds Bogus Instrument Landing System Signals Could Send Planes Off Course The majority of aircraft accidents occur during landing. And during bad weather or low-visibility, pilots are trained to entirely trust their instruments. But researchers say they can spoof wireless signals to a critical landing system, which could cause planes to miss runways.

204
204

More Trending

article thumbnail

WhatsApp's Spyware Problem

Data Breach Today

The latest edition of the ISMG Security Report digs into the WhatsApp flaw that paved the way for spyware installation. Also: Microsoft patches old operating systems and a 'virtual CISO' sizes up security challenges.

Security 201
article thumbnail

Introducing OpenText Enterprise World Learn Paths

OpenText Information Management

OpenText™ Enterprise World has always been a best place to get detailed information and expert advice on the latest OpenText products and solutions. With hundreds of OpenText product and industry experts on hand, over 200 separate breakout sessions, technical deep dive sessions, labs and demo pods, Enterprise World 2019 this July in Toronto will continue … The post Introducing OpenText Enterprise World Learn Paths appeared first on OpenText Blogs.

article thumbnail

Bill Would Help Congress Track Offensive 'Cyber Tool' Sales

Data Breach Today

State Department Would Be Required to Provide Information on Approved Sales A House panel has approved a measure designed to make sure Congress is informed when U.S. companies sell offensive cyber technologies to other nations' governments. The measure was introduced after a U.S. firm sold technologies to the United Arab Emirates that were used to target activists and journalists.

Sales 160
article thumbnail

A flaw in Slack could allow hackers to steal, manipulate downloaded files

Security Affairs

A recently patched flaw in the Slack desktop application for Windows can be exploited by attackers to steal and manipulate a targeted user’s downloaded files. Slack is a cloud-based set of proprietary team collaboration tools and services, Security researcher David Wells from Tenable discovered a critical flaw in version 3.3.7 of the Slack desktop app that could be exploited to steal and manipulate a targeted user’s downloaded files.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

DevOps Repository Firms Establish Shared Analysis Capability

Dark Reading

Following an attack on their users, and their shared response, Atlassian, GitHub, and GitLab decide to make the sharing of attack information a permanent facet of their operations.

69
article thumbnail

Stack Overflow Q&A platform announced a data breach

Security Affairs

The popular question-and-answer platform for programmers Stack Overflow announced on Thursday that is has suffered a data breach. The news of a data breach makes the headlines, this time the victim is the popular question-and-answer platform for programmers Stack Overflow. The company announced on Thursday that it has discovered unauthorized access to its production systems over the weekend.

article thumbnail

New Jersey Amends Data Breach Law to Include Online Account Information

Hunton Privacy

On May 10, 2019, New Jersey Governor Phil Murphy signed into law a bill that amends New Jersey’s data breach notification law to expand the definition of personal information to include online account information. The amendment goes into effect September 1, 2019. The amendment will require businesses subject to the law to notify New Jersey residents of a breach of security affecting a resident’s “user name, email address, or any other account holder identifying information, in combination with a

article thumbnail

How to Run a Threat Hunting Program

eSecurity Planet

What is threat hunting, how do you do it, and what tools and training do you need to do it right? We answer all that and more about this security tool.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

When Older Windows Systems Won't Die

Dark Reading

Microsoft's decision to patch unsupported machines for the critical CVE-2019-0708 flaw is a reminder that XP, 2003, and other older versions of Windows still run in some enterprises.

67
article thumbnail

Cisco addressed a critical flaw in networks management tool Prime Infrastructure

Security Affairs

Cisco had issued security updates to address 57 security flaw, including three flaws in networks management tool Prime Infrastructure. One of the flaws addressed by Cisco in the Prime Infrastructure management tool could be exploited by an unauthenticated attacker to execute arbitrary code with root privileges on PI devices. “Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow a r

article thumbnail

Artist Uses Malware in Installation

Dark Reading

A piece of 'art' currently up for auction features six separate types of malware running on a vulnerable computer.

85
article thumbnail

Process Automation Learn Paths at OpenText Enterprise World

OpenText Information Management

Following a Learn Path at OpenText™ Enterprise World this July in Toronto is a perfect way to make the most of your time at the event, to earn professional accreditation and to learn valuable tips and tricks that you can take back to your organization and implement from Day 1. We will be running one … The post Process Automation Learn Paths at OpenText Enterprise World appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Q1 2019 Smashes Record For Most Reported Vulnerabilities in a Quarter

Dark Reading

Once again, a high-proportion of the reported flaws have no current fix, according to Risk Based Security.

Risk 82
article thumbnail

Ransomware ‘Remediation’ Firm Exposed: Researchers Weigh in on Paying

Threatpost

The decision to pay a ransom in the case of a ransomware attack can be a complex one for businesses.

article thumbnail

A Trustworthy Digital Foundation Is Essential to Digital Government

Dark Reading

Agencies must take steps to ensure that citizens trust in the security of government's digital channels.

article thumbnail

WordPress WP Live Chat Support Plugin Fixes XSS Flaw

Threatpost

A cross-site scripting flaw in a popular WordPress plugin enables an unauthenticated attacker to insert JavaScript payloads into impacted websites.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Exposed Elasticsearch Database Compromises Data on 8M People

Dark Reading

Personal data exposed includes full names, physical and email addresses, birthdates, phone numbers, and IP addresses.

article thumbnail

News Wrap: WhatsApp, Microsoft, Intel and Cisco Flaws

Threatpost

From a zero day flaw in WhatsApp, to Patch Tuesday fixes, Threatpost breaks down the top vulnerabilities of this week.

63
article thumbnail

Lack of digital competency biggest hurdle in transformation efforts

Information Management Resources

Digital transformation is necessary to achieve goals and remain competitive, but more than half of organizations said they are struggling to achieve these goals because they lack digital competencies.

article thumbnail

How Decoding Network Traffic Can Save Your Data Bacon

Threatpost

The importance of reading the network tealeaves of a company’s network traffic to head off an attack.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Chart your path in AI: How OpenText Magellan is unlocking the power of information

OpenText Information Management

One of the big challenges for organizations today is how to realize the business value currently locked in the huge amounts of unstructured data being generated. Some experts claim as much as 80 percent of data collected by organizations is unstructured – information such as emails, social media feeds and documents. At OpenText™ Enterprise World … The post Chart your path in AI: How OpenText Magellan is unlocking the power of information appeared first on OpenText Blogs.

article thumbnail

Simplifying Exchange Online protection so anybody can backup and restore safely

Quest Software

Think that Exchange Online provides robust data protection? Think again. Learn about Exchange Online protection with NetVault Backup.( read more ).

49
article thumbnail

Business Network Learn Paths at OpenText Enterprise World

OpenText Information Management

Following a Learn Path at OpenText™ Enterprise World this July in Toronto is a perfect way to make the most of your time at the event, to earn professional accreditation and to learn valuable tips and tricks that you can take back to your organization and implement from Day 1. We will be running 4 … The post Business Network Learn Paths at OpenText Enterprise World appeared first on OpenText Blogs.