Mon.Mar 25, 2019

article thumbnail

FEMA Exposed 2.3 Million Disaster Victims' Private Data

Data Breach Today

Fraud and Identity Theft Risk Follows Bank Account and Postal Address Exposure Victims of hurricanes, wildfires and other disasters now face a second hit: The U.S. Federal Emergency Management Agency inadvertently shared 2.3 million disaster survivors' personal data of with an agency contractor, leaving victims at increased risk from fraud and identity theft.

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

Remember when software used to come on CDs packaged in shrinked-wrapped boxes, or even before that, on floppy disks? Related: Memory-based attacks on the rise. If you bought a new printer and wanted it to work on your desktop PC, you’d have to install a software driver, stored on a floppy disk or CD, to make that digital handshake for you. Today software is developed and deployed in the cloud, on the fly.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Hot Legal Topics at RSA Conference 2019

Data Breach Today

Attorney Kimberly Peretti of Alston & Bird on Indictments, Breach Response and More What's hot on the cybersecurity legal front? For starters, in 2018, the U.S. Department of Justice indicted twice as many alleged state-sponsored attackers than it had ever indicted, says Kimberly Peretti of Alston & Bird.

article thumbnail

PewDiePie ransomware oblige users subscribe to PewDiePie YouTube channel

Security Affairs

It is a battle with no holds barred between T-Series and PewDiePie, their fans are spreading the PewDiePie ransomware to force users to subscribe to PewDiePie Youtube channel. The story I’m going to tell you is another chapter of the battle between the most followed Youtuber T-Series and PewDiePie. T-Series is an Indian music company, while PewDiePie a Youtuber whom fans are accused to use any means to increase the number of subscribers to its channel.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Dark Side of Cybersecurity: Burnout

Data Breach Today

Veteran CISO Thom Langford on Life After Hitting Bottom Call to action: Information security teams should "include mental health topics in their team meetings, their management reports and metrics, as well as face to face meetings," says to Thom Langford, head of security consultancy (TL)2, speaking from experience.

More Trending

article thumbnail

AT&T Cybersecurity Sets Sights on Threat Intelligence

Data Breach Today

Javvad Malik on New Entity's Role in Cybersecurity Market AT&T has just re-branded its AlienVault acquisition as AT&T Cybersecurity. Javvad Malik, security advocate for the firm, explains its place in the global market and how it will impact delivery of threat intelligence.

article thumbnail

Anubis II – malware and afterlife

Security Affairs

Due to the growing demand for Android banking malware, threat actors continue using Anubis even is the creator has vanished. Introduction. Besides being the Egyptian God associated with mummification and afterlife, Anubis is also an Android banking malware that has caused quite some trouble for over 300 financial institutions worldwide since 2017. Anubis II is the Android banking Trojan created and advertised by an actor with the nickname “maza-in” This malware family goes beyond the

Access 84
article thumbnail

Enterprise Security in the Era of Digital Transformation

Data Breach Today

Stan Lowe of Zscaler on How CISOs Can Help Drive Revenue Growth Securely Digital transformation is having a significant impact on enterprise security. Zscaler's Stan Lowe describes the evolving role of the CISO in the age of cloud and connectivity.

article thumbnail

Mail Fishing

Schneier on Security

Not email, paper mail : Thieves, often at night, use string to lower glue-covered rodent traps or bottles coated with an adhesive down the chute of a sidewalk mailbox. This bait attaches to the envelopes inside, and the fish in this case -- mail containing gift cards, money orders or checks, which can be altered with chemicals and cashed -- are reeled out slowly.

Paper 81
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Application Security and the Focus on Software Integrity

Data Breach Today

Andreas Kuehlmann of Synopsys on Shifting Trends As trends such as DevSecOps and agile application development spread, enterprises increasingly are focused on software integrity. Andreas Kuehlmann of Synopsys discusses how to address this shift.

Security 179
article thumbnail

How to Check Your Computer for Hacked Asus Software Update

WIRED Threat Level

Hackers compromised Asus’s Live Update tool to distribute malware to almost a million people. Here’s how to find out if your computer has it.

IT 92
article thumbnail

Why Simpler is Better for CISOs

Data Breach Today

Trend Micro's Steve Neville on Managing Today's Complex Technical Landscape Simpler is better. While that might be a frequent truism in life, it's especially applicable to the technology landscape facing organizations, as CISOs attempt to manage cloud services, 5G and other emerging technologies, says Steve Neville, director of corporate marketing at Trend Micro.

Marketing 166
article thumbnail

Malware Payloads Hide in Images: Steganography Gets a Reboot

Threatpost

Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Inside Netscout's Threat Report

Data Breach Today

Hardik Modi of Netscout Analyzes the Latest Cybercrime Trends Netscout is out with its latest threat report, and the research offers some startling new insights into DDoS, advanced threats and the commercialization of cybercrime. Hardik Modi offers analysis.

IT 160
article thumbnail

How to infuse automation with data governance to thrive in a regulated world

IBM Big Data Hub

IIRA is an AI-powered regulatory on-ramp which helps businesses comply with a variety of regulations, and is available as an add-on to IBM Cloud Private for Data (ICP for Data).

article thumbnail

LockerGoga Ransomware Suspected in Two More Attacks

Data Breach Today

Chemical Manufacturers Hexion and Momentive Still Recovering from Cyberattacks A pair of U.S. chemical manufacturing companies have reportedly been struck by the LockerGoga ransomware over the past month and continue to recover from the same cyberattack that took down part of Aluminum giant Norsk Hydro last week.

article thumbnail

Pwn2Own: Tesla Hack, Broken VMs, and Skewed Economics

Dark Reading

In the latest Pwn2Own vulnerability throwdown at the CanSecWest conference, two researchers walk away with the lion's share of rewards-just like the real marketplace.

81
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Oregon Agency Reports Phishing Attack Affecting 350,000

Data Breach Today

Incident Among Largest Health Data Breaches So Far in 2019 The Oregon Department of Human Services is among the latest entities to reveal a phishing breach impacting the protected health information of hundreds of thousands of individuals.

Phishing 160
article thumbnail

Operation ShadowHammer – Supply-Chain attack hit ASUS users

Security Affairs

Operation ShadowHammer – ASUS is the last victim of a clamorous supply chain attack that delivered a backdoor to more than one million users, Kaspersky Lab reported. Over 1 million ASUS users may have been impacted by a supply chain attack that leveraged the ASUS Live Update utility to inject a backdoor in ASUS systems. Kaspersky tracked the attack as Operation ShadowHammer , it took place between June and November 2018, but experts discovered it in January 2019. “In January 2019, we

IT 70
article thumbnail

Securing Smartphones from Eavesdropping

Data Breach Today

Mike Fong of Privoro Discusses Smartphone Encryption Smartphone security is paramount for certain scenarios, but software based encryption has been shown to be insufficient.

Security 136
article thumbnail

On the Trail of the Robocall King

WIRED Threat Level

An investigator set out to discover the source of one scammy robocall. Turns out, his target made them by the millions.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Stepping Up to the Board

Data Breach Today

Joyce Brocaglia on How BoardSuited Prepares Security Leaders Cybersecurity leaders hear a lot about speaking to the board. But increasingly, these leaders are also tapped to serve on boards of directors. What business skills are most needed and often lacking? Executive recruiter Joyce Brocaglia of Alta Associates and the Executive Women's Forum explains.

article thumbnail

ThreatList: Remote Workers Threaten 1 in 3 Organizations

Threatpost

More than one-third of surveyed organizations (36 percent) said they have experienced a security incident because of a remote worker's actions.

article thumbnail

Three things to love with Jamf Pro 10.11

Jamf

To coincide with Apple’s March 25 event, Jamf Pro offers day-zero support for Apple's spring release of operating system updates. Learn more.

70
article thumbnail

IT Leaders, Employees Divided on Data Security

Dark Reading

Execs and employees have dramatically different ideas of how much information is being lost and why - a gap that puts enterprise data in grave danger.

IT 65
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Finding real strength in numbers through data partnerships

Information Management Resources

BOOK EXCERPT In 'Data Leverage: Unlocking the Surprising Growth Potential of Data Partnerships,' the authors explore how data partnerships can produce a whole that is often greater than the sum of its parts.

IT 61
article thumbnail

Attackers Compromise ASUS Software Update Servers to Distribute Malware

Dark Reading

ShadowHammer campaign latest to highlight dangers of supply chain attacks.

90
article thumbnail

Bugs in Grandstream Gear Lay Open SMBs to Range of Attacks

Threatpost

Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.