Sun.Mar 31, 2019

article thumbnail

Annual Protest Raises $250K to Cure Krebs

Krebs on Security

For the second year in a row, denizens of a large German-language online forum have donated more than USD $250,000 to cancer research organizations in protest of a story KrebsOnSecurity published in 2018 that unmasked the creators of Coinhive , a now-defunct cryptocurrency mining service that was massively abused by cybercriminals. Krebs is translated as “cancer” in German.

Mining 161
article thumbnail

Security Affairs newsletter Round 207 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Kindle Edition. Paper Copy. Once again thank you! Federal Emergency Management Agencys (FEMA) data leak exposes data of 2.3M survivors. Malware Static Analysis. Microsoft Defender APT now protects also macOS. WordPress Social Warfare plugin zero-day exploited in attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Password checkup: from 0 to 650, 000 users in 20 days

Elie

Password checkup allows users to check, in a privacy-preserving manner, whether their username and password matches one of the more than 4B+ credentials exposed by third-party data breaches of which Google is aware.

article thumbnail

Ex-NSA contractor Harold Thomas Martin pleads guilty to federal charge of willful retention of national defense information

Security Affairs

Harold Thomas Martin III, a 54-year-old Navy veteran from Glen Burnie and former NSA Contractor pleads guilty to 20-Year-Long theft of classified data. The former National Security Agency contractor stole a huge quantity of sensitive data from the agency and then stored it at his home and car for over two decades. The man was arrested by the FBI in August 2016 , the US DoJ charged Harold Thomas Martin with theft of secret documents and highly classified government material.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Student Traditions – past (and future?)

Archives Blogs

Every so often there seems to be a rush of interest in bringing back old Amherst traditions. Perhaps alumni wish that students of today could experience gathering as a class to sing at the senior fence. Or students wonder if they are missing out on quirky old traditions that could build school spirit. Well, today I’d like to share with you some of the lesser known student traditions and activities from the past, all candidates for reintroduction into the Amherst traditions of today!

More Trending

article thumbnail

A Case Study: Implementing a Db2 for z/OS Implicit Trusted Connection

Robert's Db2

I've been interested in the role and trusted context features of Db2 for z/OS for a long time (I posted a two-part blog entry on the topic back in 2011). Theory is nice, but what about practice? Recently, I had an opportunity to assist a DBA in implementing implicit trusted connection functionality in his Db2 for z/OS environment (more on the implicit part in a moment).

article thumbnail

Experts released the List of ~600 MAC addresses hit in ASUS hack?

Security Affairs

Experts at Skylight Cyber released the list of 600 MAC addresses used threat actors behind Operation ShadowHammer to target ASUS customers. Skylight Cyber released the list of 583 MAC addresses used threat actors behind Operation ShadowHammer to target ASUS customers. Over 1 million ASUS users may have been impacted by a supply chain attack that leveraged the ASUS Live Update utility to inject a backdoor in ASUS systems.

article thumbnail

Weekly Update 132

Troy Hunt

From last week's update in Seattle to home to Sydney to back home and a late update (again). But regardless, I'm committed to continuing the cadence of doing these updates each week and 132 of them in, I'm yet to miss a week. This week it's a combination of more of the same (travel, events and data breaches), as well as more thoughts on the future of HIBP and Cloudflare's role when it comes to nasty content online.

article thumbnail

Digital Enterprises: Built on Modern MDM

Reltio

Ankur Gupta, Sr. Product Marketing Manager, Reltio. The third Modern Data Management annual summit (#DataDriven19) had great minds sharing their MDM success stories and assessing where MDM is headed. Modern enterprises put data at the heart of every decision to stay competitive. Nice line. But that’s easier said than done. Understanding data to make it work is perhaps the biggest challenge enterprises face today.

MDM 40
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Microsoft took control of 99 domains used by Iran-linked Phosphorus APT

Security Affairs

Microsoft this week announced that it had taken control of 99 domains used by an Iran-linked APT group tracked by the company as Phosphorus. Microsoft has recently announced that it had taken control of 99 domains used by an Iran-linked APT group tracked by the tech giant as Phosphorus (aka APT35, Charming Kitten , NewsBeef , Newscaster and Ajax Security Team). “Today, court documents were unsealed detailing work Microsoft’s Digital Crimes Unit has executed to disrupt cyberattacks from a t