Wed.Oct 16, 2019

article thumbnail

Anonymization & Pseudonymization as Tools for Cross-Border Discovery Compliance

ARMA International

Introduction. Companies that conduct business internationally, and their lawyers, today face a significant challenge balancing U.S. discovery demands against the requirements of Europe’s General Data Protection Regulation (GDPR). Most U.S. courts and investigators expect parties that are involved in litigation or investigations to comply with requests for potentially relevant documents in their possession, custody, or control, regardless of whether the documents are located within or outside the

article thumbnail

Ransomware Attacks: STOP, Dharma, Phobos Dominate

Data Breach Today

GlobeImposter 2.0 and Sodinokibi Strikes Also Common, Researchers Find Ransomware is once again the most common illicit profit-making tool in online attackers' arsenal, police warn. Security firm Emsisoft says the most-seen strains in recent months include STOP, Dharma.cezar, Phobos, GlobeImposter 2.0 and Sodinokibi. Less widely seen Ryuk also continues to generate big profits.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When Card Shops Play Dirty, Consumers Win

Krebs on Security

Cybercrime forums have been abuzz this week over news that BriansClub — one of the underground’s largest shops for stolen credit and debit cards — has been hacked, and its inventory of 26 million cards shared with security contacts in the banking industry. Now it appears this brazen heist may have been the result of one of BriansClub’s longtime competitors trying to knock out a rival.

Sales 114
article thumbnail

'Silent Librarian' Revamps Phishing Campaign: Proofpoint

Data Breach Today

Iranian-Backed Hacking Group Targeting Research Universities "Silent Librarian," a hacking group with apparent ties to the Iranian government, is continuing to revamp and refine its phishing techniques as it targets research universities in the U.S. and Europe in an attempt to steal intellectual property, according to the security firm Proofpoint.

Phishing 171
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

7 steps to a successful ISO 27001 risk assessment

IT Governance

Risk assessments are at the core of any organisation’s ISO 27001 compliance project. They are essential for ensuring that your ISMS (information security management system) – which is the end-result of implementing the Standard – is relevant to your organisation’s needs. What is an information security risk assessment? An information security risk assessment is the process of identifying, resolving and preventing security problems.

Risk 78

More Trending

article thumbnail

U.S. Financial Regulators Clarify Oversight of AML/CFT Obligations in Connection With Digital Asset Activities

Data Matters

On October 11, 2019, the leaders of the U.S. Commodity Futures Trading Commission (CFTC), the Financial Crimes Enforcement Network (FinCEN) and the U.S. Securities and Exchange Commission (SEC) (together, the Agencies) issued a joint statement highlighting the application of anti-money laundering and countering the financing of terrorism (AML/CFT) obligations under the Bank Secrecy Act (BSA) to persons engaged in activities involving digital assets (Joint Statement).

article thumbnail

OCR's Severino Outlines Top HIPAA Enforcement Initiatives

Data Breach Today

Ensuring Patients' Rights to Access Records a Top Priority Enforcing patients' rights under HIPAA to access their health information - including via health apps - is a top policy initiative at the HHS Office for Civil Rights, Director Roger Severino said in a Wednesday presentation. He also said a $2.1 million HIPAA penalty would be announced soon.

Access 134
article thumbnail

Signature update for Symantec Endpoint protection crashed many device

Security Affairs

Symantec rolled out an intrusion prevention signature update for its Endpoint Protection product that has caused many devices to crash and display a so-called blue screen of death (BSOD). An intrusion prevention signature update for the Endpoint Protection product had a bad impact on the devices, in many cases it caused the devices to crash and display the blue screen of death (BSOD).

article thumbnail

Phony Company Used to Plant macOS Malware: Report

Data Breach Today

Malware Designed to Infect Devices of Cryptocurrency Exchange Employees Security researchers have found that a hacking group, which may have North Korean ties, recently created a phony company offering a cryptocurrency exchange platform as a step toward planting malware on the macOS devices of employees of cryptocurrency exchanges.

Security 134
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Typosquatting Websites Proliferate in Run-up to US Elections

Dark Reading

People who mistype the URL for their political candidate or party's website could end up on an opposing party or candidate's website, Digital Shadow's research shows.

66
article thumbnail

3 Key Risks with Employee Passwords in the Financial Services Industry

Data Breach Today

How can financial services institutions better protect employee passwords? One of the most common threat vectors plaguing financial services institutions is the employee password.

article thumbnail

Is something holding back digital transformation?

OpenText Information Management

Digital transformation has become essential for every organization. But success rates can be as low as 4% for projects in some industries. Digitizing a process depends on how effectively you deal with data at both ends of that process. The latest IDG MarketPulse report, Enterprise Fax with Capture Technology, reveals that as volumes grow, organizations … The post Is something holding back digital transformation?

article thumbnail

IoT in Vehicles: The Trouble With Too Much Code

Data Breach Today

The threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which poses risks for the coming wave of autonomous vehicles, says Campbell Murray of Blackberry. Large code bases, which likely have many hidden software bugs, are part of the problem, he says.

IoT 125
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Schadenfreude Is a Bad Look & Other Observations About Recent Disclosures

Dark Reading

The debate about whether Android or iOS is the more inherently secure platform misses the larger issues that both platforms are valuable targets and security today is no guarantee of security tomorrow.

article thumbnail

Making The Most Out of A Retention Schedule – A New 7-Minute Master Series from CAPP

Information Governance Perspectives

A Records Retention Schedule is a TOOL that EMPOWERS organizations to GOVERN and DEFENSIBLY DISPOSE of their information. Records retention is first and foremost about complying with laws and regulations. However, a retention schedule, when properly developed and utilized, is not simply a tool that tells you how long you must keep (or when to Continue reading.

article thumbnail

Federal CIOs Zero In on Zero Trust

Dark Reading

Here's how federal CIOs can begin utilizing the security concept and avoid predictable obstacles.

article thumbnail

Docker Containers Riddled with Graboid Crypto-Worm

Threatpost

A worm with a randomized propagation method is spreading via the popular container technology.

Cloud 76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How to Build a Rock-Solid Cybersecurity Culture

Dark Reading

In part one of this two-part series, we start with the basics - getting everyone to understand what's at stake - and then look at lessons from the trenches.

article thumbnail

WAVs Hide Malware in Their Depths in Innovative Campaign

Threatpost

Three different loaders and two payloads are hiding in audio files.

84
article thumbnail

Google Cloud Launches Security Health Analytics in Beta

Dark Reading

The tool is designed to help identify misconfigurations and compliance violations in the Google Cloud Platform.

Cloud 72
article thumbnail

Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector: Report

Threatpost

A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone's fingerprint reader when the phone was encased by a third-party screen protector.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cryptojacking Worm Targets and Infects 2,000 Docker Hosts

Dark Reading

Basic and 'inept' worm managed to compromise Docker hosts by exploiting misconfigurations.

69
article thumbnail

Cybercrime Tool Prices Bump Up in Dark Web Markets

Threatpost

A report reveals data, services and toolkits available for cybercriminals are becoming more expensive and sophisticated.

article thumbnail

California Dreamin’ – A Free Roadmap For your CCPA Journey

Information Governance Perspectives

What is the CCPA and why should you care? In response to recent stateside efforts to enshrine data protection including the California Consumer Privacy Act (CCPA), organizations are revisiting the efficacy of their Data and Information Governance (IG) programs. Laws and regulations vary by industry and company size. Yet each intend to protect consumer’s personal Continue reading.

article thumbnail

10 Steps for Ransomware Protection

Threatpost

Here are things you can do right now to shore up your defenses and help your recovery when you get hit.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

SailPoint Buys Orkus and OverWatchID to Strengthen Cloud Access Governance

Dark Reading

The $37.5 million acquisitions will boost SailPoint's portfolio across all cloud platforms.

Cloud 60
article thumbnail

Silent Librarian Retools Phishing Emails to Hook Student Credentials

Threatpost

Silent Librarian cyberattackers are switching up tactics in a phishing scheme bent on stealing student credentials.

article thumbnail

ARMA Infocon 2019 discussed in latest Inside the Records Room Radio Show

IG Guru

Listening back to ITRR – Talkin’ To The GURU from IG Guru by FXInternetRadio on Mixlr. [link] #mixlr via @mixlr. The post ARMA Infocon 2019 discussed in latest Inside the Records Room Radio Show appeared first on IG GURU.