Thu.Sep 19, 2019

article thumbnail

Supply Chain Attacks: Hackers Hit IT Providers

Data Breach Today

Symantec Sees New Tortoiseshell Gang Hitting Targets in Middle East A hacker group called Tortoiseshell has been hitting targets in the Middle East since at least July 2018, apparently targeting IT service providers to gain access to many potential targets at once. The campaign is fresh proof that criminals and nation-state attackers alike continue to favor supply chain attacks.

IT 254
article thumbnail

Business Process Can Make or Break Data Governance

erwin

Data governance isn’t a one-off project with a defined endpoint. It’s an on-going initiative that requires active engagement from executives and business leaders. Data governance, today, comes back to the ability to understand critical enterprise data within a business context, track its physical existence and lineage, and maximize its value while ensuring quality and security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cryptoming Botnet Smominru Returns With a Vengeance

Data Breach Today

Researchers: New Campaign Spreading Worldwide The crypotmining botnet Smominru, which has been around since at least 2017, has resurfaced with a new campaign that has infected 90,000 devices worldwide, including in the U.S., China and Russia, according to security analysts at Guardicore.

Security 180
article thumbnail

Achieving Trust: Bake Security into Your Brand

Thales Cloud Protection & Licensing

Data is the most valuable online currency a consumer possesses. Yet most people don’t trust the companies they’re sharing data with, according to a new market trends study published by Gartner. In fact, 75% of consumers worry their online accounts may be hacked and the vast majority also believe companies are using or sharing their data without even telling them, according to the study.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

2 Phishing Attacks Affect Presbyterian Health Plan Members

Data Breach Today

Apparently Unrelated Attacks Potentially Expose Member Data Phishing incidents have had a big impact on members of Albuquerque, New Mexico-based Presbyterian Health Plan in recent weeks. Two separate, apparently unrelated, attacks potentially exposed a wealth of information on plan members.

Phishing 182

More Trending

article thumbnail

Phony IRS Emails Promise Refund, But Deliver Botnet Instead

Data Breach Today

Cofense: Phishing Campaign Helps Spread the New Amadey Botnet A new phishing email campaign promises to deliver a tax refund, but instead helps spread a botnet called Amadey, according to researchers at the security firm Cofense.

Phishing 178
article thumbnail

Being human in the age of AI

IBM Big Data Hub

Will AI take over the world? Or, more to the point, will it take over the humankind? It seems to have invaded the public consciousness, sparking concerns that AI will take away jobs. This fear is driven in part by companies using AI to deliver cost savings across their businesses, including areas related to labor.

IT 84
article thumbnail

Facebook Removes Hundreds of Fake Accounts

Data Breach Today

Majority of Phony Postings Originated in Ukraine and Iraq Facebook announced this week that it has removed hundreds of fake accounts and pages. The majority of these originated in Ukraine or Iraq and used phony user identifications to spread misinformation in an attempt to influence local politics, the company says.

IT 168
article thumbnail

Revisiting Software Vulnerabilities in the Boeing 787

Schneier on Security

I previously blogged about a Black Hat talk that disclosed security vulnerabilities in the Boeing 787 software. Ben Rothke concludes that the vulnerabilities are real, but not practical.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Metasploit Creator HD Moore's Latest Hack: IT Assets

Dark Reading

Moore has built a network asset discovery tool that wasn't intended to be a pure security tool, but it addresses a glaring security problem.

IT 94
article thumbnail

At least 1,300 Harbor cloud registry installs open to attack

Security Affairs

A critical security flaw in Harbor cloud native registry for container images could be exploited to obtain admin privileges on a vulnerable hosting system. Palo Alto Networks’ Unit 42 researcher Aviv Sasson discovered a critical vulnerability in Harbor cloud native registry for container images. The flaw, tracked as CVE-2019-16097, could be exploited to take control of Harbor registries with the default configuration.

Cloud 83
article thumbnail

Smart TVs, Subscription Services Leak Data to Facebook, Google

Threatpost

Researchers discovered that smart TVs from Samsung, LG and others are sending sensitive user data to partner tech firms even when devices are idle.

IoT 90
article thumbnail

MY TAKE: What everyone should know about the promise and pitfalls of the Internet of Things

The Last Watchdog

151
151
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Deconstructing an iPhone Spearphishing Attack

Dark Reading

How criminals today bypass smartphone anti-theft protection and harvest AppleID and passwords taken from fake Apple servers.

article thumbnail

Magecart attackers target mobile users of hotel chain booking websites

Security Affairs

Trend Micro researchers reported that a Magecart group has hacked the websites of two hotel chains to inject scripts targeting Android and iOS users. Researchers discovered a series of incidents involving software credit card skimmer used by Magecart to hit the booking websites of hotel chains. In early September, the researchers discovered a JavaScript code onto two hotel websites belonging to different hotel chains.

article thumbnail

California's IoT Security Law Causing Confusion

Dark Reading

The law, which goes into effect in on January 1, requires manufacturers equip devices with 'reasonable security feature(s).' What that entails is still an open question.

IoT 82
article thumbnail

In an Eagerly Anticipated Decision, the Ninth Circuit Sides With Web Scrapers

Data Matters

For years, companies seeking to block web scrapers from collecting the information on their website would invoke the Computer Fraud and Abuse Act (CFAA), a U.S. law that criminalizes accessing a computer “without authorization.” But the U.S. Court of Appeals for the Ninth Circuit has now ruled that merely instructing scrapers that they are not welcome on a public website, either through a restrictive terms of use or a cease-and-desist letter, is probably not enough to render their access “unauth

Access 68
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The 20 Worst Metrics in Cybersecurity

Dark Reading

Security leaders are increasingly making their case through metrics, as well they should - as long as they're not one of these.

article thumbnail

Smominru Botnet continues to rapidly spread worldwide

Security Affairs

Researchers at Guardicore Labs reported that the Smominru botnet is rapidly spreading and now is already infecting over 90,000 machines each month around worldwide. In February 2018, researchers from Proofpoint discovered a huge botnet dubbed ‘Smominru’ that was using the EternalBlue exploit to infect Windows computers and recruit them in Monero cryptocurrency mining activities.

Mining 77
article thumbnail

MY TAKE: Poll shows senior execs, board members grasp strategic importance of cybersecurity

The Last Watchdog

article thumbnail

Security Pros Value Disclosure. Sometimes

Dark Reading

Security professionals will coordinate disclosure with researchers but may keep their self-discovered vulnerabilities secret, a new study shows.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Day-zero Apple OS support with Jamf Pro 10.15

Jamf

We are proud to deliver new features and support for Apple’s latest operating systems. Get the details.

75
article thumbnail

BSIMM10 Emphasizes DevOps' Role in Software Security

Dark Reading

The latest model, with insights from 122 firms, shows DevOps adoption is far enough along to influence how companies approach software security.

article thumbnail

How artificial intelligence is, and will continue, redefining job roles

Information Management Resources

One of the most hotly-debated issues around AI is how it will impact individual job roles, and whether AI is a “job killer” as opposed to a “job creator.” It's both, says Accenture's Mike Maresca.

article thumbnail

Crowdsourced Security & the Gig Economy

Dark Reading

Crowdsourced platforms have redefined both pentesting and the cybersecurity gig economy. Just not in a good way.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Microsoft Silent Update Torpedoes Windows Defender

Threatpost

Microsoft broke its built-in antivirus utility, thanks to a patch for a different issue.

IT 78
article thumbnail

Off the Record: Digitization & Legacy Paper Records

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes. This month we are focusing on digitization and imaging projects… No, we didn’t write these articles —hence the name of this series, “Off the Record”— but fortunately, we didn’t need to in order to share the knowledge with our subscribers. “ Why Isn’t Everyth

Paper 53
article thumbnail

Ecuador Fast-Tracks Data Protection Law in Wake of Massive Breach

Hunton Privacy

Ecuador is seeking to pass a data protection bill in the wake of a massive data breach that resulted in the personal data of up to 20 million people being made available online. According to reports, the bill draws on the EU General Data Protection Regulation (“GDPR”) in certain ways—for example, as relates to international data transfers—but diverges in other respects.