Mon.May 06, 2019

article thumbnail

Cybersecurity Drives Intelligence Agencies in From the Cold

Data Breach Today

Post-Snowden Transparency, Incident Response Push by Western Allies Continue With cyberattacks, online espionage and data breaches happening at a seemingly nonstop pace, Western intelligence agencies are bringing many of their capabilities out of the shadows to help businesses and individuals better safeguard themselves and respond. We need all the help we can get.

article thumbnail

Q&A: The drivers behind the stark rise — and security implications — of ‘memory attacks’

The Last Watchdog

A distinctive class of hacking is rising to the fore and is being leveraged by threat actors to carry out deep, highly resilient intrusions of well-defended company networks. Related: Memory hacking becomes a go-to tactic These attacks are referred to in the security community as “fileless attacks” or “memory attacks.” The latter conveys a more precise picture: memory hacking refers to a broad set of practices, which can include fileless attacks, that constitute this go-deep form of network brea

Security 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Despite Doxing, OilRig APT Group Remains a Threat

Data Breach Today

Researchers Describe What They've Learned From Data Dump Despite a doxing of its targets and tools in March, the advanced persistent threat group known as OilRig remains a significant threat to governments and businesses, researchers at Palo Alto Network's Unit 42 report.

article thumbnail

[Podcast] Inside the Action at The AIIM Conference

AIIM

Have you ever watched a football game or other sporting event where they gave the players or coaches microphones? Or, how about an 'after show’ of your favorite reality tv program? I don’t know about you, but these are some of my favorites to watch because it gives the viewer a more intimate look than you would get by just watching the game or show normally.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

$3 Million HIPAA Settlement in Delayed Breach Response Case

Data Breach Today

Touchstone Medical Imaging Learned of Breach From Two Federal Agencies Federal regulators have reached a $3 million HIPAA settlement in a case alleging that a medical imaging services provider delayed investigating and mitigating a breach involving patient information leaking onto the internet via a web server - and delayed notification of victims as well.

200
200

More Trending

article thumbnail

Ukrainian National Charged in Malvertising, Botnet Scheme

Data Breach Today

Indictment Alleges Years-Long Scheme Infected Millions of PCs A Ukrainian national is facing wire fraud and other charges stemming from his alleged involvement in a years-long malvertising scheme that infected millions of PCs around the world. Authorities allege that he created a botnet that other cybercriminals could rent out.

194
194
article thumbnail

A bug in Mirai code allows crashing C2 servers

Security Affairs

Ankit Anubhav, a principal researcher at NewSky Security, explained how to exploit a vulnerability in the Mirai bot to crash it. Ankit Anubhav, a principal researcher at NewSky, explained how to exploit a trivial bug in the code of the Mirai bot , which is present in many of its variants, to crash it. The expert pointed out that a Mirai C2 server crashes when someone connects it using as username a sequence of 1025+ “a” characters.

IoT 102
article thumbnail

Five technology trends driving the automotive industry into the future

DXC Technology

As cars become increasingly smarter and automated, a lot of innovative technology will be needed to make them even smarter and more useful to drivers. Manufacturing cars of the future – be they autonomous, connected, electric, or a mix of all three – will be fueled by cutting-edge technology. Companies that can deploy this technology […].

article thumbnail

Password Reuse, Misconfiguration Blamed for Repository Compromises

Dark Reading

Armed with stolen credentials from another breach or from a misconfigured file, attackers delete developers' repositories on GitHub, Bitbucket, and GitLab, leaving behind ransom notes.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Fifth Annual Sidley Privacy and Cybersecurity Roundtable

Data Matters

We held our 5th Annual Privacy and Cybersecurity Roundtable on May 1, in Washington, D.C. The event featured the Chair of the European Data Protection Board Andrea Jelinek and FTC Commissioner Noah Phillips. Other government speakers represented the White House, UK’s Information Commissioner’s Office, and staff members from the U.S. Senate and House of Representatives.

Privacy 68
article thumbnail

Other Sierra AirLink router models affected by critical flaws

Security Affairs

Sierra Wireless is warning its customers that additional AiraLink router models are affected by critical vulnerabilities previously disclosed. At the end of April, experts at Cisco Talos group disclosed a dozen of vulnerabilities in Sierra Wireless AirLink gateways and routers, including several serious flaws. Sierra Wireless AirLink gateways and routers are widely used in enterprise environments to connect industrial equipment, smart devices, sensors, point-of-sale (PoS) systems, and Industrial

article thumbnail

A Considerable Insight into your Data | Capture, organize, store and deliver rich media assets with everteam.iNSight

Everteam

In the age of Big Data, capturing, organizing and analyzing all your data is nearly impossible if you are counting on traditional methods. Without having a solution to structure and benefit from this data, you’ll find yourself with mountains of data that you can’t tell what to do with but also are afraid of getting rid of. The size of Data might be an issue but the biggest challenge is the multiple data streams coming from online sources and social media, bringing rich media assets such as image

article thumbnail

Avengers: Endgame Sites Promise Digital Downloads, Deliver Info-Harvesting

Threatpost

Web scammers are going after Marvel fans as the movie passes the $2.2 billion box-office mark, making it the second-highest grossing film of all time, behind only Avatar.

IT 76
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Microsoft Debuts ElectionGuard to Secure Voting Processes

Dark Reading

The new software development kit - free and open source - will be available to election officials and technology suppliers this summer.

article thumbnail

ICS-CERT warns of several flaws in the GE Communicator software

Security Affairs

ICS-CERT is warning of several vulnerabilities in the GE Communicator software, including hardcoded credentials and privilege escalation bugs. ICS-CERT is warning of five flaws affecting the GE Communicator software, including privilege escalation issues and hardcoded credentials. GE Communicator is a is a user-friendly software for programming and monitoring supported metering devices.

article thumbnail

Attackers Add a New Spin to Old Scams

Dark Reading

Scammers are figuring out unique ways of abusing cloud services to make their attacks look more genuine, Netskope says.

Cloud 83
article thumbnail

4 reasons it’s time to move from spreadsheets to planning software

IBM Big Data Hub

Spreadsheets are not a good option for planning - there is a better way to be efficient, agile and react to change in real-time.

77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Extinguishing the IoT Insecurity Dumpster Fire

Threatpost

Will connected devices be insecure forever? Or will legislation - such as the recent UK mandate announced this week - help boost IoT security?

IoT 69
article thumbnail

Security Top Concern as Mobile Providers Think 5G

Dark Reading

The deployment of 5G networks will bring new use cases and revenue opportunities, mobile providers say, but security will be essential.

article thumbnail

Amid Bug Bounty Hype, Sometimes Security is Left in the Dust

Threatpost

Amidst the PR glitz and popularity of bug bounty programs, experts worry that actual smart security strategy is being left behind.

article thumbnail

AI and machine learning make data the new source code

Information Management Resources

Industry leaders often rush to capitalize on the latest trends, lacking a fundamental understanding of what AI really is, beginning with the term itself.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Strange Journey of an NSA Zero-Day Vulnerability—Into Multiple Enemies' Hands

WIRED Threat Level

How a "secret" hackable bug found by the NSA was used over by Chinese, North Korean, and Russian hackers to wreak havoc.

article thumbnail

Oracle WebLogic Exploit-fest Continues with GandCrab Ransomware, XMRig

Threatpost

Snowballing attacks using a recently patched critical bug show no sign of abating.

article thumbnail

Trust the Stack, Not the People

Dark Reading

A completely trusted stack lets the enterprise be confident that apps and data are treated and protected wherever they are.

63
article thumbnail

WP Live Chat WordPress Plugin Re-Patches File Upload Flaw

Threatpost

After researchers were able to bypass a file upload validation flaw patch in WP Live Chat, a new patch has been issued.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Avalon Partners with CloudDOCX to Offer Cloud Storage Service

Info Source

VICTOR, N.Y., May 6, 2019 – Avalon Document Services and CloudDOCX have partnered to offer a full-service web-based document management solution to Avalon’s customers. The agreement allows Avalon – a leader in document services for the professional business community – to sell an end-to-end document management solution to its customers as a complete Avalon-branded service.

Cloud 45
article thumbnail

Tor Security Add-On Abruptly Killed by Mozilla Bug

Threatpost

A digital signing flaw killed add-ons for Firefox as well as Tor -- and no patch is yet available for Tor users.

article thumbnail

'Matrix'-Themed Ransomware Variant Spreads

Dark Reading

MegaCortex uses a compromised domain controller in its attack.