Tue.Aug 06, 2019

article thumbnail

Microsoft: Russia Probes Office Printers, VOIP Phones

Data Breach Today

Points to the Need to Make IoT Devices More Secure Microsoft warned on Monday that Russia-linked attackers are gaining access to corporate networks through poorly configured devices, such as office printers and VOIP phones. The remedy is paying more attention to deployed IoT devices, including establishing security policies and regular testing.

IoT 228
article thumbnail

The Weird, Dark History of 8chan and Its Founder Fredrick Brennan

WIRED Threat Level

Fredrick Brennan is appalled by the notorious chat site’s links to right-wing extremism and mass shootings. Inside his tortured journey through the web’s cesspool and his attempt at redemption.

IT 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile-Only Bank Monzo Warns 480,000 Customers to Reset PINs

Data Breach Today

Software Bug Meant Some Numbers Were Stored Unencrypted Monzo, a U.K. mobile-only bank that plans to expand into the U.S., alerted about 480,000 customers to change their PINs this week after the company's security team found that a software bug meant some numbers were stored unencrypted in plaintext.

Security 221
article thumbnail

How Much Data is Created on the Internet Each Day?

Micro Focus

90% of the data on the internet has been created since 2016, according to an IBM Marketing Cloud study. People, businesses, and devices have all become data factories that are pumping out incredible amounts of information to the web each day. This post has been tracking the growth of data created on the internet for. View Article.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

How to Effectively Use AI and ML in Security

Data Breach Today

Group-IB's Aleksandr Lazarenko on Overcoming the Challenges It's difficult to build a reliable security system based on artificial intelligence and machine learning, says Aleksandr Lazarenko of Group-IB, who offers insights on how to make the most of these technologies.

More Trending

article thumbnail

Business Email Compromise Targets Mental Health Provider

Data Breach Today

Experts Describe How to Avoid Falling Victim to These Scams A recent attempt by hackers to trick a mental health provider into transferring funds serves as a reminder to other healthcare entities about the threat of business email compromises.

157
157
article thumbnail

Securing DevOps Is About People and Culture

Dark Reading

Preconceived notions and divisions make building security into the software development life cycle an uphill battle for many organizations.

article thumbnail

Kellermann: Hackers Emboldened by Lack of Prosecutions

Data Breach Today

Cybersecurity Expert From Carbon Black Sizes Up Evolving Threat Landscape The hacking subculture has been emboldened by a lack of prosecutions for cybercrime worldwide, says Tom Kellermann of Carbon Black, who addresses the evolving threat landscape.

article thumbnail

New Lord Exploit Kit appears in the threat landscape

Security Affairs

Security experts discovered a new exploit kit, dubbed Lord Exploit Kit, that is currently targeting vulnerable versions of Adobe Flash Player. Security experts at Malwarebytes have recently discovered a new exploit kit, dubbed Lord Exploit Kit, that is targeting vulnerable versions of Adobe Flash Player. The Lord Exploit Kit was first detected by Adrian Luca , researcher at Virus Bulletin, it was involved in a malvertising campaign leveraging the the PopCash ad network.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

New Hampshire Governor Signs Insurance Data Security Law

Hunton Privacy

On August 2, 2019, New Hampshire Governor Chris Sununu signed into law SB 194 (the “Bill”), which requires insurers licensed in the state (“licensees”) to put in place data security programs and report cybersecurity events. Although the Bill takes effect January 1, 2020, licensees have one year from the effective date to implement relevant cybersecurity requirements and two years from the effective date to ensure that their third-party vendors also implement appropriate safeguards to protect and

article thumbnail

Catches of the month: Phishing scams for August 2019

IT Governance

Your employees receive an average of 4.8 phishing emails every week. Almost a third of these make it past default security systems, leaving your organisation in a permanently perilous situation. There’s plenty of advice on how to spot phishing scams , but without any real-world examples that explain how they work, it can be easy to see the threat as purely theoretical.

article thumbnail

Russia-linked STRONTIUM APT targets IoT devices to hack corporate networks

Security Affairs

The STRONTIUM Russia-linked APT group is compromising common IoT devices to gain access to several corporate networks. Researchers at Microsoft observed the Russia-linked APT group STRONTIUM abusing IoT devices to gain access to several corporate networks. The STRONTIUM APT group (aka APT28 , Fancy Bear , Pawn Storm , Sofacy Group , and Sednit ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide.

IoT 76
article thumbnail

Phone Farming for Ad Fraud

Schneier on Security

Interesting article on people using banks of smartphones to commit ad fraud for profit. No one knows how prevalent ad fraud is on the Internet. I believe it is surprisingly high -- here's an article that places losses between $6.5 and $19 billion annually -- and something companies like Google and Facebook would prefer remain unresearched.

IT 73
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

US Air Force Bug Bounty Program Nets 54 Flaws for $123,000

Dark Reading

The Air Force brought together 50 vetted hackers to find the vulnerabilities in the latest bug-bounty program hosted by a branch of the US military.

article thumbnail

How IBM Cloud Pak for Data System delivers rapid value to data-driven businesses

IBM Big Data Hub

IBM continues to increase support for open source technologies. Today, we are pleased to announce that Cloud Pak for Data System now features a new capability for Postgres workloads—the IBM Performance Server for PostgreSQL.

Cloud 73
article thumbnail

A Model Hospital Where the Devices Get Hacked—on Purpose

WIRED Threat Level

At this year's Defcon Medical Device Village, hackers will attack real medical devices at a pretend hospital.

article thumbnail

CafePress Data Breach exposes technical details of 23 Million users

Security Affairs

CafePress, the popular T-Shirt and merchandise website, suffered a data breach that exposed the personal details of 23 million of their customers. CafePress, the popular T-Shirt and merchandise website, disclosed a data breach that exposed the personal details of 23 million of their customers. The news was publicly reported by the data breach notification service Have I Been Pwned. .

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russian Attack Group Uses Phones & Printers to Breach Corporate Networks

Dark Reading

Microsoft spotted Strontium, also known as APT28 or Fancy Bear, using IoT devices to breach businesses and seek high-value data.

IoT 86
article thumbnail

QualPwn Bugs in Qualcomm chips could allow hacking Android Over the Air

Security Affairs

Researchers discovered two serious flaws, QualPwn bugs, in Qualcomm’s Snapdragon SoC WLAN firmware that could be exploited to hack Android device over the air. Security experts at Tencent Blade, the security elite unit at Tencent, have discovered two severe vulnerabilities, QualPwn bugs , that could “allow attackers to compromise the Android Kernel over-the-air. “ QualPwn is a series of vulnerabilities discovered in Qualcomm chips.

article thumbnail

T-Mobile dials Jamf Now for comprehensive mobile device management

Jamf

Jamf, the standard for Apple management, has joined the T-Mobile for Business Marketplace to support businesses using T-Mobile and Apple devices.

75
article thumbnail

Ongoing Campaign Spoofs Walmart, Dating, Movie Sites

Dark Reading

A new investigation detects more than 540 domain names linked to the Walmart brand and camouflaged as career, dating, and entertainment websites.

75
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

T-Mobile dials Jamf Now for comprehensive mobile device management

Jamf

Jamf, the standard for Apple management, has joined the T-Mobile for Business Marketplace to support businesses using T-Mobile and Apple devices.

75
article thumbnail

Security & the Infinite Capacity to Rationalize

Dark Reading

To improve the security posture of our organizations, we must open our eyes to rationalization and put an end to it with logic. Here's how.

article thumbnail

How to conduct an ISO 27001 internal audit

IT Governance

To maintain ISO 27001 compliance, your organisation needs to conduct regular internal audits. These tests check that your ISMS (information security management system) still covers the necessary requirements and help you look for ways to develop your framework. Conducting an internal audit can confusion, because unlike the implementation of the ISO 2700’s requirements, there’s no formal process to follow.

Paper 65
article thumbnail

FBI Issues Relationship Fraud/Confidence Scheme Warning

Dark Reading

Criminals are getting increasingly sophisticated in their efforts to commit fraud and recruit 'money mules,' according to the FBI.

79
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Evolution of Aggah: From Roma225 to the RG Campaign

Security Affairs

The experts at Yoroi -Cybaze ZLab discovered a new wave of attacks linked to the cyber espionage campaign tracked as Roma225. Introduction. Few months ago we started observing a cyber operation aiming to attack private companies in various business sectors, from automotive to luxury, education, and media/marketing. The attack attribution is still unclear but the large scale of the malicious activities has also been confirmed by Unit42, who reported attack attempt against government verticals t

article thumbnail

New Speculative Execution Vulnerability Gives CISOs a New Reason to Lose Sleep

Dark Reading

The vulnerability, dubbed SWAPGS, is an undetectable threat to data security, similar in some respects to Spectre and Meltdown.

article thumbnail

Mass Spoofing Campaign Takes Aim at Walmart

Threatpost

The sites are targeting job-seekers, movie aficionados and shoppers in hopes of harvesting their personal information.