Thu.Oct 11, 2018

article thumbnail

GandCrab Ransomware Partners With Crypter Service

Data Breach Today

Gang's Cult Status and Marketing Savvy Belies Shoddy Attack Code, McAfee Says The notorious GandCrab ransomware-as-a-service gang has released the latest version of its crypto-locking malware, backed by crypter service and exploit toolkit partnerships. But the gang's marketing savvy belies shoddy code-development practices, security firm McAfee finds.

article thumbnail

Patch Tuesday, October 2018 Edition

Krebs on Security

Microsoft this week released software updates to fix roughly 50 security problems with various versions of its Windows operating system and related software, including one flaw that is already being exploited and another for which exploit code is publicly available. The zero-day bug — CVE-2018-8453 — affects Windows versions 7, 8.1, 10 and Server 2008, 2012, 2016 and 2019.

Security 176
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: Remote Access Is No. 1 Healthcare Tech Hazard

Data Breach Today

ECRI Institute Calls Attention to Cyber Risks for Second Consecutive Year Hackers remotely accessing medical devices and systems - potentially disrupting care and putting patients at risk - is the No. 1 technology hazard facing healthcare entities in the year ahead, according to a new report from the ECRI Institute. Security experts size up the significance of this risk.

Access 164
article thumbnail

5 Project Management Mistakes Agile Organizations Must Avoid

AIIM

Agile companies are ambitious. Agile teams seek to reach new heights by employing an iterative approach. While agile project management is an extremely popular project management framework, it’s not wholly understood. More importantly, misusing the methodology can spell disasters for teams. Agile organizations have to be careful especially when hiring promising project managers to lead a new team.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How the US Halted China’s Cybertheft—Using a Chinese Spy

WIRED Threat Level

For years, China has systematically looted American trade secrets. Here's the messy inside story of how DC got Beijing to clean up its act for a while.

IT 98

More Trending

article thumbnail

How Cyber Essentials can help secure your devices and software

IT Governance

The Cyber Essentials scheme is a world-leading assurance mechanism for organisations of all sizes to help demonstrate that the most critical cyber security controls have been implemented. Although not adequate in the – relatively uncommon – case of a cyber criminal targeting your organisation using bespoke tools, Cyber Essentials’ controls can prevent.

article thumbnail

Exaramel Malware Links Industroyer ICS malware and NotPetya wiper

Security Affairs

ESET researchers have spotted a new strain of malware tracked as Exaramel that links the dreaded not Petya wiper to the Industroyer ICS malware. A few months ago, researchers from ESET discovered a new piece of malware that further demonstrates the existence of a link between Industroyer and the NotPetya wiper. In June 2017, researchers at antivirus firm ESET discovered a new strain of malware, dubbed Industroyer, that was designed to target power grids.

article thumbnail

Prescriptive analytics: The cure for a transforming healthcare industry

IBM Big Data Hub

Prescriptive analytics offers healthcare decision makers the opportunity to influence optimal future outcomes. Based on decision optimization technology, these capabilities allow users to not just recommend the best course of action for patients or providers, they also enable comparison of multiple “what-if” scenarios to assess the impact of choosing one action over another.

article thumbnail

Another Bloomberg Story about Supply-Chain Hardware Attacks from China

Schneier on Security

Bloomberg has another story about hardware surveillance implants in equipment made in China. This implant is different from the one Bloomberg reported on last week. That story has been denied by pretty much everyone else, but Bloomberg is sticking by its story and its sources. (I linked to other commentary and analysis here.). Again, I have no idea what's true.

IT 85
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Updating our Website

National Archives Records Express

Starting on Friday afternoon, we will be updating the content on our records management web page, located at [link]. These updates will be completed by Monday morning, October 15th. We have been looking at our records management web page and how our information is organized. We analyzed how users are interacting with the site, including what links users click on and what searches users run.

article thumbnail

Jamf announces support for new Google Cloud secure LDAP service

Jamf

Whether using G Suite or Cloud Identity, you can sync every user, authenticate them on Jamf Pro managed devices, and use LDAP lookups to scope device configurations and applications to users. Get the details.

Cloud 75
article thumbnail

Win with AI: Insurance company Guidewell looks to get data for AI

IBM Big Data Hub

James Wade, Director of Application Hosting at Guidewell and IBM Analytics Hemanth Manda spoke with Dave Vellante in New York City on the eve of the 13 September taping of the Win with AI digital broadcast about the challenge of getting data ready for AI and how IBM Cloud Private for Data can help.

article thumbnail

A Record Center is Not an Archives: Some thoughts from an interview

The Schedule

So, some context: one of my employees (I won’t name her here unless she sees this and asks me to) is currently pursuing her MLIS from SJSU. A recent assignment for one of her classes was to interview a practicing Archivist and/or Records Manager about the “qualified practices” of the profession and write up a paper/presentation/something else summarizing and analyzing it.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weekly podcast: Google+, Supermicro and Heathrow

IT Governance

This week we discuss the end of Google+, allegations of Chinese motherboard interference, and a £120,000 fine for Heathrow Airport. Hello and welcome to the IT Governance podcast for Friday, 12 October. Here are this wee- actually, can we have a quick word about that theme tune? When we started this podcast back in July 2015 I confess I expected it to be a short-lived experiment that would fizzle out by the end of the summer.

article thumbnail

Three ways OpenText and Quest Diagnostics are modernizing customer experience in healthcare

OpenText Information Management

In her annual Internet Trends Report, KPCG partner Mary Meeker highlights the impact of technology on consumer expectations and the need for better information management. According to Meeker, technology has changed consumer expectations, creating demands for modern retail experiences, more digital engagement, on-demand access, transparency, and simple payments.

article thumbnail

The Better Way: Threat Analysis & IIoT Security

Dark Reading

Threat analysis offers a more nuanced and multidimensional approach than go/no-go patching in the Industrial Internet of Things. But first, vendors must agree on how they report and address vulnerabilities.

article thumbnail

California Enacts Blockchain Legislation

Hunton Privacy

As reported on the Blockchain Legal Resource , California Governor Jerry Brown recently signed into law Assembly Bill No. 2658 for the purpose of further studying blockchain’s application to Californians. In doing so, California joins a growing list of states officially exploring distributed ledger technology. Specifically, the law requires the Secretary of the Government Operations Agency to convene a blockchain working group prior to July 1, 2019.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Window Snyder Shares Her Plans for Intel Security

Dark Reading

The security leader, known for her role in securing Microsoft, Apple, and Mozilla, discusses her new gig and what she's working on now.

article thumbnail

FitMetrix Exposes Millions of Customer Details, Accessed by Criminals

Threatpost

Gym customer data, including contact information, birth dates and height/weight data, opens the door to convincing follow-on social-engineering attacks.

Access 65
article thumbnail

Chinese Intelligence Officer Under Arrest for Trade Secret Theft

Dark Reading

Yanjun Xu attempted to steal data on advanced aviation technology that GE Aviation, among others, had spent billions developing.

80
article thumbnail

Fake Adobe Flash Updates Hide Malicious Crypto Miners

Threatpost

A fake Adobe update actually updates victims' Flash - but also installs malicious cryptomining malware.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

One-Third of US Adults Hit with Identity Theft

Dark Reading

That's double the global average and more than three times the rate of French and German adults.

89
article thumbnail

Adaptable, All-in-One Android Trojan Shows the Future of Malware

Threatpost

GPlayed may be the new face of malware -- flexible and adaptable, with a Swiss Army knife-like toolbox that can be used to target pretty much anyone.

article thumbnail

Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up

Dark Reading

Many organizations have yet to create an effective cybersecurity strategy - and it's costing them millions.

article thumbnail

My work, my way: Life as a Principal Systems Engineer at OpenText

OpenText Information Management

You never know where your first work experiences might lead you. Matthias Specht, Principal Systems Engineer, started his career with OpenText™ in 2003 as an intern. Today, 15 years later, Matthias continues to enjoy OpenText because of the large clients his development work supports, the challenging projects he works on, and the kind colleagues he … The post My work, my way: Life as a Principal Systems Engineer at OpenText appeared first on OpenText Blogs.

54
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Deep Dives: New Security Flaws in Apple and Microsoft products at Black Hat Europe

Dark Reading

With Black Hat Europe coming to London in a few months, organizers share three of the most promising Briefings slated for the December event.

article thumbnail

New Drupalgeddon Attacks Enlist Shellbot to Open Backdoors

Threatpost

Drupalgeddon 2.0 vulnerability is being exploited again by attackers using a time-honored technique of Shellbot, or PerlBot.

CMS 66
article thumbnail

Most Malware Arrives Via Email

Dark Reading

Watch out for messages with the word "invoice" in the subject line, too.

87