Thu.May 23, 2019

article thumbnail

Assange Indicted in US Under Espionage Act

Data Breach Today

Case May Prove to be One of the Most Significant First Amendment Challenges A federal grand jury has indicted WikiLeaks founder Julian Assange on 18 counts under the U.S. Espionage Act for his role in publishing classified material, the Justice Department announced Thursday. He's currently serving a prison sentence in the U.K. and fighting extradition to the U.S.

168
168
article thumbnail

Anonymous and LulzSec target the Italian Police and doctors

Security Affairs

In the last 10 days, the collectives of Anonymous and LulzSec continued their operations carrying out several cyber attacks. The main objectives of the attacks carried out by Anonymous and LulzSec ITA were the Italian doctors and the Law enforcement agencies Forces, in particular, the Police and the Carabinieri. They protest against the abuses the Public Health, they want to raise the attention on the scandal of the mysterious deaths in the hospitals accused to have been covered by the authoriti

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Assange Now Faces 18 US Charges

Data Breach Today

WikiLeaks Founder Faces Indicted Under Espionage Act A federal grand jury has indicted WikiLeaks founder Julian Assange on 18 counts under the U.S. Espionage Act for his role in publishing classified material, the Justice Department announced Thursday. He's currently serving a prison sentence in the U.K. and fighting extradition to the U.S.

169
169
article thumbnail

PoC Exploits for CVE-2019-0708 wormable Windows flaw released online

Security Affairs

Several security experts have developed PoC exploits for wormable Windows RDS flaw tracked as CVE-2019-0708 and dubbed BlueKeep. Experts have developed several proof-of-concept (PoC) exploits for the recently patched Windows Remote Desktop Services (RDS) vulnerability tracked as CVE-2019-0708 and dubbed BlueKeep. CVE-2019-0708 #BlueKeep – After many hours @ValthekOn was able to get a working PoC for this.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Cloud-Based EHR Vendor Slapped With HIPAA Fine

Data Breach Today

Investigation Came in Wake of Cyberattack That Affected Millions Federal regulators have smacked a cloud-based electronics health records vendor with a $100,000 HIPAA settlement in the wake of a 2015 cyberattack that affected millions of individuals. What's the focus of the enforcement action?

Cloud 158

More Trending

article thumbnail

Owner of Defunct Firm Fined in LeakedSource.com Case

Data Breach Today

Website Sold Access to 3.1 Billion Stolen Login Credentials, Authorities Say The former owner of the company behind the LeakedSource.com website, which trafficked in billions of stolen login credentials, will pay a fine equivalent to the money he made off the scam, according to the Royal Canadian Mounted Police.

Access 144
article thumbnail

Thangrycat: A Serious Cisco Vulnerability

Schneier on Security

Summary : Thangrycat is caused by a series of hardware design flaws within Cisco's Trust Anchor module. First commercially introduced in 2013, Cisco Trust Anchor module (TAm) is a proprietary hardware security module used in a wide range of Cisco products, including enterprise routers, switches and firewalls. TAm is the root of trust that underpins all other Cisco security and trustworthy computing mechanisms in these devices.

article thumbnail

Bestmixer Cryptocurrency Laundering Site Shuttered

Data Breach Today

Authorities Say 'Mixer' Site Laundered Nearly $200 Million Worth of Cryptocurrencies European police have shuttered Bestmixer.io, considered one of the largest underground money laundering websites for cryptocurrencies used in connection with criminal activities, including ransomware attacks.

article thumbnail

Playing Cat and Mouse: Three Techniques Abused to Avoid Detection

Security Affairs

The experts at Yoroi -Cybaze Zlab described three techniques commonly implemented by threat actors to avoid detection. Introduction. During our analysis we constantly run into the tricks cyber-attackers use to bypass companies security defences, sometimes advanced, others not. Many times, despite their elegance (or lack of it), these techniques are effective and actually help the cyber criminals to get into victim computers and penetrate company networks.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Executive Roundtable Recap: "Confessions of a Healthcare CISO"

Data Breach Today

ISMG and NTT hosted a roundtable dinner in Chicago on May 8 focused on "Confessions of a Healthcare CISO".

154
154
article thumbnail

UK provided evidence to 16 NATO allies of Russia hacking campaigns

Security Affairs

UK Government has provided to 16 NATO allies evidence of malicious Russia ‘s cyber activity in their countries over the last 18 months. According to the foreign minister Jeremy Hunt, the UK Government has provided to 16 NATO allies evidence of cyber attacks carried out by Russia against their countries over the last 18 months. Hunt explained that Russia’s intelligence apparatus is carrying out a “global campaign” targeting critical infrastructure.

article thumbnail

Goodbye Passwords: Hello Identity Management

Threatpost

As passwords are increasingly viewed as security liabilities, Identity Management solutions are picking up the slack.

article thumbnail

Tor Browser for Android is available through the Play Store

Security Affairs

Tor Browser for Android is now available on the Play Store, this is a great result for experts that everyday fight to defend human rights and privacy online. The Tor Project announced on Tuesday that the Tor Browser version Tor Browser 8.5 for Android is finally available on the Google Play Store. “Tor Browser 8.5 is now available from the Tor Browser download page and also from our distribution directory.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Researcher Publishes Four Zero-Day Exploits in Three Days

Dark Reading

The exploits for local privilege escalation vulnerabilities in Windows could be integrated into malware before Microsoft gets a chance to fix the issues.

85
article thumbnail

German SG-41 Encryption Machine Up for Auction

Schneier on Security

A German auction house is selling an SG-41. It looks beautiful. Starting price is 75,000 euros. My guess is that it will sell for around 100K euros.

article thumbnail

Russian Nation-State Hacking Unit's Tools Get More Fancy

Dark Reading

APT28/Fancy Bear has expanded its repertoire to more than 30 commands for infecting systems, executing code, and reconnaissance, researchers have found.

IT 80
article thumbnail

SandboxEscaper disclosed 3 Microsoft zero-day flaws in 24 hours

Security Affairs

Yesterday SandboxEscaper publicly disclosed a Windows zero-day vulnerability, now she disclosed other two unknown issues in less than 24 hours. Just Yesterday, the popular developer SandboxEscaper publicly disclosed a Windows zero-day vulnerability in the Task Manager, now in less than 24 hours the revealed two more unpatched Microsoft zero-day flaws.

Access 73
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Moody's Downgrade of Equifax: A Wake-up Call to Boards

Dark Reading

The event provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.

article thumbnail

The GDPR: A year in review

IT Governance

A year ago this week, the GDPR (General Data Protection Regulation) took effect, promising to revolutionise information security. To mark the anniversary, we gathered a panel of data protection experts to discuss the effect of the Regulation and the future of data protection. ‘Compliance fatigue’. In the first half of 2018, it was practically impossible to avoid news stories about the GDPR, the majority of which focused on the potential for hefty administrative fines for non-compliance.

GDPR 72
article thumbnail

Voice of the Client: Is AI your priority? Start with a data strategy

IBM Big Data Hub

Intel's Melvin Greer, Senior Principal Engineer and Chief Data Scientist, Americas writes about the data strategy necessary to execute the promises of AI and touts their collaboration with IBM on Cloud Pak for Data. But before anyone can execute an AI strategy, they’ll need a data strategy.

Cloud 72
article thumbnail

To Manage Security Risk, Manage Data First

Dark Reading

At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk.

Risk 86
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Cinco formas de traducir los retrasos aéreos en experiencias positivas

DXC Technology

Las aerolíneas saben muy bien que habrá retrasos. Pero aún siendo inevitables, hay formas de traducirlos en experiencias positivas. Todas ellas cuentan con datos comerciales muy valiosos (de los comercios del aeropuerto, áreas de descanso y del comportamiento de los viajeros) en este recinto acotado. Conocen sus preferencias. Con esta información, pueden mejorar mucho los […].

article thumbnail

Moody's Outlook Downgrade of Equifax: A Wake-up Call to Boards

Dark Reading

The move provides another spark to light a fire under CISOs to improve how they measure and communicate security risks to the board, security experts say.

article thumbnail

Use case upon use case for Jamf Setup and Jamf Reset

Jamf

Discover how the Jamf Setup and Jamf Reset apps are helping schools, hospitals, hospitality and retail organizations maximize their Apple investments.

Retail 74
article thumbnail

The Julian Assange Espionage Act Charges Target Press Freedom

WIRED Threat Level

By invoking the Espionage Act against Julian Assange, the Justice Department will effectively put national security journalism on trial.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

SandboxEscaper Drops Three More Windows Exploits, IE Zero-Day

Threatpost

As promised, developer SandboxEscaper has dropped exploit code for four more bugs, on the heels of releasing a Windows zero-day yesterday.

article thumbnail

Get a sneak peek of advances in OpenText Content Suite and Extended ECM

OpenText Information Management

New releases of OpenTextâ„¢ Content Suite and OpenTextâ„¢ Extended ECM are on the way! At Enterprise World in Toronto, attendees will learn about all the recently released and upcoming features for Content Suite and Extended ECM, complete with demos and interactive sessions hosted by the experts behind the product. What’s new in OpenText Content Suite … The post Get a sneak peek of advances in OpenText Content Suite and Extended ECM appeared first on OpenText Blogs.

ECM 64
article thumbnail

FEC Gives Green Light for Free Cybersecurity Help in Federal Elections

Dark Reading

Official opinion issued by the Federal Election Commission to nonprofit Defending Digital Campaigns is good news for free and reduced-cost security offerings to political candidates and committees.