Fri.Oct 19, 2018

article thumbnail

Cryptojackers Keep Hacking Unpatched MikroTik Routers

Data Breach Today

Vigilante Hacker Is Killing Unpatched Routers' Remote Administration Ability Cryptojackers and eavesdroppers are continuing to exploit a one-time zero-day flaw in unpatched MikroTik routers, despite a patch that's been available for six months as well as the actions of a vigilante "gray hat" hacker who's forcibly "fixed" 100,000 vulnerable routers.

203
203
article thumbnail

[Podcast] How to Prepare for the CIP Exam

AIIM

Test.Quiz.Exam.How do these words make you feel? For many, the mere mention of them is enough to conjure up feelings of anxiety, stress and pressure. You don't often hear people say, "I LOVE taking tests.". At AIIM, we know tests can be downright scary. But, we also know the power of preparation and understanding. A lot of times fear comes from the unknown - in the case of a test, not knowing what to expect, not knowing if you're prepared, and just overall fear of failure from not knowing enough

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Heads-Up: Patch 'Comically Bad' libSSH Flaw Now

Data Breach Today

Thankfully Most SSH - From BSD to Linux Distros to Macs - Is Unaffected Attention admins: If you use libSSH - one of the open-source flavors of Secure Shell, or SSH - patch now. The advice follows the disclosure of a vulnerability that one expert, Paul Ducklin of Sophos, terms "comically bad.

Security 203
article thumbnail

Russian Trolls Are Still Playing Both Sides—Even With the Mueller Probe

WIRED Threat Level

The latest indictment against Russian trolls shows how they sowed division in the US on wedge issues, including the investigation into their activity.

Security 106
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

FDA Calls for 'Cybersecurity Bill of Materials' for Devices

Data Breach Today

Food and Drug Administration Releases Draft of Updated Pre-Market Guidance for Medical Devices Before marketing their medical devices, manufacturers should prepare a "cybersecurity bill of materials" that lists components that could be susceptible to vulnerabilities, according to a draft of updated FDA premarket guidance.

More Trending

article thumbnail

UK Cyberattack Investigations: An Analysis

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the results of over 1,000 cyberattack investigations in the U.K. Also: an update on the proposed NIST privacy framework and a report on voter registration information for sale on the dark web.

Sales 163
article thumbnail

West Virginia Using Internet Voting

Schneier on Security

This is crazy (and dangerous). West Virginia is allowing people to vote via a smart-phone app. Even crazier, the app uses blockchain -- presumably because they have no idea what the security issues with voting actually are.

article thumbnail

Vendor Risk Management: Conquering the Challenges

Data Breach Today

Organizations must carefully monitor that their business associates are adequately addressing data security to help guard against breaches, says Mark Eggleston, CISO at Health Partners Plans, who will speak on vendor risk management at ISMG's Healthcare Security Summit, to be held Nov. 13-14 in New York.

Risk 149
article thumbnail

Splunk addressed several vulnerabilities in Enterprise and Light products

Security Affairs

Splunk recently addressed several vulnerabilities in Enterprise and Light products, some of them have been rated “high severity.”. Splunk Enterprise solution allows organizations to aggregate, search, analyze, and visualize data from various sources that are critical to business operations. The Splunk Light is a comprehensive solution for small IT environments that automates log analysis and integrate server and network monitoring.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How Cyber Essentials can help secure your patch management

IT Governance

In this blog series, we will discuss each of the Cyber Essentials scheme’s five security controls that, according to the UK government, could prevent “around 80% of cyber attacks”. Our third blog covers patch management and addresses the need for organisations to keep software up to date with security patches. If you’ve missed it, take a look at our first blog here , and our second blog here.

article thumbnail

Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew

Security Affairs

Security researchers from McAfee have recently uncovered a cyber espionage campaign, tracked as Operation Oceansalt, targeting South Korea, the United States, and Canada. The threat actors behind Operation Oceansalt are reusing malware previously associated with China-linked cyberespionage group APT1. “McAfee Advanced Threat Research and Anti-Malware Operations teams have discovered another unknown data reconnaissance implant targeting Korean-speaking users.” reads the report. “

article thumbnail

Social Media Companies Tout “War Rooms” To Combat Election Interference

Adam Levin

The social media companies Facebook and Reddit are publicizing “War Rooms” set up to closely monitor their network content for election tampering. Facebook in particular experienced significant backlash for their site’s role in disseminating information created by Russian “troll farms” where false and misleading new stories and advertisements were propagated to discredit then-candidate Hillary Clinton as well as to foment general disagreement and conflict across the United States.

article thumbnail

Drupal dev team fixed Remote Code Execution flaws in the popular CMS

Security Affairs

The Drupal development team has patched s everal vulnerabilities in version 7 and 8 of the popular CMS, including RCE flaws. The development team of the Drupal content management system addressed several vulnerabilities in version 7 and 8, including some flaws that could be exploited for remote code execution. Drupal team fixed a critical vulnerability that resides in the Contextual Links module, that fails to properly validate requested contextual links.

CMS 79
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

A Trove of Facebook Data Is a Spammer's Dream and Your Nightmare

WIRED Threat Level

A new report suggests that spammers, not nation states, may have been behind the Facebook hack. That could be even worse news.

article thumbnail

Achieve your professional potential with 15% off our courses

IT Governance

Continual professional development is key in all industries. Gaining and documenting skills, knowledge and experience – whether formally or informally – will help you progress in your career. Professional development usually falls into one of two categories: developing skills in preparation for your next career move or as part of your current position.

GDPR 66
article thumbnail

Google Patch to Block Spectre Slowdown in Windows 10

Dark Reading

Microsoft will incorporate Google's Retpoline patch to prevent Spectre Variant 2 from slowing down its operating system.

IT 80
article thumbnail

Card Factory allowed customer photos to be exposed publicly

IT Governance

Card Factory, the UK-based gift shop and greeting card company, inadvertently made customer photos publicly available on its website. If these could have been used to identify individuals, this would have constituted a personal data breach under the EU GDPR (General Data Protection Regulation). Insecure storage. Customer Iain Row discovered the error when buying a birthday card online from Card Factory.

Retail 65
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Weekly Update 109

Troy Hunt

Last one before home time! But it has been an epic trip and as I say in the video, this is by far my most enjoyable trip to the US yet after probably a dozen over the last few years (that includes Hawaii, too). Given the interest after my pointing out a couple of little differences in the US compared to the rest of the world last week, after the usual tech and infosec intro this week I decided to focus a big whack of this week's video on what some of differences look like.

article thumbnail

Risky Business: Dark Reading Caption Contest Winners

Dark Reading

Phishing, anti-shoulder surfing, Russia and other hysterical identity management puns and comments. And the winners are.

article thumbnail

AWS FreeRTOS Bugs Allow Compromise of IoT Devices

Threatpost

The bugs let hackers crash IoT devices, leak their information, and completely take them over.

IoT 81
article thumbnail

AI-powered analytics to drive operational excellence for oil and gas

OpenText Information Management

In a previous blog, I looked at how effective content management is an important factor driving operational excellence for oil and gas companies. Your people need access to the right information at the right time in the right format. However, in today’s Big Data world, the combination of Artificial Intelligence (AI) and analytics is essential … The post AI-powered analytics to drive operational excellence for oil and gas appeared first on OpenText Blogs.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors

Dark Reading

A report by the Wall Street Journal points finger at group that is know to Facebook Security.

article thumbnail

Trivial Post-Intrusion Attack Exploits Windows RID

Threatpost

Simple technique enables attackers to leverage Windows OS component to maintain stealth and persistence post system compromise.

64
article thumbnail

EU Takes Step Toward Cyberattack Sanctions

Dark Reading

European leaders complete first step toward establishing a sanctions regime.

80
article thumbnail

NIS Directive – what does this mean for Scottish organisations?

IT Governance

Earlier this year, the EU introduced a law that requires critical infrastructure organisations to improve their ability to ensure that crucial network and information systems remain functional in the event of disruption, and that their essential service remains available in all reasonable circumstances. . That law – the NIS Directive (Directive on security of network and information systems) – was transposed into UK law as the NIS Regulations (The Network and Information Systems Regulations 2

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weighing the pros and cons of data security outsourcing

Information Management Resources

As with any job role, responsibility or task, certain advantages and disadvantages come with outsourcing. Weighing these factors against one another will help you get a clearer picture of how to proceed.

article thumbnail

Tips for Managing Your Inactive Files

Archive Document Data Storage

Your organisation uses some files every day. You also have files that don’t see day-to-day use but must be retained for administrative purposes, retention requirements, or legal compliance; these are inactive files. Do you have a strategy for keeping them organised, accessible, and secure? Here are several tips for managing your inactive files: Review Your Retention Schedule.

article thumbnail

7 views: Why National Cyber Security Awareness Month is more important than ever

Information Management Resources

Growing cyber threats remind organizations of the need to be proactive, know their data and security vulnerabilities, encourage awareness practices and seek outside help when necessary.