Fri.Jul 26, 2019

article thumbnail

Marcus Hutchins Spared Prison Time in Malware Case

Data Breach Today

British Security Expert Pleaded Guilty to Creating Kronos Trojan Marcus Hutchins, who rose to fame by helping to stop the WannaCry ransomware attacks, was spared jail time on Friday after pleading guilty earlier this year to creating the Kronos banking malware.

article thumbnail

Why EA Needs to Be Part of Your Digital Transformation Strategy

erwin

Enterprise architecture (EA) isn’t dead, you’re just using it wrong. Part three of erwin’s digital transformation blog series. . I’ll let you in on a little secret: the rumor of enterprise architecture’s demise has been greatly exaggerated. However, the truth for many of today’s fast-moving businesses is that enterprise architecture fails. But why?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Massive Botnet Attack Used More Than 400,000 IoT Devices

Data Breach Today

Researchers at Imperva Say Incident Mimicked Mirai-Style DDoS Attack A massive botnet attack earlier this year utilized more than 400,000 connected devices over the course of 13 days, according to researchers at the security firm Imperva.

IoT 205
article thumbnail

A flaw in LibreOffice could allow the hack of your PC

Security Affairs

LibreOffice users have to know that their unpatched computers could be hacked by simply opening a specially crafted document. Bad news for LibreOffice users, the popular free and open-source office suite is affected by an unpatched remote code execution vulnerability. Recently, LibreOffice released the latest version 6.2.5 that addresses two severe flaws tracked as CVE-2019-9848 and CVE-2019-9849.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Louisiana Declares Emergency After Malware Attacks

Data Breach Today

At Least One of Four School Districts Confirmed Ransomware Louisiana's governor issued an emergency declaration on Wednesday in response to a rash of malware infections, hitting some of the state's public schools. The move will allow the state to marshal more resources to deal with the incidents.

More Trending

article thumbnail

Johannesburg Utility Recovering After Ransomware Attack

Data Breach Today

Incident Plunges Parts of South Africa City Into Dark City Power, the local electrical utility that powers Johannesburg in South Africa, is recovering Friday after an unknown ransomware variant that locked-up the company's applications, network and databases for most of the day on Thursday. The attack knocked out power and services for some residents for most of the day, according to local reports.

article thumbnail

How to Get Your Equifax Settlement Money

WIRED Threat Level

A settlement with the FTC means Equifax will pay victims of its breach $125 or more. Make sure it pay ups.

IT 101
article thumbnail

Lawmakers, Privacy Advocates Slam FTC's Facebook Settlement

Data Breach Today

Critics Say the Deal Doesn't Do Enough to Protect Users' Privacy Facebook's $5 billion privacy settlement with the FTC this week did little to satisfy critics who argue that the social media giant still holds too much sway over its users' personal data.

Privacy 179
article thumbnail

Insider Logic Bombs

Schneier on Security

Add to the "not very smart criminals" file : According to court documents, Tinley provided software services for Siemens' Monroeville, PA offices for nearly ten years. Among the work he was asked to perform was the creation of spreadsheets that the company was using to manage equipment orders. The spreadsheets included custom scripts that would update the content of the file based on current orders stored in other, remote documents, allowing the company to automate inventory and order management

76
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'Survivor' Lessons from an Attack on Dental Practice

Data Breach Today

Florida Dentist Describes Recovering from Ransomware Attack Dentist Carl Bilancione is a survivor in more ways than one, including surviving a recent ransomware attack on the accounting software of his small Florida practice. What should other small entities should learn from these seemingly random attacks?

article thumbnail

Companies' 'Anonymized' Data May Violate GDPR, Privacy Regs

Dark Reading

New study found that any database containing 15 pieces of demographic data could be used to identify individuals.

GDPR 94
article thumbnail

Russia Targeted All 50 States During 2016 Election: Report

Data Breach Today

Senate Intelligence Committee Report Finds Extensive Interference A report from the U.S. Senate Intelligence Committee finds that Russia targeted election systems and infrastructure in all 50 states during the run-up to the 2016 Presidential elections. The committee, however, could find no evidence that vote tallies were altered.

169
169
article thumbnail

What Every Security Team Should Know About Internet Threats

Dark Reading

Of particular interest for cybercriminals is the Domain Name System, which plays a central role in orchestrating all Internet and application traffic.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

OnDemand Webinar | Integrating Information Risk Management into Business Risk Management

Data Breach Today

Learn about trends in information security risk assessment that align with business risk. This webinar explores communication challenges around information security, the typical journey organizations are taking to bring information risk management into the broader umbrella of business risk management, and the advantages accruing to organizations as they mature their information risk management programs.

Risk 134
article thumbnail

Malware Researcher Hutchins Sentenced to Supervised Release

Dark Reading

Marcus Hutchins, the researcher known for stopping WannaCry, avoids jail time over charges of creating and distributing Kronos malware.

82
article thumbnail

The Vision for Omnichannel Authentication

Data Breach Today

Enterprises today have many digital ways of interacting with their customers - and therefore just as many ways for authenticating those users and transactions. Sesh Venkataraman of CA Technologies explains the business value of omnichannel authentication solutions.

article thumbnail

Irish Silk Road admin sentenced to 78 months in federal prison

Security Affairs

An Irish national has been sentenced to 78 months in jail for his role as one of the administrators and forum moderators of Silk Road dark web marketplace. Gary Davis (31), of Wicklow, Ireland, has been sentenced to 78 months in prison for his role as one of the administrators and forum moderators of Silk Road dark web marketplace. The man, who is also known as Libertas also provided customer support to Silk Road users in 2013, for this job he received a weekly salary.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How does API Management Complement IAM?

Data Breach Today

Flat-out, traditional IAM practices are insufficient to secure a modern enterprise that relies on such diverse endpoints and connected devices. But API management can play a strong complementary role, says Jay Thorne of CA Technologies, a Broadcom company.

Security 134
article thumbnail

Complete Personal Fraud Kits Sell for Less Than $40 on Dark Web

Dark Reading

The low cost of records reflects the huge supply of PII after many breaches at hospitals, government agencies, and credit bureaus.

article thumbnail

The Encryption 'Backdoor' Debate Continues

Data Breach Today

The latest edition of the ISMG Security Report offers a deep dive on the debate about whether law enforcement officials should have a "backdoor" to circumvent encryption. Also featured: An analysis of Equifax's settlement with the FTC and a discussion of a new report on the cost of data breaches.

article thumbnail

Weekly Update 149

Troy Hunt

What. A. Week. I've been in San Fran meeting with a whole bunch of potential purchasers for HIBP and it's been. intense. Daunting. Exciting. It's actually an amazing feeling to see my "little" project come to this where I'm sitting in a room with some of the most awesome tech companies whilst flanked by bankers in suits. I try and give a bit of insight into that in this week's video, keeping in mind of course that I'm a bit limited by how much detail I can go into right now.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Rare Steganography Hack Can Compromise Fully Patched Websites

Threatpost

Attackers are hiding PHP scripts in EXIF headers of JPEG images to hack websites, just by uploading an image.

article thumbnail

FormGet Storage Bucket Leaks Passport Scans, Bank Details

Dark Reading

Exposed files include mortgage and loan information, passport and driver's license scans, internal corporate files, and shipping labels.

75
article thumbnail

New York Amends Breach Notification Law

Hunton Privacy

On July 25, 2019, New York Governor Andrew Cuomo signed into law Senate Bill S5575B (the “Bill”), an amendment to New York’s breach notification law (the “Act”). The Bill expands the Act’s definition of “breach of the security of the system” and the types of information ( i.e. , “private information”) covered by the Act, and makes certain changes to the Act’s requirements for breach notification.

article thumbnail

Louisiana Gov Declares Emergency After Cyberattacks Plague Schools

Threatpost

Attacks on at least three school districts and likely others have prompted the state's first emergency due to cyberattack.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Black Hat Q&A: Inside the Black Hat NOC

Dark Reading

Cybersecurity expert Bart Stump explains what it's like to reliably deliver a useful, high-security network for one of the toughest audiences in the world.

article thumbnail

SAP Ariba helps customers procure more effectively

OpenText Information Management

When you have millions of customers worldwide that need to seamlessly connect and exchange information every day, data integration becomes a major challenge. Global software company, SAP Ariba, found itself in exactly this situation. Its solution was to move to Integration Managed Services on the OpenText™ Business Network. Here’s why. In a recent Forrester report, … The post SAP Ariba helps customers procure more effectively appeared first on OpenText Blogs.

article thumbnail

EDPB Adopts Guidelines on Data Processing Through Video Devices

Hunton Privacy

The European Data Protection Board (the “EDPB”) recently adopted its Guidelines 3/2019 on processing of personal data through video devices (the “Guidelines”). Although the Guidelines provide examples of data processing for video surveillance, these examples are not exhaustive. The Guidelines aim to provide guidance on how to apply the EU General Data Protection Regulation (“GDPR”) in all potential areas of video device use.

GDPR 57