Thu.May 09, 2019

article thumbnail

Crime Gang Advertises Stolen 'Anti-Virus Source Code'

Data Breach Today

Researchers: 'Fxmsp' Russian Hacking Collective Exploits Victims Via RDP and Active Directory The "Fxmsp" hacker collective has been advertising source code that it claims to have stolen from three top U.S. anti-virus software development firms, as well as remote access to the companies' neworks, warns fraud-prevention firm Advanced Intelligence.

Access 279
article thumbnail

Why Should You Care about Real-Time Capture?

AIIM

5 Elements of Real-time Capture. Why should your organization care about the differences between real-time capture and batch capture? Each has a purpose and benefit to an organization, based on the need, information type, and value it represents in relation to operational outcomes. Many businesses today, are facing increased demands to capture information from unique applications immediately, and address multi-channel capture at the first touch-point of content.

ECM 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware Knocks Out Accounting Software Giant Wolters Kluwer

Data Breach Today

Outage Leaves Firm's Cloud-Based Tax and Accounting Software Customers Scrambling Accounting software giant Wolters Kluwer is continuing to attempt to recover from a malware attack that has disrupted access to its cloud-based tax and accountancy software, which the company says is used by most major U.S. accounting firms and global banks. Some users say they've been left unable to do their jobs.

Cloud 254
article thumbnail

Securing Sensitive Data in Pivotal Cloud Foundry

Thales Cloud Protection & Licensing

The Cloud Security Challenge. It’s no secret that cloud technology usage is pervasive among enterprises. According to the 2019 Thales Data Threat Report -Global Edition, some 90 percent of 1,200 responding data security professionals worldwide report their organizations are using the cloud. While the agility and cost-saving benefits of cloud technologies are compelling, the need to protect sensitive application data remains.

Cloud 112
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New Skimmer Attack Steals Data From Over 100 Ecommerce Sites

Data Breach Today

Malicious JavaScript Steals Credit Card Data A new skimmer attack that has injected malicious JavaScript into the payment sections of 105 ecommerce websites is stealing credit card and other customer data, security researchers warn. The news comes after another recent report of similar attacks against online campus stores.

Security 219

More Trending

article thumbnail

Health Data Breach Tally Update: What's Been Added?

Data Breach Today

Business Associate Reports Ransomware Attack; Hacks Still Biggest Cause of Breaches A ransomware attack reported by a business associate that impacted more than three dozen clients and nearly 207,000 individuals is among the latest incidents added to the Department of Health and Human Services' data breach tally. Here's the latest health data breach tracking update.

article thumbnail

Amazon Is Losing the War on Fraudulent Sellers

Schneier on Security

Excellent article on fraudulent seller tactics on Amazon. The most prominent black hat companies for US Amazon sellers offer ways to manipulate Amazon's ranking system to promote products, protect accounts from disciplinary actions, and crush competitors. Sometimes, these black hat companies bribe corporate Amazon employees to leak information from the company's wiki pages and business reports, which they then resell to marketplace sellers for steep prices.

Sales 94
article thumbnail

New Initiative Aims to Fast-Track Women into Cybersecurity Careers

Dark Reading

'100 Women in 100 Days' is a career development program made possible by a $160,000 gift from Craig Newmark Philanthropies.

article thumbnail

Another NSA Leaker Identified and Charged

Schneier on Security

In 2015, the Intercept started publishing " The Drone Papers ," based on classified documents leaked by an unknown whistleblower. Today, someone who worked at the NSA, and then at the National Geospatial-Intelligence Agency, was charged with the crime. It is unclear how he was initially identified. It might have been this: "At the agency, prosecutors said, Mr.

Paper 84
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Freedom Mobile data breach impacts at least 15,000 customers

Security Affairs

Canadian Freedom Mobile mobile network operator exposed the details of many customers, including their payment card data. Security researchers at vpnMentor discovered an unprotected database containing information belonging to Freedom Mobile customers. Freedom Mobile is the fourth largest mobile network operator in Canada. The unprotected database stored at least 5 million records associated with 1.5 million users of the mobile network operator.

article thumbnail

How to Close the Critical Cybersecurity Talent Gap

Dark Reading

If we don't change our ways, the gap will keep getting worse. Outside-the-box thinking and new techniques are required, and here are a few ways to get started.

article thumbnail

Cisco Talos warns of hardcoded credentials in Alpine Linux Docker Images

Security Affairs

Since December 2015, Alpine Linux Docker images have been shipped with hardcoded credentials, a NULL password for the root user. Security researchers from Cisco revealed that Alpine Linux Docker images distributed via the official Docker Hub portal since December 2015 have been using a NULL password for the root account, The NULL password for the root account was included in the Official Alpine Linux Docker images since v3.3.

article thumbnail

Managing Emerging Technology Disruption with Enterprise Architecture

erwin

Emerging technology has always played an important role in business transformation. In the race to collect and analyze data, provide superior customer experiences, and manage resources, new technologies always interest IT and business leaders. KPMG’s The Changing Landscape of Disruptive Technologies found that today’s businesses are showing the most interest in emerging technology like the Internet of Things (IoT) , artificial intelligence (AI) and robotics.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Nation-State Breaches Surged in 2018: Verizon DBIR

Dark Reading

The source of breaches has fluctuated significantly over the past nine years, but organized crime has almost always topped nation-state actors each year. The gap narrowed significantly in 2018, according to the annual report.

74
article thumbnail

‘Unhackable’ Biometric USB Offers Up Passwords in Plain Text

Threatpost

A simple Wireshark analysis was enough to subvert the gadget, which uses iris identification to protect the drive.

article thumbnail

US DoJ Indicts Chinese Man for Anthem Breach

Dark Reading

Fujie Wang allegedly worked as part of a hacking team out of China that stole information on nearly 80 million Americans in the massive healthcare breach.

78
article thumbnail

Information Services Giant Wolters Kluwer hit by ransomware attack

Security Affairs

Global information services company Wolters Kluwer took offline has taken offline many of its applications and platforms in response to a ransomware attack. Another ransomware attack made hit a big company, this time the victim is the Global information services giant Wolters Kluwer that took offline some of the affected systems after the incident. Wolters Kluwer N.V. is a global information services company headquartered in the Netherlands that serves legal, business, tax, accounting, finance,

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Washington Amends Data Breach Notification Law

Hunton Privacy

As reported by Bloomberg Law , on May 7, 2019, Washington State Governor Jay Inslee signed a bill ( HB 1071 ) amending Washington’s data breach notification law. The new requirements include the following: Expanded Definition of Personal Information. HB 1071 expands the definition of “personal information.” Washington’s breach notification law previously defined personal information as an individual’s name in combination with the individual’s Social Security number, state identification card num

article thumbnail

DoJ indicted a member of China-based hacking group behind Anthem hack

Security Affairs

US DoJ indicted a member of sophisticated China-based hacking group for series of computer intrusions. The group is also responsible for the 2015 Health Insurer Anthem data breach. The US Department of Justice indicted Fujie Wang (32), a member of sophisticated Chinese hacking group that breached at several US companies, including the health insurer Anthem Inc. back in 2015. “A federal grand jury returned an indictment unsealed today in Indianapolis, Indiana, charging a Chinese national as

article thumbnail

Alpine Linux Docker Images Shipped for 3 Years with Root Accounts Unlocked

Threatpost

Alpine Linux Docker images available via the Docker Hub contained a critical flaw allowing attackers to authenticate on systems using the root user and no password.

article thumbnail

Vulnerability in UC Browser Apps exposes to phishing attacks

Security Affairs

Security researcher discovered a browser address bar spoofing flaw that affects popular Chinese UC Browser and UC Browser Mini apps for Android. Security researcher and bug hunter Arif Khan has discovered a browser address bar spoofing vulnerability that affects popular Chinese UC Browser and UC Browser Mini apps for Android. The vulnerability affects latest version of the UC Browser 12.11.2.1184 and UC Browser Mini 12.10.1.1192.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cyber criminals conned holidaymakers out of £7 million in 2018

IT Governance

More than 5,000 people fell victim to holiday and travel booking scams last year, with their losses totalling £7 million, according to an Action Fraud and NFIB (National Fraud Intelligence Bureau) study. The scams cost holidaymakers £1,380 on average, although this only accounts for money paid directly to scammers. The actual cost is much higher when you factor in the additional expenses victims faced, such as making new travel plans or cancelling their holidays.

Sales 64
article thumbnail

The Absolut Company chooses Preservica to future-proof its 140-year history

Preservica

Preservica’s cloud hosted active digital preservation platform will be used to safeguard unique advertising, posters and product images for brands including Absolut Vodka. Boston, MA; London, UK. May 9, 2019. Preservica, market leaders in active digital preservation has announced that the Absolut Company has selected its cloud hosted active digital preservation platform to protect and future-proof more than 140 years of unique brand heritage and company history.

article thumbnail

5 ways airlines benefit by integrating digital agents with live ones

DXC Technology

Many of us have had an experience similar to this: You call an airline to make a reservation and get a digital agent on the phone. The call starts off fine, but when you ask if your friend can sit next to you on the flight, the digital agent stalls and sends you to a […].

article thumbnail

IBM InfoSphere DataStage takes data integration to any cloud

IBM Big Data Hub

The IBM Institute for Business Value found that 85 percent of companies manage a multicloud environment.

Cloud 74
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How the Skills Gap Strains - and Constrains - Security Pros

Dark Reading

New ISSA/ESG survey underscores increasing pressures and security fallout of a strapped security team.

article thumbnail

HMRC forced to delete 5 million voice records after GDPR gaffe

IT Governance

HMRC (HM Revenue and Customs) has been told to delete more than five million people’s voice records after it was discovered that the way the information was collected breached the GDPR (General Data Protection Regulation). The UK’s tax authority didn’t give individuals the option to opt out of a scheme in which it used voice records as part of its audio verification system.

GDPR 53
article thumbnail

4 reasons every organization needs a data governance strategy

Information Management Resources

Everybody knows data is essential in business today, but handling it effectively and ethically is no easy task. That's where data governance comes in.