Fri.Dec 07, 2018

article thumbnail

Another Electronic Health Records Vendor Hacked

Data Breach Today

Ransomware Attack Hits Cloud-Based EHR Firm, Affecting Data of Eye Clinic Yet another cyberattack against a cloud-based electronic health records vendor has been revealed. This one involved a ransomware attack that potentially exposed data on 16,000 patients of a California eye clinic. What can healthcare organizations do to minimize vendor risks?

article thumbnail

Bomb Threat Hoaxer, DDos Boss Gets 3 Years

Krebs on Security

The ringleader of a gang of cyber hooligans that made bomb threats against hundreds of schools and launched distributed denial-of-service (DDoS) attacks against Web sites — including KrebsOnSecurity on multiple occasions — has been sentenced to three years in a U.K. prison, and faces the possibility of additional charges from U.S.-based law enforcement officials.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Face Off: Researchers Battle AI-Generated Deep Fake Videos

Data Breach Today

Convincing Face-Swapping Clips Easy to Create With Gaming Laptops and Free Tools The easy availability of tools for designing face-swapping deep-fake videos drove Symantec security researchers Vijay Thaware and Niranjan Agnihotri to design a tool for spotting deep fakes, which they described in a briefing at the Black Hat Europe 2018 conference in London.

Security 196
article thumbnail

What’s Your New Year’s Resolution?

AIIM

A new year gives us the chance to reflect on all we've accomplished and set our sights on new challenges to conquer. If you haven't embarked on your Digital Transformation journey, this is the perfect time to begin. I invite you to join us for a free webinar: Your 2019 Information Management Resolution. We’re offering it on two days so everyone can join!

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

3 Top Security Challenges in Healthcare

Data Breach Today

Chris Bowen of ClearDATA on Improving 'Change Management' Understanding where data is stored so it can be protected, overcoming security misconfiguration and improving vendor management diligence are three top challenges for healthcare organizations, says Chris Bowen of ClearDATA.

Security 194

More Trending

article thumbnail

Australia Passes Encryption-Busting Law

Data Breach Today

Government Can Force Technology Companies to Break Encryption Australia's Parliament has passed new laws enabling it to compel technology companies to break their own encryption. Although the government argued the laws are needed to combat criminal activity and terrorism, opponents argued the powers could creep beyond their scope and weaken the security of all software.

article thumbnail

Experts at Yoroi – Cybaze Z-Lab analyzed MuddyWater Infection Chain

Security Affairs

Malware researchers at Yoroi – Cybaze Z-Lab analyzed the MuddyWater Infection Chain observed in a last wave of cyber attacks. Introduction. At the end of November, some Middle East countries have been targeted by a new wave of attacks related to the Iranian APT group known as “ MuddyWater “: their first campaign was observed back in 2017 and more recently Unit42 researchers reported attacks in the ME area.

article thumbnail

Solving 3rd Party Cybersecurity Risk

Data Breach Today

Your organization's risk surface may be larger than you think. Your organization's risk surface is larger than you think. How can you get a handle on what risks exist, where they reside, and which ones are most important to resolve immediately?

Risk 184
article thumbnail

Back Issues of the NSA's Cryptolog

Schneier on Security

Five years ago, the NSA published 23 years of its internal magazine, Cryptolog. There were lots of redactions, of course. What's new is a nice user interface for the issues, noting highlights and levels of redaction.

IT 79
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A Practitioner's Perspective on Advanced IAM

Data Breach Today

Nomura's Charanjit Singh Sodhi on How to Assess and Tackle IAM Risks Multifactor authentication and privilege-based controls are among the forms of identity and access management that can help security leaders address key vulnerabilities in their organizations, says Charanjit Singh Sodhi of Normura Wholesale, who offers advice.

article thumbnail

O2 customers stripped of mobile data after network collapse

IT Governance

Tens of millions of O2 customers were stripped of internet access yesterday after the telecommunications giant’s data network collapsed. O2, which also shares infrastructure with Tesco Mobile and GiffGaff, claimed the outage was due to a “global software issue”. Deprived of cat memes, many irate users turned to Twitter to voice their frustration. “Since O2 has been down I’ve had to talk to the family.

GDPR 76
article thumbnail

Australia's Encryption-Busting Law Could Impact the World

WIRED Threat Level

Australia has passed a law that would require companies to weaken their encryption, a move that could reverberate globally.

article thumbnail

Insider Threats & Insider Objections

Dark Reading

The 'tyranny of the urgent' and three other reasons why it's hard for CISOs to establish a robust insider threat prevention program.

IT 75
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

6 top AI predictions for 2019 from PwC

Information Management Resources

Organizations that focus their efforts in six key areas will be far ahead of other businesses at this time next year, says the research firm.

article thumbnail

Using Fuzzing to Mine for Zero-Days

Threatpost

Infosec Insider Derek Manky discusses how new technologies and economic models are facilitating fuzzing in today's security landscape.

Mining 73
article thumbnail

Data Breaches: The Complete WIRED Guide

WIRED Threat Level

Everything you ever wanted to know about Equifax, Mariott, and the problem with social security numbers.

article thumbnail

Problems with the Squid Emoji

Schneier on Security

The Monterey Bay Aquarium has some problems with the squid emoji. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Criminals Use Locally Connected Devices to Attack, Loot Banks

Dark Reading

Tens of millions of dollars stolen from at least eight banks in East Europe, Kasperksy Lab says.

82
article thumbnail

Weekly Update 116

Troy Hunt

I'm on countdown to take-off for the next 2 and a bit weeks so I'm going to keep this intro really short because it's sitting between me and a relaxing cold one (as soon as the bags are ready). Heaps of services got pwned, Australia has a screwy set of circumstances (and reactions) around a cyber bill and HIBP had a 5th birthday celebration which resulted in stickers and a really fun live AMA video.

Access 58
article thumbnail

Australia Anti-Encryption Law Triggers Sweeping Backlash

Threatpost

A newly-passed Australian law could allow the government to force tech companies to create backdoors in their products.

article thumbnail

The 2018 Gartner Critical Capabilities for Content Services Platforms report will help you decide which solution is best for your organization

OpenText Information Management

Following on the heels of their recent 2018 Gartner Magic Quadrant for Content Services Platforms, Gartner has now released the 2018 Critical Capabilities for Content Services Platforms. Both are highly recommended reading for everyone involved in the ECM/Content Services sector. The two reports complement each other: The Magic Quadrant evaluates high-level strategy and execution, while … The post The 2018 Gartner Critical Capabilities for Content Services Platforms report will help you de

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

'Simplify Everything': Google Talks Container Security in 2019

Dark Reading

Google Cloud's container security lead shares predictions, best practices, and what's top of mind for customers.

article thumbnail

Microsoft Calls For Facial Recognition Tech Regulation

Threatpost

Microsoft and the AI Now Institute are both calling for regulation as facial recognition software picks up popularity.

Privacy 64
article thumbnail

Structures, Engineering and Security

Adam Shostack

J.E. Gordon’s Structures, or Why Things Don’t Fall Down is a fascinating and accessible book. Why don’t things fall down? It turns out this is a simple question with some very deep answers. Buildings don’t fall down because they’re engineered from a set of materials to meet the goals of carrying appropriate loads. Those materials have very different properties than the ways you, me, and everything from grass to trees have evolved to keep standing.

article thumbnail

Marriott CFO calls $1B estimate on cyber breach premature

Information Management Resources

It’s too soon for Marriott International Inc. to estimate the cost of the massive cyber breach that the company disclosed last week, said Chief Financial Officer Leeny Oberg.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Kubernetes Deployments Around the World Show Vulnerabilities

Dark Reading

Kubernetes owners who expose APIs to the Internet are leaving their systems open to hackers.

69
article thumbnail

ThreatList: Gift Card-Themed BEC Holiday Scams Spike

Threatpost

Watch out for emails about gift cards and corporate donations, researcher warn.

article thumbnail

Iranian Nationals Charged for Atlanta Ransomware Attack

Dark Reading

The March attack used SamSam ransomware to infect 3,789 computers.