Mon.Oct 07, 2019

article thumbnail

Unpatched VPN Servers Targeted by Nation-State Attackers

Data Breach Today

Pulse Secure, Palo Alto and Fortinet Devices Being Hit by APT Groups, NCSC Warns Nation-state attackers have been targeting known flaws that customers have yet to patch in their Pulse Secure, Palo Alto and Fortinet VPN servers, Britain's National Cyber Security Center warns, adding that any organization that didn't immediately apply patches should review logs for signs of hacking.

Security 245
article thumbnail

NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

The Last Watchdog

It seems like any discussion of cybersecurity these days invariably circles back to automation. Our growing fixation with leveraging artificial intelligence to extract profits from Big Data – for both constructive and criminal ends—is the order of the day. Related: Why Cyber Pearl Harbor is upon us Vigilante is a cybersecurity startup that cuts against that grain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Google Is Using AI to Help Ensure Android App Security

Data Breach Today

Google Security Evangelist Mike Burr Describes Android Security Measures Mike Burr of Google provides an overview of Android security efforts, including using artificial intelligence to scan Android apps.

article thumbnail

D-Link router models affected by remote code execution issue that will not be fixed

Security Affairs

Researchers at Fortinet’s FortiGuard Labs have publicly disclosed a critical remote code execution vulnerability affecting some models of D-Link routers. Security experts at Fortinet’s FortiGuard Labs disclosed a remote code execution vulnerability tracked as CVE-2019-16920. The vulnerability is an unauthenticated command injection issue that was discovered on September 2019.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

New Zealand Breach May Affect 1 Million

Data Breach Today

Health Data Breach Could Have Started as Early as 2016 Officials in New Zealand are investigating one or more data breaches at a healthcare provider that could have affected nearly 1 million patients. While the most recent cyber intrusion was discovered in August, it appears that attackers began accessing the T? Ora Compass Health network as early as 2016.

More Trending

article thumbnail

Malicious Bots: Mitigating the Threat

Data Breach Today

Eric Bucher of Sequence Security on the Role of Machine Learning Malicious bot attacks are on the rise. Eric Bucher of Cequence Security describes the role machine learning can play in mitigating the threat.

Security 179
article thumbnail

Edward Snowden's Memoirs

Schneier on Security

Ed Snowden has published a book of his memoirs: Permanent Record. I have not read it yet, but I want to point you all towards two pieces of writing about the book. The first is an excellent review of the book and Snowden in general by SF writer and essayist Jonathan Lethem, who helped make a short film about Snowden in 2014. The second is an essay looking back at the Snowden revelations and what they mean.

Sales 82
article thumbnail

Report: Android Banking Botnet Targeted Russians

Data Breach Today

Researchers Discovered Geost Botnet After Attackers Made Operational Security Mistakes A large-scale banking botnet has targeted approximately 800,000 Android devices belonging to Russian citizens since at least 2016, according to a new research report by a trio of cybersecurity researchers.

article thumbnail

6 Active Directory Security Tips for Your Poor, Neglected AD

Dark Reading

The unappreciated core of your enterprise IT network needs your security team's TLC. Here are a few ways to give Active Directory the security love it needs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Initial CCPA Compliance Costs Could Hit $55 Billion: Study

Data Breach Today

Report Estimates Anticipated Expenses for California Consumer Privacy Act Compliance The California Consumer Privacy Act could cost companies in the state a total of $55 billion for initial compliance expenses, according to a new study prepared for the state attorney general's office. The landmark privacy legislation is slated to go into effect on Jan. 1, 2020.

article thumbnail

US will help Baltic states to secure baltic energy grid

Security Affairs

The United States and Baltic announced cooperation to protect the Baltic energy grid from cyber attacks as they disconnect from the Russian electricity grid. The US and Baltic agreed to cooperate to protect the Baltic energy grid from cyber attacks as they disconnect from the Russian electricity grid. US Energy Secretary Rick Perry and counterparts from Lithuanian, Latvian and Estonian counterparts announced the cooperation for the protection of Baltic Energy Grid against cyber attacks in this &

article thumbnail

Responding to Ransomware Attacks: Critical Steps

Data Breach Today

Organizations must take a number of critical steps to prepare a response to ransomware attacks before they hit, says Caleb Barlow, the new president and CEO of security consulting firm CynergisTek, who offers a guide.

article thumbnail

Lack of Role Models, Burnout & Pay Disparity Hold Women Back

Dark Reading

New ISACA data emphasizes a gap between men and women who share their opinions on underrepresentation of women and equal pay in the tech industry.

84
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to Prioritize Vulnerability Patching

Data Breach Today

New Report Asserts That Using CVSS Scores Alone Is Inadequate Rather than focusing solely on rankings offered by the common vulnerability scoring system, or CVSS, when setting priorities for risk mitigation, organizations need to size up the specific potential risks that vulnerabilities pose to their critical assets, according to a new report from RiskSense.

Risk 160
article thumbnail

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Threatpost

Millions of iOS users could be vulnerable to man-in-the-middle attacks that trace back to flawed Twitter code used in popular iPhone apps.

IT 84
article thumbnail

New Card Fraud Countermeasures

Data Breach Today

Gord Jamieson of Visa Canada Offers an Update Gord Jamieson of Visa Canada offers an update on fraud-fighting efforts by describing two new fraud schemes and Visa's countermeasures.

134
134
article thumbnail

CIPL Co-Hosts Workshop on Brazil’s New Data Protection Law

Hunton Privacy

On September 25, 2019, the Centre for Information Policy Leadership at Hunton Andrews Kurth (“CIPL”) and the Instituto Brasiliense de Direito Público (“IDP”) had the first of a series of workshops for their joint project on “Brazilian Data Protection Implementation and Effective Regulation.” This is an exclusive project that aims to contribute to the debates around the Brazilian Data Protection Law ( Lei Geral de Proteção de Dados Pessoais (“LGPD”)), including the development of good practices f

Paper 71
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Data from Sephora and StreetEasy data breaches added to HIBP

Security Affairs

The popular data breach notification service Have I Been Pwned? (HIBP) has added the stolen data from the StreetEasy and Sephora data incidents. Have I Been Pwned? ( HIBP), the popular service that allows users to check whether their personal data has been compromised by data breaches has added the stolen data from the StreetEasy and Sephora data incidents.

article thumbnail

D-Link Home Routers Open to Remote Takeover Will Remain Unpatched

Threatpost

CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.

97
article thumbnail

5 things HR departments need to know about data protection

IT Governance

HR plays a crucial role in an organisation’s GDPR (General Data Protection Regulation) compliance. The department is full of personal data, whether it’s of employees, their next of kin or candidates responding to job adverts. With such an active role in processing sensitive information, HR staff must make sure they’re doing everything necessary to protect employees and meet their regulatory requirements.

GDPR 68
article thumbnail

Leveraging DNS to Enhance Your Networks Security

PerezBox

DNS is the internets lookup table, it builds a bridge between the domain name (e.g., perezbox.com) and the IP address (e.g., 184.24.56.17). The IP address being where you can find. Read More. The post Leveraging DNS to Enhance Your Networks Security appeared first on PerezBox.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

10 Steps to Assess SOC Maturity in SMBs

Dark Reading

Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines.

71
article thumbnail

Users reported problems with patches for CVE-2019-1367 IE zero-day

Security Affairs

Patches for Internet Explorer Zero-Day Causing Problems for Many Users. Microsoft released a new set of patches for a zero-day flaw in Internet Explorer recently fixed due to problems reported by users with the previous patch. On September 23, Microsoft released an out-of-band patch to address a zero-day memory corruption flaw in Internet Explorer ( CVE-2019-1367 ) that has been exploited in attacks in the wild.

article thumbnail

Drupalgeddon2 Vulnerability Still Endangering CMSes

Dark Reading

A new wave of attacks has been discovered on Drupal-based content management systems that weren't patched for the older flaw.

71
article thumbnail

Alabama Hospitals Pay Up in Ransomware Attack

Threatpost

A trio of Alabama hospitals have decided to pay for a decryption key.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Magecart Skimmers Spotted on 2M Websites

Dark Reading

Researchers say supply chain attacks are responsible for the most significant spikes in Magecart detections.

73
article thumbnail

China’s Issues Provisions on Cyber Protection of Children’s Personal Information

Hunton Privacy

On October 1, 2019, China’s Provisions on Cyber Protection of Children’s Personal Information (“Provisions”) became effective. The Cyberspace Administration of China had released the Provisions on August 23, 2019, and they are the first rules focusing on the protection of children’s personal information in China. Definition of Children. “Children” in the Provisions refers to minors under 14 years old.

article thumbnail

What does Peter Dutton's US trip mean for encryption and privacy? | Paul Karp

The Guardian Data Protection

Australia and the US are negotiating a deal to speed up information sharing about criminal suspects Australia and the US have begun negotiating a deal to speed up information sharing about criminal suspects between law enforcement agencies and tech giants such as Google and Facebook. But questions remain about the practical effects of such a deal, given the drive towards encryption of information that keeps data at arm’s length from the tech companies themselves.