Fri.Nov 24, 2023

article thumbnail

European Commission Failing to Tackle Spyware, Lawmakers Say

Data Breach Today

Parliamentarians Pass Resolution Calling For Immediate Executive Branch Action European lawmakers slammed the EU executive branch's inaction after a parliamentary committee called for tougher rules designed to prevent spyware abuse across the trading bloc. More than half of European Parliament lawmakers backed a resolution demanding rapid action.

284
284
article thumbnail

App used by hundreds of schools leaking children’s data

Security Affairs

Almost a million files with minors’ data, including home addresses and photos were left open to anyone on the internet, posing a threat to children. During a recent investigation, the Cybernews research team discovered that IT company Appscook – which develops applications used by more than 600 schools in India and Sri Lanka for education management – leaked a staggering amount of sensitive data, including photos of minors, home addresses, and birth certificates, due to a misconfiguration

Risk 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: Will Federal Budget Cuts Bite US Security?

Data Breach Today

Also: Advice for the Next White House Cyber Director; CISOs' Liability Concerns In the latest weekly update, the former federal CISO, Grant Schneider, joins three editors at ISMG to discuss important cybersecurity issues, including advice for the next White House cyber director, and liability concerns facing CISOs following SolarWinds and its CISO being accused of fraud.

Security 281
article thumbnail

Exposed Kubernetes configuration secrets can fuel supply chain attacks

Security Affairs

Researchers warn of publicly exposed Kubernetes configuration secrets that could pose a threat of supply chain attack for organizations. Aqua Nautilus researchers warn of publicly exposed Kubernetes configuration secrets that put organizations at risk of supply chain attacks. The experts noticed that these misconfigurations impact hundreds of organizations and open-source projects.

Passwords 108
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Indian Hotels Probes Alleged Customer Data Breach

Data Breach Today

1.5 Million Customers' Details Stolen From Taj Hotel Chain, Attacker Claims Hospitality giant Indian Hotels is probing the alleged theft of data from its systems after a criminal recently claimed they stole data pertaining to 1.5 million customers of the Taj hotel chain in 2020, which they're now advertising on a popular English-language cybercrime forum.

More Trending

article thumbnail

Application modernization overview

IBM Big Data Hub

Application modernization is the process of updating legacy applications leveraging modern technologies, enhancing performance and making it adaptable to evolving business speeds by infusing cloud native principles like DevOps, Infrastructure-as-code (IAC) and so on. Application modernization starts with assessment of current legacy applications, data and infrastructure and applying the right modernization strategy (rehost, re-platform, refactor or rebuild) to achieve the desired result.

Cloud 101
article thumbnail

North Korea-linked Konni APT uses Russian-language weaponized documents

Security Affairs

North Korea-linked Konni APT group used Russian-language Microsoft Word documents to deliver malware. FortiGuard Labs researchers observed the North Korea-linked Konni APT group using a weaponized Russian-language Word document in an ongoing phishing campaign. The KONNI RAT was first spotted by Cisco Talos researchers in 2017, it has been undetected since 2014 and was employed in highly targeted attacks.

article thumbnail

LitterDrifter USB Worm

Schneier on Security

A new worm that spreads via USB sticks is infecting computers in Ukraine and beyond. The group­—known by many names, including Gamaredon, Primitive Bear, ACTINIUM, Armageddon, and Shuckworm—has been active since at least 2014 and has been attributed to Russia’s Federal Security Service by the Security Service of Ukraine. Most Kremlin-backed groups take pains to fly under the radar; Gamaredon doesn’t care to.

article thumbnail

Go on a Psychedelic Journey of the Internet's Growth and Evolution

WIRED Threat Level

Security researcher Barrett Lyon, who makes visualizations of the internet's network infrastructure, is back with a new piece chronicling the rise of the IPv6 protocol.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Chocolate Swiss Army Knife

Schneier on Security

It’s realistic looking. If I drop it in a bin with my keys and wallet, will the TSA confiscate it?

IT 88
article thumbnail

SCONUL supports Green Libraries

CILIP

SCONUL supports Green Libraries The Society of College, National and University Libraries (SCONUL), has joined the Green Libraries Campaign as a partner organisation. The Green Libraries Campaign is the next phase of the Green Libraries Partnership, which connected libraries across England through the national Green Libraries Week campaign, allocated funding that enabled libraries to launch green activities, and ran the inaugural Green Libraries conference for knowledge sharing and green network

article thumbnail

How to Automate the Hardest Parts of Employee Offboarding via The Hacker News

IG Guru

Check out the article here. The post How to Automate the Hardest Parts of Employee Offboarding via The Hacker News first appeared on IG GURU.

article thumbnail

Alan Calder on Cyber Resilience

IT Governance

An interview with an award-winning author. Alan Calder, the CEO of GRC International Group PLC, IT Governance’s parent company, was recently awarded the Best Cyber Book of the Year award at The Real Cyber Awards 2023 for his new book Cyber Resilience – Defence-in-depth principles. To mark the occasion, we sat down with him for this special interview.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Friday Squid Blogging: Squid Nebula

Schneier on Security

Pretty photograph. The Squid Nebula is shown in blue, indicating doubly ionized oxygen—­which is when you ionize your oxygen once and then ionize it again just to make sure. (In all seriousness, it likely indicates a low-mass star nearing the end of its life). As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

article thumbnail

Hamas-linked APT uses Rust-based SysJoker backdoor against Israel

Security Affairs

Researchers reported that a Hamas-linked APT group is using a Rust-based SysJoker backdoor against Israeli entities. Check Point researchers observed a Hamas-linked APT group is using the SysJoker backdoor against Israeli entities. In December 2021, security experts from Intezer first discovered the SysJoker backdoor, which is able to infect Windows, macOS, and Linux systems.

IT 92