Remove 2018 Remove Mining Remove Retail
article thumbnail

Oracle critical patch advisory addresses 284 flaws, 33 critical

Security Affairs

The flaw also affected the Financial Services Analytical Applications Infrastructure, the Fusion Middleware MapViewer, and four three Oracle Retail components. The bug affected the OCA’s Diameter Signalling Router component and its Communications Services Gatekeeper.

article thumbnail

Security Affairs newsletter Round 181 – News of the week

Security Affairs

Evolution of threat landscape for IoT devices – H1 2018. Adobe issued a critical out-of-band patch to address CVE-2018-12848 Acrobat flaw. Magecart cybercrime group stole customers credit cards from Newegg electronics retailer. Ngrok Mining Botnet. Flaw in Western Digital My Cloud exposes the content to hackers.

Security 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s time to think twice about retail loyalty programs

Thales Cloud Protection & Licensing

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. In this case, it looks as though the attackers had been on the Starwood network for somewhere around three years, mining out their reservations database (keep in mind that Marriott only acquired Starwood in 2016 ).

Retail 66
article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Some 27 percent of IT professionals who partook in a survey conducted by next-gen firewall supplier Imperva at RSA 2018 reported receiving more than 1 million security alerts daily. In many cases the tedious, first-level correlating of SIEM logs to sift out threats has moved beyond human capability.

article thumbnail

MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

The Last Watchdog

NTA refers to using advanced data mining and security analytics techniques to detect and investigate malicious activity in traffic moving between each device and on every critical system in a company network. It was one of the more fascinating conversations I had on the floor at Black Hat USA 2018. Remember how Target got hacked?

article thumbnail

Attacks against machine learning — an overview

Elie

This series of posts is modeled after the talk I gave at RSA 2018. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. Obviously, we couldn’t anticipate that abusive mining would become such a huge issue.

Mining 107
article thumbnail

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

pic.twitter.com/KiaGNKhaig — Troy Hunt (@troyhunt) March 1, 2018. This screen faces out into the retail store with people constantly wandering past it only a couple of meters away, well within the distance required to observe the contents off it. — Geoffrey Huntley (@GeoffreyHuntley) March 27, 2018.