Fri.Nov 24, 2023

article thumbnail

ISMG Editors: Will Federal Budget Cuts Bite US Security?

Data Breach Today

Also: Advice for the Next White House Cyber Director; CISOs' Liability Concerns In the latest weekly update, the former federal CISO, Grant Schneider, joins three editors at ISMG to discuss important cybersecurity issues, including advice for the next White House cyber director, and liability concerns facing CISOs following SolarWinds and its CISO being accused of fraud.

Security 277
article thumbnail

Exposed Kubernetes configuration secrets can fuel supply chain attacks

Security Affairs

Researchers warn of publicly exposed Kubernetes configuration secrets that could pose a threat of supply chain attack for organizations. Aqua Nautilus researchers warn of publicly exposed Kubernetes configuration secrets that put organizations at risk of supply chain attacks. The experts noticed that these misconfigurations impact hundreds of organizations and open-source projects.

Passwords 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission Failing to Tackle Spyware, Lawmakers Say

Data Breach Today

Parliamentarians Pass Resolution Calling For Immediate Executive Branch Action European lawmakers slammed the EU executive branch's inaction after a parliamentary committee called for tougher rules designed to prevent spyware abuse across the trading bloc. More than half of European Parliament lawmakers backed a resolution demanding rapid action.

276
276
article thumbnail

App used by hundreds of schools leaking children’s data

Security Affairs

Almost a million files with minors’ data, including home addresses and photos were left open to anyone on the internet, posing a threat to children. During a recent investigation, the Cybernews research team discovered that IT company Appscook – which develops applications used by more than 600 schools in India and Sri Lanka for education management – leaked a staggering amount of sensitive data, including photos of minors, home addresses, and birth certificates, due to a misconfiguration

Risk 140
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Indian Hotels Probes Alleged Customer Data Breach

Data Breach Today

1.5 Million Customers' Details Stolen From Taj Hotel Chain, Attacker Claims Hospitality giant Indian Hotels is probing the alleged theft of data from its systems after a criminal recently claimed they stole data pertaining to 1.5 million customers of the Taj hotel chain in 2020, which they're now advertising on a popular English-language cybercrime forum.

More Trending

article thumbnail

LitterDrifter USB Worm

Schneier on Security

A new worm that spreads via USB sticks is infecting computers in Ukraine and beyond. The group­—known by many names, including Gamaredon, Primitive Bear, ACTINIUM, Armageddon, and Shuckworm—has been active since at least 2014 and has been attributed to Russia’s Federal Security Service by the Security Service of Ukraine. Most Kremlin-backed groups take pains to fly under the radar; Gamaredon doesn’t care to.

article thumbnail

North Korea-linked Konni APT uses Russian-language weaponized documents

Security Affairs

North Korea-linked Konni APT group used Russian-language Microsoft Word documents to deliver malware. FortiGuard Labs researchers observed the North Korea-linked Konni APT group using a weaponized Russian-language Word document in an ongoing phishing campaign. The KONNI RAT was first spotted by Cisco Talos researchers in 2017, it has been undetected since 2014 and was employed in highly targeted attacks.

article thumbnail

Alan Calder on Cyber Resilience

IT Governance

An interview with an award-winning author. Alan Calder, the CEO of GRC International Group PLC, IT Governance’s parent company, was recently awarded the Best Cyber Book of the Year award at The Real Cyber Awards 2023 for his new book Cyber Resilience – Defence-in-depth principles. To mark the occasion, we sat down with him for this special interview.

article thumbnail

Application modernization overview

IBM Big Data Hub

Application modernization is the process of updating legacy applications leveraging modern technologies, enhancing performance and making it adaptable to evolving business speeds by infusing cloud native principles like DevOps, Infrastructure-as-code (IAC) and so on. Application modernization starts with assessment of current legacy applications, data and infrastructure and applying the right modernization strategy (rehost, re-platform, refactor or rebuild) to achieve the desired result.

Cloud 89
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Go on a Psychedelic Journey of the Internet's Growth and Evolution

WIRED Threat Level

Security researcher Barrett Lyon, who makes visualizations of the internet's network infrastructure, is back with a new piece chronicling the rise of the IPv6 protocol.

article thumbnail

Chocolate Swiss Army Knife

Schneier on Security

It’s realistic looking. If I drop it in a bin with my keys and wallet, will the TSA confiscate it?

IT 95
article thumbnail

SCONUL supports Green Libraries

CILIP

SCONUL supports Green Libraries The Society of College, National and University Libraries (SCONUL), has joined the Green Libraries Campaign as a partner organisation. The Green Libraries Campaign is the next phase of the Green Libraries Partnership, which connected libraries across England through the national Green Libraries Week campaign, allocated funding that enabled libraries to launch green activities, and ran the inaugural Green Libraries conference for knowledge sharing and green network

article thumbnail

How to Automate the Hardest Parts of Employee Offboarding via The Hacker News

IG Guru

Check out the article here. The post How to Automate the Hardest Parts of Employee Offboarding via The Hacker News first appeared on IG GURU.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Friday Squid Blogging: Squid Nebula

Schneier on Security

Pretty photograph. The Squid Nebula is shown in blue, indicating doubly ionized oxygen—­which is when you ionize your oxygen once and then ionize it again just to make sure. (In all seriousness, it likely indicates a low-mass star nearing the end of its life). As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

article thumbnail

Hamas-linked APT uses Rust-based SysJoker backdoor against Israel

Security Affairs

Researchers reported that a Hamas-linked APT group is using a Rust-based SysJoker backdoor against Israeli entities. Check Point researchers observed a Hamas-linked APT group is using the SysJoker backdoor against Israeli entities. In December 2021, security experts from Intezer first discovered the SysJoker backdoor, which is able to infect Windows, macOS, and Linux systems.

IT 128