Sat.Aug 29, 2020 - Fri.Sep 04, 2020

article thumbnail

Morgan Stanley Hit With $5 Million Data Breach Suit

Data Breach Today

Poor Procedures for Discarding Old Equipment Led to Breach, Lawsuit Alleges A $5 million lawsuit seeking class action status has been filed against Morgan Stanley, claiming the financial organization failed to properly safeguard personally identifiable information when the company discarded old computer equipment.

article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

Many organizations feel forced to keep legacy applications alive to retain access to historical data – either for customer service, operational requirements, or compliance. However, keeping these old systems running can use up resources that would be better deployed driving digital transformation. And relying on legacy technology creates business risk because these older systems are much harder to fix when things go wrong and more vulnerable to security threats.

ECM 173
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

We Didn't Encrypt Your Password, We Hashed It. Here's What That Means:

Troy Hunt

You've possibly just found out you're in a data breach. The organisation involved may have contacted you and advised your password was exposed but fortunately, they encrypted it. But you should change it anyway. Huh? Isn't the whole point of encryption that it protects data when exposed to unintended parties? Ah, yes, but it wasn't encrypted it was hashed and therein lies a key difference: Saying that passwords are “encrypted” over and over again doesn’t make it so.

Passwords 145
article thumbnail

Integrating Data Governance and Enterprise Architecture

erwin

Aligning these practices for regulatory compliance and other benefits. Why should you integrate data governance (DG) and enterprise architecture (EA)? It’s time to think about EA beyond IT. Two of the biggest challenges in creating a successful enterprise architecture initiative are: collecting accurate information on application ecosystems and maintaining the information as application ecosystems change.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

A Tale of Two Hacker Incidents

Data Breach Today

Healthcare Organizations Facing More Cyberthreats Two recent hacking incidents that each affected more than 100,000 individuals illustrate the variety of cyberthreats healthcare organizations face during these chaotic times. Security experts offer risk mitigation insights.

Risk 358

More Trending

article thumbnail

German DPA Issues Guidance on Data Transfers Following Schrems II

Hunton Privacy

On August 24, 2020, the Data Protection Authority (“DPA”) of the German federal state of Baden-Württemberg issued guidance on international data transfers following the judgment of the Court of Justice of the European Union (“CJEU”) in the Schrems II case (decision C-311/18 of July 16, 2020). As we previously reported , the judgment of the CJEU invalidated the EU-U.S.

article thumbnail

Remote work requirement exposes the corporate digital divide

DXC Technology

Like many others, my family and I have done our best to enjoy the unexpectedly large amount of time we have together at home due to social distancing guidelines. Adjusting to the new normal, we have relied heavily on Internet access not only for work and school, but to stay sane and keep the peace. […]. The post Remote work requirement exposes the corporate digital divide appeared first on DXC Blogs.

Access 137
article thumbnail

Ex-Cisco Engineer Pleads Guilty in Insider Threat Case

Data Breach Today

Sudhish Kasaba Ramesh Caused $1.4 Million in Damages to Former Employer A one-time Cisco engineer has pleaded guilty to causing $1.4 million in damages to his former employer. Sudhish Kasaba Ramesh admitted to deleting 456 virtual machines that affected 16,000 WebEx accounts for weeks, according to the Justice Department.

357
357
article thumbnail

Malicious npm package ‘fallguys’ removed from the official repository

Security Affairs

The npm security team removed a malicious JavaScript library from the npm repository that was designed to steal sensitive files from the victims. The npm security team has removed the JavaScript library “ fallguys ” from the npm portal because it was containing a malicious code used to steal sensitive files from an infected users’ browser and Discord application.

Libraries 143
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

NSA Mass Surveillance Program Illegal, U.S. Court Rules

Threatpost

The NSA argued its mass surveillance program stopped terrorist attacks - but a new U.S. court ruling found that this is not, and may have even been unconstitutional.

IT 136
article thumbnail

The future of retail banking: Frictionless, personalized, cohesive

DXC Technology

Following this year’s extraordinary events, our retail bank partners have been asking to rapidly implement contactless solutions that minimize touch points for customers. Current circumstances aside, research indicates that contactless is just one part of the future retail banking landscape. In the long term, banks will grow their customer bases and portfolios by offering frictionless […].

Retail 128
article thumbnail

Lack of MFA May Have Caused Sendgrid Account Compromise

Data Breach Today

Email Service Provider Moving to Implement Additional Security Measures Security professionals are expressing surprise that email service provider Sendgrid did not have multifactor authentication in place to protect its customer accounts, which resulted in a large, but unknown, number being compromised with the data being sold on the darknet.

article thumbnail

New KryptoCibule Windows Trojan spreads via malicious torrents

Security Affairs

Experts warn of the KryptoCibule Windows malware that has been active since late 2018 and has targeted users in the Czech Republic and Slovakia. Security researchers from ESET have shared technical detailts of a new piece of Windows malware tracked as KryptoCibule. The malware has been active since at least December 2018, it targets cryptocurrency users as a triple threat.

Mining 143
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

European Parliament Meeting on Future of EU-U.S. Data Flows

Hunton Privacy

On September 3, 2020, the Committee on Civil Liberties, Justice and Home Affairs (“LIBE Committee”) of the European Parliament held a meeting to discuss the future of EU-U.S. data flows following the Schrems II judgment of the Court of Justice of the European Union (the “CJEU”). In addition to Members of the European Parliament (“MEPs”), the meeting’s participants included Justice Commissioner Didier Reynders, European Data Protection Board (“EDPB”) Chair Andrea Jelinek and Maximilian Schrems.

article thumbnail

Is social media being mined for insider threats?

OpenText Information Management

This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in plain sight” said Stephenie Meyer, the author of the bestselling Twilight series. Not that long-ago, social media was the “new kid on the block,” something we used to share photos with distant family members, comment … The post Is social media being mined for insider threats?

Mining 119
article thumbnail

Russian Election Misinformation Campaign Re-Emerges

Data Breach Today

Facebook Takes Down Accounts Associated with Russia's 'Internet Research Agency' Troll Farm Facebook says the Russian troll group that interfered in the 2016 U.S. election is at it again, using sham accounts and a fake news site to spread disinformation in advance of the November election. Facebooks says it took down the accounts involved.

IT 346
article thumbnail

North Korea-linked APT group BeagleBoyz targets banks

Security Affairs

North Korea-linked APT group BeagleBoyz intensified its operations since February, US CISA, Department of the Treasury, FBI, and USCYBERCOM warn. According to a joint advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury, the Federal Bureau of Investigation (FBI), and U.S. Cyber Command (USCYBERCOM) North Korea-linked APT group BeagleBoyz was very active since February 2020 targeting banks across the world.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

AI on the Email Offense

Dark Reading

Mass domain purchasing enables email attackers to slip by traditional defenses. Here's how artificial intelligence can stop them.

article thumbnail

ServiceNow??????????????!?

DXC Technology

????????????????????????????IT???????????ITSM?????????ServiceNow????????????IT??????????????????????????????????????????????????????????????2020?3??ServiceNow??Emergency Response Management????????????Safe Workplace????????????????????????????????????????????????????????????????????????????????? ServiceNow?????2020?3??11,000??????????????????????????????????????????????????

Cloud 116
article thumbnail

Australian Driver's Licenses Exposed on S3 Bucket

Data Breach Today

It's Unclear Who Owns the Data and If Those Affected Will Be Notified About 54,000 Australian driver's licenses were exposed in an open Amazon Simple Storage Service bucket, according to a security researcher. It remains unclear what entity or agency exposed the data and whether those affected will be notified.

Security 345
article thumbnail

France will not ban Huawei from its upcoming 5G networks

Security Affairs

French President Emmanuel Macron announced that France won’t ban the Chinese giant Huawei from its upcoming 5G telecommunication networks. French President Emmanuel Macron announced that his government will not exclude Chinese telecom giant Huawei from the building of the upcoming 5G telecommunication networks. However, Macron said that France will favor European providers of 5G technology due to security concerns.

IT 142
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Creepy ‘Geofence’ Finds Anyone Who Went Near a Crime Scene

WIRED Threat Level

Police increasingly ask Google and other tech firms for data about who was where, when. Two judges ruled the investigative tool invalid in a Chicago case.

Security 124
article thumbnail

WhatsApp Discloses 6 Bugs via Dedicated Security Site

Threatpost

The company committed to more transparency about app flaws, with an advisory page aimed at keeping the community better informed of security vulnerabilities.

Security 121
article thumbnail

The Risks Posed by Mobile Health Apps

Data Breach Today

What privacy and security issues are raised by patients using smartphone apps to access health records? Attorney Helen Oscislawski and security expert Jarrett Kolthoff offer an analysis.

Risk 348
article thumbnail

Hackers are trying to exploit DoS flaw in Cisco IOS XR software running in carrier-grade routers

Security Affairs

Cisco warns that threat actors are attempting to exploit a high severity DoS flaw in its Cisco IOS XR software that runs on carrier-grade routers. Cisco warned over the weekend that attackers are trying to exploit a high severity memory exhaustion denial-of-service (DoS) vulnerability ( CVE-2020-3566 ) affecting the Cisco IOS XR Network OS that runs on carrier-grade routers.

Access 144
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Hypothesis: Cyber Attackers Are After Your Scientific Research

Dark Reading

From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.

Security 122
article thumbnail

Personal Information of Millions of US Voters Available on Dark Web

Adam Levin

Databases containing the personal information of millions of U.S. voters have appeared on Russian hacking forums. According to Russian news outlet Kommersant , a hacker called Gorka9 has posted the personal information of several million registered voters in Michigan, Arkansas, Connecticut, Florida, and South Carolina.The data includes names, birthdates, gender, mailing addresses, email addresses and polling station numbers.

FOIA 112
article thumbnail

Cisco Alert: Hackers Targeting Zero-Day Flaws in IOS XR

Data Breach Today

Remote Attacker Could Exhaust Device Memory, Causing a Denial of Service Warning: Hackers are actively attempting to exploit two zero-day flaws in the IOS XR Cisco operating system that runs its carrier-grade routers. Cisco has described ways to partially mitigate the vulnerabilities while it preps patches.

IT 317