Sat.Apr 18, 2020 - Fri.Apr 24, 2020

article thumbnail

What Is Agile Enterprise Architecture? Just Enough, Just in Time

erwin

Having an agile enterprise architecture (EA) is the difference between whether an organization flourishes or flounders in an increasingly changing business climate. Over the years, EA has gotten a bad reputation for not providing business value. However, frameworks and languages like TOGAF, ArchiMate and DODAF aren’t responsible for this perception.

article thumbnail

Hackers Target Oil Companies as Prices Plunge

WIRED Threat Level

The sophisticated spear-phishing campaign hit as energy companies planned their response to falling crude prices. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nintendo Confirms Breach of 160,000 Accounts

Threatpost

After gamers reported unauthorized logins and purchases, Nintendo confirmed that over 160,000 accounts had been hacked.

article thumbnail

Remote Workforce: Securing the Next Normal

Data Breach Today

SailPoint's Mike Kiser on Rising Need for Zero Trust, Cloud Governance The global pandemic has revealed a lot about the extended remote workforce and its haves and have-nots, says Mike Kiser of SailPoint Technologies. In a preview of an upcoming virtual roundtable, he describes the cybersecurity forces shaping the new post-crisis workforce.

Security 147
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Expert identifies new Nazar APT group referenced in 2017 Shadow Brokers leak

Security Affairs

A security expert uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017. Juan Andres Guerrero-Saade, a former Kaspersky and Google researcher, uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017.

Libraries 139

More Trending

article thumbnail

Automated Bots Are Increasingly Scraping Data & Attempting Logins

Dark Reading

The share of bot traffic to online sites declines, but businesses are seeing an overall increase in automated scraping of data, login attempts, and other detrimental activity.

86
article thumbnail

A new Insomnia iOS exploit used to spy on China’s Uyghur minority

Security Affairs

Security researchers from Volexity discovered a new Insomnia iOS exploit that was being used to spy on China’s Uyghur minority. The Uyghur group is a Turkic minority ethnic group originating from and culturally affiliated with the general region of Central and East Asia. “The Uyghurs are recognized by the Chinese government only as a regional minority within a multicultural nation.

article thumbnail

IT Services Firm Cognizant Hit with Maze Ransomware

Dark Reading

Cognizant is working with cyber defense firms and law enforcement to investigate the attack, disclosed April 17.

article thumbnail

Secure Together: Netflix scams and how to report suspicious emails

IT Governance

With the UK government recently confirming that the lockdown will be extended for a further three weeks, we hope you’re comfortable in your remote work set-up – or, at least, as comfortable as one can hope. The isolation will be challenging in the best of situations, but plenty of people – such as those with children or unruly housemates – are facing a particularly tough time.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Attackers Increasingly Using Web Shells to Create Backdoors

Data Breach Today

NSA, Australian Signals Directorate, Offer Mitigation Tips The U.S. National Security Agency and the Australian Signals Directorate offer guidance on how to mitigate the growing threat posed by attackers using web shells to create backdoors.

Security 251
article thumbnail

Hacking Apple iPhones and iPads by sending emails to the victims

Security Affairs

Two zero-day flaws in the default mailing app pre-installed on iPhones and iPads allow attackers to hack the devices just by sending emails. Experts at cybersecurity firm ZecOps have discovered two zero-day vulnerabilities in iPhone and iPad devices that have been exploited in a series of attacks that targeted iOS high-profile users since at least January 2018.

Libraries 142
article thumbnail

A Dozen Nation-Backed APTs Tap COVID-19 to Cover Spy Attacks

Threatpost

Iran's Charming Kitten and other nation-state actors are using the coronavirus pandemic to their advantage, for espionage.

article thumbnail

COVID-19 Caption Contest Winners

Dark Reading

It was a tough choice! And the winner is.

IT 78
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Expert discloses 4 zero-days in IBM Data Risk Manager

Security Affairs

A security researcher disclosed details of four zero-day flaws impacting an IBM security product after the IT giant refused to address them. The security researcher Pedro Ribeiro, Director of Research at Agile Information Security, has published details about four zero-day vulnerabilities affecting the IBM Data Risk Manager (IDRM) after the company refused to address the issues.

Risk 139
article thumbnail

When in Doubt: Hang Up, Look Up, & Call Back

Krebs on Security

Many security-conscious people probably think they’d never fall for a phone-based phishing scam. But if your response to such a scam involves anything other than hanging up and calling back the entity that claims to be calling, you may be in for a rude awakening. Here’s how one security and tech-savvy reader got taken for more than $10,000 in an elaborate, weeks-long ruse.

Phishing 363
article thumbnail

Genetic Testing Lab Hack Affects 233,000

Data Breach Today

Second Largest Health Data Breach So Far This Year A California-based genetic testing laboratory has reported an email hacking incident that may have exposed medical information on nearly 233,000 individuals. It's the second-largest health data breach posted to the federal health data breach tally so far in 2020.

article thumbnail

How to Bring Business Process Management to Your Business

AIIM

Businesses looking for ongoing growth and scalability try to achieve these goals through different approaches that can provide “that extra advantage.” One such approach is business process management , which aims to find and make ongoing improvements in the operations of a business. This is currently a popular tactic in the business world, featuring various applications, techniques, and tools which make it a complex field of business development.

Analytics 196
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

State-sponsored hackers are using COVID-19 lures, Google warns

Security Affairs

Google warns that nation-backed hackers are exploiting the COVID-19 pandemic to organizations involved in the fight against the pandemic. Google is warning that nation-state actors are exploiting the COVID-19 (Coronavirus) pandemic to target health care organizations and entities involved in the fight against the pandemic. Google’s Threat Analysis Group (TAG) shared its latest findings related to state-backed attacks and revealed that it has identified more than a dozen state-sponsored groups us

Phishing 145
article thumbnail

White-Hat Hackers Help 'Fold' COVID-19 Proteins

Dark Reading

A grassroots effort provides scientists with computing power to help simulate the novel coronavirus' proteins and come up with therapeutic solutions for the disease.

145
145
article thumbnail

Cognizant: Ransomware Attack Disrupting Services

Data Breach Today

SEC Filing Shows Company Still Assessing Maze Attack IT services and consulting giant Cognizant is still assessing the damage from a ransomware attack on Friday. And it's warning that the incident is disrupting services to some of its clients and could affect the company's revenue.

article thumbnail

Amid Its Covid-19 Crisis, China Was Still Hacking Uighurs’ iPhones

WIRED Threat Level

Security researchers reveal a months-long, indiscriminate campaign targeting the iPhones of Chinese Muslims.

IT 143
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

267 Million Facebook identities available for 500 euros on the dark web

Security Affairs

Over 267 million Facebook profiles are offered for sale on dark web sites and hacker forums, the dump is offered for £500 ($623) and doesn’t include passwords. Hackers are offering for sale over 267 million Facebook profiles for £500 ($623) on dark web sites and hacker forums, the archive doesn’t include passwords. Early March, the security expert Bob Diachenko uncovered an Elasticsearch cluster containing more than 267 million Facebook user IDs, phone numbers, and names.

Sales 145
article thumbnail

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

The Last Watchdog

Privileged Access Management ( PAM ) arose some 15 years ago as an approach to restricting access to sensitive systems inside of a corporate network. Related: Active Directory holds ‘keys to the kingdom’ The basic idea was to make sure only the folks assigned “privileged access’’ status could successfully log on to sensitive servers. PAM governs a hierarchy of privileged accounts all tied together in a Windows Active Directory ( AD ) environment.

Access 138
article thumbnail

Prosecutors: Insider 'Sabotaged' Medical Equipment Shipments

Data Breach Today

Hacker Disrupted Delivery of Supplies Used in COVID-19 Crisis, DOJ Says The former vice president of finance at a Georgia-based medical supplies company has been charged with hacking into the firm's computers and "sabotaging" shipment of personal protective equipment in the midst of the COVID-19 crisis.

330
330
article thumbnail

CNIL’s New Guidelines on HR Processing

HL Chronicle of Data Protection

The French Data Protection Authority (CNIL) has recently released new guidelines (French only) regarding human resources processing operations. When the GDPR became effective, the CNIL’s previous set of HR Data guidelines became out of date as they did not incorporate the new law’s requirements ( e.g. obligations relating to records of processing activities and Data Protection Impact Assessments).

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Cyberattack reports quadrupled during Coronavirus outbreak, FBI warns

Security Affairs

The FBI announced that the number of cybercrime reports is spiked since the beginning of the Coronavirus (COVID-19) pandemic. Speaking at the Aspen Institute, FBI Deputy Assistant Director Tonya Ugoretz, announced that the bureau has observed a spike in cybercrime reports since the beginning of the C oronavirus pandemic. The FBI official explained that the number of reports has quadrupled compared to months before the COVID-19 outbreak. “The FBI has an Internet Crime Complaint Center, the

article thumbnail

Information Management Business Issues Hit Distance Learning

AIIM

Like many other areas around the country and around the world, my daughter's school has joined the " learn from home " movement. I've been a teleworker for nearly 16 years, so we already have the technology infrastructure required, including an older but still useful laptop and fairly robust Wi-Fi. But it's come with more than a few challenges, some of which are the same types of information management challenges we all struggle with at times in the world of business.

Metadata 128
article thumbnail

SBA May Have Exposed Data on 8,000 Loan Applicants

Data Breach Today

Reports: Application Portal Flaw May Have Leaked Social Security Numbers, Other Data The U.S. Small Business Administration says a flaw in an online application portal may have exposed the personal data - including Social Security numbers - of approximately 8,000 loan applicants seeking help coping with the economic impact of the COVID-19 pandemic, according to news reports.