Sat.Jan 04, 2020 - Fri.Jan 10, 2020

article thumbnail

Eliminate the Password, Eliminate the Password Problem.

The Security Ledger

Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like? Yaser Masoudnia, the Senior Director Product Management, Identity Access Management, at LogMeIn* takes us there. The post Eliminate. Read the whole entry. » Related Stories Explained: Two-Factor vs.

article thumbnail

What Orwell's '1984' Missed: Free Social Media Apps

Data Breach Today

UAE Green Lights All-Access Social Messaging App, Blocks Rivals Not even George Orwell could have predicted nation-state surveillance in the 21st century. Give us free instant messaging for our smartphones, and faster than you can say "viral kitten video," we're collectively part of a mass surveillance nightmare. Case in point: The ToTok social messaging app.

Access 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In App Development, Does No-Code Mean No Security?

Dark Reading

No-code and low-code development platforms are part of application development, but there are keys to making sure that they don't leave security behind with traditional coding.

article thumbnail

Google Ditches Patch-Time Bug Disclosure in Favor of 90-Day Policy

Threatpost

Project Zero vulnerability disclosures will now happen at 90 days, even if a patch becomes available before then.

55
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

11 cyber security predictions for 2020

IT Governance

Almost everyone wants to know what the future has in store – particularly when it comes to cyber security. Keeping aware of the latest cyber threats and the best solutions to combat them will put organisations in a better position to prevent attacks. With that in mind, Geraint Williams, IT Governance’s chief information security officer, discusses his cyber security predictions in the upcoming year.

More Trending

article thumbnail

MITRE presents ATT&CK for ICS, a knowledge base for ICS

Security Affairs

MITRE announced the initial release of a version of its MITRE ATT&CK knowledge base that focuses on industrial control systems (ICS). MITRE’s ATT&CK framework is becoming a standard in cybersecurity community for the classification of attacker behavior. Now the organization is going to propose a knowledge base that focused on ICS systems for its MITRE’s ATT&CK. “ ATT&CK for ICS is a knowledge base useful for describing the actions an adversary may take while operatin

article thumbnail

Hackers Increasingly Probe North American Power Grid

Data Breach Today

But Electric Sector, Driven by Regulators, Has Been Adapting, Experts Say Hackers have been increasingly probing the North American power grid for weaknesses, but the industry - driven in part by regulators - is increasingly able to identify and repel attackers, industrial cybersecurity experts say.

article thumbnail

How to Secure Your Wi-Fi Router and Protect Your Home Network

WIRED Threat Level

Router security has improved a bunch in recent years, but there are still steps you can take to lock yours down even better.

Security 241
article thumbnail

The Hidden Cost of Ransomware: Wholesale Password Theft

Krebs on Security

Organizations in the throes of cleaning up after a ransomware outbreak typically will change passwords for all user accounts that have access to any email systems, servers and desktop workstations within their network. But all too often, ransomware victims fail to grasp that the crooks behind these attacks can and frequently do siphon every single password stored on each infected endpoint.

Passwords 252
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Malicious app exploiting CVE-2019-2215 zero-day available in Google Play since March

Security Affairs

Security experts have found a malicious app in the Google Play that exploits the recently patched CVE-2019-2215 zero-day vulnerability. Earlier October, Google Project Zero researchers Maddie Stone publicly disclosed a zero-day vulnerability , tracked as CVE-2019-2215 , in Android. Maddie Stone published technical details and a proof-of-concept exploit for the high-severity security vulnerability, seven days after she reported it to the colleagues of the Android security team.

article thumbnail

Router Cryptojacking Campaigns Disrupted

Data Breach Today

20,000 Hacked MikroTik Routers in Southeast Asia Were Malware-Infected Nearly 16,000 malware-infected MicroTik routers in Southeast Asia have been scrubbed of Coinhive cryptojacking code, which mines for monero, thanks to an international police operation. Globally, however, 26,000 MicroTik routers reportedly remain infected with the stealth monero-mining code.

Mining 242
article thumbnail

Iranian Hackers Have Been ‘Password-Spraying’ the US Grid

WIRED Threat Level

A state-sponsored group called Magnallium has been probing American electric utilities for the past year.

Passwords 236
article thumbnail

Alleged Member of Neo-Nazi Swatting Group Charged

Krebs on Security

Federal investigators on Friday arrested a Virginia man accused of being part of a neo-Nazi group that targeted hundreds of people in “swatting” attacks, wherein fake bomb threats, hostage situations and other violent scenarios were phoned in to police as part of a scheme to trick them into visiting potentially deadly force on a target’s address.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

56.25 million US residents records collected by CheckPeople exposed on a Chinese server

Security Affairs

A database containing the personal details of 56.25 million US residents that allegedly belongs to CheckPeople.com website was exposed online. A database containing the personal details of 56.25 million US residents that allegedly belongs to the CheckPeople.com website was exposed online on a server having a Chinese IP address. The huge trove of data includes names, home addresses, phone numbers, and ages.

Archiving 246
article thumbnail

Voting Machine Firm CEOs Open to Greater Federal Oversight

Data Breach Today

Congress Wants Security Vulnerabilities Addressed to Thwart Foreign Interference The CEOs of the three largest voting machine manufacturers testified before a U.S. Congressional committee that they would be open to greater federal oversight of their equipment to help ensure the security of voting data in upcoming elections, including the 2020 presidential contest.

article thumbnail

How the US Knew Iranian Missiles Were Coming Before They Hit

WIRED Threat Level

The US has operated an extensive network of missile warning systems for over half a century, but next-generation missiles will put it to the test.

IT 236
article thumbnail

5 Ways Data Modeling Is Critical to Data Governance

erwin

Enterprises are trying to manage data chaos. They might have 300 applications, with 50 different databases and a different schema for each one. They also face increasing regulatory pressure because of global data regulations , such as the European Union’s General Data Protection Regulation (GDPR) and the new California Consumer Privacy Act (CCPA), that went into effect last week on Jan. 1.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

CISA warns that Pulse Secure VPN issue CVE-2019-11510 is still exploited

Security Affairs

The US DHS CISA agency is warning organizations that threat actors continue to exploit the CVE-2019-11510 Pulse Secure VPN vulnerability. The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) is warning organizations that attackers continue to exploit the well known Pulse Secure VPN vulnerability tracked as CVE-2019-11510.

Security 246
article thumbnail

Lawsuit Filed in Wake of Ransomware Attack

Data Breach Today

Ryuk Attack on DCH Health System Disrupted Patient Care Last Fall A lawsuit filed against DCH Health System in the wake of a ransomware attack that disrupted medical services for several days alleges that the Alabama-based organization failed "to properly maintain and safeguard its computer systems and data.

article thumbnail

A Facebook Bug Exposed Anonymous Admins of Pages

WIRED Threat Level

A bad code update allowed anyone to easily reveal which accounts posted to Facebook Pages—including celebrities and politicians—for several hours. .

Privacy 223
article thumbnail

Customer Experience Trends: How To Stand Out From the Crowd

Reltio

Customer experience trends might change from time to time, but the central component remains steady: The customer must be at the heart of every business decision that you make. In B. Joseph Pine and James G. Gilmore’s seminal 1999 book, The Experience Economy , they predicted a new economic era in which businesses would shift their focus from creating products or services to delivering memorable experiences to their customers.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Mozilla addresses CVE-2019-17026 Firefox Zero-Day exploited in targeted attacks

Security Affairs

Mozilla has released security updates for Firefox browser that address a zero-day vulnerability (CVE-2019-17026) that has been exploited in targeted attacks. Mozilla has released security updates for Firefox browser that address a zero-day flaw (CVE-2019-17026) that has been exploited in targeted attacks. Mozilla has released security updates to address a critical Firefox browser zero-day issue (CVE-2019-17026) that has been exploited in targeted attacks.

article thumbnail

FBI Asks Apple For Access to Saudi Shooter's iPhones

Data Breach Today

Request Echoes 2016 Legal Standoff Between Apple and the FBI The FBI has sent a letter to Apple asking for help in accessing encrypted data from two iPhones belonging to a deceased shooter. The bureau's move may be a prelude to another legal fight between the FBI and Apple over strong encryption.

Access 195
article thumbnail

Russia Takes a Big Step Toward Internet Isolation

WIRED Threat Level

total control.

Security 189
article thumbnail

2020 tech predictions from Jamf CEO

Jamf

Jamf CEO, Dean Hager, highlights four areas where he sees the technology industry expanding in 2020. Read this blog for full details.

104
104
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

The city of Las Vegas announced it has suffered a cyber attack

Security Affairs

The city of Las Vegas announced it has suffered a cyber attack that breached its computer systems, it is unclear whether any sensitive data was exposed. Las Vegas officials say a cyber attack breached the city’s computer systems , the attack took place on Tuesday, but it wasn’t immediately clear if any sensitive data was exposed. City spokesman David Riggleman told the Las Vegas Review-Journal that City officials were informed of the breach around 4:30 a.m. and the IT department qui

IT 246
article thumbnail

Patch or Perish: VPN Servers Hit by Ransomware Attackers

Data Breach Today

Pulse Secure Says Critical April 2019 Patch Protects Against Sodinokibi Too Attackers are hitting unpatched Pulse Secure VPN servers with Sodinokibi - aka REvil - ransomware, British security researcher Kevin Beaumont warns. Pulse Secure says that although many organizations have installed the critical April 2019 patch, holdouts persist.

article thumbnail

Facebook Says Encrypting Messenger by Default Will Take Years

WIRED Threat Level

Mark Zuckerberg promised default end-to-end encryption throughout Facebook's platforms. Nearly a year later, Messenger's not even close.