Nov 25, 2023NewsroomData Security / Vulnerability The maintainers of the open-source file-sharing software ownCloud have warned of three critical security flaws that could be exploited to disclose sensitive information and modify files. A brief description of the vulnerabilities is as follows - Disclosure of sensitive credentials and configuration in containerized … [Read more...] about 3 Critical Vulnerabilities Expose ownCloud Users to Data Breaches
data
Okta’s Recent Customer Support Data Breach Impacted 134 Customers
Nov 04, 2023NewsroomData Breach / Cyber Attack Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach affected 134 of its 18,400 customers. It further noted that the unauthorized intruder gained access to its systems from September 28 to October 17, 2023, and ultimately accessed HAR files containing … [Read more...] about Okta’s Recent Customer Support Data Breach Impacted 134 Customers
Five Reasons Why Legacy Data Loss Prevention Tools Fail to Deliver
Like so many legacy technologies, legacy data loss prevention (DLP) tools fail to deliver the protection today’s organizations need. Implementation challenges, visibility gaps and inconsistent policies negatively impact customers and make data breaches far too easy for adversaries. With U.S. data breach costs averaging a staggering $4.45 million last year, organizations need a … [Read more...] about Five Reasons Why Legacy Data Loss Prevention Tools Fail to Deliver
Vulnerability in Confluence Data Center and Confluence Server
Recently, CISA, the FBI, and MS-ISAC issued a joint advisory urging all organizations that use Confluence Data Center and Confluence Server to update the software immediately due to a major vulnerability. Here’s what the problem is and why this advisory is on point. CVE-2023-22515 in Confluence Data Center and Confluence Server The vulnerability in question, designated … [Read more...] about Vulnerability in Confluence Data Center and Confluence Server
Okta’s Support System Breach Exposes Customer Data to Unidentified Threat Actors
Oct 21, 2023NewsroomData Breach / Cyber Attack Identity services provider Okta on Friday disclosed a new security incident that allowed unidentified threat actors to leverage stolen credentials to access its support case management system. "The threat actor was able to view files uploaded by certain Okta customers as part of recent support cases," David Bradbury, Okta's … [Read more...] about Okta’s Support System Breach Exposes Customer Data to Unidentified Threat Actors
Locking Down Financial and Accounting Data — Best Data Security Strategies
Oct 17, 2023The Hacker NewsData Security / Infosec Webinar Financial data is much more than just a collection of numbers; it is a crucial component of any business and a prime target for cybercriminals. It's important to understand that financial records can be a veritable treasure trove for digital pirates. A security breach not only puts customers' personal information in … [Read more...] about Locking Down Financial and Accounting Data — Best Data Security Strategies
Researchers Unveil ToddyCat’s New Set of Tools for Data Exfiltration
Oct 13, 2023NewsroomAPT / Malware The advanced persistent threat (APT) actor known as ToddyCat has been linked to a new set of malicious tools that are designed for data exfiltration, offering a deeper insight into the hacking crew's tactics and capabilities. The findings come from Kaspersky, which first shed light on the adversary last year, linking it to attacks against … [Read more...] about Researchers Unveil ToddyCat’s New Set of Tools for Data Exfiltration
New OS Tool Tells You Who Has Access to What Data
Ensuring sensitive data remains confidential, protected from unauthorized access, and compliant with data privacy regulations is paramount. Data breaches result in financial and reputational damage but also lead to legal consequences. Therefore, robust data access security measures are essential to safeguard an organization's assets, maintain customer trust, and meet regulatory … [Read more...] about New OS Tool Tells You Who Has Access to What Data
Customize your data ingestion with Elastic input packages
Say hello to Julia, who works as an engineer at Ascio Innovation firm. She is currently working with Oracle Weblogic server and wants to get a set of metrics for monitoring it. She goes ahead and installs Elastic Oracle Weblogic Integration, which uses Jolokia in the backend to fetch the metrics. Now, her team wants to advance in the monitoring and has the following … [Read more...] about Customize your data ingestion with Elastic input packages
Revolutionizing big data management: Unveiling the power of Amazon EMR and Elastic integration
In the dynamic realm of data processing, Amazon EMR takes center stage as an AWS-provided big data service, offering a cost-effective conduit for running Apache Spark and a plethora of other open-source applications. While the capabilities of EMR are impressive, the art of vigilant monitoring holds the key to unlocking its full potential. This blog post explains the pivotal … [Read more...] about Revolutionizing big data management: Unveiling the power of Amazon EMR and Elastic integration