Collecting data is crucial for observability and security, and ensuring it is quickly searchable with low-latency results is essential for managing and protecting applications and infrastructure effectively. However, storing all of this data incurs ongoing storage costs, creating a key opportunity for cost savings. In Elastic Cloud, you can optimize storage expenses by setting … [Read more...] about Optimize the cost of logs storage in Elastic Cloud using hot and frozen data tiers
data
Acronym Overdose – Navigating the Complex Data Security Landscape
In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others. While these acronyms represent critical frameworks, architectures, and tools for protecting sensitive information, they can also overwhelm those trying to piece together an effective security strategy. This article aims to demystify some of the most … [Read more...] about Acronym Overdose – Navigating the Complex Data Security Landscape
North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data
Oct 18, 2024Ravie LakshmananInsider Threat / Cyber Espionage North Korean information technology (IT) workers who obtain employment under false identities in Western companies are not only stealing intellectual property, but are also stepping up by demanding ransoms in order to not leak it, marking a new twist to their financially motivated attacks. "In some instances, … [Read more...] about North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data
Demystifying Data Protection in the Cloud
In the dynamic landscape of data security, navigating the complexities of modern architectures requires a sophisticated approach. The exponential growth of data and the proliferation of cloud services require advanced security strategies that can adapt to rapidly changing conditions. Traditional methods of data protection, while foundational, often fall short in addressing the … [Read more...] about Demystifying Data Protection in the Cloud
LinkedIn Halts AI Data Processing in U.K. Amid Privacy Concerns Raised by ICO
Sep 21, 2024Ravie LakshmananPrivacy / Artificial Intelligence The U.K. Information Commissioner's Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended processing users' data in the country to train its artificial intelligence (AI) models. "We are pleased that LinkedIn has reflected on the concerns we raised about its approach to … [Read more...] about LinkedIn Halts AI Data Processing in U.K. Amid Privacy Concerns Raised by ICO
New Android Malware ‘Ajina.Banker’ Steals Financial Data and Bypasses 2FA via Telegram
Sep 12, 2024Ravie LakshmananMobile Security / Financial Fraud Bank customers in the Central Asia region have been targeted by a new strain of Android malware codenamed Ajina.Banker since at least November 2024 with the goal of harvesting financial information and intercepting two-factor authentication (2FA) messages. Singapore-headquartered Group-IB, which discovered the … [Read more...] about New Android Malware ‘Ajina.Banker’ Steals Financial Data and Bypasses 2FA via Telegram
How to turn data into actionable insights | Elastic
The last step in turning data into actionable insights is analysis and retrieval. This means figuring out what the patterns and trends you’ve spotted mean for your business and how you can use them to make more informed decisions.For example, say your ecommerce store sells two different brands of canned tomatoes. The marketing team contacts you and asks how tomato brand A is … [Read more...] about How to turn data into actionable insights | Elastic
New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks
Sep 09, 2024Ravie LakshmananVulnerability / Hardware Security A novel side-channel attack has been found to leverage radio signals emanated by a device's random access memory (RAM) as a data exfiltration mechanism, posing a threat to air-gapped networks. The technique has been codenamed RAMBO by Dr. Mordechai Guri, the head of the Offensive Cyber Research Lab in the … [Read more...] about New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks
Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data
Aug 21, 2024Ravie LakshmananSoftware Security / Vulnerability Cybersecurity researchers have disclosed a critical security flaw impacting Microsoft's Copilot Studio that could be exploited to access sensitive information. Tracked as CVE-2024-38206 (CVSS score: 8.5), the vulnerability has been described as an information disclosure bug stemming from a server-side request … [Read more...] about Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data
Elastic 8.15: Enhanced semantic search and new SIEM data import
The 8.15 release contains a significant number of features, including more tools to fine tune relevance, additional model flexibility, and vector search improvements as well as advances in AI-driven security analytics to modernize onboarding of custom SIEM data in minutes. Following the donation of the Elastic Common Schema (ECS) and Universal Profiling to the OpenTelemetry … [Read more...] about Elastic 8.15: Enhanced semantic search and new SIEM data import