Why IT needs to lead the next phase of data science

Most companies today have invested in data science to some degree. In the majority of cases, data science projects have tended to spring up team by team inside an organization, resulting in a disjointed approach that isn’t scalable or cost-efficient. Think of how data science is typically introduced into a company today: Usually, a line-of-business organization that wants to make more data-driven decisions hires a data scientist to create models for its specific needs. Seeing that group’s performance improvement, another business unit decides to hire a data scientist to create its own R or Python applications. Rinse and repeat, until every functional entity within the corporation has its own siloed data scientist or data science team.

Cisco fixes maximum severity MSO auth bypass vulnerability

Cisco has addressed a maximum severity authentication bypass vulnerability found in the API endpoint of the Cisco ACI Multi-Site Orchestrator (MSO) installed on the Application Services Engine. Cisco ACI MSO is an intersite network and policy orchestration solution that helps admins monitor the health of their organizations' interconnected sites across multiple data centers. Impacts only MSO 3.0 releases "A vulnerability in [...]

2021-02-26T18:09:32-05:00February 25th, 2021|General News|

Cyber-pandemic: The most notable cyber attacks of 2020

2020 and the COVID-19 pandemic saw employees move to remote working, keeping IT professionals on high alert for cyberattacks. Cynet has turned back the pages of 2020 to review the most noteworthy cyberattacks making up what it calls is the cyber-pandemic. "2020 was the year that COVID-19 brought a major cyber-pandemic to the world," the company says. An assessment by INTERPOL [...]

2021-02-26T18:09:31-05:00February 25th, 2021|General News|

Cybercriminals Target QuickBooks Databases

The breaches start with two types of phishing attacks to gain access to QuickBooks databases, according to findings by ThreatLocker. In the first, the attackers send a PowerShell command that runs inside the malicious email. In the second, the attackers send a Word document via email; if the recipient opens the attached document, a macro or link within that document downloads a file onto their machine. Once the executable or PowerShell command runs, it retrieves the victim's most recently saved QuickBooks file location, points to the file share or local file, and grabs that file.

2021-02-28T01:58:33-05:00February 24th, 2021|General News|

Hackers auction alleged stolen Cyberpunk 2077, Witcher source code

Threat actors are auctioning the alleged source code for CD Projekt Red games, including Witcher 3, Thronebreaker, and Cyberpunk 2077, that they state were stolen in a ransomware attack. Yesterday, CD Projekt suffered a ransomware attack where the attackers claim to have stolen unencrypted source code for Cyberpunk 2077, Witcher 3, Gwent, and an unreleased version of Witcher 3. As part of the [...]

2021-02-26T18:09:31-05:00February 21st, 2021|General News|

Microsoft, Facebook and PayPal most impersonated brands during phishing attacks

Microsoft, Facebook and PayPal are amongst the most impersonated brands during phishing attacks in 2020, according to a new report from Vade Secure. Its annual Phishers' Favorites report for 2020 reveals that Microsoft has maintained its position as the brand most often found in phishing emails, followed by Facebook and PayPal. During the year of lockdown and remote working, cloud services [...]

2021-02-26T18:09:31-05:00February 16th, 2021|General News|

US Coast Guard orders maritime facilities to report SolarWinds breaches

The U.S. Coast Guard (USCG) has ordered MTSA-regulated facilities and vessels using SolarWinds software for critical functions to report security breaches in case of suspicions of being affected by the SolarWinds supply-chain attack. USCG's order was delivered through a Marine Safety Information Bulletin (MSIB) published on Wednesday on continued awareness regarding the ongoing exploitation of SolarWinds software. "It is critical that [...]

2021-02-26T18:09:30-05:00February 16th, 2021|General News|

This file-sharing app with over a billion downloads has some major security flaws

One of the most popular Android file sharing apps has several vulnerabilities that haven’t been fixed by its developers for over three months, new research has claimed. Security researchers at Trend Micro discovered the shortcomings in the ShareIT app that if exploited, can not only leak a user’s sensitive data, but can also execute arbitrary code on the device. More worryingly, [...]

2021-02-26T18:09:30-05:00February 16th, 2021|General News|
Go to Top