article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. Big Data is unstructured.

article thumbnail

The Big Risks In Big Data For Fintech Companies

SecureBlitz

In this post, I will show you the big risks in Big Data for Fintech companies. These innovative companies have moved the once legacy world of banking into new […] The post The Big Risks In Big Data For Fintech Companies appeared first on SecureBlitz Cybersecurity.

Big data 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese threat actors extract big data and sell it on the dark web

SC Magazine

Among the incidents data stolen by Chinese hackers involved a Twitter database. Researchers on Monday reported that cybercriminals are taking advantage of China’s push to become a leader in big data by extracting legitimate big data sources and selling the stolen data on the Chinese-language dark web.

Big data 100
article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

Justice Department this week indicted seven Chinese nationals for a decade-long hacking spree that targeted more than 100 high-tech and online gaming companies. The government alleges the men used malware-laced phishing emails and “supply chain” attacks to steal data from companies and their customers. Image: FBI.

Antivirus 363
article thumbnail

Massive AT&T Hack Exposed ‘Nearly All’ Customer Phone Numbers

Tech Republic Security

Businesses and individuals with AT&T accounts from May 1, 2022 to October 31, 2022 and on January 2, 2023 will be notified if their data was affected.

Hacking 198
article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

API hacking escapades. Over the past couple of years, good-guy researchers and malicious hackers alike have steadily scaled up their hacking activities to flush them out. Over the past couple of years, good-guy researchers and malicious hackers alike have steadily scaled up their hacking activities to flush them out.

Big data 240
article thumbnail

Critical flaw in Apache Parquet’s Java Library allows remote code execution

Security Affairs

This impacts big-data frameworks (e.g., Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs hacking,Parquet’s Java Library) The flaw affects systems importing Parquet files, especially from untrusted sources, and can be exploited by attackers tampering with the files.