Fri.Aug 25, 2023

article thumbnail

Victims Sue Financial Firms Over MOVEit Data Breaches

Data Breach Today

Fresh Lawsuits Target Prudential, Plus Charles Schwab and Subsidiary TD Ameritrade Two financial services giants hit by the mass attack on MOVEit file-sharing software - Prudential and Schwab - are the latest victims to face lawsuits from affected individuals. The suit filed against Prudential seeks 10 years of prepaid identity theft monitoring services instead of the usual two.

article thumbnail

Kroll Employee SIM-Swapped for Crypto Investor Data

Krebs on Security

Security consulting giant Kroll disclosed today that a SIM-swapping attack against one of its employees led to the theft of user information for multiple cryptocurrency platforms that are relying on Kroll services in their ongoing bankruptcy proceedings. And there are indications that fraudsters may already be exploiting the stolen data in phishing attacks.

Phishing 191
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ISMG Editors: The Shifting Cyber Insurance Landscape

Data Breach Today

Also: Global Privacy Trends; Tornado Cash Founders Charged In the latest weekly update, ISMG editors discuss the shifting dynamics of cyber insurance, why APAC is approaching privacy regulations around emerging technologies, and how U.S. authorities charged the co-founders of cryptocurrency mixer Tornado Cash with money laundering.

Insurance 246
article thumbnail

Whiffy Recon malware triangulates the position of infected systems via Wi-Fi

Security Affairs

Experts observed the SmokeLoader malware delivering a new Wi-Fi scanning malware strain dubbed Whiffy Recon. Secureworks Counter Threat Unit (CTU) researchers observed the Smoke Loader botnet dropping a new Wi-Fi scanning malware named Whiffy Recon. The malicious code triangulates the positions of the infected systems using nearby Wi-Fi access points as a data point for Google’s geolocation API. “The scan results are mapped to a JSON structure (see Figure 5) that is sent to the Googl

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Spain to Launch Europe's First AI Regulatory Agency

Data Breach Today

Madrid Touts Strategy for 'Inclusive, Sustainable, Citizen-Focused' AI Spain is set to launch Europe's first-ever artificial intelligence regulatory agency as the trading bloc finalizes legislation meant to mitigate risks and ban AI applications considered too risky. Madrid said its goal is to foster AI that is "inclusive, sustainable, and centered on citizens.

More Trending

article thumbnail

Chinese State Hackers 'Flax Typhoon' Targeting Taiwan

Data Breach Today

Likely Espionage Campaign Focuses on Persistence and Credential Dumping Chinese state hackers are targeting Taiwanese organizations, likely for espionage, in a difficult-to-detect campaign that relies on Windows utilities. Microsoft dubbed the threat actor Flax Typhoon in a Thursday blog post and said the hackers seek persistence, lateral movement and credential access.

Access 241
article thumbnail

'Whiffy Recon' Malware Transmits Device Location Every 60 Seconds

Dark Reading

Deployed by the infamous SmokeLoader botnet, the location-tracking malware could be used for a host of follow-on cyberattacks or even physical targeting.

91
article thumbnail

UnitedHealthcare Fined $80K for 6-Month Records Access Delay

Data Breach Today

HHS Settlement Is Agency's 45th HIPAA 'Right of Access' Enforcement Action Four years ago, federal regulators started sending a message to healthcare entities about the need to give patients timely access to their health records. Insurer UnitedHealthcare, the 45th firm penalized for potential "right to access" violations, agreed to an $80,000 fine and corrective action.

Access 240
article thumbnail

China Unleashes Flax Typhoon APT to Live Off the Land, Microsoft Warns

Dark Reading

The cyber-espionage group has created a stealthy, hard-to-mitigate network of persistent access across a range of organizations, but the endgame is unclear.

Access 89
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Lazarus Group Debuts Tiny Trojan for Espionage Attacks

Data Breach Today

The Malware Is Based on an Unusual Development Framework Researchers spotted North Korean state hackers deploying a more compact remote access Trojan through a flaw in IT service management software in a campaign affecting European and U.S. critical infrastructure. Cisco Talos said the Lazarus Group in May started to deploy a Trojan it named QuiteRAT.

Access 236
article thumbnail

Luna Grabber Malware Targets Roblox Gaming Devs

Dark Reading

Roblox gaming developers are lured in by a package that claims to create useful scripts to interact with the Roblox website, for example by “promot(ing) users, shout events, and so on, or to create Discord utiltiies (sic) to manage their community.

82
article thumbnail

Feds Seek Innovative Tech Ideas for Health Sector Security

Data Breach Today

Agency Requests Proposals for Applying National Security to Civilian Systems A new healthcare-focused research agency is seeking proposals for innovative cybersecurity technologies that can apply a national security approach to protecting this highly targeted civilian industry. Today's off-the-shelf software is falling short, the agency said.

Security 230
article thumbnail

Your KnowBe4 Fresh Content Updates from August 2023

KnowBe4

Check out the 21 new pieces of training content added in August, alongside the always fresh content update highlights, events and new features.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hacking Food Labeling Laws

Schneier on Security

This article talks about new Mexican laws about food labeling, and the lengths to which food manufacturers are going to ensure that they are not effective. There are the typical high-pressure lobbying tactics and lawsuits. But there’s also examples of companies hacking the laws: Companies like Coca-Cola and Kraft Heinz have begun designing their products so that their packages don’t have a true front or back, but rather two nearly identical labels—except for the fact that only

article thumbnail

How-to: On-Device Content Filtering with Jamf Safe Internet

Jamf

On-Device Content Filtering advances cybersecurity enormously, and helps to secure endpoints that have been a problem specific to schools: students using a VPN. Here’s how you can configure Jamf Safe Internet to take full advantage of it.

article thumbnail

Vendors Training AI With Customer Data is an Enterprise Risk

Dark Reading

While Zoom has scrapped plans to harvest customer content for use in its AI and ML models, the incident should raise concerns for enterprises and consumers a like.

Risk 72
article thumbnail

Use KnowBe4’s New Callback Phishing Feature to Boost Your Organization's Security Awareness

KnowBe4

Use the new Callback Phishing feature in your KnowBe4 console to run a simulated callback phishing campaign to see if your employees would fall for this trick.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Is Bias in AI Algorithms a Threat to Cloud Security?

Dark Reading

Using AI for threat detection and response is essential — but it can't replace human intelligence, expertise, and intuition.

Cloud 80
article thumbnail

Press Release – AIIM releases call for session proposals for 2024 conference

IG Guru

The Association for Intelligent Information Management (AIIM) released the call for session proposals for the 2024 AIIM Conference. The event will be held at the Hyatt Regency in San Antonio, Texas, April 3-5. AIIM invites anyone to submit a session proposal, including non-members. If you have knowledge, a case study, or experience to share with […] The post Press Release – AIIM releases call for session proposals for 2024 conference first appeared on IG GURU.

article thumbnail

NIST Publishes First Draft Standards for Post-Quantum Cryptography

Dark Reading

Publication of the first draft PQC standards opens a 90-day period for public comment and paves the way for interoperability testing.

78
article thumbnail

Understanding HIPAA: A Guide to Avoiding Common Violations

Armstrong Archives

Healthcare has become more interconnected than ever, making it important to protect patients’ sensitive information. The Health Insurance Portability and Accountability Act (HIPAA) ensures individuals’ health data protection and privacy. The HIPAA was introduced in 1996, and its main goal is to ensure healthcare providers keep their patient’s information private while still using it to provide exceptional medical services.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Joint Statement Published on Data Scraping and the Protection of Privacy

Hunton Privacy

On August 24, 2023, 12 data protection authorities published a joint statement calling for the protection of personal data from unlawful data scraping. The statement was issued by the authorities of Argentina, Australia, Canada, Colombia, Hong Kong, Jersey, Mexico, Morocco, New Zealand, Norway, Switzerland and the UK. The joint statement reminds organizations that personal data that is publicly accessible is still subject to data protection and privacy laws in most jurisdictions, and highlights

Privacy 52
article thumbnail

e-Invoicing mandates and updates: Poland

OpenText Information Management

August 2023 Polish President signs legal act mandating the KSeF e-Invoicing system On August 4, 2023, the President of the Republic of Poland endorsed an Act that introduces the obligation to issue invoices through the National e-Invoice System (KSeF). With the Act’s approval awaiting publication in the Journal of Laws, the final stage of the … The post e-Invoicing mandates and updates: Poland appeared first on OpenText Blogs.

52
article thumbnail

Managing your cloud ecosystems: Maintaining workload continuity during worker node upgrades

IBM Big Data Hub

Planning and managing your cloud ecosystem and environments is critical for reducing production downtime and maintaining a functioning workload. In the “Managing your cloud ecosystems” blog series, we cover different strategies for ensuring that your setup functions smoothly with minimal downtime. To start things off, the first topic in this blog series is ensuring workload continuity during worker node upgrades.

Cloud 53
article thumbnail

Revolutionizing Healthcare: RFID's Vital Role in the Sterilization of Medical Devices

HID Global

HID’s RFID technology revolutionizes the way medical devices are managed, monitored and protected in the pursuit of ensuring patient safety and well-being.

52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How to Create a Data Strategy Roadmap

Docuware

Every day your company adds new data to the already substantial amount of existing data stored in your ERP, CRM and other IT systems is already enormous. Data doesn’t provide deep insights on its own, but when it’s used correctly it can uncover actionable knowledge that can improve processes, assess financial fitness, enhance customer satisfaction and provide other metrics that predict business success or warn of potential threats.

IT 26
article thumbnail

Friday Squid Blogging: China’s Squid Fishing Ban Ineffective

Schneier on Security

China imposed a “pilot program banning fishing in parts of the south-west Atlantic Ocean from July to October, and parts of the eastern Pacific Ocean from September to December.” However, the conservation group Oceana analyzed the data and figured out that the Chinese weren’t fishing in those areas in those months, anyway. < blockquote>In the south-west Atlantic moratorium area, Oceana found there had been no fishing conducted by Chinese fleets in the same time period in 20

article thumbnail

Donald Trump's Mug Shot Matters in a World of Fakes

WIRED Threat Level

The first booking photo of a US president stands out among a sea of photoshops and AI-generated images online.

Privacy 87