Fri.Jan 19, 2024

article thumbnail

35.5 Million Customers Affected by Apparel Maker VF's Breach

Data Breach Today

Owner of Such Brands as North Face and Vans Says Business Mostly Back to Normal Skateboarding shoe and outdoor apparel maker VF Corp. said data pertaining to 35.5 million customers appears to have been stolen in a data breach the company detected and disclosed last month. The breach disrupted e-commerce order fulfillment as well as inventory replenishment at retail stores.

Retail 285
article thumbnail

Canadian Man Stuck in Triangle of E-Commerce Fraud

Krebs on Security

A Canadian man who says he's been falsely charged with orchestrating a complex e-commerce scam is seeking to clear his name.

241
241
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

XDR and the Benefits of Managed Services

Data Breach Today

Extended Detection and Response (XDR) has evolved significantly over the past few years, becoming more critical than ever for organizations in need of enhanced capabilities. But so, too, have the accompanying managed services evolved. Port53 Technologies President Omar Zarabi explains.

282
282
article thumbnail

Ransomware attacks break records in 2023: the number of victims rose by 128%

Security Affairs

Ransomware groups claimed that they successfully targeted 4191 victims in 2023, Cybernews researchers report. According to the Ransomlooker tool, the number of ransomware attack victims increased by 128.17% compared to the previous year (2022), with 1837 additional incidents. Based on Ransomlooker, a free Cybernews tool for monitoring the dark web and other hidden areas of the internet, more ransomware attacks occurred in spring and summer, with 1253 and 1275 victims, compared to winter and autu

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

French CNIL Imposes Fine of 10 Million Euros on Yahoo

Data Breach Today

Company Fined for Dropping Advertising Cookies Without Consent The French data regulator imposed a fine of 10 million euros on Yahoo after determining that the company's advertising cookie policy had violated the country's privacy regulations. Yahoo deposited more than 20 tracking cookies without giving consumers a chance to withdraw consent.

Privacy 279

More Trending

article thumbnail

Kyivstar Hack to Cost the Ukrainian Telco Giant $100 Million

Data Breach Today

Kyivstar Parent Veon Attributes Losses to Customer Retention Measures A December cyberattack on Ukraine's top telecom operator, which authorities in Kyiv attribute to the Russian military, will cost the parent company nearly $100 million. Ukraine in mid-December accused the Russian General Staff Main Intelligence Directorate of perpetuating the incident.

Military 279
article thumbnail

The Quantum Computing Cryptopocalypse – I’ll Know It When I See It

Security Affairs

Can quantum computing break cryptography? Can it do it within a person’s lifetime? Will it be a cryptopocalypse, as some experts suggest? Can quantum computing break cryptography? Sure, it can. Can it do it within a person’s lifetime? Yes. In fact, it will likely achieve this sometime within your career. Will it be a cryptopocalypse , as some experts suggest?

IT 120
article thumbnail

Finnish Hacker Denies Role In Psychotherapy Clinic Attack

Data Breach Today

Aleksanteri Kivimäki Disputed In Court Evidence Collected by Police A Finnish man accused of hacking and leaking mental health records downplayed his tech skills and said during cross-examination in court he had no part in the data breach. Kivimäki said he's been engaged with computers since aged three but described his programming skills as "pretty insignificant.

article thumbnail

China-linked APT UNC3886 exploits VMware zero-day since 2021

Security Affairs

China-linked group UNC3886 has been exploiting vCenter Server zero-day vulnerability CVE-2023-34048 since at least late 2021. Mandiant researchers reported that China-linked APT group UNC3886 has been exploiting vCenter Server zero-day vulnerability CVE-2023-34048 since at least late 2021. vCenter Server is a critical component in VMware virtualization and cloud computing software suite.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

71 Million Unique Emails Found in Naz.api Cybercrime Dump

Data Breach Today

Information-Stealing Malware Continues to Amass Fresh Credentials, Experts Warn The appearance of Naz.api - a massive collection of online credentials harvested by information-stealing malware that contains 71 million unique email addresses - illustrates the scale at which such data is being collected, shared and sold, security experts warn.

Security 274
article thumbnail

Kansas State University suffered a serious cybersecurity incident

Security Affairs

Kansas State University (K-State) suffered a cybersecurity incident that has disrupted part of its network and services. Kansas State University (K-State) suffered a cybersecurity incident that impacted a portion of its network and services. On January, 16, 2023, the University K-State announced it was experiencing a disruption to certain network systems, including VPN, K-State Today emails, and videos on Canvas, or Mediasite.

article thumbnail

Microsoft: Russian State Hackers Obtained Access to Leadership Emails

Data Breach Today

Computing Giant Says Hackers Did Not Access Customer Data or Production Systems Russian state hackers obtained access to the inboxes of senior Microsoft executives for at least six weeks, the computing giant disclosed late Friday afternoon. "There is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems.

Access 270
article thumbnail

Facebook Work-From-Home “Job” Posting Scam Goes the Extra Mile to Trick Victims

KnowBe4

A new job posting scam found by IT security company Qualysys is focused on capturing victim’s identity details, accessing victim’s Facebook accounts, and committing fraud. In this new scam, legitimate Facebook advertising is used to post fake work-from-home job ads from several companies. As with most of these scams, victims are directed to a third-party messaging app and are asked to sign a realistic-looking employment contract.

Access 109
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Groups Urge FTC to Scrutinize Google Location Data Practices

Data Breach Today

Complaint Alleges Tech Giant Is Breaking Privacy Promises, Putting Patients at Risk Two tech advocacy groups are pushing the Federal Trade Commission to investigate Google, alleging the company has reneged on a promise it made after the Supreme Court's 2022 overturn of Roe v. Wade to promptly delete location data about users' visits to sensitive places, such as abortion clinics.

Privacy 263
article thumbnail

U.S. CISA warns of actively exploited Ivanti EPMM flaw CVE-2023-35082

Security Affairs

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM flaw CVE-2023-35082 to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Ivanti EPMM flaw CVE-2023-35082 (CVSS score: 9.8) vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. At the end of July, Ivanti disclosed a security vulnerability impacting Endpoint Manager Mobile (EPMM), tracked as CVE-2023-35078 (CVSS score: 7.8), that was e

article thumbnail

ISMG Editors: Why Are Crypto Phishing Attacks Surging?

Data Breach Today

Legal Moves: Crypto Theft Lawsuit; Hospital Sues LockBit Gang In the latest weekly update, ISMG editors discussed why crypto-seeking drainer scam-as-a-service operations are thriving, a novel legal move that recovered a hospital's stolen data, and a ground-breaking case involving bitcoin that could streamline recovery for victims.

Phishing 261
article thumbnail

Zelle Is Using My Name and Voice without My Consent

Schneier on Security

Okay, so this is weird. Zelle has been using my name, and my voice, in audio podcast ads—without my permission. At least, I think it is without my permission. It’s possible that I gave some sort of blanket permission when speaking at an event. It’s not likely, but it is possible. I wrote to Zelle about it. Or, at least, I wrote to a company called Early Warning that owns Zelle about it.

IT 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Popular GPUs Used in AI Systems Vulnerable to Memory Leak

Data Breach Today

LeftoverLocals Affects Apple, AMD and Qualcomm Devices Researchers uncovered a critical vulnerability in graphic processing units of popular devices that could allow attackers to access data from large language models. They dubbed the vulnerability LeftoverLocals and said it affects the GPU frameworks of Apple, AMD and Qualcomm devices.

Access 261
article thumbnail

How to build a successful disaster recovery strategy

IBM Big Data Hub

Whether your industry faces challenges from geopolitical strife, fallout from a global pandemic or rising aggression in the cybersecurity space, the threat vector for modern enterprises is undeniably powerful. Disaster recovery strategies provide the framework for team members to get a business back up and running after an unplanned event. Worldwide, the popularity of disaster recovery strategies is understandably increasing.

Risk 97
article thumbnail

New Jersey Becomes 14th State to Enact a Comprehensive State Privacy Law

Hunton Privacy

On January 16, 2024, Governor Phil Murphy signed into law Bill 332 , making New Jersey the 14 th state with a comprehensive state privacy law. The law is set to take effect in January 2025. Applicability The law will apply to controllers that conduct business in New Jersey or produce products or services that are targeted to New Jersey residents, and that during a calendar year meet any of the following criteria: (1) control or process the personal data of at least 100,000 New Jersey consumers (

Privacy 97
article thumbnail

Speaking to the CIA’s Creative Writing Group

Schneier on Security

This is a fascinating story. Last spring, a friend of a friend visited my office and invited me to Langley to speak to Invisible Ink, the CIA’s creative writing group. I asked Vivian (not her real name) what she wanted me to talk about. She said that the topic of the talk was entirely up to me. I asked what level the writers in the group were.

96
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Exploring the hyper-competitive future of customer experience

IBM Big Data Hub

The future of customer experience (CX) is more : more data, more technology, more surprising and delighting. It’s also more pressure to retain those customers, whether those interactions happen online or in-store. As customer expectations and habits change, so too must the CX that organizations provide. Study after study shows that customer loyalty is decreasing, as customers demand more from the providers of goods and services and show their displeasure by switching brands.

article thumbnail

How to Opt Out of Comcast’s Xfinity Storing Your Sensitive Data

WIRED Threat Level

One of America’s largest internet providers may collect data about your political beliefs, race, and sexual orientation to serve personalized ads.

article thumbnail

FTC Bans Data Broker from Selling Precise Consumer Location Data

Hunton Privacy

On January 18, 2024, the Federal Trade Commission announced a proposed order against geolocation data broker InMarket Media (“InMarket”), barring the company from selling or licensing precise location data. According to the FTC’s charges, InMarket failed to obtain informed consent from users of applications developed by the company and its third-party partners.

article thumbnail

Copilot for Microsoft 365 – What You Need to Know

Daymark

The ever-increasing impact of AI is everywhere you look. We at Daymark are excited by the prospect of leveraging AI to help us and our clients optimize their businesses. One technology we are particularly enthusiastic about is Copilot for Microsoft 365. We are very excited to announce that Copilot for Microsoft 365 is now available to organizations of all sizes.

IT 67
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Mainframe Modernization: Should I Stay, or Should I Go?

OpenText Information Management

Mainframes still matter today. According to IBM, 45 of the world’s top 50 banks run on IBM zSystems. Furthermore, mainframes are used by 71% of Fortune 500 companies – handling 68% of the world’s production IT workloads and processing 90% of all credit card transactions. While these high-performance computers can process up to 1 trillion … The post Mainframe Modernization: Should I Stay, or Should I Go?

article thumbnail

Takeaways from “Retail’s Big Show” at NRF

Jamf

Hear what Jamf learned at the NRF 2024 Retail’s Big Show , including what’s next for retail and how technology will play a major part in what’s to come.

Retail 64
article thumbnail

Why now is the time for AI governance

Collibra

AI is here and its potential is enormous. But data professionals know that managing an AI roadmap can be challenging, especially if your organization lacks trusted data. Without trusted data, you can’t build trusted AI. In our era of AI-driven transformation, forward-thinking organizations integrating AI into the roadmap know that AI governance can make all the difference.