Mon.Jun 21, 2021

article thumbnail

First American Financial's SEC Breach Settlement: $488,000

Data Breach Today

SEC: Executives Left in Dark About Vulnerability in File-Sharing System Title insurance company First American Financial Corp. will pay the SEC a $488,000 penalty as a result of a data breach revealed two years ago. Information security staff members were aware of the vulnerability in the company's EaglePro document-sharing system for five months but failed to fix it, the SEC reports.

Insurance 345
article thumbnail

How Cyber Safe is Your Drinking Water Supply?

Krebs on Security

Amid multiple recent reports of hackers breaking into and tampering with drinking water treatment systems comes a new industry survey with some sobering findings: A majority of the 52,000 separate drinking water systems in the United States still haven’t inventoried some or any of their information technology systems — a basic first step in protecting networks from cyberattacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

N. Korean Attackers Suspected in S. Korean Nuclear Agency Hack

Data Breach Today

Attackers Exploited VPN Flaw at Nuclear Agency The Korea Atomic Energy Research Institute, a South Korean organization, confirms it was recently hacked, apparently by a North Korean group that exploited a VPN vulnerability.

IT 337
article thumbnail

Ragnar Locker ransomware leaked data stolen from ADATA chipmaker

Security Affairs

The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more than 700GB of stolen data. The Ragnar Locker ransomware gang has published on its leak sites more than 700GB of data stolen from Taiwanese memory and storage chip maker ADATA. The group published the link to 13 password-protected archives, allegedly containing sensitive data stolen from the chipmaker. “!

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Attack Compromises Fertility Patients' Records

Data Breach Today

Clinic Says It Regained Control of Network, Data Reproductive Biology Associates, an Atlanta-based clinic operator, and its affiliate, MyEggBank North America, report their systems were hit by a ransomware attack in April but say they regained control of their network and data after contacting the attackers.

More Trending

article thumbnail

The Future of Machine Learning and Cybersecurity

Schneier on Security

The Center for Security and Emerging Technology has a new report: “ Machine Learning and Cybersecurity: Hype and Reality.” Here’s the bottom line: The report offers four conclusions: Machine learning can help defenders more accurately detect and triage potential attacks. However, in many cases these technologies are elaborations on long-standing methods — not fundamentally new approaches — that bring new attack surfaces of their own.

article thumbnail

Threat actors in January attempted to poison the water at a US facility

Security Affairs

Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the importance of cybersecurity for water and wastewater utilities. The news that a threat actor in January attempted to poison the water at a facility in the U.S. made the headlines and highlights the importance of protecting critical infrastructure from hackers.

Passwords 103
article thumbnail

Wegmans Exposes Customer Data in Misconfigured Databases

Threatpost

Cleanup in aisle "Oops": The supermarket chain said that it misconfigured two cloud databases, exposing customer data to public scrutiny.

Cleanup 111
article thumbnail

China: Navigating China Episode 19: China’s new Data Security Law: what multinational businesses need to know

DLA Piper Privacy Matters

Authors: Carolyn Bigg , Venus Cheung, Fangfang Song. China’s Data Security Law (“ DSL ”) has come into force and takes effect on 1 September 2021. The speed of its passing has left multinational businesses scrabbling to understand the key compliance obligations. While many of the practical compliance steps will be detailed in measures and guidelines to be published over the coming weeks and months, here’s what we already know: 1.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bugs in NVIDIA’s Jetson Chipset Opens Door to DoS Attacks, Data Theft

Threatpost

Chipmaker patches nine high-severity bugs in its Jetson SoC framework tied to the way it handles low-level cryptographic algorithms.

IT 109
article thumbnail

Software-Container Supply Chain Sees Spike in Attacks

Dark Reading

Attackers target companies' container supply chain, driving a sixfold increase in a year, aiming to steal processing time for cryptomining and compromise cloud infrastructure.

Cloud 93
article thumbnail

Agent Tesla RAT Returns in COVID-19 Vax Phish

Threatpost

An unsophisticated campaign shows that the pandemic still has long legs when it comes to being social-engineering bait.

article thumbnail

Did Companies Fail to Disclose Being Affected by SolarWinds Breach?

Dark Reading

The SEC has sent out letters to some investment firms and publicly listed companies seeking information, Reuters says.

87
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Embryology Data Breach Follows Fertility Clinic Ransomware Hit

Threatpost

Approximately 38,000 of RBA's customers had their embryology data stolen by a ransomware gang.

article thumbnail

Baltimore County Public Schools' Ransomware Recovery Tops $8M

Dark Reading

The school district has spent seven months and a reported $8.1 million recovering from the November attack.

article thumbnail

iPhone Wi-Fi Crushed by Weird Network

Threatpost

… until you reset network settings and stop connecting to a weirdly named network, that is. FUD is spreading. iOS Wi-Fi demolition is not.

article thumbnail

Using scenario planning to help supply chains bounce back

CGI

Using scenario planning to help supply chains bounce back. Before drawing conclusions about the resilience of manufacturing supply chains, we must first establish how they will bounce back from over a year of intense pressure and change. pooja.cs@cgi.com. Mon, 06/21/2021 - 01:46.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Data Leaked in Fertility Clinic Ransomware Attack

Dark Reading

Reproductive Biology Associates says the data of 38,000 patients may have been compromised in the April cyberattack.

article thumbnail

The Future of Remote Work (2021)

Record Nations

As June 2021 comes to a close, the future of remote work still seems up in the air. While the United States seems to be keeping Covid-19 at bay, other countries are still struggling to get the virus under control. States are beginning to re-open, and employees are starting to return to the office. At […]. The post The Future of Remote Work (2021) appeared first on Record Nations.

55
article thumbnail

Best Practices for Accounts Payable: An Insider’s View

Docuware

DocuWarians is a blog feature that introduces you to the people behind the product. In this post, Gigi Kelso, Manager of Collections and Accounts Receivable tells us about her experience working with and without digital document management.

48
article thumbnail

Are We Ever Going to Run Out of Digital Storage Space? via Gizmodo

IG Guru

Check out the article here. The post Are We Ever Going to Run Out of Digital Storage Space? via Gizmodo appeared first on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Are Ransomware Attacks the New Pandemic?

Dark Reading

Ransomware has been a problem for decades, so why is government just now beginning to address it?

article thumbnail

MI5 seized Boris Johnson’s phone over security risk fears

Security Affairs

The British intelligence agency MI5 seized Boris Johnson ‘s phone over concerns related to the availability of his number online for the last 15 years. The British Security Service, also known as MI5, has seized the mobile devices used by PM Boris Johnson over concerns that were raised after the discovery of the availability of its number online for the last 15 years.

Risk 134
article thumbnail

EDPB Releases Final Recommendations on Supplementary Measures for International Transfers

Hunton Privacy

On June 21, 2021, following a public consultation, the European Data Protection Board (“EDPB”) published the final version of its recommendations on supplementary measures in the context of international transfer safeguards, such as Standard Contractual Clauses (“SCCs”) (the “Recommendations”). The EDPB released its first draft of the Recommendations in November 2020, following the Schrems II judgement.

GDPR 144
article thumbnail

Register for RMS Section Meeting! July 12th, 2pm EST

The Schedule

Please Join us! We have an informative and lively session planned! Register here. DESCRIPTION Agenda: 1. RMS Committee Annual Overview (Jessika Drmacich, Chair; Krista Oldham, Vice-Chair) 2. Panel Discussion: “Presidential Records and Presidential Transitions: The View from NARA” Presidential Records and Presidential Transitions: The View from NARA Two National Archives leaders who work closely with the White House will be joining us to talk about how the Presidential Records Act rea

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Federal Government Interest in Cyber Continues: Congressional Hearings on the Colonial Pipeline Cyberattack

Data Matters

On May 7, 2021, Colonial Pipeline experienced a ransomware cyberattack on its corporate network. This attack, attributed to the DarkSide hacking group, led the company to temporarily halt the operation of its pipeline network—causing fuel shortages throughout the East Coast. Although highly publicized, the Colonial Pipeline cyberattack is not unique.

article thumbnail

Lawmakers Unveil Cybersecurity Legislation

Data Breach Today

Bills Address Criminal Penalties, School District Protection and More Republican and Democratic lawmakers have recently introduced several cybersecurity-related bills seeking to address issues ranging from imposing tougher penalties for cybercriminals to improving protection of school districts.