Mon.Jan 22, 2024

article thumbnail

LoanDepot Ransomware Attack: 16.6 Million Customers Affected

Data Breach Today

Customers 'Sensitive Personal Information' Stolen, Large Mortgage Lender Reports Non-bank mortgage lending giant LoanDepot says hackers stole "sensitive personal information" pertaining to 16.6 million customers when they breached its systems earlier this month as part of a ransomware attack. The company said it will directly notify all affected customers.

article thumbnail

Cops Used DNA to Predict a Suspect’s Face—and Tried to Run Facial Recognition on It

WIRED Threat Level

Leaked records reveal what appears to be the first known instance of a police department attempting to use facial recognition on a face generated from crime-scene DNA. It likely won’t be the last.

IT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Hit on Tietoevry Causes IT Outages Across Sweden

Data Breach Today

Finnish IT Services Previews Days or Weeks of Disruption, Ties Attack to Akira An Akira ransomware attack that hit a data center run by Finnish IT software and services firm Tietoevry has led to widespread outages across Sweden. Healthcare, local governments, retail outlets and the country's largest cinema chain are among the organizations experiencing ongoing disruptions.

article thumbnail

Mother of all breaches – a historic data leak reveals 26 billion records: check what’s exposed

Security Affairs

Cybersecurity researcher Bob Dyachenko and CyberNews researchers discovered the largest data leak ever discovered. The supermassive leak contains data from numerous previous breaches, comprising an astounding 12 terabytes of information, spanning over a mind-boggling 26 billion records. The leak is almost certainly the largest ever discovered. There are data leaks, and then there’s this.

Phishing 133
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

France's OFAC to Tackle Cyberthreats Ahead of Olympics

Data Breach Today

French Police Office for Cybercrime Has a Staff of 180 A dedicated cybercrime unit under the French National Police is set to scale up operations ahead of the upcoming Olympics as authorities warn that cyberattacks are among the greatest threats to the event. Authorities on Friday unveiled the unit's new headquarters in Parisian suburb Nanterre.

291
291

More Trending

article thumbnail

Microsoft's Latest Hack Sparks Major Security Concerns

Data Breach Today

Experts Warn Tech Giant Faces Potential for Future Cyberattacks After Email Hacking Security experts told ISMG they were concerned Microsoft could suffer future cyberattacks and threats to its customers after a Russian state hacking group managed to evade detection for several weeks while targeting accounts associated with the company’s top executives.

Security 285
article thumbnail

Apple fixed actively exploited zero-day CVE-2024-23222

Security Affairs

Apple addressed the first zero-day vulnerability that impacts iPhones, Macs, and Apple TVs. The issue is actively exploited in the wild. Apple released security updates to address a zero-day vulnerability, tracked as CVE-2024-23222, that impacts iPhones, Macs, and Apple TVs. This is the first actively exploited zero-day vulnerability fixed by the company this year.

Security 125
article thumbnail

On Point: Offensive Security for Mobile Network Operators

Data Breach Today

Build Resiliency by Simulating Real-World Attacks and Gaining Insight Into Threats As cyberthreats evolve, mobile network operators need offensive security to maintain resilience. Traditional security, such as firewalls and encryption, is not sufficient on its own. Offensive security is proactive; it mimics the strategies of real attackers to stay ahead of potential threats.

Security 283
article thumbnail

Cybercriminals leaked massive volumes of stolen PII data from Thailand in Dark Web

Security Affairs

Resecurity researchers warn of massive leak of stolen Thai personally identifiable information (PII) on the dark web by cybercriminals. Resecurity has detected a noticeable increase in data leaks from consumer-focused platforms in Thailand, confirming that threat actors are actively targeting the personal data of citizens now at the beginning of 2024.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Prosecutors Add to Evidence Against Alleged Vastaamo Hacker

Data Breach Today

Extortion Money Found in Bank Account of Aleksanteri Kivimaki, Prosecutors Say Prosecutors trying the case of a Finnish national accused of attempting to extort tens of thousands of psychotherapy patients and of later posting therapy notes online said Monday that they have traced the cryptocurrency wallet used by the blackmailer to the accused man.

281
281
article thumbnail

Facebook Phishing Scams Target Concerned Friends and Family

KnowBe4

BleepingComputer describes a phishing scam that’s been running rampant on Facebook for the past several months, in which threat actors use hacked accounts to post links to phony articles implying that someone has been killed in an accident.

Phishing 123
article thumbnail

Report: Hackers Scammed $7.5M From HHS Grant Payment System

Data Breach Today

Money Meant for Poor Communities Stolen as Authorities Issued Phishing Scam Alerts Hackers have reportedly stolen about $7.5 million from a Department of Health and Human Services grant payment system in a series of cyberattacks last year. The news comes in the midst of HHS and other authorities warnings about rising threats involving social engineering and payment scams.

Phishing 281
article thumbnail

“My Slice”, an Italian adaptive phishing campaign

Security Affairs

Adaptive phishing campaigns are emerging as an increasingly sophisticated threat in the cybersecurity landscape. The phenomenon This phenomenon represents an evolution of traditional phishing tactics, as attackers seek to overcome defenses using more personalized and targeted approaches. In an adaptive phishing campaign, attackers gather specific information about victims through various sources, such as social media, public websites, and previous data breaches.

Phishing 118
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to handle a ransomware attack 

IBM Big Data Hub

It’s the news no organization wants to hear―you’ve been the victim of a ransomware attack, and now you’re wondering what to do next. The first thing to keep in mind is you’re not alone. Over 17 percent of all cyberattacks involve ransomware —a type of malware that keeps a victim’s data or device locked unless the victim pays the hacker a ransom.

article thumbnail

Apple iOS 17.3: How to Turn on iPhone's New Stolen Device Protection

WIRED Threat Level

Apple’s iOS 17.3 introduces Stolen Device Protection to iPhones, which could stop phone thieves from taking over your accounts. Here’s how to enable it right now.

IT 118
article thumbnail

The dynamic forces behind data center re-transformation 

IBM Big Data Hub

Data centers are undergoing significant evolution. Initially, they were massive, centralized facilities that were complex, costly and difficult to replicate or restore. Now, advancements in hardware and software as well as increased focus on sustainability are driving rapid transformation. Catalysts and conundrums A dramatic shift in development and operations is making data centers more agile and cost-effective.

Cloud 109
article thumbnail

Russian State-Sponsored Threat Actor Targets High Profile Individuals in Phishing Campaign

KnowBe4

The Russian state-sponsored threat actor “COLDRIVER” is launching phishing campaigns against “high profile individuals in NGOs, former intelligence and military officers, and NATO governments,” according to researchers at Google’s Threat Analysis Group (TAG).

Phishing 107
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

VulnRecap 1/22/24 – Watch Chrome, Ivanti, Citrix Issues

eSecurity Planet

This week’s vulnerability news include GitHub credential access, a new Chrome fix, and hidden malware from pirated applications hosted on Chinese websites. Citrix and Ivanti are seeing more problems, too, as more vulnerabilities have cropped up in Netscaler and Endpoint Manager Mobile. Make sure your security teams are regularly checking vendors’ software and hardware updates for any patches, and keep a particular eye on networking equipment.

article thumbnail

AI Does Not Scare Me, But It Will Make The Problem Of Social Engineering Much Worse

KnowBe4

I am not scared of AI. What I mean is that I do not think AI is going to kill humanity Terminator-style. I think AI is going to be responsible for more cybercrime and more realistic phishing messages, but it is already pretty bad. Social engineering, without AI, is already involved in 70% - 90% of successful cyber attacks.

IT 98
article thumbnail

AI Bots on X (Twitter)

Schneier on Security

You can find them by searching for OpenAI chatbot warning messages, like: “I’m sorry, I cannot provide a response as it goes against OpenAI’s use case policy.” I hadn’t thought about this before: identifying bots by searching for distinctive bot phrases.

IT 95
article thumbnail

GDPR compliance checklist

IBM Big Data Hub

The General Data Protection Regulation (GDPR) is a European Union (EU) law that governs how organizations collect and use personal data. Any company operating in the EU or handling EU residents’ data must adhere to GDPR requirements. However, GDPR compliance is not necessarily a straightforward matter. The law outlines a set of data privacy rights for users and a series of principles for the processing of personal data.

GDPR 88
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The best of times, the worst of times for public libraries

CILIP

The best of times, the worst of times for public libraries Isobel Hunter, CEO of Libraries Connected, discusses how the sector is demonstrating its best innovation while facing its worst financial crisis. ISOBEL Hunter became the first Chief Executive of Libraries Connected in 2018. As a reincarnation of the Association of Chief Librarians, one of Libraries Connected’s achievements was to use professional staff as well as volunteer members.

article thumbnail

EU Reaches Political Agreement on Cyber Resilience Act for Digital and Connected Products

Data Matters

On 30 November 2023, the EU reached political agreement on the Cyber Resilience Act (“ CRA ”), the first legislation globally to regulate cybersecurity for digital and connected products that are designed, developed, produced and made available on the EU market. The CRA was originally proposed by the European Commission in September 2022. Alongside the recently adopted Data Act , Digital Operational Resilience Act (“ DORA ”), Critical Entities Resilience Act (“ CER ”), Network and Information Sy

article thumbnail

Copyright: The demise of ‘skill, labour and effort’?

CILIP

Copyright: The demise of ‘skill, labour and effort’? Is a photograph or digital image of a 2D artwork that is itself out of copyright, protected by copyright? This is a topic of heated debate often linked to the fees charged by museums and other publicly funded institutions for use of their images. This blog is by Sean Waterman, Head of Intellectual Property Naomi Korn Associates.

Access 76
article thumbnail

EDPB Publishes One-Stop-Shop Digest on Data Security and Breach Notification

Hunton Privacy

On January 18, 2024, the European Data Protection Board published a thematic one-stop-shop (“OSS”) case digest titled, “Security of Processing and Data Breach Notification” (the “Digest”). The Digest analyzes a selection of decisions adopted by EU data protection authorities on data security and data breaches. The Digest addresses topics including the appropriateness of technical and organizational data security measures used by organizations, the causes of personal data breaches ( e.g. , malic

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Industry analyst recognition round-up

OpenText Information Management

Innovation sits at the heart of OpenText as we continue to power and protect information to help businesses gain the information advantage. With this in mind, OpenText is honored to receive positive recognition for our solutions from many of the leading industry analyst firms we actively collaborate with. These reports play a pivotal role in … The post Industry analyst recognition round-up appeared first on OpenText Blogs.

70
article thumbnail

Ohio Social Media Age Verification and Parental Consent Law Temporarily Blocked

Hunton Privacy

On January 9, 2023, an Ohio federal judge placed a temporary restraining order on Ohio’s Parental Notification by Social Media Operators Act, Ohio Rev. Code § 1349.09(B)(1) (the “Act”), which was approved in July 2023 and was set to go into effect on January 15,2024. Under the Act, parents must provide consent for children under 16 to set up an account on social media and online gaming platforms.

Privacy 69
article thumbnail

Cutting time-to-market for new solutions with enhanced development efficiency 

OpenText Information Management

Stratesys has been helping clients drive digital transformation, unlock new sources of business value, and facilitate growth for more than two decades. Since we opened our first office in Spain, we’ve expanded into a leading international business with over 1,500 employees and operations on two continents. Over the years, we’ve built a strong reputation for … The post Cutting time-to-market for new solutions with enhanced development efficiency appeared first on OpenText Blogs.