Mon.Jun 14, 2021

article thumbnail

Union Benefits Administrator Says Data Deleted in Hack

Data Breach Today

Service Employees International Union 775 Benefits Group: PII and PHI Deleted A Seattle-based benefits administrator for unionized home healthcare and nursing home workers has reported a hacking incident affecting 140,000 individuals that involved deleting certain data.

360
360
article thumbnail

Welcoming the Finnish Government to Have I Been Pwned

Troy Hunt

Today I'm very happy to welcome the Finnish government to Have I Been Pwned by granting their National Cyber Security Centre full and free access to query their government domains. API access to query their domains will give them greater visibility into the impact of data breaches on the Finnish government. Finland is now the 5th Nordic country and 21st national CERT to be onboarded with many more from around the globe to be announced shortly.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fujifilm Reportedly Refused to Pay Ransom

Data Breach Today

Report: After Ransomware Attack, Japanese Conglomerate Restored Operations Using Backups Japanese conglomerate Fujifilm, which earlier this month was the victim of a ransomware attack, reportedly refused to pay a ransom and restored operations using backups.

article thumbnail

Apple fixed 2 WebKit flaws exploited to target older iPhones

Security Affairs

Apple released an out-of-band iOS update for older iPhones and iPads and warned that threat actors are actively exploiting two flaws in WebKit. Apple released an out-of-band iOS update ( iOS 12.5.4 patch ) for older iPhones and iPad, the IT giant also warned that some vulnerabilities affecting its WebKit may have been actively exploited. WebKit is a browser engine developed by Apple and primarily used in its Safari web browser, as well as all iOS web browsers.

Security 114
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Will Ransomware Attacks Push Congress to Enact Regs?

Data Breach Today

Recent Congressional Hearings Highlight Need for Greater Cybersecurity Oversight After hearings in the Senate and House on a spate of ransomware attacks that have put the nation's critical infrastructure in danger, some security experts say Congress may be poised to take action to create greater regulatory oversight of cybersecurity within certain industries.

More Trending

article thumbnail

Using PAM in an OT Environment

Data Breach Today

Gartner's Felix Gaehtgens on Addressing Challenges To enhance privileged access management for operational technology, organizations should use specialized remote access solutions for vendors that are allowed to access OT networks, says Felix Gaehtgens, an analyst at Gartner.

Access 194
article thumbnail

Volkswagen Vendor Exposed Data of 3.3m Drivers

Threatpost

Nearly all of the leaked data was for owners or wannabe owners of the automaker’s luxury brand of Audis, now at greater risk for phishing, ransomware or car theft.

Phishing 116
article thumbnail

Avaddon Ransomware Operation Calls It Quits, Releases Keys

Data Breach Today

2,934 Decryption Keys Released for Free; Emsisoft Rushes Out Full Decoder The prolific Avaddon ransomware-as-a-service operation has announced its closure and released 2,934 decryption keys for free. Has the increased focus by Western governments on combating ransomware been driving this and other operations to exit the fray?

article thumbnail

Major blackouts across Puerto Rico. Are the DDoS and the fire linked?

Security Affairs

A fire and cyberattack hit an electrical substation for the electricity provider Luma Energy, causing major blackouts across Puerto Rico. A large fire at the Luma’s Monacillo electrical substation in San Juan for Puerto Rico’s new electricity provider, Luma Energy, caused major blackouts across Puerto Rico on Thursday. BREAKING: Much of the Metro area of Puerto Rico, the most populated area of the island, is without power right now after an explosion & fire at a power plant in th

IT 116
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’ll be part of a European Internet Forum virtual debate on June 17, 2021. The topic is “Decrypting the encryption debate: How to ensure public safety with a privacy-preserving and secure Internet?” I’m speaking at the all-online Society for Philosophy and Technology Conference 2021 , June 28-30, 2021.

article thumbnail

G7 calls on Russia to dismantle operations of ransomware gangs within its borders

Security Affairs

The member states of the G7 group have called on Russia and other states to dismantle operations of the ransomware gangs operating within their countries. G7 member states have called on Russia and other states to dismantle operations of ransomware gangs operating within their countries. The call to action follows the large number of ransomware attacks that targeted organizations in the US and Europe, such as the Colonial Pipeline and JBS attacks.

article thumbnail

Remarkable Records: Wildlife Edition

The Texas Record

A common icebreaker question among records professionals is, “What is your favorite record series?”. While we all have our own “favorites,” the twelve local government retention schedules include several series one might call “remarkable,” including this one: PW5550-03c WILDLIFE RECORDS Necropsy reports on dead marine mammals. 3 years. By regulation – 9 CFR 3.110(g).

article thumbnail

TikTok Can Now Collect Biometric Data

Schneier on Security

This is probably worth paying attention to: A change to TikTok’s U.S. privacy policy on Wednesday introduced a new section that says the social video app “may collect biometric identifiers and biometric information” from its users’ content. This includes things like “faceprints and voiceprints,” the policy explained.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Microsoft Teams: Very Bad Tabs Could Have Led to BEC

Threatpost

Attackers could have used the bug to get read/write privileges for a victim user’s email, Teams chats, OneDrive, Sharepoint and loads of other services.

article thumbnail

Colonial Pipeline Cyberattack Proves a Single Password Isn't Enough

Dark Reading

Since the attack, it's been revealed that it was down to a single password. Yes, ransomware needs to be on your radar -- but a focus on credentials is vital.

article thumbnail

Moobot Milks Tenda Router Bugs for Propagation

Threatpost

An analysis of the campaign revealed Cyberium, an active Mirai-variant malware hosting site.

IoT 108
article thumbnail

SEO poisoning campaign aims at delivering RAT, Microsoft warns

Security Affairs

Microsoft spotted a series of attacks that use SEO poisoning to deliver a remote access trojan (RAT) used by threat actors to steal sensitive data. Microsoft is monitoring a wave of cyber attacks that leverages SEO poisoning to deliver a remote access trojan (RAT) to steal sensitive data from the infected systems. Microsoft 365 Defender data shows that the SEO poisoning technique is effective, given that Microsoft Defender Antivirus has detected and blocked thousands of these PDF documents in nu

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Utilities ‘Concerningly’ at Risk from Active Exploits

Threatpost

Utilities’ vulnerability to application exploits goes from bad to worse in just weeks. .

Risk 106
article thumbnail

VPN Attacks Surged in First Quarter

Dark Reading

But volume of malware, botnet, and other exploit activity declined because of the Emotet botnet takedown.

126
126
article thumbnail

Transforming an Expert into an Expert System

Role Model Software

Wikipedia tells us “In artificial intelligence, an expert system is a computer system emulating the decision-making ability of a human expert.” I’m not sure why the “in artificial intelligence” is in that statement. Pick your favorite definition of artificial intelligence (AI). It’s a bit of a moving target but many want to claim that they produce or use it.

article thumbnail

Know Thy Enemy: Fighting Half-Blind Against Ransomware Won't Work

Dark Reading

We lack reliable, representative, actionable data about ransomware's actual scope, scale, and impact. The Ransom Incident Response Network could change that.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Q2 2021 Forrester Wave™ for Content Platforms provides expert insight into the evolving content management landscape

OpenText Information Management

Forrester Research, Inc. just released their report on the state of the content services technology landscape, The Forrester Wave™: Content Platforms, Q2, 2021. Reports from respected, unbiased analyst firms such as Forrester are always recommended reading. Regardless of your role in content management or content services, their analysis goes a long way toward helping you … The post Q2 2021 Forrester Wave™ for Content Platforms provides expert insight into the evolving content management l

article thumbnail

TEN YEARS OF BREACHES IN ONE IMAGE via THE VERGE

IG Guru

Nearly 8 billion usernames have leaked since June 2011. The post TEN YEARS OF BREACHES IN ONE IMAGE via THE VERGE appeared first on IG GURU.

article thumbnail

Good, Better, Best Software Testing Tools

ForAllSecure

What are the defenses that we have against the software vulnerabilities? Static Analysis. Static application security testing, also known as static code analysis is perhaps the most popular tool. SAST uncovers vulnerabilities by analyzing source code itself, the defects that they identify are known unknown risks, meaning SAST identifies a known class of weaknesses and if left alone, that coding weakness might result in a vulnerability.

Risk 52
article thumbnail

CILIP Pathways: First apprentices in the world achieve the LIAS Level 3 apprenticeship

CILIP

First apprentices in the world achieve the LIAS Level 3 apprenticeship. CILIP is delighted to announce the world?s first Library, Information and Archive Services Assistant Level 3 Apprentices. Not only is this is a huge achievement for the apprentices but also represents a significant milestone for the information workforce. This apprenticeship was designed by an employer-led trailblazer group, supported by CILIP and ARA (The Archives and Records Association), to open up an alternative route in

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New Top 20 Secure-Coding List Positions PLCs as Plant 'Bodyguards'

Dark Reading

Best practices guide encompasses integrity, hardening, resilience, and monitoring of PLCs in industrial networks.

article thumbnail

Allen v. PPE Casino Resorts Maryland, LLC (D. Md. 2021)

eDiscovery Law

Key Insight: Plaintiffs sought a protective order to prevent defendant from obtaining ESI from five different social media platforms they were active on. The court found that while a plaintiff’s social media postings could be relevant to a claim for “garden variety” emotional distress damages, some caution was necessary, such that a “deeper dive” into […].

article thumbnail

Cyber Analytics Database Exposed 5 Billion Records Online

Dark Reading

In an ironic twist, Cognyte's data alerts customers to third-party data exposures.

Analytics 103