Mon.Mar 01, 2021

article thumbnail

Indian Vaccine Makers, Oxford Lab Reportedly Hacked

Data Breach Today

Incidents Spotlight Growing COVID-19-Related Cyberthreats Two Indian vaccine makers and an Oxford University lab are reportedly among the latest targets of hackers apparently seeking to steal COVID-19 research data.

363
363
article thumbnail

Data Beyond Borders: The Schrems II Aftermath

Thales Cloud Protection & Licensing

Data Beyond Borders: The Schrems II Aftermath. divya. Tue, 03/02/2021 - 07:06. On July 16, 2020 the Court of Justice of the European Union issued the Schrems II decision in the case Data Protection Commission v. Facebook Ireland. That decision invalidates the European Commission’s adequacy decision for the EU-U.S. Privacy Shield Framework, on which more than 5,000 U.S. companies rely to conduct trans-Atlantic trade in compliance with EU data protection rules.

GDPR 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rockwell Controllers Vulnerable

Data Breach Today

Flaw Could Enable Access to Secret Encryption Key A critical authentication bypass vulnerability could enable hackers to remotely compromise programmable logic controllers made by industrial automation giant Rockwell Automation, according to the cybersecurity company Claroty. Rockwell has issued mitigation recommendations.

article thumbnail

National Security Risks of Late-Stage Capitalism

Schneier on Security

Early in 2020, cyberspace attackers apparently working for the Russian government compromised a piece of widely used network management software made by a company called SolarWinds. The hack gave the attackers access to the computer networks of some 18,000 of SolarWinds’s customers, including US government agencies such as the Homeland Security Department and State Department, American nuclear research labs, government contractors, IT companies and nongovernmental agencies around the world.

Risk 142
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cryptomining Botnet Uses Bitcoin Wallet to Avoid Detection

Data Breach Today

Akamai Describes How This Approach Works A cryptomining botnet campaign is using bitcoin blockchain transactions to hide command-and-control server addresses and stay under the radar, defeating takedown attempts, according to security firm Akamai.

More Trending

article thumbnail

Ryuk Ransomware Updated With 'Worm-Like Capabilities'

Data Breach Today

Prolific Ransomware Can 'Spread Automatically' Inside Networks, CERT-FR Warns Prolific Ryuk ransomware has a new trick up its sleeve. "A Ryuk sample with worm-like capabilities - allowing it to spread automatically within networks it infects" was recently discovered during an incident response effort, warns CERT-FR, the French government's computer emergency response team.

article thumbnail

Cybercrime 'Help Wanted': Job Hunting on the Dark Web

Dark Reading

How's your 'Probiv'? How about customer service? Here's how Dark Web forums connect cybercriminals looking for talent with those looking for work -- and which skills are hot right now.

125
125
article thumbnail

Equifax CISO Jamil Farshchi on SolarWinds and Supply Chains

Data Breach Today

‘Supply Chain Security Is Broken, and It’s Time for a Change’ Jamil Farshchi has been there. As CISO of Equifax, he knows what it’s like to be a victim of a high-profile cyberattack. And he knows breached companies have a choice: "Are they going to be a force for good by helping the rest of the industry learn from their experience?

Security 274
article thumbnail

How low-code is transforming software development

DXC Technology

An emerging way to program, known as low-code application development, is transforming the way we create software. With this new approach, we’re creating applications faster and more flexibly than ever before. What’s more, this work is being done by teams where up to three-quarters of the team members can have no prior experience in developing […].

Cloud 119
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Why This Facebook Privacy Settlement Is Unusual

Data Breach Today

$650 Million Settlement Reached Under Illinois' Groundbreaking Biometrics Privacy Law Ending six years of litigation, a federal judge has signed off on a $650 million settlement of a class-action lawsuit against Facebook for violating Illinois' groundbreaking privacy law that restricts collecting biometrics data. Here's why this case is so unusual.

Privacy 229
article thumbnail

Gootkit delivery platform Gootloader used to deliver additional payloads

Security Affairs

The Javascript-based infection framework for the Gootkit RAT was enhanced to deliver a wider variety of malware, including ransomware. Experts from Sophos documented the evolution of the “Gootloader,” the framework used for delivering the Gootkit RAT banking Trojan. The framework was improved to deploy a wider range of malware, including ransomware payloads. “In recent years, almost as much effort has gone into improvement of its delivery method as has gone into the NodeJS-based malware it

article thumbnail

Passwords, Private Posts Exposed in Hack of Gab Social Network

Threatpost

The Distributed Denial of Secrets group claim they have received more than 70 gigabytes of data exfiltrated from social media platform Gab.

Passwords 121
article thumbnail

ByteDance agreed to pay $92M in US privacy Settlement for TikTok data collection

Security Affairs

ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users for illegal data collection. ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users. The settlement has yet to be approved by a federal judge. The Chinese firm was accused to have failed to get the users’ consent to collect data in compliance with the Illinois biometric privacy law.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New York State imposes a $1.5 million penalty in cybersecurity breach case

Data Protection Report

On March 3, 2021, the New York Department of Financial Services (NYDFS) announced a Consent Order with a NYDFS-licensed Maine-based mortgage banker and loan servicer settling alleged violations of the NYDFS cybersecurity regulations. ( In the matter of Residential Mortgage Services, Inc., March 3, 2021). The Consent Order required RMS to pay $1.5 million, and within 90 days, submit to NYDFS all of the following: a comprehensive written Cybersecurity Incident Response Plan; a comprehensive cyber

article thumbnail

Intern caused ‘solarwinds123’ password leak, former SolarWinds CEO says

Security Affairs

Top executives of the software firm SolarWinds blamed an intern for having used a weak password for several years, exposing the company to hack. Top executives of the SolarWinds firm believe that the root cause of the recently disclosed supply chain attack is an intern that has used a weak password for several years. Initial investigation suggested that the password “solarwinds123” was publicly accessible via a misconfigured GitHub repository since June 17, 2018.

article thumbnail

Firewall Vendor Patches Critical Auth Bypass Flaw

Threatpost

Cybersecurity firm Genua fixes a critical flaw in its GenuGate High Resistance Firewall, allowing attackers to log in as root users.

article thumbnail

NSA embraces the Zero Trust Security Model

Security Affairs

The National Security Agency (NSA) published a document to explain the advantages of implementing a zero-trust model. The National Security Agency (NSA) recently published a document to explain the benefits of adopting a zero-trust model, and advice to navigate the process. Modern infrastructure are complex environments that combine multiple technologies and that are exposed to sophisticated cyber threats.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Mobile Adware Booms, Online Banks Become Prime Target for Attacks

Threatpost

A snapshot of the 2020 mobile threat landscape reveals major shifts toward adware and threats to online banks.

Security 109
article thumbnail

New Jailbreak Tool Works on Most iPhones

Dark Reading

The Unc0ver team has released a tool that works on iOS 11 and later, and exploits a vulnerability that was recently under attack.

139
139
article thumbnail

FTC to Host Digital Dark Patterns Workshop in April

Hunton Privacy

On February 24, 2021, the Federal Trade Commission announced that it will hold a workshop on digital dark patterns on April 29, 2021. The workshop will aim to understand the ways in which user interfaces can have the effect, intentionally or unintentionally, of obscuring, subverting or impairing consumer autonomy, decision-making or choice. The workshop will explore a number of issues related to digital dark patterns, including: how dark patterns differ from sales tactics employed by brick-and-m

Sales 82
article thumbnail

Building a Next-Generation SOC Starts With Holistic Operations

Dark Reading

The proper template for a modernized SOC team is one that operates seamlessly across domains with a singular, end-to-end view.

137
137
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What Life Is Like Under Myanmar's Internet Shutdown

WIRED Threat Level

One couple living in Yangon explain the impact of the military coup's terrifying censorship measures.

article thumbnail

MSP Provider Builds Red Team as Attackers Target Industry

Dark Reading

NinjaRMM, which provides tools for managed service providers, aims to create a red team capability following years of attacks against MSPs.

129
129
article thumbnail

Malware Loader Abuses Google SEO to Expand Payload Delivery

Threatpost

Gootloader has expanded its payloads beyond the Gootkit malware family, using Google SEO poisoning to gain traction.

IT 91
article thumbnail

ARMA International Education Foundation (AIEF) Call Nominations for Trustee Positions

IG Guru

(Palmyra, NJ – February 22, 2022) – The Foundation is a leading organization that enhances the practical and scholarly knowledge of information management by funding and promoting research, scholarship, and educational opportunities for information management professionals. The Foundation is a non-profit corporation with 501(c)3 tax exempt status in the US.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Universal Health Services Suffered $67 Million Loss Due to Ransomware Attack

Dark Reading

Earnings report points to diversion of care during incident for financial loss.

article thumbnail

Popular WordPress Plugin accepts Cryptocurrencies as a new annual payment option

IG Guru

It is possible to upgrade to a WPSec Premium Account with over 70 different cryptocurrencies (crypto, coins). We support Bitcoin, Bitcoin Cash, Zcash, Dogecoin, Litecoin, Ether, Dash and Monero to mention a few.At the moment you can only pay annually using cryptocurrencies. And you will be notified several times before the expiry so you can […].

IT 57
article thumbnail

CCC Days at RoleModel Software: Part 2

Role Model Software

“A little learning is a dangerous thing.” - Alexander Pope If you stop learning, you stop growing; you stop getting better. At RoleModel Software, we’re learning every day. In our quest to deliver high-quality, tailored software solutions by closely collaborating with our customers, we see the opportunity to use every situation to get better. No project is created equal.