Tue.Jun 02, 2020

article thumbnail

REvil Ransomware Gang Starts Auctioning Victim Data

Krebs on Security

The criminal group behind the REvil ransomware enterprise has begun auctioning off sensitive data stolen from companies hit by its malicious software. The move marks an escalation in tactics aimed at coercing victims to pay up — and publicly shaming those don’t. But it may also signal that ransomware purveyors are searching for new ways to profit from their crimes as victim businesses struggle just to keep the lights on during the unprecedented economic slowdown caused by the COVID-1

article thumbnail

Study: Breach Victims Rarely Change Passwords

Data Breach Today

Researchers Call on Breached Companies to Revamp Notification Even after being notified that their personal data has been compromised in a breach, only about a third of users change their passwords - and most are not strong or unique, according to a study by researchers at Carnegie Mellon University, who call for changes in breach notification procedures.

Passwords 281
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Intelligent Information Management (IIM) Policies and the Law - Part 1

AIIM

Every so often, IIM practitioners and lawyers cross paths. One such intersection is around policy writing. As practitioners modify and improve their IIM policies , it's important to keep in mind how those policies specifically relate to the law. Understanding that relationship better will help IIM and legal specialists work together more effectively.

Education 169
article thumbnail

Federal Agencies Reported Fewer Security Incidents in 2019

Data Breach Today

But OMB Report Says 'High-Value Assets' Need Better Protection U.S. federal agencies reported 8% fewer cybersecurity incidents in 2019 compared to the previous year, according to the White House's Office of Management and Budget. But 71 audits of agencies' "high-value assets" showed many remain susceptible to attacks because of a lack of security measures.

Security 254
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

AI firm that worked with Vote Leave wins new coronavirus contract

The Guardian Data Protection

Deal may allow Faculty, linked to senior Tory figures, to analyse social media data, utility bills and credit ratings UK coronavirus updates – live See all our coronavirus coverage An artificial intelligence firm hired to work on the Vote Leave campaign may analyse social media data, utility bills and credit rating scores as part of a £400,000 contract to help the government deal with the coronavirus pandemic.

More Trending

article thumbnail

The Pentagon?s Hand-Me-Downs Helped Militarize Police. Here?s How

WIRED Threat Level

Over several decades, the 1033 program has shipped over $7.4 billion of Defense Department property to more than 8,000 law enforcement agencies.

Security 142
article thumbnail

Secure Digital Identity in the Age of Coronavirus

Data Breach Today

Jeremy Grant on the Evolution of Digital Identities and the Post-Password Future Jeremy Grant has spent more than two decades championing the cause of secure digital identities. But as the COVID-19 pandemic has created a remote workforce of unprecedented scale seemingly overnight, are current approaches to securing the identity management and attestation practice up to the challenge?

Security 227
article thumbnail

Allyship: Jamf will educate, act, support, improve and listen

Jamf

We, as one Jamf, pledge to be leaders and allies of change by taking intentional action. Read for full details.

Education 145
article thumbnail

Data Breach Lawsuit Filed Against Pediatric Care Provider

Data Breach Today

Aveanna Healthcare Breach Affected More Than 166,000 A lawsuit seeking class action status has been filed against Atlanta-based Aveanna Healthcare in the wake of a 2019 data breach at the pediatric home healthcare provider that affected more than 166,000 individuals.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

10 Tips for Maintaining Information Security During Layoffs

Dark Reading

Insider cyber threats are always an issue during layoffs -- but with record numbers of home office workers heading for the unemployment line, it's never been harder to maintain cybersecurity during offboarding.

article thumbnail

IP-in-IP flaw affects devices from Cisco and other vendors

Security Affairs

A flaw in the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls impact devices from Cisco and other vendors. A vulnerability that affects the IP-in-IP tunneling protocol (aka IP Encapsulation within IP) implemented by Cisco and other vendors could be exploited for denial-of-service (DoS) attacks and to bypass security controls.

Security 115
article thumbnail

California AG Submits CCPA Regulations for Approval ? Requests Expedited Review Ahead of July 1 Enforcement Deadline

HL Chronicle of Data Protection

On June 1, The California Attorney General (CA AG) submitted the final text of the CCPA regulations to the California Office of Administrative Law (OAL) for approval. Though regulations submitted to the OAL in June ordinarily would not become effective—if approved—until October 1, the CA AG has requested an expedited review. According to the CA AG, the expedited review would allow the regulations to become effective by July 1, which still is the date his office plans to begin enforcing the CCPA

article thumbnail

There was no data breach in the cyberattack against Minneapolis Police

Security Affairs

Last week a massive distributed denial-of-service (DDoS) attack shut down the websites and systems of Minneapolis, but there is no evidence of a breach. Over the weekend, Anonymous demanded justice for George Floyd and threatened to ‘expose the many crimes’ of Minneapolis Police. George Floyd was killed by a white police officer by kneeling on his neck for more than eight minutes.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

?Nonlethal? Anti-Protest Weapons Can Cause Serious Harm

WIRED Threat Level

Rubber bullets and tear gas are billed as relatively safe. They're anything but.

Security 145
article thumbnail

Apple fixes CVE-2020-9859 zero-day used in recent Unc0ver jailbreak

Security Affairs

This week Apple released security patches to address the CVE-2020-9859 zero-day vulnerability that had been used to jailbreak iPhones devices. Apple released security patches to address the CVE-2020-9859 zero-day vulnerability in the iOS kernel that had been used to jailbreak iPhones. The flaw was discovered by a team of cyber-security researchers and hackers that also released a new jailbreak package dubbed Unc0ver (from the name of the team that devised it) that works on all recent iOS version

article thumbnail

Machine learning capabilities abound with IBM Product Master

IBM Big Data Hub

The integrity and trustworthiness of data or any other master entity is enforced via data quality rules. Customers no longer want to rely on hand crafted rules that can number in the thousands, which in turn also need a lot of maintenance.

96
article thumbnail

SecurityAffairs awarded as Best European Cybersecurity Technical Blog

Security Affairs

I’m proud to announce that SecurityAffairs was awarded as Best European Cybersecurity Technical Blog at European Cybersecurity Blogger Awards. The winners of the annual European Cybersecurity Blogger Awards have been announced. With over a 1000 names put forward, the shortlists for the 12 awards were put to the public vote, and winners were announced via a video conference.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Octopus Scanner Sinks Tentacles into GitHub Repositories

Threatpost

At least 26 different open-source code repositories were found to be infected with an unusual attack on the open-source software supply chain.

Access 103
article thumbnail

Verizon?s 2020 Data Breach Investigations Report debunks popular cyber crime myth

IT Governance

Contrary to what you might have heard, cyber criminals pose a much bigger threat to organisations than employees. This is the stand-out finding in Verizon’s 2020 Data Breach Investigations Report , debunking speculation that internal actors should now be organisations’ top priority. The confusion perhaps stems from the fact that incidents involving malicious or negligent insiders have doubled in the past year – from 424 to 881.

article thumbnail

Sodinokibi ransomware operators leak files stolen from Elexon electrical middleman

Security Affairs

The REvil/Sodinokibi ransomware operators have leaked the files allegedly stolen from the UK power grid middleman Elexon. In May Elexon , a middleman in the UK power grid network, was the victim of a cyber attack, its systems have been infected with the Sodinokibi ransomware. The incident impacted only affected the internal IT network, including the company’s email server, and employee laptops.

article thumbnail

"Sign in with Apple" Vulnerability

Schneier on Security

Researcher Bhavuk Jain discovered a vulnerability in the "Sign in with Apple" feature, and received a $100,000 bug bounty from Apple. Basically, forged tokens could gain access to pretty much any account. It is fixed.

Access 102
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Understanding the ethics of AI

OpenText Information Management

In 2018, Elaine Herzberg was killed in what is believed to be the first pedestrian fatality by an autonomous vehicle. The incident caught the world’s attention and shone a light on the ethics of AI. The death of Elaine Herzberg was shocking because it raised questions about whether we could trust Artificial Intelligence (AI) with … The post Understanding the ethics of AI appeared first on OpenText Blogs.

article thumbnail

Two Critical Android Bugs Open Door to RCE

Threatpost

Google and Qualcomm both addressed significant vulnerabilities in their June updates.

Security 104
article thumbnail

Companies Fall Short on Mandatory Reporting of Cybercrimes

Dark Reading

Understaffed and under fire, companies fail to report cybercrimes even when they are legally obligated to notify authorities, results of a new survey show.

78
article thumbnail

Kodak Alaris? INfuse Platform Enables Remote Work with Xenith Scan@Home Solution

Info Source

ROCHESTER, N.Y., June 1, 2020 – Xenith Intelligent Workplace Services has partnered with Kodak Alaris to create a pre-configured Scan@Home Solution built on INfuse , the global information capture specialist’s Smart Connected Scanning Solution. The platform enables remote workers to scan directly into line-of-business systems from their home offices.

Paper 64
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Risk Assessment & the Human Condition

Dark Reading

Five lessons the coronavirus pandemic can teach security professionals to better assess, monitor, manage, and mitigate organizational risk.

Risk 104
article thumbnail

The Librarians of the Future Will Be AI Archivists via Popular Mechanics

IG Guru

An intriguing article on how the Library of Congress is using AI and OCR. The post The Librarians of the Future Will Be AI Archivists via Popular Mechanics appeared first on IG GURU.

article thumbnail

Mobile Phishing Attacks Increase Sharply

Dark Reading

Organizations need to include smartphones and tablets in their phishing mitigation strategies, a new report suggests.

Phishing 111