Tue.Jan 03, 2023

article thumbnail

GUEST ESSAY: These common myths and misconceptions make online browsing very risky

The Last Watchdog

For the average user, the Internet is an increasingly dangerous place to navigate. Related: Third-party snooping is widespread. Consider that any given website experiences approximately 94 malicious attacks a day , and that an estimated 12.8 million websites are infected with malware. So, in response to these numbers, users are seeking ways to implement a more secure approach to web browsing.

Privacy 188
article thumbnail

A Few Cybersecurity Stocks Soared in 2022, But Most Stumbled

Data Breach Today

Check Point, KnowBe4 Saw Gains; Other Vendors Saw Average Stock Price Drop of 40% After two sensational years in the public markets during the height of COVID-19, 2022 was a rude awakening for the cybersecurity industry. The four-headed monster of inflation, interest rate hikes, supply chain shortages and the ongoing Russia-Ukraine war dragged most stock prices down.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breaking RSA with a Quantum Computer

Schneier on Security

A group of Chinese researchers have just published a paper claiming that they can—although they have not yet done so—break 2048-bit RSA. This is something to take seriously. It might not be correct, but it’s not obviously wrong. We have long known from Shor’s algorithm that factoring with a quantum computer is easy. But it takes a big quantum computer, on the orders of millions of qbits, to factor anything resembling the key sizes we use today.

Paper 145
article thumbnail

Senior Healthcare Firm Pays Breach Settlement to States

Data Breach Today

Avalon Health Care Pays $200,000 to Utah and Oregon, Pledges Security Enhancements A Utah-based senior healthcare firm paid a $200,000 settlement to two state attorneys general after it delayed reporting a 2019 data breach by 10 months. The breach affected 14,500 individuals and included Social Security numbers and medical treatment information.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Colorado AG Publishes Second Draft of Colorado Privacy Act Rules

Hunton Privacy

On December 21, 2022, the Colorado Attorney General published an updated version of the draft rules to the Colorado Privacy Act (“CPA”). The draft, which follows the first iteration of the proposed rules published on October 10, 2022, solicits comments on five topics: (1) new and revised definitions; (2) the use of IP addresses to verify consumer requests; (3) a proposed universal opt-out mechanism; (4) streamlining the privacy policy requirements; and (5) bona fide loyalty programs.

Privacy 118

More Trending

article thumbnail

List of data breaches and cyber attacks in December 2022 – 31.5 million records breached

IT Governance

December can be the best or worst time to suffer a data breach. On the one hand, people have started to wind down to the end of the year, all attention is on holidays and a data breach is more likely to fall under the data. But for the very same reasons, a December data breach can be the worst possible scenario. Your team suddenly has a mountain of work on its hands as it mitigate the damage.

article thumbnail

BlackCat Spoofs Victim Website to Leak Stolen Data

Data Breach Today

Ransomware-as-a-Service Group a Pioneer in Typosquatted Domains to Spread Leaks The BlackCat ransomware-as-a-service group created a spoofed website closely mimicking the website of a victim in order to spread stolen data online. The victim is a small U.S. accounting firm, whose stolen files apparently includes tax returns and passport scans.

article thumbnail

There is a New Trend in Social Engineering with a Disgusting Name; "Pig-butchering"

KnowBe4

The technique began in the Chinese underworld, and it amounts to an unusually protracted form of social engineering. The analogy is with fattening up a pig, then butchering it for all it’s worth. In this case the analogy is wayward, since the criminal doesn’t really fatten up the pig, not that much, anyway, but it works at least this far: they develop the marks slowly, and they get the marks to fatten up the accounts they ultimately drain.

IT 111
article thumbnail

Malaysian Agencies Investigate Alleged Breach Affecting 13M

Data Breach Today

Maybank - Country's Largest Institution - Denies Data Breach Malaysian Communications and Digital Minister Fahmi Fadzil has ordered an inquiry into an alleged massive data breach that reportedly involves data of Maybank, Astro and the Election Commission. The alleged breach reportedly affects 13 million citizens.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Black Hat Flashback: The Day That Dan Kaminsky Saved the Internet

Dark Reading

Dark Reading's Kelly Jackson Higgins explains the enormous legacy left behind by Dan Kaminsky and his seminal "Great DNS Vulnerability" talk at Black Hat 2008.

112
112
article thumbnail

Poland Sounds Alarm on Russian Hacking

Data Breach Today

Government Says Hackers' Goals Are 'Destabilization, Intimidation and Sowing Chaos' Poland is warning that Russian hackers have intensified activities in national cyberspace with the aim of "destabilization, intimidation and sowing chaos." Poland is a staging ground for military aid to Kyiv and a destination for more than 1.4 million refugees who fled Moscow's war of conquest.

Military 130
article thumbnail

Five Guys Hit with BIPA Class Action

Hunton Privacy

On December 20, 2022, a former employee in Illinois brought a class action suit against Five Guys Enterprises, LLC (“Five Guys”), a burger chain, alleging that Five Guys violated the Illinois Biometric Information Privacy Act (“BIPA”). . According to the complaint filed in the Northern District of Illinois Eastern Division, Five Guys utilizes a time clock system that require employees to scan and input their fingerprints or thumbprints to log in and out of the time clock system.

Privacy 105
article thumbnail

Toronto Hospital Gauges Whether to Use LockBit Decryptor

Data Breach Today

LockBit Says Affiliate Broke Its Rules in Ransomware Attack on Children's Hospital A Toronto pediatric hospital says it has restored nearly two-thirds of the systems affected by a mid-December ransomware attack but will evaluate whether to use a decryptor supplied by the LockBit ransomware-as-a-service group. LockBit says an affiliate violated a policy against attacking hospitals.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

In 2023, let’s focus on balance.

Jamf

Jamf CEO Dean Hager takes a look at lessons we learned in 2022— and predicts how we can apply those lessons in 2023 for a successful year, even during difficult times.

105
105
article thumbnail

Sam Bankman-Fried Pleads 'Not Guilty' in Criminal Case

Data Breach Today

Trial Date Tentatively Set for Oct. 2 Former cryptocurrency billionaire Sam Bankman-Fried entered a "not guilty" plea in Manhattan federal district court Tuesday. He faces up to 115 years in prison if found guilty on all counts. Bankman-Fried has been out on $250 million bail in home detention with his parents in California.

130
130
article thumbnail

WordPress Sites Under Attack from Newly Found Linux Trojan

Dark Reading

Researchers who discovered the backdoor Linux malware say it may have been around for more than three years — and it targets 30+ plug-in bugs.

IT 118
article thumbnail

4 Best Practices When Conducting an HR Investigation

Hanzo Learning Center

HR Investigations tend to happen quickly, with the triggering event setting things into motion and demanding some kind of response almost immediately. There is also a desire to resolve the issue in short order. However, when things are moving this fast, errors can arise. This is why having repeatable processes in place is of key importance. With that in mind, here are 4 best practices for conducting an HR Investigation: Develop an Investigation Plan.

IT 98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Creating a mature data culture

Collibra

Let’s talk about data maturity. . In the general sense, maturity is the state of being fully developed. At Collibra, we define data intelligence maturity as: The ability for your organization to leverage data to make informed business decisions. The degree to which your organization has adopted and implemented the technologies, processes, and policies required to manage your data on demand and at scale.

article thumbnail

Synology fixes multiple critical vulnerabilities in its routers

Security Affairs

Synology fixed several critical flaws in its routers, including flaws likely demonstrated at the Pwn2Own 2022 hacking contest. Taiwanese NAS maker Synology published two new critical advisories in December. The first advisory is related to the most severe vulnerability addressed by the company, which is a critical out-of-bounds write issue, tracked as CVE-2022-43931 (CVSS3 Base Score10).

IT 95
article thumbnail

Chinese 'RedZei' Group Batters Victims With Incessant Vishing Effort

Dark Reading

The cybercriminals switch up carriers and SIM cards regularly, making it difficult for either mobile users or telecom companies to block the barrage of malicious calls and voicemails.

IT 75
article thumbnail

BitRAT campaign relies on stolen sensitive bank data as a lure

Security Affairs

Experts warn of a new malware campaign using sensitive information stolen from a bank as a lure to spread the remote access trojan BitRAT. Qualys experts spotted a new malware campaign spreading a remote access trojan called BitRAT using sensitive information stolen from a bank as a lure in phishing messages. BitRAT is a relatively new threat advertised on underground marketplaces and forums since Feb 2021, it is offered for $20.

Mining 94
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Raspberry Robin Worm Hatches a Highly Complex Upgrade

Dark Reading

The Evil Corp-linked malware family has undergone an evolution, becoming more obfuscated and "several times more complex," as the group behind it tests how far the worm can be spread.

IT 71
article thumbnail

Does Volvo Cars suffer a new data breach?

Security Affairs

A post published on a popular hacking forum claims Volvo Cars has suffered a new data breach, alleging stolen data available for sale. French cybersecurity Anis Haboubi yesterday first noticed that a threat actor was attempting to sell data allegedly stolen from Volvo Cars on a popular hacking forum. VOLVO CARS aurait été la victime du #ransomware endurance ; 200gb de données sensibles sont en vente ; pic.twitter.com/VFMdv7IBmr — Anis Haboubi |₿| (@HaboubiAnis) January 2, 2023.

article thumbnail

The Next First Day

John Battelle's Searchblog

Today is the first workday of the new year. For most of us, that means the slow roll of the holidays is over. Today we answer all those emails we left unattended, resume work we left on hold in early December, and start filling up our calendars with meetings we’d rather not attend. I’ve chosen a different path this year, for me, an uncertain path.

IT 64
article thumbnail

Canadian Copper Mountain Mining Corporation (CMMC) shut down the mill after a ransomware attack

Security Affairs

The Canadian Copper Mountain Mining Corporation (CMMC) was hit with a ransomware attack that impacted its operations. The Canadian Copper Mountain Mining Corporation (CMMC) announced to have suffered a ransomware attack late on December 27, 2022, which impacted its operation. . Copper Mountain’s flagship asset is the 75% owned Copper Mountain mine located in southern British Columbia near the town of Princeton.

Mining 92
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cyberattackers Torch Python Machine Learning Project

Dark Reading

The popular PyTorch Python project for data scientists and machine learning developers has become the latest open source project to be targeted with a dependency confusion attack.

90
article thumbnail

Why organizational change management is essential to digital transformation success

OpenText Information Management

Michael O’Malley argues “it isn’t the technology itself that IT projects trip over.” Research from the Project Management Institute confirms that change management challenges account for most project failures. Harvard Business School defines organizational change management (OCM) as the process of guiding organizational change to a successful resolution and notes that it typically includes three … The post Why organizational change management is essential to digital transformation success

article thumbnail

Name That Edge Toon: The Upside Down

Dark Reading

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.

85