Tue.Jun 30, 2020

article thumbnail

Victim Count in Magellan Ransomware Incident Soars

Data Breach Today

Breach Reports Show Growing Tally of Affiliates, Individuals Affected The number of companies and individuals affected by an April ransomware attack on managed care provider Magellan Health continues to grow. This illustrates the risks faced by interconnected organizations in the healthcare sector.

article thumbnail

COVID-19 ‘Breach Bubble’ Waiting to Pop?

Krebs on Security

The COVID-19 pandemic has made it harder for banks to trace the source of payment card data stolen from smaller, hacked online merchants. On the plus side, months of quarantine have massively decreased demand for account information that thieves buy and use to create physical counterfeit credit cards. But fraud experts say recent developments suggest both trends are about to change — and likely for the worse.

Sales 297
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Brute-Force Attacks Targeting RDP on the Rise

Data Breach Today

ESET Researchers: Attacks Open the Door to Launching Ransomware, Planting Cryptominers Since the start of the COVID-19 pandemic, the number of brute-force attacks targeting RDP connections has steadily increased, spiking to 100,000 incidents per day in April and May, according to the security firm ESET. These attacks pave the way for launching ransomware attacks and planting cryptominers.

article thumbnail

A threat actor is selling databases stolen from 14 companies

Security Affairs

A threat actor is selling databases containing data belonging to 14 different companies he claimed were hacked in 2020. A threat actor is selling databases that contain user records for 14 different organizations he claimed were hacked in 2020, only for four of them ( HomeChef , Minted , Tokopedia , and Zoosk ) were previously reported data breaches.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

US Cyber Command Alert: Patch Palo Alto Networks Products

Data Breach Today

'Critical' Authentication Bypass Risk Posed by Easy-to-Exploit PAN-OS Software Flaw Palo Alto Networks product alert: All users should immediately patch a "critical" flaw in Pan-OS that can be remotely exploited to bypass authentication and take full control of systems or gain access to networks, U.S. Cyber Command and the Cybersecurity Infrastructure and Security Agency warn.

More Trending

article thumbnail

OnDemand | Excelling in Difficult Times and Doing Business in the New Normal

Data Breach Today

Leadership Insights with John Chambers This webinar will provide leaders inside and outside of contact centers with actionable recommendations and proven strategies to keep your organization and its' teams moving forward in our rapidly changing world.

IT 231
article thumbnail

EU Commission Launches Public Consultation on NIS Directive Revision

Hunton Privacy

On June 25, 2020, the European Commission (the “EU Commission”) launched a public consultation on the revision of the Directive on Security of Network and Information Systems (the “ NIS Directive ”). According to the EU Commission, a revision is needed because cybersecurity capabilities in EU Member States remain unequal despite progress made with the NIS Directive, and the level of protection in the EU is insufficient.

article thumbnail

Bills Call for State, White House Cybersecurity Coordinators

Data Breach Today

State Coordinators Would Be Appointed by CISA A bipartisan group of U.S. senators is calling for federal funding for cybersecurity coordinators in every state. Meanwhile, a measure introduced in the House would restore the position of cybersecurity director in the White House.

article thumbnail

CISA: Nation-State Attackers Likely to Exploit Palo Alto Networks Bug

Threatpost

An authentication-bypass vulnerability allows attackers to access network assets without credentials when SAML is enabled on certain firewalls and enterprise VPNs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ransomware Targets Mac Users

Data Breach Today

Malwarebytes Says Malware Hidden in Fake Installer for 'Little Snitch' App A ransomware strain targeting Mac users is spreading via a fake installer for Little Snitch - a host-based application firewall for macOS - according to the security firm Malwarebytes, which says the malware is poorly designed.

article thumbnail

Personal data of thousands of users from the UK, Australia, South Africa, the US, Singapore exposed in bitcoin scam

Security Affairs

Group-IB discovered thousands of personal records of users from multiple countries exposed in a targeted multi-stage bitcoin scam. Group-IB, a global threat hunting and intelligence company headquartered in Singapore, has discovered thousands of personal records of users from the UK, Australia, South Africa, the US, Singapore, Spain, Malaysia and other countries exposed in a targeted multi-stage bitcoin scam.

article thumbnail

Off the Record: Zoom Trials

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes. No, we didn’t write these articles —hence the name of this series, “Off the Record”— fortunately, we didn’t need to in order to share the knowledge with our subscribers.

article thumbnail

COVID-19 Puts ICS Security Initiatives 'On Pause'

Dark Reading

Security pros concerned that increased remote access to vulnerable operational technology and stalled efforts to harden OT environments puts critical infrastructure at greater risk.

Security 102
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

APTs will exploit Palo Alto Networks’s PAN-OS flaw soon, US Cyber Command says

Security Affairs

U.S. Cyber Command believes foreign APTs will likely attempt to exploit the recently addressed flaw in Palo Alto Networks’s PAN-OS firewall OS. Recently Palo Alto Network addressed a critical vulnerability , tracked as CVE-2020-2021, affecting the PAN-OS operating system that powers its next-generation firewall. The flaw could allow unauthenticated network-based attackers to bypass authentication, it has has been rated as critical severity and received a CVSS 3.x base score of 10.

article thumbnail

Android Apps Stealing Facebook Credentials

Schneier on Security

Google has removed 25 Android apps from its store because they steal Facebook credentials : Before being taken down, the 25 apps were collectively downloaded more than 2.34 million times. The malicious apps were developed by the same threat group and despite offering different features, under the hood, all the apps worked the same. According to a report from French cyber-security firm Evina shared with ZDNet today, the apps posed as step counters, image editors, video editors, wallpaper apps, fl

Security 112
article thumbnail

Attackers Will Target Critical PAN-OS Flaw, Security Experts Warn

Dark Reading

After Palo Alto Networks alerted users to a simple-to-exploit vulnerability in its network security gear, security agencies quickly warn that attackers won't wait to jump on it.

Security 111
article thumbnail

Five network essentials to connect your business to anything

OpenText Information Management

The global COVID-19 pandemic has highlighted the importance for companies to find a trusted partner that can seamlessly connect their digital ecosystem together. Companies today potentially work with thousands of trading partners all over the world and during periods of disruption, supply chain teams need to ensure they have end-to-end visibility of their entire business … The post Five network essentials to connect your business to anything appeared first on OpenText Blogs.

IoT 79
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

German BGH Decision Confirms Interplay Between Collection of Personal Data and Competition Law

Hunton Privacy

On June 23, 2020, the German Federal Court of Justice (the Bundesgerichtshof , or “BGH”) issued a decision confirming the enforceability, in preliminary proceedings, of the order of the German Federal Cartel Office (the “ Bundeskartellamt ”) against Facebook’s data practices. On February 2, 2019, the Bundeskartellamt issued an order prohibiting Facebook from combining user data from different sources.

article thumbnail

FCC Designates Huawei & ZTE as National Security Threats

Dark Reading

Backdoors in 5G network equipment from these vendors could enable espionage and malicious activity, agency says.

Security 104
article thumbnail

The Various Aspects of Db2 for z/OS Data Encryption

Robert's Db2

Just last week, a person on the Db2 for z/OS team at an organization asked me for some guidance regarding data encryption in a Db2 context. In responding to that request, I noted that Db2 for z/OS data encryption is a multifaceted topic, and I proceeded to describe various categories of Db2 data encryption and the Db2 features and functions that pertain to those categories.

article thumbnail

Don't Slow Cybersecurity Spending: Steer into the Skid with a Tight Business Plan

Dark Reading

We all know there are slippery conditions ahead, which is why it's never been more important for organizations to maintain and even increase their spending on cybersecurity.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Think Ransomware Can’t Put You Out of Business?

Adam Levin

We’re not even halfway through 2020, and already it’s been a record-breaking year for ransomware attacks. Barely a week goes by without reports of a new strain or variant of malware wreaking havoc among companies. 1-99-employee companies are a target. No industry, category, size, or group is safe from this cyber scourge. We hear about the big ones.

article thumbnail

UCSF Pays $1.14M After NetWalker Ransomware Attack

Threatpost

UCSF has paid more than $1 million after a ransomware attack encrypted data related to "important" academic research on several servers.

article thumbnail

Key Takeaways From Sidley’s Privacy and Cybersecurity Monitor-Side Chat Featuring Bruno Gencarelli, Head of International Data Flows and Protection at the European Commission

Data Matters

On June 25, 2020, Sidley partner, Alan Raul, founder and co-head of Sidley’s privacy and cybersecurity practice, hosted Bruno Gencarelli, head of International Data Flows and Protection at the European Commission, for a Monitor-Side Chat. The discussion focused largely on the Commission’s report on two years of the GDPR which was issued on 24 June 2020.

Privacy 68
article thumbnail

CISA Issues Advisory on Home Routers

Dark Reading

The increase in work-from-home employees raises the importance of home router security.

Security 110
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

EvilQuest Mac Ransomware Has Keylogger, Crypto Wallet-Stealing Abilities

Threatpost

A rare, new Mac ransomware has been discovered spreading via pirated software packages.

article thumbnail

Automation in OpenText Media Management

OpenText Information Management

When managing a Digital Asset Management (DAM) system, many administrators quickly find that the management part is the hardest to get right. In addition to standard asset governance processes, such as approval, expiration and archiving, digital assets present special challenges. Assets in a DAM can be very complex – these are typically large high-resolution images … The post Automation in OpenText Media Management appeared first on OpenText Blogs.

article thumbnail

3 Years After NotPetya, Many Organizations Still in Danger of Similar Attacks

Dark Reading

The same gaps that enabled ransomware to spread remain in patching, network segmentation, backup practices, security experts say.