Wed.Feb 10, 2021

article thumbnail

Senators Demand More Coordination in SolarWinds Investigation

Data Breach Today

Warner and Rubio Call for Designation of Leader of Four-Agency Effort Citing a lack of coordination and transparency, U.S. Sens. Mark Warner and Marco Rubio of the Intelligence Committee are urging the four federal agencies investigating the cyberattack that targeted SolarWinds and other organizations to designate a leader for their investigative efforts.

363
363
article thumbnail

Catches of the month: Phishing scams for February 2021

IT Governance

Cyber criminals have had constant success with coronavirus-related phishing scams, but their most recent campaign is the most dangerous we’ve seen. There have been multiple reports of people receiving an email purportedly from the NHS, saying they can book an appointment to receive their first COVID-19 vaccine. The sophisticated scam preys on people’s eagerness to be vaccinated and the much-publicised fact that the NHS is indeed emailing people to book vaccines.

Phishing 128
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Patient Files Dumped on Darknet Site After Hacking Incidents

Data Breach Today

Data Appears to Come From 2 Healthcare Organizations in Florida, Texas The Conti cybercrime gang has reportedly leaked sensitive patient data, as well as employee records, on a darknet site following recent hacker attacks on a two healthcare organizations in Florida and Texas.

359
359
article thumbnail

EU Member States Agree on Council’s Text for the ePrivacy Regulation

Hunton Privacy

On February 10, 2021, representatives of the EU Member States reached an agreement on the Council of the European Union’s (the “Council’s”) negotiating mandate for the draft ePrivacy Regulation, which will replace the current ePrivacy Directive. The text approved by the EU Member States was prepared under Portugal’s Presidency and will form the basis of the Council’s negotiations with the European Parliament on the final terms of the ePrivacy Regulation.

Metadata 126
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Microsoft Issues Second Patch for Netlogon Vulnerability

Data Breach Today

First Patch for 'Zerologon' Flaw Had Been Issued Last August Microsoft has finally pushed out the second half of the software patch for the "Zerologon" privilege escalation vulnerability in the Windows Netlogon Remote Protocol more than five months after the first half of the patch was issued.

336
336

More Trending

article thumbnail

Chinese APT Group Deploys ‘Most Sophisticated’ Shellcode

Data Breach Today

Newly Discovered BendyBear's Advanced Features Include Anti-Analysis Capabilities BlackTech, a Chinese advanced persistent threat group, is deploying a sophisticated new shellcode called BendyBear as part of its latest espionage campaign, security firm Palo Alto Networks reports.

Security 312
article thumbnail

Top 5 digital technology trends in Life Sciences in 2021

OpenText Information Management

In its ‘Covid-19: Accelerating digital transformation for Life Sciences’, Reuters states: “COVID-19 has placed the life sciences industry in Europe under extreme pressure, testing it like no other event. Lockdowns have shocked the system and exposed shortcomings, forcing every function to evaluate and adapt its roles and responsibilities almost overnight.

article thumbnail

How Deepfakes Can Defeat Video ID Verification Tests

Data Breach Today

Ilya Volovik of Gemini Advisory Describes Research Findings Banking institutions, cryptocurrency exchanges and other companies have begun implementing video-based identity verification. But deepfake technology can be used to circumvent these security checks, says Ilya Volovik, a researcher at Gemini Advisory.

Security 291
article thumbnail

Ransomware Profitability

Schneier on Security

Analyzing cryptocurrency data, a research group has estimated a lower-bound on 2020 ransomware revenue: $350 million, four times more than in 2019. Based on the company’s data, among last year’s top earners, there were groups like Ryuk, Maze (now-defunct), Doppelpaymer, Netwalker ( disrupted by authorities ), Conti, and REvil (aka Sodinokibi).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Florida's Water Hack: Poor IT Security Laid Bare

Data Breach Today

Oldsmar Used Windows 7, Shared TeamViewer Password, Didn't Have a Firewall The Florida city that experienced a breach of its water treatment system used now-unsupported Windows 7 machines, shared the same password for remote access and had no firewall. The incident is likely to raise questions over the vulnerability of critical infrastructure in small towns on slim IT security budgets.

IT 279
article thumbnail

Anti-malware firm Emsisoft accidentally exposes internal DB

Security Affairs

Antivirus firm Emsisoft discloses a data breach, a third-party had access to a publicly exposed database containing technical logs. The anti-malware solutions provider Emsisoft disclosed last week a data breach. The company revealed that a third-party had accessed a publicly exposed database containing technical logs. The root cause of the incident was a misconfiguration of a database, used in a test environment, that was exposed to the Internet.

article thumbnail

SIM-Swapping Hackers Steal Celebrities' Cryptocurrency

Data Breach Today

Police Arrest 10 Suspects on Hacking, Fraud and Money Laundering Charges Police have arrested 10 individuals suspected of being part of an international gang that targeted U.S. celebrities by using SIM-swapping attacks to steal cash and more than $100 million in cryptocurrency. Authorities say hackers continue to target cryptocurrency holders and exchanges.

279
279
article thumbnail

Will this recent High Court decision reduce the number of group-litigation claims?

DLA Piper Privacy Matters

A judgment handed down following a costs and case management conference in Weaver [2021] EWHC 217 (QB) appears to have struck a blow to claimant solicitors seeking to pursue group-action in the UK. Background. The UK ‘group action’ landscape is ever shifting, notably in the world of data protection compensation. The relatively steep growth in the number and scale of data protection claims can be traced back to the judgment in Vidal-Hall v Google Inc [2014] EWHC 13 (QB) , where damages for non-ma

Marketing 105
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

LodaRAT Malware Can Now Target Android Devices

Data Breach Today

Trojan's Operators Also Updated Version Used to Target Windows Devices The developers of LodaRAT malware, which has previously only targeted Windows devices, have developed a new variant, Loda4Android, that targets Android devices, according to Cisco Talos.

243
243
article thumbnail

SAP addresses a critical flaw in SAP Commerce Product

Security Affairs

SAP released seven new security notes on February 2021 Security Patch Day, including a Hot News note for a critical issue affecting SAP Commerce. SAP released seven new security notes on February 2021 Security Patch Day and updated six previously released notes. The new security notes include a Hot News note that addresses a critical vulnerability, tracked as CVE-2021-21477, in SAP Commerce.

article thumbnail

Hybrid, Older Users Most-Targeted by Gmail Attackers

Threatpost

Researchers at Google and Stanford analyzed a 1.2 billion malicious emails to find out what makes users likely to get attacked. 2FA wasn't a big factor.

Security 113
article thumbnail

CIPL Submits Response to European Commission’s Proposal for a Regulation on European Data Governance

Hunton Privacy

On February 5, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth submitted a response to the European Commission’s (the “Commission’s”) public consultation on the Commission’s Proposal for a Regulation on European Data Governance (the “Data Governance Act,” or “DGA”). This proposal is the first set of initiatives announced under the broader European Data Strategy.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

RIM industry mourns the unexpected passing of Noeleta Lacey

IG Guru

We have lost another great contributor to our industry. Noeleta Lacey, owner of Advanced Records in Lost Angeles, California passed away unexpectedly last week. A great tribute written by her friend Giovanna Giulia Spadoni can be found on LinkedIn here. Your i-SIGMA (PRISM/NAID) friends will miss you Noeleta. The post RIM industry mourns the unexpected passing of Noeleta Lacey appeared first on IG GURU.

98
article thumbnail

Digital experience for CFOs

OpenText Information Management

Implementing a digital experience platform (DXP) for your organization can be a significant financial commitment. But it’s also an investment that can pay considerable dividends. If you’re a marketing executive or CMO going to your CFO for DXP funds, you’ll likely need to explain what DXP is and what it can deliver for your organization. This blog post and associated executive brief are here to make your job … The post Digital experience for CFOs appeared first on OpenText Blogs.

article thumbnail

New York Department of Financial Services Issues First Guidance by a U.S. Regulator Concerning Cyber Insurance

Data Matters

On February 4, 2021, the New York Department of Financial Services (NYDFS) issued Circular Letter No. 2 announcing a Cyber Insurance Risk Framework (the Framework) that describes industry best practices for New York-regulated property/casualty insurers. Issuance of the Framework is notable as it represents the first official guidance by a U.S. regulator concerning the increasingly critical issue of cyberinsurance.

article thumbnail

A Barcode Scanner App With Millions of Downloads Goes Rogue

WIRED Threat Level

After an update in December, the app began infecting Android devices, bombarding users with ads on their default browser.

Security 103
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CD Projekt Red game maker discloses ransomware attack

Security Affairs

The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher, has disclosed a ransomware attack. The gaming firm CD Projekt Red, which developed popular games like Cyberpunk 2077 and The Witcher series, has suffered a ransomware attack. The company confirmed the security breach with a series of messages on its social media channels ( Facebook and Twitter ).

article thumbnail

SAP Commerce Critical Security Bug Allows RCE

Threatpost

The critical SAP cybersecurity flaw could allow for the compromise of an application used by e-commerce businesses.

Security 100
article thumbnail

Zero Trust in the Real World

Dark Reading

Those who are committed to adopting the concept have the opportunity to make a larger business case for it across the organization, working with executive leaders to implement a zero-trust framework across the entire enterprise.

IT 107
article thumbnail

Law enforcement arrested 8 people that targeted celebrities with SIM swapping attacks

Security Affairs

A total of eight criminals have been arrested on 9 February as a result of an international police operation into a series of SIM swapping attacks. Eight men were arrested in England and Scotland as part of a year-long international investigation into a series of SIM swapping attacks targeting high-profile victims in the United States. The investigation, coordinated by Europol, involved law enforcement authorities from the United Kingdom, United States, Belgium, Malta and Canada.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Reducing the data gap

OpenText Information Management

Manufacturing organizations have risen to the challenge of thwarting the disruptions from COVID-19. There’s plenty to applaud among companies across many sectors—automotive, high tech, and industrial and materials manufacturing. To meet consumer demand for products, they worked around the clock to keep plants operational, supply chains up and running, and production lines moving.

article thumbnail

Hacker Sets Alleged Auction for Witcher 3 Source Code

Threatpost

The ransomware gang behind the hack of CD Projekt Red may be asking for $1 million opening bids for the company's valuable data.

article thumbnail

Webinar: The Rules of Good Information Governance (IG) on March 16, 2021 8:45 AM Mountain via Wyoming Chapter of ARMA

IG Guru

2021 Wyoming Chapter of ARMA Mini Virtual Spring Seminar All Hands on Deck – The rules of good information governance (IG) apply now more than ever! Tuesday, March 16, 2021 8:45 A.M. – 11:00 A.M Virtual Event: Zoom Instructions will be sent closer to the event Registration is underway for the Wyoming Chapter of ARMA […]. The post Webinar: The Rules of Good Information Governance (IG) on March 16, 2021 8:45 AM Mountain via Wyoming Chapter of ARMA appeared first on IG GURU.