Fri.Sep 03, 2021

article thumbnail

Facebook's WhatsApp Hit With $266 Million GDPR Fine

Data Breach Today

Transparency Shortfalls Cited, as WhatsApp Accused of Not Revealing Data Sharing Ireland's privacy law enforcer, the Data Protection Commission, has hit WhatsApp with a 225 million euro ($266 million) fine, finding that it violated the EU's General Data Protection Regulation in part by not telling users how it was sharing their data with parent company Facebook.

GDPR 363
article thumbnail

Apple Backs Down on Its Controversial Photo-Scanning Plans

WIRED Threat Level

A sustained backlash against a new system to look for child sexual abuse materials on user devices has led the company to hit pause.

IT 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2 UK Telecom Firms Under DDoS Attacks

Data Breach Today

Ongoing Attacks Disrupt Voip Unlimited and Voipfone Services Voip Unlimited and Voipfone, two Voice over Internet Protocol-based telecom companies in the U.K., report being victims of ongoing distributed denial-of-service attacks that have disrupted services.

360
360
article thumbnail

FBI warns of ransomware attacks targeting the food and agriculture sector

Security Affairs

FBI warns ransomware gangs are actively targeting organizations in the food and agriculture sector. The FBI Cyber Division issued a Private Industry Notification (PIN) to warn of ransomware attacks targeting the Food and Agriculture sector disrupting its operations, causing financial loss and negatively impacting the overall food supply chain. Small farms, large producers, processors and manufacturers, and markets and restaurants are particularly exposed to ransomware attacks. “Cyber crimi

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Atlassian Vulnerability Being Exploited in the Wild

Data Breach Today

Cyber Command and CISA Issue Alerts Cyber Command and the U.S. Cybersecurity and Infrastructure Security Agency issued alerts Friday warning those using Atlassian's Confluence and Data Center products that attackers are actively exploiting the critical remote code execution vulnerability CVE-2021-26084.

More Trending

article thumbnail

Could Lessons From Plane Hijackings Help Fight Ransomware?

Data Breach Today

Atlantic Council: Extortion Is an Old Crime; We Have Existing Strategies Ransomware is the result of a criminal blending technology's wonders: networking and encryption. It's a modern day implementation of extortion, a crime as old as time. The Atlantic Council contends lessons from fighting past extortion schemes, such as plane hijackings, could help fight ransomware.

article thumbnail

PRIVATELOG, a new malware that leverages Common Log File System (CLFS) to avoid detection

Security Affairs

Mandiant researchers spotted a new malware family, dubbed PRIVATELOG, that relies on the Common Log File System (CLFS) to evade detection solutions. FireEye’s Mandiant cybersecurity researchers spotted a new malware family, named PRIVATELOG, that relies on the Common Log File System ( CLFS ) to hide a second-stage payload in registry transaction files to avoid detection.

article thumbnail

Analysis: The Latest Data Breach Trends

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of data breach trends. Also featured: yet another Microsoft Exchange vulnerability and misconceptions about cybercrime groups.

article thumbnail

Introducing the New and Improved Bulletin B!

The Texas Record

On August 31, 2021 , the newest edition of 13 TAC §7, otherwise known as Bulletin B , will go live! The updates to 13 TAC §7 are adopted as an administrative rule of the Commission—and are located in the Texas Register. For local governments, this means that all previous versions of 13 TAC §7 will be obsolete, and we recommend your organization accesses the updated rules in order to follow the most updated version of Bulletin B.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Conti Ransomware Threat Rising as Group Gains Affiliates

Data Breach Today

Playbook Leak Reveals Effective Training Program for Less-Sophisticated Affiliates As the United States heads into a holiday weekend, experts are warning that ransomware-wielding attackers are sure to unleash crypto-locking chaos in the coming days, with Conti ransomware attacks in particular having been rising sharply in recent weeks.

article thumbnail

Conti ransomware gang targets Microsoft Exchange servers with ProxyShell exploits

Security Affairs

The Conti ransomware operators are targeting Microsoft Exchange servers leveraging recently disclosed ProxyShell vulnerability exploits. The Conti ransomware gang is targeting Microsoft Exchange servers leveraging exploits with recently disclosed ProxyShell vulnerabilities. ProxyShell is the name of three vulnerabilities that could be chained by an unauthenticated remote attacker to gain code execution on Microsoft Exchange servers.

article thumbnail

SEC Charges BitConnect on $2 Billion Fraud Scheme

Data Breach Today

Experts Warn of Continued Scrutiny in Cryptocurrency Markets The U.S. SEC announced civil action against defunct cryptocurrency lending platform BitConnect for allegedly defrauding investors out of $2 billion. In response, experts say cryptocurrency markets will face continued scrutiny over investor protections, fraud and security.

Marketing 267
article thumbnail

Weekly Update 259

Troy Hunt

I'm  back from the most epic of holidays! How epic? Just have a scroll through the thread: I’m back! Went offline for most of the last week, pics and stories to follow 🐊 pic.twitter.com/hRUcKMwgGU — Troy Hunt (@troyhunt) September 2, 2021 Which the Twitter client on my iPad somehow decided to break into 2 threads: At times this felt like navigating through a scene from Jurassic Park, just with wallabies rather than velociraptors 🦖 pic.twitter.com/VHa4kJw6k

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Lawsuit Alleges Security Failures at Clinic

Data Breach Today

DuPage Medical Group Sued After Breach Affecting 655,000 DuPage Medical Group in suburban Chicago has been smacked with a lawsuit following its recent "network outage" health data breach, which was reported to regulators as potentially affecting the protected health information of more than 655,000 individuals. What are plaintiffs alleging?

article thumbnail

AWS for Health and OpenText for Healthcare – Better together

OpenText Information Management

Earlier this month Amazon Web Services introduced AWS for Health, an offering of curated AWS services and AWS Partner Network solutions used by thousands of healthcare and life sciences customers globally. AWS for Health provides proven and easily accessible capabilities that help organizations increase the pace of innovation, unlock the potential of health data, and … The post AWS for Health and OpenText for Healthcare – Better together appeared first on OpenText Blogs.

Access 90
article thumbnail

Attackers Are Selling Their Victims’ Internet Bandwidth

Data Breach Today

Report Claims Criminals Are Installing Proxyware Service Security firm Cisco Talos reported this week that cybercriminals have found a new way to make money from their victims, by abusing internet-sharing "proxyware" platforms such as Honeygain and Nanowire to illegally share their victim’s internet connection.

Security 232
article thumbnail

The State of Incident Response: Measuring Risk and Evaluating Your Preparedness

Threatpost

Grant Oviatt, director of incident-response engagements at Red Canary, provides advice and best practices on how to get there faster.

Risk 100
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The Deadline for Hospital Future Act (KHZG) Funding is Swiftly Approaching

HID Global

The Deadline for Hospital Future Act (KHZG) Funding is Swiftly Approaching. mzillig. Fri, 09/03/2021 - 12:21.

88
article thumbnail

Brute-Force Attacks Target Inboxes for Gift Card Data

Threatpost

Cybercriminal enterprise is mass testing millions of usernames and passwords per day in a hunt for loyalty card data.

article thumbnail

Why Ransomware Hackers Love a Holiday Weekend

WIRED Threat Level

Looking forward to Labor Day? So are ruthless gangs of cybercriminals.

article thumbnail

Jamf + Oomnitza: Managing endpoints in an increasingly dynamic IT environment

Jamf

Managing mobile devices and its growing complexities shouldn’t be a constant source of stress for organizations. Integrating Oomnitza with Jamf Pro to successfully manage devices while providing insight into device health leverages technology in ways that keeps devices performing optimally and data safeguarded while ensuring compliance.

IT 78
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

FIN7 Capitalizes on Windows 11 Release in Latest Gambit

Threatpost

The financially motivated group looked to steal payment-card data from a California-based point-of-sale service provider.

Sales 81
article thumbnail

What’s new in OpenText Exceed TurboX 12.0.4

OpenText Information Management

As remote work has become the new normal, remote access to business-critical software has become the norm and needs to be supported on any platform and any device. With OpenText™ Exceed TurboX (ETX) 12.0.4, OpenText is introducing a new universal client for remote access from any platform and any device. The performance of remote access … The post What’s new in OpenText Exceed TurboX 12.0.4 appeared first on OpenText Blogs.

Access 63
article thumbnail

History of the HX-63 Rotor Machine

Schneier on Security

Jon D. Paul has written the fascinating story of the HX-63, a super-complicated electromechanical rotor cipher machine made by Crypto AG.

article thumbnail

Performance considerations for cloud services provisioning: Infrastructure services

OpenText Information Management

In the competitive business world, the responsiveness of business applications plays a vital role in business success. As volumes of business users and transactions grow, responsiveness becomes a concern if the underlying environment does not support the load. This can even lead to business downtime in persistent load scenarios as a backlog of requests builds … The post Performance considerations for cloud services provisioning: Infrastructure services appeared first on OpenText Blogs.

Cloud 58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Dentons artificial intelligence (AI) survey

Privacy and Cybersecurity Law

Artificial Intelligence (AI) is one of the most transformative technologies that we have ever experienced. Yet, the deployment of AI continues to raise legal and ethical questions that institutions are struggling to solve, with a continuous effort to regulate without over-regulating. Are businesses ready for the AI revolution? To gain deeper insight into AI issues and opportunities, and to understand business readiness for AI transformation, we invite you to complete our global AI Survey.

article thumbnail

Performance considerations for cloud services provisioning: Value-added services

OpenText Information Management

In our first blog, I discussed performance parameters for cloud services that were specific toinfrastructureApart from infrastructure services, though, cloud providers also provide value-added services that can be used to manage and augment non-functional performance requirements of business applications. This blog describes performance parameters for cloud services that are specific to two value-added services: performance … The post Performance considerations for cloud services provision

Cloud 58
article thumbnail

Hacker-Themed Board Game

Schneier on Security

Black Hat is a hacker-themed board game.

98