Mon.May 15, 2023

article thumbnail

Info-Stealing Malware Populates 'Cloud of Logs' Offerings

Data Breach Today

Private Subscription Services Emerge, Together With Fresh Strains of Info Stealers Cybercrime watchers continue to see prolific use of information-stealing malware such as Raccoon and Vidar, which are being used to populate stolen digital identity listings at markets such as Genesis, RussianMarket and TwoEasy, as well as via Telegram channels offering "clouds of logs.

Cloud 276
article thumbnail

SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars

The Last Watchdog

In an increasingly interconnected world, the evolution of the automotive industry presents an exciting yet daunting prospect. Related: Privacy rules for vehicles As vehicles continue to offer modern features such as app-to-car connectivity, remote control access, and driver assistance software, a huge risk lurks in the shadows. The physical safety of things like airbags, rearview mirrors, and brakes is well accounted for; yet cybersecurity auto safety concerns are rising to the fore.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PharMerica Reports Breach Affecting Nearly 6 Million People

Data Breach Today

Money Message Ransomware Group Threatens to Release 1.6 Million Records Institutional pharmacy PharMerica says personal data of nearly 6 million current and deceased patients was caught up in a March hacking incident. The Money Message ransomware group claims to be the attacker, posting on its dark web leak site multiple spreadsheets the group says contain patient data.

article thumbnail

New Rule for Digitizing Records: What you need to know

National Archives Records Express

Welcome to the first in a series of blog posts on the new rule for digitizing federal records. As we mentioned in a previous post , the National Archives and Records Administration (NARA) recently published the final rule for digitizing permanent federal records. This new rule, known as 36 CFR § 1236 Subpart E, will be effective starting June 5, 2023.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

What the Uber-Joe Sullivan Case Means for CISO Liability

Data Breach Today

Attorney Lisa Sotto Advises Security Leaders to Seek Adequate Liability Coverage Former chief security officer Joe Sullivan avoided jail time for his role in impeding a federal investigation into Uber's security practices, but attorney Lisa Sotto of Hunton Andrews Kurth LLP warned security leaders and executives "to take heed" and ensure they are covered for personal liability.

Security 147

More Trending

article thumbnail

What's Inside Washington State's New My Health My Data Act

Data Breach Today

Organizations of all types have important work ahead to comply with Washington state's new My Health My Data Act, which pertains to any entity - inside or outside the state - that handles health data of consumers in the state, said Cat Kozlowski, attorney at law firm Polsinelli.

130
130
article thumbnail

Micro-Star International Signing Key Stolen

Schneier on Security

Micro-Star International—aka MSI—had its UEFI signing key stolen last month. This raises the possibility that the leaked key could push out updates that would infect a computer’s most nether regions without triggering a warning. To make matters worse, Matrosov said, MSI doesn’t have an automated patching process the way Dell, HP, and many larger hardware makers do.

IT 97
article thumbnail

Why 'Shift Left' Leads to Unrealistic Security Expectations

Data Breach Today

Gayatri Prakash of CloudBees on Reducing the Noise From Tools, Automating Processes The "shift left" movement puts "unrealistic" expectations on developers, said Gayatri Prakash, vice president and general manager of compliance at CloudBees. She said installing new tools to manage various parts of the SDLC is not necessarily "going to solve our problem for security.

Security 130
article thumbnail

DDoS Myths: Blackholing and Outsourcing Won’t Stop Everything

eSecurity Planet

Gone are the days when you could get away with doing nothing to prepare for DDoS attacks. With the cost of DDoS attacks falling and their frequency and sophistication growing, even organizations that think their profile is too low to worry about DDoS can still become victims. Even organizations that think they’re protected against DDoS attacks may be more at risk than they think.

Cloud 93
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bipartisan Bill Aims to Shut Rural Hospital Cyber Skill Gaps

Data Breach Today

Calls for CISA to Develop Cyber Workforce Development Strategy New bipartisan legislation introduced in the U.S. Senate - the Rural Hospital Cybersecurity Enhancement Act - aims to help address the shortage of cybersecurity skills facing rural hospitals, which increasingly find themselves in the crosshairs of hackers, including ransomware attackers.

article thumbnail

Former Ubiquiti employee gets 6 years in jail for stealing confidential data and extorting company

Security Affairs

A former Ubiquiti employee has been sentenced to six years in jail for the theft of confidential data and extorting company for ransom. NICKOLAS SHARP, a former Ubiquiti employee was sentenced today to six years in prison. In December 2020, SHARP stole gigabytes of data from the company, then he posed as an anonymous hacker that was offering support to the company to recover the stolen files and identify the alleged flaw exploited in the alleged security incident. “In December 2020, SHARP

article thumbnail

Toyota Discloses Decade-Long Data Leak Exposing 2.15M Customers' Data

Dark Reading

A misconfigured cloud instance exposed vehicle data, but not personally identifiable information, the car maker says.

Cloud 112
article thumbnail

PharMerica data breach impacts more than 5.8 million individuals

Security Affairs

National pharmacy network PharMerica discloses a data breach that impacted more than 5.8 million individuals. National pharmacy network PharMerica disclosed a data breach that exposed the personal information of 5,815,591 individuals. The incident took place in March and the company started notifying the impacted individuals via letter. The company is the second largest in the institutional pharmacy services market, with revenues of $1.9 billion and a customer base of 330,000 “beds”

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Buffalo Mass Shooting Victims' Families Sue Meta, Reddit, Amazon

WIRED Threat Level

The families of victims of a mass shooting in Buffalo are challenging the platforms they believe led the attacker to carry out a racist massacre.

article thumbnail

New RA Group ransomware gang is the latest group using leaked Babuk source code

Security Affairs

A previously unknown ransomware group known as RA Group is targeting companies in U.S. and South Korea with leaked Babuk source code. Cisco Talos researchers recently discovered a new ransomware operation called RA Group that has been active since at least April 22, 2023. The group has already compromised three organizations in the U.S. and one in South Korea.

article thumbnail

The State of Organizational Cyber Defenses Impacts Cyber Insurance Availability, Cost, and Terms

KnowBe4

A new report highlights the direct connection between how strong your organization’s security stance is and how easy it is to obtain cyber insurance.

article thumbnail

Lancefly APT uses powerful Merdoor backdoor in attacks on Asian orgs

Security Affairs

The Lancefly APT group is using a custom powerful backdoor called Merdoor in attacks against organizations in South and Southeast Asia. Symantec researchers reported that the Lancefly APT group is using a custom-written backdoor in attacks targeting organizations in South and Southeast Asia, as part of a long-running campaign. The highly-targeted attacks aim at organizations in government, aviation, education, and telecom sectors.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Ransomware Gangs are “Big Game Hunting” as Victim Org Sizes and Ransom Payments Continue to Rise

KnowBe4

Midsize and enterprise organizations take notice: the average and median amount of a ransom payment and the median size of the victim organization are on the rise.

article thumbnail

RA Ransomware Group Emerges With Custom Spin on Babuk

Dark Reading

The freshly minted ransomware gang is customizing leaked Babuk source code to go after cyber targets in the US and South Korea — and it's expanding its operations quickly.

article thumbnail

Leveraging partnerships, technology, and design to enhance water quality through the inaugural Aquality app

IBM Big Data Hub

Summary: Together with IBM, Deltares is working to enhance and expand the reach of its Aquality app, formerly called the Nitrate app. The tool can help farmers improve water quality, protect biodiversity, save on fertilizer costs and make farming practices more sustainable. The Aquality app leverages technologies such as machine learning to help communities detect nitrate pollution and other quality characteristics in water and is experimenting with artificial intelligence to provide feedback an

article thumbnail

How the China Personal Information Protection Law Applies to Foreign Asset Managers

Data Matters

Since China’s Personal Information Protection Law (PIPL) came into effect in November 2021, there has been widespread uncertainty amongst offshore fund managers and investors with entities outside Mainland China as to how and whether the regime applies to them. Given the potential for foreign asset managers to overlook or misinterpret PIPL, this brief update outlines some guidance as to how PIPL can apply, and to whom, in a practical context.

Privacy 97
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Introducing the DRM-Report Q1 2023: Unveiling the Current State of Ransomware

Security Affairs

DRM Dashboard Ransomware Monitor released the first quarterly report for the year 2023 about the activities of ransomware groups globally. DRM Dashboard Ransomware Monitor, an independent platform of cybersecurity monitoring, is pleased to release the quarterly the DRM-Report for the first quarter of 2023. This comprehensive report delves into the alarming rise of ransomware attacks worldwide and provides valuable insights into the landscape of cybercriminal activities.

article thumbnail

PharMerica Leaks 5.8M Deceased Users' PII, Health Information

Dark Reading

Relatives are being alerted that a PharMerica compromise exposed the sensitive data of their deceased loved ones, which could be used for identity theft.

84
article thumbnail

FTC Warns of MetaMask and PayPal Phishing Campaigns

KnowBe4

The US Federal Trade Commission has issued an alert warning of phishing campaigns that are impersonating PayPal and the MetaMask cryptowallet.

article thumbnail

Unlock productivity with advanced generative AI

IBM Big Data Hub

AI and automation are driving business transformation by empowering individuals to do work without expert knowledge of business processes and applications. Whether it’s an employee who knows what they need but doesn’t know how to do it, a knowledge worker who knows how to do the task but needs help doing it more efficiently, or a customer who wants to resolve an issue but struggles with self-help tools, artificial intelligence (AI) unlocks new levels of productivity by empowering ind

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Breaking the DDoS Attack Loop With Rate Limiting

Dark Reading

This Tech Tip demonstrates how security engineers can best use rate limits to mitigate distributed denial-of-service attacks.

article thumbnail

IBM Tech Now: May 15, 2023

IBM Big Data Hub

​Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published. IBM Tech Now: Episode 76 We’re covering all the exciting watsonx news coming out of Think 2023 this week: Introducing watsonx: The future of AI for business Introducing the technology behind watsonx.ai, IBM’s AI and data platform for enterpr

Cloud 71
article thumbnail

The Face Off: AI Deepfakes and the Threat to the 2024 Election

KnowBe4

The Associated Press warned this week that AI experts have raised concerns about the potential impact of deepfake technology on the upcoming 2024 election. Deepfakes are highly convincing digital disinformation, easily taken for the real thing and forwarded to friends and family as misinformation.