Mon.Apr 05, 2021

article thumbnail

Facebook Data Exposure: Lessons to Learn

Data Breach Today

Experts Advise Organizations to Check Password Reset Policies, Take Other Steps The revelation that 533 million previously stolen Facebook account records have been made public on a darknet forum should inspire organizations to take aggressive action to further protect customer data security, some security experts say.

Passwords 297
article thumbnail

Ransom Gangs Emailing Victim Customers for Leverage

Krebs on Security

Some of the top ransomware gangs are deploying a new pressure tactic to push more victim organizations into paying an extortion demand: Emailing the victim’s customers and partners directly, warning that their data will be leaked to the dark web unless they can convince the victim firm to pay up. This letter is from the Clop ransomware gang, putting pressure on a recent victim named on Clop’s dark web shaming site. “Good day!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Capital One Warns of More Data Leaked in 2019 Breach

Data Breach Today

Additional Social Security Numbers May Have Been Exposed Capital One is warning additional customers that their Social Security numbers may have been exposed in a massive 2019 breach. Meanwhile, a suspect in the breach is slated to go to trial in October.

Security 282
article thumbnail

GUEST ESSAY: The missing puzzle piece in DevSecOps — seamless source code protection

The Last Watchdog

We live in a time where technology is advancing rapidly, and digital acceleration is propelling development teams to create web applications at an increasingly faster rhythm. The DevOps workflow has been accompanying the market shift and becoming more efficient every day – but despite those efforts, there was still something being overlooked: application security.

Marketing 129
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ubiquiti's Breach Notification: The 'No Evidence' Hedge

Data Breach Today

Being 'Not Currently Aware' Customer Data Was Stolen Doesn't Mean It's Safe When a breached organization such as Ubiquiti says it is "not currently aware of evidence" that attackers stole customer data, it too often means: "We don't know, because we failed to have in place the robust logging and monitoring capabilities that might have provided us all with real answers.

IT 279

More Trending

article thumbnail

Ariel Weintraub Takes Charge of Cybersecurity at MassMutual

Data Breach Today

New Head of Enterprise Cybersecurity Succeeds CISO Jim Routh Less than a year ago, Ariel Weintraub was dabbling in data science as head of security operations and engineering at MassMutual, working under CISO Jim Routh. Now she’s replaced Routh as the new head of enterprise cybersecurity - and she welcomes the challenge.

article thumbnail

Wi-Fi Devices as Physical Object Sensors

Schneier on Security

The new 802.11bf standard will turn Wi-Fi devices into object sensors: In three years or so, the Wi-Fi specification is scheduled to get an upgrade that will turn wireless devices into sensors capable of gathering data about the people and objects bathed in their signals. “When 802.11bf will be finalized and introduced as an IEEE standard in September 2024, Wi-Fi will cease to be a communication-only standard and will legitimately become a full-fledged sensing paradigm,” explains Fra

article thumbnail

Healthcare Phishing Incidents Lead to Big Breaches

Data Breach Today

Patient Data Exposed in Several Email-Related Cases As healthcare sector organizations continue to fall victim to phishing incidents, the number of individuals affected by health data breaches involving compromised email accounts continues to rise.

Phishing 214
article thumbnail

Firmware attacks, a grey area in cybersecurity of organizations

Security Affairs

A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. Microsoft recently published a report that states, titled “March 2021 Security Signals report,” that revealed that more than 80% of enterprises were victims of at least one firmware attack in the past two years. The study pointed out that only 29% of the targeted organizations have allocated budgets to protect firmware.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

15 Cybersecurity Pitfalls and Fixes for SMBs

Threatpost

In this roundtable, security experts focus on smaller businesses offer real-world advice for actionable ways to shore up defenses using fewer resources.

article thumbnail

2,5M+ users can check whether their data were exposed in Facebook data leak

Security Affairs

You can check if your personal information is included in the Facebook data leak by querying the data breach notification service Have I Been Pwned. The news of the availability on a hacking forum of the personal information for 533,313,128 Facebook users made the headlines. The availability of the data was first reported by Alon Gal, CTO of cyber intelligence firm Hudson Rock.

article thumbnail

Yesterday’s collection woes need not be today’s (or tomorrow’s) problem

OpenText Information Management

Collection is often considered the most technically rigorous and complex phase of eDiscovery—it involves the acquisition of potentially relevant electronically stored information (ESI) from native sources into an eDiscovery platform for investigation or review. Collection is also the stage at which large and unexpected risks, time delays and unnecessary costs can quickly spiral out of … The post Yesterday’s collection woes need not be today’s (or tomorrow’s) problem appeared first on OpenT

Risk 93
article thumbnail

LinkedIn Phishing Ramps Up With More-Targeted Attacks

Dark Reading

Seeking to take advantage of out-of-work users, malware groups continue to use LinkedIn and business services to offer fictional jobs and deliver infections instead.

Phishing 121
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Thales Earns 5-Star Rating in 2021 CRN Partner Program Guide

Thales Cloud Protection & Licensing

Thales Earns 5-Star Rating in 2021 CRN Partner Program Guide. madhav. Tue, 04/06/2021 - 06:57. CRN, a brand of the Channel Company, publishes its Partner Program Guide every year as a means for solutions providers to learn more about the partner programs operated by some of the industry’s leading technology companies that offer IT products and services including IT manufacturers, software developers, distributors and more.

article thumbnail

LinkedIn Spear-Phishing Campaign Targets Job Hunters

Threatpost

Fake job offers lure professionals into downloading the more_eggs backdoor trojan.

Phishing 119
article thumbnail

7 Ways to Reduce Cyber Threats From Remote Workers

Dark Reading

The pandemic's decline won't stop the work-from-home trend nor the implications for cybersecurity, so it's crucial to minimize the threats.

article thumbnail

How To Defend the Extended Network Against Web Risks

Threatpost

Aamir Lakhani, cybersecurity researcher for Fortinet’s FortiGuard Labs, discusses criminals flocking to web server and browser attacks, and what to do about it.

Risk 79
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Security in the healthcare spotlight

OpenText Information Management

One of the most significant priorities facing healthcare in 2021 is the need for improved security. The rapid move to remote platforms and telehealth has increased the attack surface for cyberattacks targeting healthcare organizations. As a joint alert from the Department of Health and Human Services, the Department of Homeland Security’s Cybersecurity and Infrastructure Security … The post Security in the healthcare spotlight appeared first on OpenText Blogs.

article thumbnail

Apple Mail Zero-Click Security Vulnerability Allows Email Snooping

Threatpost

The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two.ZIP files attached.

article thumbnail

Name That Edge Toon: Rough Patch?

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

73
article thumbnail

533M Facebook Accounts Leaked Online: Check if You Are Exposed

Threatpost

An estimated 32 million, of the half-billion of Facebook account details posted online, were tied to US-based accounts.

Privacy 82
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

To be or not to be. an “autodialer”

Data Protection Report

On April 1, 2021, the U.S. Supreme Court decided the question whether the Telephone Consumer Protection Act’s (TCPA) definition of “autodialer”. encompasses equipment that can “store” and dial telephone numbers, even if the device does not “us[e] a random or sequential number generator.” It does not. To qualify as an “automatic telephone dialing system,” a device must have the capacity either to store a telephone number using a random or sequential generator or to produce a telephone number usin

Access 52
article thumbnail

Spy Operations Target Vietnam with Sophisticated RAT

Threatpost

Researchers said the FoundCore malware represents a big step forward when it comes to evasion.

IT 89
article thumbnail

Kaspersky Uncovers New APAC Cyberespionage Campaign

Dark Reading

A group related to Chinese-speaking threat group Cycldek is targeting government and military organizations in Vietnam.

article thumbnail

Zapproved Announces Release of ZDiscovery Platform

Zapproved

Zapproved's industry-leading legal hold software and our powerful processing & review engine all in one platform: Introducing ZDiscovery.

Cloud 59
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

California Supreme Court Requires All-Party Consent to Record Phone Calls

Hunton Privacy

On April 1, 2021, California’s Supreme Court ruled unanimously that the state’s prohibition on recording calls without consent applies to parties on the call and not just third-party eavesdroppers. Writing for the Court, Chief Justice Tani G. Cantil-Sakauye wrote that California’s penal code “prohibits parties as well as nonparties from intentionally recording a communication transmitted between a cellular or cordless phone and another device without the consent of all parties to the communicati

article thumbnail

Data from 553 Million Facebook Accounts Leaked Online

Dark Reading

Personal information belonging to more than 533 million Facebook users was found available on a cybercrime forum.

53
article thumbnail

Federal Acquisition Service Training (FAST) Monthly Conference Series – Electronic Records Management

National Archives Records Express

We will be presenting at an upcoming Federal Acquisition Service Training (FAST) Series on the Federal Electronic Records Modernization Initiative (FERMI). GSA welcomes you to attend and hear about acquiring services and solutions for Electronic Records Management on April 22nd at 1:00 p.m. EST to discover best practices, tools and techniques to get the most out of your next Electronic Records Management procurement. .