Wed.Sep 21, 2022

article thumbnail

Digital Bank Revolut Confirms Customer Data Breach

Data Breach Today

Names, Addresses, Emails and Telephone Numbers Exposed But Money Is Safe Customers of app-based bank Revolut should be on guard for phishing attempts after a data breach exposed personal details such as names, emails and telephone numbers. The London-based fintech startup told Lithuanian authorities the hacking incident affects more than 50,000 customers.

article thumbnail

SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity

The Last Watchdog

The pace and extent of digital transformation that global enterprise organizations have undergone cannot be overstated. Related: The criticality of ‘attack surface management’ Massive global macro-economic shifts have fundamentally changed the way companies operate. Remote work already had an impact on IT strategy and the shift to cloud, including hybrid cloud , well before the onset of Covid 19.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Group TeamTNT Returns with New Cloud Attacks

eSecurity Planet

A retired threat actor has returned with new attacks aimed at the cloud, containers – and encryption keys. The Aqua Nautilus research team observed three attacks that appeared very similar to those performed by TeamTNT, a threat actor specializing in cloud platforms and online instances such as Kubernetes clusters, Redis servers, and Docker APIs.

Cloud 135
article thumbnail

GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’

The Last Watchdog

Cybersecurity is a top concern for individuals and businesses in the increasingly digital world. Billion-dollar corporations, small mom-and-pop shops and average consumers could fall victim to a cyberattack. Related: Utilizing humans as security sensors. Phishing is one of the most common social engineering tactics cybercriminals use to target their victims.

Phishing 198
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Spell-Checking in Google Chrome, Microsoft Edge Browsers Leaks Passwords

Dark Reading

It's called "spell-jacking": Both browsers have spell-check features that send data to Microsoft and Google when users fill out forms for websites or Web services.

Passwords 116

More Trending

article thumbnail

Meru Data Podcast Features Sidley Associate Lauren Kitces

Data Matters

Sidley associate Lauren Kitces was featured on Simplify For Success, a podcast series presented by Meru Data and hosted by Priya Keshav. Lauren discussed FTC’s proposed rulemaking regarding data privacy and data security, and shared her thoughts on how to prepare for the FTC enforcement. Tune in here. The episode can also be found on various streaming platforms, including Apple Podcasts , Spotify , and Amazon Music.

article thumbnail

U.S. gov adds more Chinese Telecom firms to the Covered List

Security Affairs

The U.S. Federal Communications Commission (FCC) has added more Chinese telecom firms to the Covered List. The U.S. Federal Communications Commission (FCC) has added Pacific Network Corp, ComNet (USA) LLC, and China Unicom (Americas) Operations Limited, to the Covered List. The Covered List, published by Public Safety and Homeland Security Bureau published, included products and services that could pose an unacceptable risk to the national security of the United States or the security and safety

article thumbnail

Microsoft Brings Zero Trust to Hardware in Windows 11

Dark Reading

A stacked combination of hardware and software protects the next version of Windows against the latest generation of firmware threats.

92
article thumbnail

Russian Sandworm APT impersonates Ukrainian telcos to deliver malware

Security Affairs

Russia-linked APT group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware. Russia-linked cyberespionage group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware. Multiple security firms have reported that the Sandworm APT continues to target Ukraine with multiple means, including custom malware and botnet like Cyclops Blink.

Military 100
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Cyber Insurers Clamp Down on Clients' Self-Attestation of Security Controls

Dark Reading

After one company suffered a breach that could have been headed off by the MFA it claimed to have, insurers are looking to confirm claimed cybersecurity measures.

article thumbnail

Meru Data Podcast Features Sidley Associate Lauren Kitces

Data Matters

Sidley associate Lauren Kitces was featured on Simplify For Success , a podcast series presented by Meru Data and hosted by Priya Keshav. Lauren discussed FTC's proposed rulemaking regarding data privacy and data security, and shared her thoughts on how to prepare for the FTC enforcement. The post Meru Data Podcast Features Sidley Associate Lauren Kitces appeared first on Data Matters Privacy Blog.

article thumbnail

How to Dodge New Ransomware Tactics

Dark Reading

The evolving tactics increase the threat of ransomware operators, but there are steps organizations can take to protect themselves.

article thumbnail

Shadowy Russian Cell Phone Companies Are Cropping Up in Ukraine

WIRED Threat Level

But as Ukrainians retake ground, some of the firms are erasing their online presence.

Privacy 82
article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

Christophe Louvion, Chief Product & Technology Officer of NRC Health, is here to take us through how he guided his company's recent experience of getting from concept to launch and sales of products within 90 days. In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Meet Our Mayhem Heroes: Raj Shah

ForAllSecure

” As part of the Mayhem Heroes program , ForAllSecure visited various university campuses in the Spring of 2022. At the end of April, ForAllSecure hosted a day-long hackathon at Arizona State University where 181 students participated in the day-long in person training program followed by an online training held soon after. Over the next several weeks, the combined groups of ASU students contributed over 300 GitHub Open Source Software integrations for our Mayhem Heroes program.

article thumbnail

Parent empowerment: Opening doors for engagement in education

Jamf

The final entry in our series about empowering users with Jamf’s end-user apps for education, this blog post details how Jamf Parent gives parenting adults access to their children’s schoolwork and device use.

article thumbnail

Internships are worth their ‘weight in gold’ says MARA student

IG Guru

Check out the post here.

article thumbnail

Opportunity for Comment: Draft Bulletin on Storing Radiographic Film Records

National Archives Records Express

We are requesting comments on a draft NARA Bulletin, “ Guidance on Storing Radiographic Film Records ”. . Please send comments or questions to rmstandards@nara.gov by October 14, 2022. This draft Bulletin provides agencies with general storage guidance for managing radiographic film as federal records, in accordance with 36 CFR Chapter XII Subchapter B, Parts 1234 and 1237. .

40
article thumbnail

An Architect’s Guide for Selecting Scalable, Data-Layer Technologies

There’s no getting around it: selecting the right foundational data-layer components is crucial for long-term application success. That’s why we developed this white paper to give you insights into four key open-source technologies – Apache Cassandra®, Apache Kafka®, Apache Spark™, and OpenSearch® – and how to leverage them for lasting success. Discover everything you’ll want to know about scalable, data-layer technologies: Learn when to choose these technologies and when to avoid them Explore h

article thumbnail

Imperva blocked a record DDoS attack with 25.3 billion requests

Security Affairs

Cybersecurity company Imperva announced to have mitigated a distributed denial-of-service (DDoS) attack with a total of over 25.3 billion requests. Cybersecurity firm Imperva mitigated a DDoS attack with over 25.3 billion requests on June 27, 2022. According to the experts, the attack marks a new record for Imperva’s application DDoS mitigation solution.

article thumbnail

Moving beyond spreadsheets with IBM Planning Analytics

IBM Big Data Hub

My journey with IBM Planning Analytics started with an early morning phone call to tell me that a member of my team had died, suddenly and unexpectedly. Not only was his loss a personal tragedy, it was a tragedy for the whole organization. Our teams relied heavily on his decades of expertise to help us plan and forecast strategically for the future.

article thumbnail

Next Round is on the General! Recalling the Time When General “Lightning Joe” Collins Bought a Round for 600 Men

Unwritten Record

When you hear “Cartographic Records”, what is the first thing that comes to mind? Most likely, you would be inclined to think of maps – topographic maps, geopolitical maps, navigation charts, township plats, and any of a hundred other, different sorts of maps. But did you know that maps aren’t the only type of records in the holdings of the Cartographic Branch?

article thumbnail

FTC Defends Expansive Privacy and Data Security ANPR at Public Forum

Data Matters

The FTC continues its defense of the wide-reaching Advance Notice of Proposed Rulemaking (ANPR) on “ Commercial Surveillance and Data Security ” that the Commission, by a 3-2 vote, issued in August. (See the supporting statements of Chair Lina Khan and Commissioners Rebecca Slaughter , and Alvaro Bedoya , and the dissenting statements of Commissioners Christine Wilson and Noah Phillips.).

Privacy 102
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.