Mon.Aug 30, 2021

article thumbnail

Phishing Attack Used Spoofed COVID-19 Vaccination Forms

Data Breach Today

Researchers Find Fraudsters Pose as HR Execs to Harvest Credentials A recently uncovered phishing campaign used fake COVID-19 vaccination forms - and took advantage of confusion over whether employees will return to their offices this fall - to harvest workers' email credentials, according to analysts with security firm INKY. The malicious messages appear to come from victims' HR departments.

Phishing 336
article thumbnail

Boston Public Library discloses cyberattack

Security Affairs

The Boston Public Library was victim of a cyberattack that crippled its computer network, the library revealed in a statement Friday. The Boston Public Library announced on Friday that it was hit by a cyberattack that compromised its computer network. The affected systems were taken offline to prevent the threat from spreading. At the time of the announcement, the library said that there is no evidence that sensitive employee or patron data has been compromised.

Libraries 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Attack on Swiss City Exposed Citizens' Data

Data Breach Today

Rolle Officials Say They 'Underestimated the Severity' of Attack Local officials with the city of Rolle, located near Lake Geneva in Switzerland, have acknowledged that they initially misjudged the impact of a recent ransomware attack that reportedly led to the leak of residents' data on the darknet.

article thumbnail

SEC Continues Focus on Cybersecurity Disclosure Failures, Announces Settled Charges Against Pearson plc

Data Matters

Through its announcement of settled charges against Pearson plc (Pearson) on August 16, 2021, the U.S. Securities and Exchange Commission signaled its continued, high level scrutiny of companies’ public statements related to data security incidents. 1 Without admitting or denying the SEC’s findings, Pearson agreed to a cease and desist order (Order) and to pay a $1 million penalty. 2 The SEC’s Pearson Order follows its June 2021 announcement that it had settled charges against First American T

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Microsoft: Beware Phishing Attacks with Open Redirect Links

Data Breach Today

Ongoing Campaign Also Uses Malicious CAPTCHA Verification Page Microsoft is warning of a "widespread" phishing campaign in which fraudsters use open redirect links to lure users to malicious websites to harvest Office 365 and other credentials, according to a recent report. In some cases, the attackers deploy a malicious CAPTCHA verification page.

Phishing 265

More Trending

article thumbnail

Bangkok Airways Execs Apologize for Data Breach

Data Breach Today

LockBit Ransomware Gang Takes Credit, Threatens to Release Data Bangkok Airways issued an apology late last week for a data breach that apparently compromised the personally identifiable information for an unstated number of its passengers. The LockBit ransomware gang claimed credit for the attack.

article thumbnail

US DoJ announces the creation of Cyber Fellowship Program

Security Affairs

Th e US DoJ announced a new Cyber Fellowship program for training prosecutors and attorneys on cybersecurity. The US DoJ announced a new Cyber Fellowship program for training selected prosecutors and attorneys on cyber threat and threat actors. The course is coordinated through the Criminal Division’s Computer Crime and Intellectual Property Section.

article thumbnail

IG: DoD Did Not Properly Secure Access to VIP Records

Data Breach Today

Experts: Private Healthcare Entities Struggle with Similar Woes The Department of Defense did not effectively control access to the health information of high-profile personnel, says a new watchdog agency report, which hints that the findings also may indicate ineffective access control over other DoD employees' health records.

Access 190
article thumbnail

The Underground Economy: Recon, Weaponization & Delivery for Account Takeovers

Threatpost

In part one of a two-part series, Akamai's director of security technology and strategy, Tony Lauro, lays out what orgs need to know to defend against account takeover attacks.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

SEC to Monitor Illicit Activity on DeFi Platforms

Data Breach Today

Agency Contracts With Blockchain Firm AnChain.AI; Experts Weigh In The U.S. Securities and Exchange Commission will monitor decentralized finance transactions, after contracting with the blockchain cybersecurity firm AnChain.AI. Legal experts suggest this and other recent moves preview increased regulation of the decentralized finance space.

article thumbnail

Excellent Write-up of the SolarWinds Security Breach

Schneier on Security

Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.

Security 118
article thumbnail

Senator Seeks Input on Securing Crypto, Blockchain

Data Breach Today

Security Experts Praise Desire to Regulate Market, Cite Complexity Sen. Pat Toomey of the Senate Banking Committee is requesting input from the cryptocurrency and blockchain community to inform future legislation on its security and privacy. Several experts praise efforts to regulate the space, but cite its complexities.

article thumbnail

Microsoft Exchange ‘ProxyToken’ Bug Allows Email Snooping

Threatpost

The bug (CVE-2021-33766) is an information-disclosure issue that could reveal victims' personal information, sensitive company data and more.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Creating workplace experiences that keep employees happy and productive

OpenText Information Management

With hybrid workplaces here to stay, your workers and new hires expect you to create the best employee experience possible, so they can get their jobs done, wherever they are. You can do this with Microsoft VIVA, which is Microsoft’s new platform to empower employees with insights and resources to stay engaged, focused and productive. … The post Creating workplace experiences that keep employees happy and productive appeared first on OpenText Blogs.

article thumbnail

LockBit Gang to Publish 103GB of Bangkok Air Customer Data

Threatpost

The airline announced the breach on Thursday, and the ransomware gang started a countdown clock the next day.

article thumbnail

T-Mobile hit with class-action lawsuits over data breach via Fox Business

IG Guru

Check out the article here. The post T-Mobile hit with class-action lawsuits over data breach via Fox Business appeared first on IG GURU.

article thumbnail

HPE Warns Sudo Bug Gives Attackers Root Privileges to Aruba Platform

Threatpost

HPE joins Apple in warning customers of a high-severity Sudo vulnerability.

113
113
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Release Preview LAW 7.6

eDiscovery Daily

As data volumes grow, fortunately so has computer processing power. CloudNine LAW and Explore 7.6 will take advantage of this power boost to amplify your speed to review and production. The import technology behind both LAW’s Turbo Import and Explore uses a computer’s multiple processing cores more efficiently, making processing faster. The application updates will include over 200 enhancements to build upon the already strong, import speeds of LAW and Explore.

Risk 72
article thumbnail

Army Testing Facial Recognition in Child-Care Centers

Threatpost

Army looking for AI to layer over daycare CCTV to boost ‘family quality of life.’.

Privacy 91
article thumbnail

Release Preview LAW 7.6

eDiscovery Daily

As data volumes grow, fortunately so has computer processing power. CloudNine LAW and Explore 7.6 will take advantage of this power boost to amplify your speed to review and production. The import technology behind both LAW’s Turbo Import and Explore uses a computer’s multiple processing cores more efficiently, making processing faster. The application updates will include over 200 enhancements to build upon the already strong, import speeds of LAW and Explore.

Risk 62
article thumbnail

Db2 for z/OS: Package-Related Things of Which You Should be Aware

Robert's Db2

Db2 for z/OS packages have been around for a long time - since, I believe, V2R3, back in the early 1990s. Even so, I've found myself talking more about packages to people lately than I have in quite some years. These discussions - conducted in meetings, in phone calls and through email - have highlighted for me some related topics and items of information of which more folks should be aware.

Access 62
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Leveraging Aruba WiFi installations for HID Location Services – Better Together

HID Global

Leveraging Aruba WiFi installations for HID Location Services – Better Together. jschuck. Mon, 08/30/2021 - 11:51.

52
article thumbnail

GUEST ESSAY: The Top 5 myths about SIEM –‘security information and event management’

The Last Watchdog

One of the most commonly repeated phrases in the security industry is, “Security teams hate their SIEM!”. Related: The unfolding SIEM renaissance. Security Information and Event Management (SIEM) is not what it was 20 years ago. Don’t get me wrong, SIEMs do take work through deployment, maintenance, and tuning. They also require strategic planning. Yet, much to the chagrin of everyone who believed the vendor hype, they fail to provide the “single pane of glass” for all tasks in security operatio

Analytics 185
article thumbnail

Common PKI Certificate Management Mistakes and How to Avoid Them 

HID Global

Common PKI Certificate Management Mistakes and How to Avoid Them . mchandarana. Mon, 08/30/2021 - 10:57.

52
article thumbnail

ISRAELI FIRM ‘BRIGHT DATA’ (LUMINATI NETWORKS) ENABLED THE ATTACKS AGAINST KARAPATAN

Security Affairs

Who is behind the massive and prolonged Distributed Denial of Service (DDoS) attack that hit the Philippine human rights alliance Karapatan? The 25 days long DDoS attack against the website of Karapatan was launched by almost 30.000 IP addresses, whereas one third of the addresses originated from devices that there were not running “Open Proxies” or “Tor exits”.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.