Fri.Feb 01, 2019

article thumbnail

Stolen RDP Credentials Live On After xDedic Takedown

Data Breach Today

Customers of Notorious RDP Marketplace Expected to Move to Rival UAS Market The notorious xDedic Marketplace Russian-language cybercrime forum and shop remains offline following an international police takedown. Security experts expect xDedic customers to shift to UAS, a rival darknet market that also specializes in stolen and hacked remote desktop protocol credentials.

Marketing 240
article thumbnail

250 Webstresser Users to Face Legal Action

Krebs on Security

More than 250 customers of a popular and powerful online attack-for-hire service that was dismantled by authorities in 2018 are expected to face legal action for the damage they caused, according to Europol , the European Union’s law enforcement agency. In April 2018, investigators in the U.S., U.K. and the Netherlands took down attack-for-hire service WebStresser[.]org and arrested its alleged administrators.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Brexit Preparation: Get Personal Data Flows in Order

Data Breach Today

Privacy Watchdog Orders Businesses to Prepare as UK Teeters on Edge of 'No Deal' As the U.K. teeters on the edge of a "no deal" Brexit, the country's information commissioner has warned businesses to prepare, saying that any organization that handles Europeans' personal data must ensure they have a legal transfer arrangement in place for continuing to do so.

article thumbnail

MY TAKE: Why companies should care about 2.2 billion stolen credentials circulating in easy reach

The Last Watchdog

Some chilling hard evidence has surfaced illustrating where stolen personal information ultimately ends up, once it has flowed through the nether reaches of the cyber underground. Wired magazine reported this week on findings by independent security researchers who have been tracking the wide open availability of a massive cache of some 2.2 billion stolen usernames, passwords and other personal data.

Passwords 133
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Aetna Fined Yet Again for Exposing HIV Information

Data Breach Today

California Attorney General Smacks Health Insurer With Hefty Penalty California's attorney general has slapped Aetna with a substantial financial penalty in the latest enforcement action against the health insurer following a 2017 breach involving HIV information.

Insurance 185

More Trending

article thumbnail

The Persistent Threat of Nation-State Cyberattacks

Data Breach Today

The latest edition of the ISMG Security Report features an update on what U.S. intelligence chiefs told Congress this week about persistent nation-state cyberthreats, plus reports on evasion tactics used by cryptocurrency money launderers and what government CIOs have to say about security funding.

article thumbnail

Why capture is a key foundation of information management strategies

OpenText Information Management

Today’s number one business challenge is keeping track of information. Whether we are talking about user or business-process generated information, the volumes, types and sources are increasing rapidly, and there is a recognition — some would say an anxiety — that organizations are losing control of their information and the value it contains. Effectively connecting … The post Why capture is a key foundation of information management strategies appeared first on OpenText Blogs.

article thumbnail

Facebook Gets Its First Real Privacy Penalty - From Apple

Data Breach Today

Apple's Privacy Warning to Facebook: We Can Break You Apple's conflict with Facebook this week resulted in the most effective and quickest punishment the social network has ever received over a privacy issue. But should a multi-billion dollar tech company like Apple be picking up the slack for the digital privacy enforcement failures of governments?

Privacy 174
article thumbnail

State Bank of India left archive with millions of Customer messages exposed

Security Affairs

Another data breach made the headlines, this time the victim is the State Bank of India that left a database containing personal information exposed online. The State Bank of India that left a database containing personal information exposed online. The discovery was made by an anonymous security researcher that has found a server used for the bank’s Quick service, a mobile-based information service.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Embracing Digital Risk Protection: Take Your Threat Intelligence to the Next Level

Data Breach Today

Risk 185
article thumbnail

The return of the AdvisorsBot malware

Security Affairs

Security experts at Cybaze – Yoroi ZLab have analyzed a new sample of the AdvisorsBot malware, a downloader that was first spotted in August 2018. As usual, the malware looks like a legitimate e-mail attachment, named as “invoice.doc”. Today, weaponized Microsoft office documents with macros, are one of the most common and more effective methods to deliver malware, because they also rely on simple social engineering tricks to lure users to enable them. .

article thumbnail

Nest Hack Leaves Homeowner Sleepless in Chicago

Dark Reading

A Chicago-area family's smart home controls were compromised in a hack that has left them feeling vulnerable in their own home.

99
article thumbnail

US authorities aim to dismantle North Korea’s Joanap Botnet

Security Affairs

FBI and Air Force experts are sinkholing the Joanap botnet to collect information about it and dismantle the malicious infrastrcuture. The U.S. Justice Department declares war to the Joanap Botnet that is associated with North Korea. The U.S. DoJ announced this week that it is working to dismantle the infamous Joanap botnet, a malicious infrastructure that is believed to be associated to Pyongyang.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Leave.?EU and Arron Banks insurance firm fined £120,000 for data breaches

The Guardian Data Protection

Information commissioner also launches data protection audit after Brexit violations The information commissioner has launched an audit into Leave.EU and the insurance company owned by the campaign’s key financial backer, Arron Banks, after fining the organisations a total of £120,000 for data protection violations during the EU referendum campaign.

article thumbnail

Weekly Update 124

Troy Hunt

I'm pumping this weekly update out a little bit later, pushing it just before I get on the plane back home to Australia. I've just wrapped up a week in London with Scott doing all things NDC including a couple of days of workshops and a couple of talks each. We discuss that, and how the UK seems to have an odd infatuation with doing anything that could even remotely be deemed a health and safety risk.

Risk 68
article thumbnail

My Health Record: clinics receiving up to $50,000 a year in incentives

The Guardian Data Protection

Amid the bonus payments, there are concerns patients have been signed up without their informed consent Medical clinics have been pocketing up to $50,000 a year in bonus payments to sign people up to the My Health Record scheme, amid concerns patients have been registered without their informed consent. Thursday was the deadline for people to opt out of the scheme.

article thumbnail

3 Tips to Prepare for SQL Server 2008 and Windows Server 2008 End of Support

Daymark

Time is running out. Microsoft deadlines for SQL Server 2008 and Windows Server 2008 end of support are quickly approaching with Extended Support for SQL Server 2008 and 2008 R2 ending on July 9, 2019 and Extended Support for Windows Server 2008 and 2008 R2 ending on January 14, 2020. Don’t risk possible security or compliance gaps of unsupported software.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

European Commission Issues GDPR Infographic

Hunton Privacy

On January 25, 2019, the European Commission (the “Commission”) issued an infographic on compliance with and enforcement and awareness of the EU General Data Protection Regulation (“GDPR”) since the GDPR took force on May 25, 2018. The infographic revealed that: 95,180 complaints have been lodged with EU national data protection authorities (“DPAs”) under the GDPR.

GDPR 66
article thumbnail

IG GURU partners with the Institute of Information Management in Africa

IG Guru

IIM and IG GURU have agreed to partner and promote their organizations across the globe. Andrew Ysasi, the President of IG GURU, had this to say about the partnership, “IG GURUis committed to connecting practitioners and educators across the globe. Partnering with IIM provides us the opportunity to share and learn from practitioners and educators […].

article thumbnail

Study the Cutting Edge of Cybersecurity at Black Hat Asia

Dark Reading

Whether you want an in-depth look at one of the biggest data breaches in recent memory or some advanced data forensics training, Black Hat Asia is the place to be.

article thumbnail

Work faster and save money

OpenText Information Management

Most people rely on traditional methods of viewing and annotating different types of documents – for example, using Adobe® Acrobat® to work with PDFs or AutoCAD® to work with engineering documents. However, not only is it costly to maintain so many native applications, but constantly “flipping screens” and using a separate application for every document type … The post Work faster and save money appeared first on OpenText Blogs.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How Hackers Could Hit Super Bowl LIII

Dark Reading

Security threats and concerns abound for the year's biggest football game. What officials and fans can do about it.

article thumbnail

Threatpost News Wrap Podcast For Feb. 1

Threatpost

From Facebook's research app being pulled from iOS devices to a new-found dump of compromised credentials, here are the top news of the week.

Privacy 58
article thumbnail

KISS, Cyber & the Humble but Nourishing Chickpea

Dark Reading

The combination of simple, straightforward, and methodical ingredients are the keys to developing a balanced and well-rounded security program.

article thumbnail

Four data management trends that will help driving business acceleration

Information Management Resources

These prevailing trends will help IT teams best manage data, be fully aligned with the business’ goals, and have direct impact on future operations of the enterprise.

IT 55
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Houzz Urges Password Resets After Data Breach

Threatpost

The decorating website said that account usernames, passwords and more have been compromised as part of a breach.

article thumbnail

Speed and security

OpenText Information Management

According to estimates, approximately 80 percent of clinician’s diagnoses are based on laboratory analysis. Doctors and healthcare professionals require fast access to accurate reports on which to base their treatments, patients want more access to their medical information so that they can make informed decisions. Clinical labs need the ability to get the right reports … The post Speed and security appeared first on OpenText Blogs.

article thumbnail

Cybercriminals Aim for the Super Bowl Goal Posts

Threatpost

Scams, infrastructure attacks, data harvesting and attacks on streamers are all in the offing.

Privacy 68