Tue.Feb 19, 2019

article thumbnail

Wendy's Reaches $50 Million Breach Settlement With Banks

Data Breach Today

After Insurance, Fast-Food Chain's Breach Costs Are Nearly $34 Million Fast-food giant Wendy's has reached a $50 million settlement agreement with financial institutions that sued after attackers planted RAM-scraping malware on point-of-sale systems in 1,025 of its restaurants in 2015 and 2016, stealing massive quantities of payment card data.

Insurance 232
article thumbnail

Why is Information Management Modernization So Important Right NOW?

AIIM

The combination of cloud technologies plus mobile is a volatile one when it comes to the sustainability of existing organizations. We’ve never before been in a disruptive environment quite like this one, and it demands much more agile approaches to IT. Established incumbents are being challenged on every front. Consider the following: In the banking industry, Better Mortgage can qualify a mortgage loan in 3-minutes and approve it within 24-hours.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Police Push Free Decryptor for GandCrab Ransomware

Data Breach Today

But GandCrab Gang Appears to Already Be Testing New Decryptor-Proof Version Good news for many victims of GandCrab: There's a new, free decryptor available from the No More Ransom portal that will unlock systems that have been crypto-locked by the latest version of the notorious, widespread ransomware. But the ransomware gang appears to already be prepping a new version.

article thumbnail

These Are the Countries With the Best and Worst Cybersecurity

Security Affairs

Cybersecurity is a growing concern among governments, businesses and individuals around the world. Cyberattacks can have severe impacts on everyone. A recent report from researchers at the University of Oxford identified 57 different impacts that cyber incidents can have. They ranged from regulatory fines to depression to damaged relationships with customers.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Suspected State-Sponsored Hackers Pummel US and Australia

Data Breach Today

As Diplomacy Fails, China and Iran Escalate Hack Attacks Recent apparently state-sponsored hack attacks have hit dozens of companies in the U.S. and political parties in Australia. Officials say China and Iran appear to have escalated their online espionage campaigns, seeking to gather better intelligence and steal intellectual property.

198
198

More Trending

article thumbnail

Post-Breach HIPAA Enforcement: A Call for 'Safe Harbors'

Data Breach Today

Groups Provide Feedback on Potential Changes to the HIPAA Rules Among the hundreds of responses to a federal request for comments about potential changes to the HIPAA rules were suggestions for "safe harbors" that would shelter organizations with strong security strategies from HIPAA enforcement actions after a health data breach.

article thumbnail

Experts found a Remote Code Execution flaw in WordPress 5.0.0

Security Affairs

Security experts disclosed a critical remote code execution vulnerability in versions of WordPress prior 5.0.3, that remained uncovered for 6 years. Security experts at RIPS Technologies GmbH disclosed a critical remote code execution vulnerability in versions of WordPress prior 5.0.3, that remained uncovered for 6 years. The experts discovered that the flaw could be exploited by an attacker who gains access to an account with at least ‘ author ‘ privileges on a WordPress install to

article thumbnail

Unactioned data subject access requests could lead to legal action

IT Governance

Buckinghamshire-based housing developer Magnacrest has been fined for failing to respond to DSARs (data subject access requests) , giving organisations a fresh reminder of the importance of the public’s legal rights to review the information that’s processed about them. The investigation into Magnacrest predates the GDPR (General Data Protection Regulation) , resulting in a relatively small fine.

Access 91
article thumbnail

North Korea's Lazarus Group Targets Russian Companies For First Time

Dark Reading

In an unusual development, the group known for its attacks against companies in countries viewed as geopolitical foes is now going after companies in a country considered an ally, Check Point Software says.

IT 84
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Group-IB: More than 70% of Russian banks are not ready for cyberattacks

Security Affairs

According to a new research conducted by Group-IB experts, 74 percent of Russian banks were not ready for cyberattacks. Group-IB , an international company that specializes in preventing cyberattacks , has conducted high-tech cybercrimes research based on an analysis of responses to information security incidents carried out by Group-IB Incident Response team in 2018.

article thumbnail

19 Minutes to Escalation: Russian Hackers Move the Fastest

Dark Reading

New data from CrowdStrike's incident investigations in 2018 uncover just how quickly nation-state hackers from Russia, North Korea, China, and Iran pivot from patient zero in a target organization.

78
article thumbnail

The Long Run of Shade Ransomware

Security Affairs

Since the beginning of the year, security firms observed a new intense ransomware campaign spreading the Shade ransomware. Between January and February, a new, intense, ransomware campaign has been observed by many security firms. It spreads Shade/ Treshold variants, one of the most dangerous threats in the cyber crime scenario, known since its massive infection into the Russian panorama back in 2015, its expansion has been tracked by several CSIRTs and CERTs all across the world.

article thumbnail

Estonia's Volunteer Cyber Militia

Schneier on Security

Interesting -- although short and not very detailed -- article about Estonia's volunteer cyber-defense militia. Padar's militia of amateur IT workers, economists, lawyers, and other white-hat types are grouped in the city of Tartu, about 65 miles from the Russian border, and in the capital, Tallinn, about twice as far from it. The volunteers, who've inspired a handful of similar operations around the world, are readying themselves to defend against the kind of sustained digital attack that could

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

'Formjacking' Compromises 4,800 Sites Per Month. Could Yours Be One?

Dark Reading

Cybercriminals see formjacking as a simple opportunity to take advantage of online retailers - and all they need is a small piece of JavaScript.

Retail 86
article thumbnail

Awareness of cyber resilience is increasing rapidly

IT Governance

We’ve been extolling the virtues of cyber resilience a lot lately – and for good reason. The approach, which describes the ability to prepare for, respond to and recover from security incidents, is quickly becoming accepted by information security experts as the best way for organisations to address their cyber security needs. But it’s not only experts who are saying this.

article thumbnail

2019 Thales DTR: Global Edition: Facts that may surprise you

Thales Cloud Protection & Licensing

A few weeks ago, we issued the Global Edition of our 2019 Thales Data Threat Report, now in its seventh year. This year much of the emphasis within the results was on how digital transformation can put organizations’ sensitive data at risk. The results showed, for instance, that almost every organization surveyed is dealing with digital transformation at one level or another (97%), and that organizations that are aggressively investing in digital transformation had higher rates of data breaches.

article thumbnail

Less than two months to go until DSP Toolkit submission deadline

IT Governance

Less than two months remain for healthcare organisations to demonstrate compliance with NHS Digital’s DSP (Data Security and Protection) Toolkit. To avoid the disruption caused by not meeting this deadline, organisations need to be aware of the changes that the DSP Toolkit brings compared to its predecessor, the IG (Information Governance) Toolkit. Unsure if you need to comply?

GDPR 71
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Eight questions to ask before selecting a mobile shelving solution

TAB OnRecord

When considering a mobile shelving installation, these eight essential questions will help you find the solution that works both today and in the future. Read More. The post Eight questions to ask before selecting a mobile shelving solution appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes

WIRED Threat Level

A new ranking of nation-state hacker speed puts Russia on top by a span of hours.

Security 102
article thumbnail

Making the Case for a Cybersecurity Moon Shot

Dark Reading

There are severe and unsolved problems in our industry that justify a sustained effort and substantial investment. It's worth picking one.

article thumbnail

What constitutes a complete intelligent forms platform?

OpenText Information Management

Having an intelligent forms platform can help your organization on its journey to digital transformation, but not all solutions are designed to meet your specific needs. In fact, many off-the-shelf forms applications lack the capabilities to develop complete end-to-end data collection forms that can solve everything from simple to complex business problems.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Security Leaders Are Fallible, Too

Dark Reading

Security leaders set the tone for their organizations, and there are many places where the process can go wrong. Second in a six-part series.

article thumbnail

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates

CGI

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates. pooja.cs@cgi.com. Tue, 02/19/2019 - 10:45. In Texas, community solar farms enable citizens to contribute to a greener environment. In Europe, if one owns solar panels but not a battery, E.ON Solarcloud offers the option of creating a credit balance for the winter.

article thumbnail

Google Research: No Simple Fix For Spectre-Class Vulnerabilities

Dark Reading

Chip makers' focus on performance has left microprocessors open to numerous side-channel attacks that cannot be fixed by software updates - only by hard choices.

69
article thumbnail

Enterprise security and risk management efforts continue to lag

DXC Technology

Increasingly, enterprises realize that they not only need to secure their digital assets, but that they need to do it economically. Most organizations know that they need to be compliant to any number of government or industry regulations that affect them — from HIPAA to GDPR — but simply achieving compliance doesn’t mean an organization […].

Risk 59
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

6 Tax Season Tips for Security Pros

Dark Reading

Here are some practical ways to ensure your company's safety as Uncle Sam comes calling.

article thumbnail

Top 3 takeaways from Legalweek New York 2019

OpenText Information Management

Legaltech 2019 is like the super bowl of legal technology, it brings together the best teams in the industry (on the field and off), draws a huge crowd, and has some of the best advertisements of the year! This year was no exception. Welcome Catalyst OpenText is excited to welcome Catalyst to the legal technology … The post Top 3 takeaways from Legalweek New York 2019 appeared first on OpenText Blogs.

IT 56
article thumbnail

New GandCrab Decryptor Unlocks Files of Updated Ransomware

Threatpost

This is the third update to the prolific GandCrab malware within the past year.