Thu.Jun 27, 2019

article thumbnail

Cloud Hopper: Major Cloud Services Victims Named

Data Breach Today

Reuters Says Fujitsu, Tata, NTT Data, Dimension Data, CSC and DXC Affected Six major cloud services providers apparently were victims of Cloud Hopper, an umbrella name for deep cyber intrusions suspected to originate in China, Reuters reports. The report also alleges Cloud Hopper-affected companies withheld information from their clients for reasons of liability and bad publicity.

Cloud 250
article thumbnail

Breach at Cloud Solution Provider PCM Inc.

Krebs on Security

A digital intrusion at PCM Inc. , a major U.S.-based cloud solution provider, allowed hackers to access email and file sharing systems for some of the company’s clients, KrebsOnSecurity has learned. El Segundo, Calif. based PCM [ NASDAQ:PCMI ] is a provider of technology products, services and solutions to businesses as well as state and federal governments.

Cloud 237
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wipro Attack Tied to Larger Phishing Campaign: Analysis

Data Breach Today

RiskIQ Says Attackers Apparently Are Manipulating Gift Cards The cyberattack earlier this year against Indian outsourcer Wipro, as well as several of its customers, is part of a much larger, multiyear phishing campaign that involves many more companies used as jumping off points, according to RiskIQ, which says the attackers apparently are manipulating gift cards.

Phishing 228
article thumbnail

List of data breaches and cyber attacks in June 2019 ­– 39.7 million records leaked

IT Governance

After a rampant start to the year for data breaches and cyber attacks, it’s about time we went one month without at least one massive security incident. June 2019’s total of 39,713,046 breached records is the lowest since May last year – the month that the GDPR (General Data Protection Regulation) came into effect. Is this the start of the long-awaited ‘GDPR bounce’?

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Certain Insulin Pumps Recalled Due to Cybersecurity Issues

Data Breach Today

FDA Warns Patients About Medtronic's Voluntary Recall of Some Wireless Pumps In a rare move, the Food and Drug Administration has warned patients that medical device maker Medtronic has issued a voluntary recall of certain wireless insulin pumps due to cybersecurity vulnerabilities that cannot be adequately patched.

More Trending

article thumbnail

ENISA Gets Permanent Mandate as EU Tackles Cybersecurity

Data Breach Today

EU Cybersecurity Act Now In Full Force With the European Union's Cybersecurity Act now in full force, the European Union Agency for Network and Information Security, or ENISA, has a new name and a permanent mandate - as well as more money and staff - to oversee a range of cybersecurity issues.

article thumbnail

Thousands of IoT Devices Bricked By Silex Malware

Threatpost

A 14-year-old hacker bricked at least 4,000 Internet of Things devices with a new strain of malware called Silex this week. Threatpost talks to the researcher who discovered the malware.

IoT 90
article thumbnail

Bill Proposes Easing HIPAA Enforcement Action in Some Cases

Data Breach Today

HHS Would Consider an Organization's Security Measures Before Issuing Fines Bipartisan healthcare legislation that a Senate health committee passed on Wednesday includes a provision that would incentivize healthcare entities to adopt "strong cybersecurity practices" by encouraging federal regulators to consider organizations' security efforts when making HIPAA enforcement decisions.

article thumbnail

More Supply, More Demand: Cybersecurity Skills Gap Remains

Dark Reading

Although the number of programs for training workers in cybersecurity skills has increased, as well as the number of graduates, the gap in supply and demand for cybersecurity-skilled workers is essentially unchanged, leaving companies to struggle.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

£60 million in recovery costs for Norsk Hydro after refusing ransom demand

IT Governance

Earlier this month, Norsk Hydro published its first quarterly report since it fell victim to a devastating ransomware attack in March. Profits fell by 82% , but that’s a much better result than many were expecting. The malware tore through the aluminium producer, with productivity grinding to a halt at all 171 of the organisation’s sites. For a few hundred thousand pounds, Norsk Hydro could have bought a decryptor from the blackmailers and restored its systems.

article thumbnail

Spanish Soccer League App Spies on Fans

Schneier on Security

The Spanish Soccer League's smartphone app spies on fans in order to find bars that are illegally streaming its games. The app listens with the microphone for the broadcasts, and then uses geolocation to figure out where the phone is. The Spanish data protection agency has ordered the league to stop doing this. Not because it's creepy spying, but because the terms of service -- which no one reads anyway -- weren't clear.

IT 85
article thumbnail

New Exploit for Microsoft Excel Power Query

Dark Reading

Proof-of-concept, which allows remote code execution, is latest to exploit Dynamic Data Exchange (DDE) and is another reminder why organizations must ensure Office settings are secure.

article thumbnail

New Microsoft Excel Attack Vector Surfaces

Threatpost

Researchers have identified security hole in Microsoft Office’s Excel spreadsheet program that allows an attacker to trigger a malware attack on remote systems.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

US-based Cloud Solution Provider PCM Inc. hacked

Security Affairs

Hackers breached the infrastructure of PCM Inc. , one of the major U.S.-based cloud solution provider, and accessed to email and file sharing systems for some of its clients. Hackers breached the infrastructure of PCM Inc., one of the major U. S. -based cloud solution provider. According to the popular investigator Brian Krebs, the attackers gained access to email and file sharing systems for some of the company clients.

Cloud 83
article thumbnail

How IBM is advancing Watson Anywhere with new DataOps and discovery capabilities

IBM Big Data Hub

While data is an enterprise’s most valuable resource when it comes to gaining competitive advantage and improving business performance, time is a critical component. Businesses run 24x7, tasking our data citizens to maximize actionable insights that will drive the actions of tomorrow.

IT 77
article thumbnail

Leaky Amazon S3 Buckets Expose Data of Netflix, TD Bank

Threatpost

Netflix, TD Bank, and Ford were only a few of the companies whose data was exposed by three leaky Amazon S3 buckets owned by Attunity.

Cloud 89
article thumbnail

7 Ways to Mitigate Supply Chain Attacks

Dark Reading

Breaches caused by external vendors and service providers have become a major and escalating problem for organizations.

94
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Scammers Prey on Instagram Vanity and ‘Verified Account’ Status

Threatpost

Hackers are stealing Instagram credentials through a tricky phishing scam that asks victims to apply for exclusive verified account status.

article thumbnail

Flaws in the BlueStacks Android emulator allows remote code execution and more

Security Affairs

Multiple flaws in the BlueStacks Android emulator were addressed, including a vulnerability that allowed attackers to remotely control code execution. Other issues included information disclosure and a flaw that allowed attackers to steal backups of the VM and its data. In April, the researcher Nick Cano discovered that BlueStacks versions prior than v4.90.0.1046 are affected by a DNS rebinding vulnerability that allowed attackers to gain access to the emulator’s IPC functions.

article thumbnail

How Hackers Infiltrate Open Source Projects

Dark Reading

The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code.

90
article thumbnail

Cloud Hopper operation hit 8 of the world’s biggest IT service providers

Security Affairs

A long-running operation carried out by China-linked hackers, and tracked as Cloud Hopper, has targeted clients of major companies, including IBM, HPE, Tata CS, Fujitsu, and NTT. Hackers broke into the internal networks on major companies, such as HPE and IBM, and stole corporate data and trade secrets. Then the attackers used the stolen information to target into customer systems.

Cloud 76
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Office 365 Multifactor Authentication Done Right

Dark Reading

Why the ubiquitous nature of Office 365 poses unique challenges for MFA-based security and how organizations can protect themselves.

article thumbnail

How Hackers Turn Microsoft Excel's Own Features Against It

WIRED Threat Level

A pair of recent findings show how hackers can compromise Excel users without any fancy exploits.

IT 97
article thumbnail

Understanding & Defending Against Polymorphic Attacks

Dark Reading

Polymorphic malware is far from a new thing. But today, what is good for attackers is also good for defenders. Here's why.

83
article thumbnail

Tired of Google following you? It is now easier to clear location data

The Guardian Data Protection

New functionality automatically deletes history of places users have visited It is now slightly easier to opt out of Google’s panopticon , with the introduction of new controls from the search engine to automatically clear your data after a set period of time. By default, Google saves a permanent history of everything a user has searched for, every website they have visited, activity from any other app, site or device that uses Google services, and a record of their physical movements gleaned fr

IT 63
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

NIST Issues IoT Risk Guidelines

Dark Reading

A new report offers the first step toward understanding and managing IoT cybersecurity risks.

IoT 93
article thumbnail

Crooks stole millions from Bitrue Cryptocurrency Exchange

Security Affairs

Another cryptocurrency exchange announced to have suffered a theft, this time is the victim is the Singapore-based Bitrue. It has happened again, crooks stole funds from another cryptocurrency exchange, this time the victim is the Singapore-based Bitrue. Bitrue revealed on Thursday that hackers accessed the accounts of tens of its customers and stole their funds.

article thumbnail

Learn How Privacy Laws Can Be Used for Identity Theft at Black Hat USA

Dark Reading

Attend Black Hat USA this summer and see how researchers are subverting the GDPR's privacy rules and detecting deep fakes with machine learning.

Privacy 74