Wed.Nov 28, 2018

article thumbnail

Two Iranians Charged in SamSam Ransomware Attacks

Data Breach Today

US Prosecutors Allege Pair Targeted More Than 200 Victims, Including Cities, Hospitals A federal grand jury has indicted two Iranians for allegedly waging SamSam ransomware attacks on more than 200 entities, including Atlanta and other municipalities and six healthcare organizations. They collected $6 million in ransoms and caused more than $30 million in losses to victims, U.S. prosecutors allege.

article thumbnail

How Cyber Essentials can help secure against malware

IT Governance

The Cyber Essentials scheme is a world-leading assurance mechanism for organisations of all sizes to help demonstrate that the most critical cyber security controls have been implemented. To highlight the importance and usefulness of the Cyber Essentials scheme, we’ve produced a series of blog posts summarising each of the five security controls that, according to the UK government, could prevent “around 80% of cyber attacks”.

Security 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Faces GDPR Complaints Over Web, Location Tracking

Data Breach Today

Search Giant's Pervasive Tracking Isn't Clear to Consumers, Groups Contend Consumer organizations in seven countries plan to file complaints alleging that Google is violating the EU's General Data Protection Regulation via its location, web and app activity tracking, in what could be a blow to the search giant's lucrative but data-hungry targeted advertising business.

GDPR 223
article thumbnail

[Podcast] Who is AIIM? Meet the People that Make up the AIIM Community

AIIM

Who is AIIM ? Well, that's a challenging question considering AIIM is an organization. But, when we take a step back, it's easier to see that AIIM does have a persona. It's you, me, and the other 155,000 global information professionals worldwide that make up the AIIM Community. So to be able to answer a question like "Who is AIIM?", we had to go straight to the source!

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Feds Charge Eight With Online Advertising Fraud

Data Breach Today

$36 Million in Digital Video Ad Fraud Tied to 3ve and Methbot Schemes The U.S. Department of Justice says eight individuals have been indicted - and three of them arrested abroad - as part of a multiyear FBI investigation into gangs that allegedly perpetrated digital advertising fraud via the Methbot and 3ve schemes.

206
206

More Trending

article thumbnail

Attack on Billing Vendor Results in Massive Breach

Data Breach Today

Atrium Health Says Attack on AccuDoc Affected 2.65 Million Individuals North Carolina-based Atrium Health is notifying 2.65 million individuals of a data breach involving a cyberattack on databases hosted by a third-party billing vendor. The incident is the largest U.S. health data breach revealed so far in 2018.

article thumbnail

Uber fined £385,000 for data breach cover-up

IT Governance

The ICO (Information Commissioner’s Office) has fined Uber £385,000 for a data breach affecting 35 million people, including 2.7 million British customers. In November 2016, attackers accessed Uber’s Cloud servers, which contained passengers’ names, phone numbers, email addresses and the location where they had signed up. The crooks also accessed the personal data of 3.7 million drivers, including 82,000 from the UK.

article thumbnail

FBI along with security firms dismantled 3ve Ad Fraud Operation

Security Affairs

FBI along with cybersecurity firms dismantled a sophisticated ad fraud scheme that allowed its operators to earn tens of millions of dollars. Law enforcement and private firms such as Google and WhiteOps took down one of the largest and most sophisticated digital ad-fraud campaign, tracked as Dubbed 3ve, that infected over 1.7 million computers to carry out advertising frauds.

article thumbnail

Serbia Enacts New Data Protection Law

Hunton Privacy

On November 9, 2018, Serbia’s National Assembly enacted a new data protection law. The Personal Data Protection Law, which becomes effective on August 21, 2019, is modeled after the EU General Data Protection Regulation (“GDPR”). As reported by Karanovic & Partners, key features of the new Serbian law include: Scope – the Personal Data Protection Law applies not only to data controllers and processors in Serbia but also those outside of Serbia who process the personal data of Serbian citizen

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

GDPR data breach notification: A quick guide

IT Governance

The data breach notification requirements of the EU GDPR (General Data Protection Regulation) are complicated, so it’s no surprise that many organisations aren’t sure what they’re supposed to be doing. However, it’s crucial that you know what to do when disaster strikes. This blog explains everything you need to know in simple terms. What is a personal data breach?

article thumbnail

AccuDoc Data Breach impacted 2.6 Million Atrium Health patients

Security Affairs

Hospital network Atrium Health suffered a data breach, hacked accessed patients’ personal information after compromised the technology solutions provider AccuDoc. Atrium Health offers healthcare and wellness programs in the Southeast of the United States through more than 40 hospitals and 900 care locations. AccuDoc is a company providing technology solutions to the healthcare industry, including Hospital network Atrium Health.

article thumbnail

The "Typical" Security Engineer: Hiring Myths & Stereotypes

Dark Reading

In an environment where talent is scarce, it's critical that hiring managers remove artificial barriers to those whose mental operating systems are different.

article thumbnail

Russian Hackers Haven't Stopped Probing the US Power Grid

WIRED Threat Level

Researchers warn that utilities hackers don't need to cause blackouts to do damage.

Security 107
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why DEP and VPP gave way to Apple School/Business Manager

Jamf

Have questions about what the Apple deployment programs actually do? Today is the day we clear up the Apple vernacular and help you leverage the right services to get the absolute most out of your Apple devices.

70
article thumbnail

Federal Indictments in SamSam Ransomware Campaign

Dark Reading

Two Iranian nationals have been indicted on multiple counts by a federal grand jury in connection with the SamSam ransomware attacks that struck government, critical infrastructure, and healthcare organizations.

article thumbnail

OpenText Teamsite 16.4.1 is available now

OpenText Information Management

If you’re working in a web content management system (CMS) every day, it needs to function as you’d expect and be easy to use. That’s why OpenText has prioritized usability, along with new developer and partner tools, in its latest release of OpenTextTM TeamSite. Component browser You will notice several improvements within the component browser and … The post OpenText Teamsite 16.4.1 is available now appeared first on OpenText Blogs.

CMS 62
article thumbnail

Google, White Ops, Industry Players Dismantle 3ve Ad Fraud Operation

Dark Reading

3ve, an ad fraud operation amassing 1.7M infected machines, was taken down in an operation driven by law enforcement, Google, White Ops, and several security companies.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Initial patch for Webex Meetings flaw WebExec was incomplete. Cisco fixed it again

Security Affairs

Cisco has released a new round of security patches to address potentially serious WebExec Webex flaw first addressed one month ago. One month ago, Cisco addressed the CVE-2018-15442 vulnerability, also tracked as WebExec by Counter Hack researchers Ron Bowes and Jeff McJunkin who discovered it. The flaw affects Cisco Webex Meetings Desktop and has been rated as a “high” severity command injection vulnerability.

IT 61
article thumbnail

Amazon Rolls Out AWS Security Hub

Dark Reading

New security platform aggregates information from Amazon Web Services cloud accounts and third-party tools.

article thumbnail

Cybersecurity Threats Keep Evolving, Research Shows

eSecurity Planet

We examine 11 important cybersecurity research reports released in November -- and the controls organizations should consider.

article thumbnail

Incorrect Assessments of Data Value Putting Organizations at Risk

Dark Reading

Information security groups often underestimate or overestimate the true value of data assets, making it harder to prioritize controls.

Risk 69
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Addressing the data challenges in the Digital Twin

OpenText Information Management

The digital twin – a digital representation of a physical object – is one of the best examples of truly harnessing the power of the Internet of Things (IoT). It is often said that Industry 4.0 needs digital twins to really push it forward. The demand for digital twins is exploding as the practical applications for … The post Addressing the data challenges in the Digital Twin appeared first on OpenText Blogs.

IoT 54
article thumbnail

Middle East, North Africa Cybercrime Ups Its Game

Dark Reading

Ransomware, DDoS extortion, and encrypted communications abound as cybercriminals in the region refine their tradecraft.

IT 72
article thumbnail

The Nature of Mass Exploitation Campaigns

Threatpost

Examples of how attackers carry out mass exploitation campaigns and how to defend against them.

Privacy 75
article thumbnail

Data Breach Threats Bigger Than Ever

Dark Reading

A quarter of IT and security leaders expect a major data breach in the next year.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FBI Sinkholes $38M Global Ad Fraud Operation

Threatpost

The multi-year campaign used malware and botnets to falsify billions of webpages and "site users.".

article thumbnail

Atrium Health Breach Exposes 2.65 Million Patient Records

Dark Reading

Supplier that handles billing and online payments for health-care provider became aware of incident Oct. 1.

67
article thumbnail

How to trade digitally with your small suppliers

OpenText Information Management

For the largest retailers, getting their suppliers to comply to their digital trading requirements is as easy as imposing hefty fines for non-compliance. But for most retailers, the all stick, no carrots approach may not work. Most businesses will do better when they focus on building collaborative relationships to streamline business processes. This blog examines … The post How to trade digitally with your small suppliers appeared first on OpenText Blogs.

Retail 45