Fri.May 10, 2019

article thumbnail

Chinese Men Charged With Hacking Health Insurer Anthem

Data Breach Today

Data of 78.8 Million Individuals Was Encrypted, Sent to China, US Alleges Two Chinese men have been indicted on charges related to the breach of health insurer Anthem, which saw the personal information of 78.8 million individuals stolen, as well as attacks against three other large U.S. companies.

Insurance 260
article thumbnail

Nine Charged in Alleged SIM Swapping Ring

Krebs on Security

Eight Americans and an Irishman have been charged with wire fraud this week for allegedly hijacking mobile phones through SIM-swapping, a form of fraud in which scammers bribe or trick employees at mobile phone stores into seizing control of the target’s phone number and diverting all texts and phone calls to the attacker’s mobile device.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Warn of 'Electricfish' Malware Linked to North Korea

Data Breach Today

CERT Says Hidden Cobra APT Group Developed Malware The FBI and the Department of Homeland Security have issued a joint warning about new malware called "Electricfish." Investigators suspect it was developed by the advanced persistent threat group Hidden Cobra, which has been linked to North Korea.

Security 249
article thumbnail

GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain

The Last Watchdog

The recent network breach of Wipro , a prominent outsourcing company based in India, serves as a stunning reminder that digital transformation cuts two ways. Our rising dependence on business systems that leverage cloud services and the gig economy to accomplish high-velocity innovation has led to a rise in productivity. However, the flip side is that we’ve also created fresh attack vectors at a rapid rate – exposures that are not being adequately addressed.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Symantec CEO Exits as Company Misses Earnings Forecast

Data Breach Today

Stock Price Dives After Anti-Virus Firm CEO Greg Clark's Abrupt Departure In a surprise turn of events, Symantec's CEO, Greg Clark, resigned on Thursday, the same day that the company reported that it had missed earnings estimates, sending the value of its stock plummeting in after-hours trading and into the next day.

IT 202

More Trending

article thumbnail

DeepDotWeb Goes Dark

Data Breach Today

The latest edition of the ISMG Security Report analyzes the FBI takedown of DeepDotWeb, a dark net portal. Also featured are discussions on healthcare app security and the repercussions of poor coding security.

Security 182
article thumbnail

SNP faces fines for data protection breach after election mailing error

The Guardian Data Protection

Party refers itself to ICO after voters receive campaign letters not addressed to them The Scottish National party faces being fined for a breach of data protection laws after sending out tens of thousands of European election mailings to the wrong addresses. The Information Commissioner’s Office confirmed on Friday morning that the SNP have referred itself for investigation after voters across Scotland received letters addressed to strangers or neighbours.

109
109
article thumbnail

Cultural Challenges and Digital Transformation

Data Breach Today

ISMG and Zscaler hosted a roundtable dinner in Morristown, New Jersey on April 11 focused on security's role in digital transformation.

article thumbnail

Cryptanalyzing a Pair of Russian Encryption Algorithms

Schneier on Security

A pair of Russia-designed cryptographic algorithms -- the Kuznyechik block cipher and the Streebog hash function -- have the same flawed S-box that is almost certainly an intentional backdoor. It's just not the kind of mistake you make by accident, not in 2014.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Digitizing data to build a talented workforce

OpenText Information Management

Data – whether it is client, vendor, enterprise or consumer – has become the lifeblood of global business. And nearly a year after the General Data Protection Regulation (GDPR) came into force, the way in which organizations store, handle and use data has emerged as a priority. With the added uncertainty of Brexit and other … The post Digitizing data to build a talented workforce appeared first on OpenText Blogs.

GDPR 91
article thumbnail

Demystifying the Dark Web: What You Need to Know

Dark Reading

The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners.

103
103
article thumbnail

Nvidia Warns Windows Gamers on GPU Driver Flaws

Threatpost

Nvidia has patched three vulnerabilities in its Windows GPU display driver that could enable information disclosure, denial of service and privilege escalation.

IT 87
article thumbnail

Heap Buffer Overflow Vulnerability found in Kaspersky Antivirus Engine

Security Affairs

Security researchers at the Imaginary team discovered a Heap Buffer Overflow Vulnerability in Kaspersky Antivirus Engine and responsibly reported it. Security experts at the Imaginary team discovered a Heap Buffer Overflow vulnerability in Kaspersky Antivirus Engine. The flaw tracked as CVE-2019-8285 affects Kaspersky Lab Antivirus Engine version before 04. apr. 2019 and potentially allows arbitrary code execution. “Kaspersky Anti-Virus Engine is prone to a heap-based buffer-overflow vulne

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Access and Source Code to Samsung Apps Left Unprotected on Public Server

Adam Levin

The source code and security keys associated with a number of Samsung apps and projects have been discovered on unprotected server. Samsung’s SmartThings home automation platform was among the projects exposed in the compromise. The exposed server contained a code repository that was misconfigured and publicly available. In addition to the underlying code of several major Samsung apps was a security token that allowed unfettered access to 135 projects and applications.

Access 77
article thumbnail

What good are notebooks? Bridging the data science skills gap with collaboration

IBM Big Data Hub

Predictive modeling and analytics have long been the domain of the data scientist and only the data scientist. But with modern tools, data science is becoming a team sport—business analysts and subject matter experts can join the analysis. While the players may have different skill sets and processes, in the world of predictive analytics, collaboration between them can position an entire team to win with data science.

article thumbnail

Hackers Still Outpace Breach Detection, Containment Efforts

Dark Reading

Research shows time to discovery and containment of breaches slowly shrinking, but attackers don't need a very big window to do a lot of damage.

81
article thumbnail

DOJ Says Chinese Hackers Attacked Anthem, but Not Why

WIRED Threat Level

For years, China was rumored to be behind the health insurance company's massive data breach, but now the Justice Department is noticeably silent on the hackers' motives and affiliation.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

5 Reasons Why Your Data Governance Program Will Fail and Digital Transformation will Triumph

Collibra

Your organization is, or was, off to a great start by understanding the importance of data and its ability to produce better insights and results than your industry competitors. So why are your Data Governance efforts falling flat? Your company’s Data Governance initiatives are driven by a technical department (e.g. IT, Analytics, etc.). Let’s face it, even though your data governance program may have started in your IT/Analytics department, in this day and age almost everyone is capable of gene

article thumbnail

What is quantum computing and what could it mean for the healthcare industry?

DXC Technology

One of the longest hype curves in technology history — without products even being deployed — is that of quantum computing. After decades of research, many feel that viable and reliable quantum products may not be to market for another ten years. For those who have heard the term but are sketchy on what quantum […].

IT 64
article thumbnail

Microsoft SharePoint Bug Exploited in the Wild

Dark Reading

A number of reports show CVE-2019-0604 is under active attack, Alien Labs researchers say.

88
article thumbnail

DHS and FBI published a Malware Analysis Report on North Korea-linked tool ELECTRICFISH

Security Affairs

The U.S. Department of Homeland Security (DHS) and the FCI published a new joint report on ELECTRICFISH, a malware used by North Korea. US DHS and the Federal Bureau of Investigation (FBI) conducted a joint analysis of a traffic tunneling tool dubbed ELECTRICFISH used by North Korea-linked APT group tracked as Hidden Cobra (aka Lazarus ). It is interesting to note that the sample analyzed in the report is not on Virus Total, as highlighted by the security exper t Dariel Huss.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The WannaCry Security Legacy and What’s to Come

Threatpost

The WannaCry attack proved pivotal, changing the way organizations go about securing their environments.

article thumbnail

How We Collectively Can Improve Cyber Resilience

Dark Reading

Three steps you can take, based on Department of Homeland Security priorities.

article thumbnail

ThreatList: Nigerian Cybercrime Surged 54 Percent in 2018

Threatpost

Nigerian scam groups launched even more attacks in 2018 - and used more complex types of malware to reach more victims.

article thumbnail

Bumper Crop of New Briefings Added for Black Hat USA

Dark Reading

Among the 50+ new Briefings confirmed for this August event are a deep dive into the Apple T2 chip and a pile of lessons learned from the Equifax and Home Depot breaches.

52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

News Wrap: Facebook Regulation, Verizon DBIR, Hidden Airbnb Cameras

Threatpost

From a creepy Airbnb incident to Verizon's Data Breach Investigations Report, Threatpost editors break down the top privacy and security stories for the week ended May 10.

article thumbnail

8 top technology trends impacting the supply chain in 2019

Information Management Resources

Analysts will explore the top industry trends at the Gartner Supply Chain Executive Conferences, May 13-16 in Phoenix, AZ and June 17-19 in Barcelona, Spain.

article thumbnail

Symantec CEO Greg Clark Steps Down

Dark Reading

Exec shake-up comes amid earnings drop in financial report.

71