Thu.Aug 29, 2019

article thumbnail

Innovation on the Dark Web: How Bad Actors Are Keeping Pace

Threatpost

How criminals have adapted to develop the next generation of dark markets and operations.

article thumbnail

Ransomware Bites Dental Data Backup Firm

Krebs on Security

PerCSoft , a Wisconsin-based company that manages a remote data backup service relied upon by hundreds of dental offices across the country, is struggling to restore access to client systems after falling victim to a ransomware attack. West Allis, Wis.-based PerCSoft is a cloud management provider for Digital Dental Record (DDR), which operates an online data backup service called DDS Safe that archives medical records, charts, insurance documents and other personal information for various denta

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Paige Thompson Charged With Hacking 30 Organizations

Data Breach Today

Thompson Accused of Stealing Data on 100 Million Americans From Capital One A federal grand jury indictment against Seattle software engineer Paige A. Thompson charges her with stealing 100 million records from Capital One, stealing data from at least 29 other organizations, as well as using hacked cloud computing servers to mine for cryptocurrency.

Mining 208
article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

Europe came down hard this summer on British Airways and Marriott for failing to safeguard their customers’ personal data. The EU slammed the UK airline with a $230 million fine , and then hammered the US hotel chain with a $125 million penalty – the first major fines under the EU’s toughened General Data Protection Regulation , which took effect May 25, 2018.

GDPR 118
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

TrickBot Variant Enables SIM Swapping Attacks: Report

Data Breach Today

Banking Trojan Evolves to Target Wireless Carrier Customers A new variant of the TrickBot banking Trojan is enabling attackers to conduct SIM swapping schemes against Verizon Wireless, Sprint and T-Mobile customers in the U.S., potentially paving the way for account takeover fraud, according to a report from Dell's SecureWorks division.

199
199

More Trending

article thumbnail

Magecart Group Continues Targeting E-Commerce Sites

Data Breach Today

Arxan Analyzes Vulnerabilities in Over 80 Sites Hit by 'Formjacking' Attacks In a series of recent attacks attributed to the umbrella criminal group known as Magecart, malicious JavaScript code was injected into over 80 e-commerce websites to steal credit card and other customer data, according to a new report from the security firm Arxan, which highlights the sites' vulnerabilities.

Security 182
article thumbnail

A total of six hackers already become millionaires on HackerOne

Security Affairs

HackerOne announced that five more hackers have become millionaires thanks to their contributes to the bug bounty programs managed by the platform. Bug bounty platform HackerOne announced that four more hackers have become millionaires after participating in the bug bounty programs managed by the platform. In March, HackerOne announced that two of its members have each earned more than $1 million by participating bug bounty programs.

article thumbnail

Google, Medical Center Ask Court to Dismiss Privacy Lawsuit

Data Breach Today

Legal Experts Analyze the Key Issues in Complex Case Google and the University of Chicago Medical Center have filed motions to dismiss a class action lawsuit that alleges patients' records were not properly de-identified by the hospital before they were shared with Google for research. Legal experts offer an analysis of the privacy case.

Privacy 153
article thumbnail

A new variant of Trickbot banking Trojan targets Verizon, T-Mobile, and Sprint users

Security Affairs

A new Trickbot Trojan variant is targeting Verizon Wireless, T-Mobile, and Sprint users, confirming the evolution of the threat. TrickBot is a popular banking Trojan that has been around since October 2016, its authors has continuously upgraded it by implementing new features. For example, in February Trend Micro detected a variant that includes a new module used for Remote App Credential-Grabbing.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cybersecurity: Building Better Teams

Data Breach Today

Deborah Kish of Fasoo on Rethinking the Approach When it comes to rethinking how enterprises structure their cybersecurity teams, Deborah Kish of Fasoo says that teamwork and better coordination among stakeholders are essential.

article thumbnail

Capital One Hacker indicted on federal charges for Wire Fraud and Computer Data Theft

Security Affairs

Paige Thompson, the alleged hacker behind the Capital One hack and attacks on 30 other organizations has been indicted on wire fraud and computer fraud. Paige Thompson, a transgender woman, suspected to be the hacker behind the Capital One hack and attacks on 30 other organizations has been indicted on wire fraud and computer fraud. In July, Capital One, one of the largest U.S.

Mining 77
article thumbnail

The 'Judicious' Use of AI and ML

Data Breach Today

Artificial intelligence and machine learning must be judiciously used, such as when monitoring internet of things devices, says David De Roure, professor of e-research at the University of Oxford, who offers insights on IoT risk management.

article thumbnail

AI Emotion-Detection Arms Race

Schneier on Security

Voice systems are increasingly using AI techniques to determine emotion. A new paper describes an AI-based countermeasure to mask emotion in spoken words. Their method for masking emotion involves collecting speech, analyzing it, and extracting emotional features from the raw signal. Next, an AI program trains on this signal and replaces the emotional indicators in speech, flattening them.

Paper 77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Expert releases Metasploit modules for Cisco UCS flaws

Security Affairs

An expert published technical details of recently disclosed Cisco Unified Computing System (UCS) flaws that can be exploited to take complete control of vulnerable systems. Security researcher Pedro Ribeiro, aka “ bashis ,” has released the details of three the recently addressed vulnerabilities in the Cisco Unified Computing System (UCS) products along with Metasploit modules for their exploitation.

article thumbnail

Extracting the lifeblood of AI at ExxonMobil

IBM Big Data Hub

Seizing the AI opportunity to tap new sources of energy inspired one ExxonMobil leader to take a collaborative approach to its big data problem. Now she’s been recognized by IBM as a top woman AI leader.

article thumbnail

Venmo’s Public Transactions Policy Stirs Privacy Concerns

Threatpost

In an open letter, the Mozilla Foundation and EFF scolded Venmo for its data privacy policies, which they say could open the door to stalking and spear-phishing.

Privacy 72
article thumbnail

Privacy 2019: We're Not Ready

Dark Reading

To facilitate the innovative use of data and unlock the benefits of new technologies, we need privacy not just in the books but also on the ground.

Privacy 76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Is human-centered design at the heart of your customer experience? It should be.

DXC Technology

Digital technologies are impacting every aspect of our lives, and companies have no choice but to transform and adapt. To earn customer loyalty and respect, we are expected to meet customers’ needs at every interaction. At the same time, it has become increasingly difficult to innovate effectively to meet those needs in today’s complex and […].

article thumbnail

Google Announces New, Expanded Bounty Programs

Dark Reading

The company is significantly expanding the bug-bounty program for Google Play and starting a program aimed at user data protection.

81
article thumbnail

Lumber Liquidators hit by malware attack that took down its network

Security Affairs

Lumber Liquidators, a leading specialty retailer of hard-surface flooring in North America, announced that a malware attack took down its network. North American hard-surface flooring retailer Lumber Liquidators revealed that it was victim of a security incident, a malware-based attack took down part of its network for nearly a week. . Lumber Liquidators has 416 locations in North America, it features more than 400 varieties of floors in the latest styles, including solid and engineered hardwood

IT 63
article thumbnail

Bug Bounties Continue to Rise, but Market Has Its Own 1% Problem

Dark Reading

The average payout for a critical vulnerability has almost reached $3,400, but only the top bug hunters of a field of 500,000 are truly profiting.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Swedish Data Protection Authority Issues First Fine Under GDPR

Hunton Privacy

On August 21, 2019, the Swedish Data Protection Authority (the “Swedish DPA”) imposed its first fine since the EU General Data Protection Regulation (“GDPR”) came into effect in May, 2018. The Swedish DPA fined a school 200,000 Swedish Kroner for creating a facial recognition program in violation of the GDPR. Although the Swedish school obtained consent from the students and their parents to collect the sensitive personal data as part of the facial recognition program, the Swedish DPA said that

GDPR 63
article thumbnail

Retadup Worm Squashed After Infecting 850K Machines

Dark Reading

An operation involving French law enforcement, the FBI, and Avast forces Retadup to delete itself from victim machines.

77
article thumbnail

Google Targets Data-Abusing Apps with Bug Bounty Launch

Threatpost

Google is looking to battle the malicious apps - and apps abusing user data - on Google Play by improving its bug-bounty program arsenal.

IT 60
article thumbnail

New Botnet Targets Android Set-Top Boxes

Dark Reading

ARES has already infected thousands of devices and is growing, IoT security firm says.

IoT 78
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

TGI Fridays Delivers Customer Indigestion Over Data Exposure

Threatpost

TGI Fridays Australia restaurant chain warns loyalty reward program member of exposed data incident.

Privacy 69
article thumbnail

Critical data and master data - What is the difference?

Information Management Resources

The confusion between the two terms comes about because they are used for different purposes. Master data is nearly always critical to your business, but your critical data could include non-master data.

MDM 53
article thumbnail

Critical Cisco VM Bug Allows Remote Takeover of Routers

Threatpost

CVE-2019-12643 has been given the highest possible severity rating.