Wed.Oct 31, 2018

article thumbnail

Sextortion Scam Wields Stolen Passwords, Demands Bitcoins

Data Breach Today

Attackers Send a Leaked Password as 'Proof' Victim Was Hacked Scammers behind an ongoing "sextortion" campaign have been emailing a legitimate password - likely from a publicly leaked list - to victims with a threat to release a compromising video of the recipient unless they pay up in bitcoins, Barracuda Networks warns.

Passwords 238
article thumbnail

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. Here are three reasons to consider it: Reduce the risk of data breaches. If you want to keep your organisation secure, you need your employees to know what they’re doing.

Security 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crypto-Locking Kraken Ransomware Looms Larger

Data Breach Today

Ransomware-as-a-Service Operation Joins Forces With Fallout Exploit Kit A slick ransomware-as-a-service operation called Kraken Cryptor has begun leveraging the Fallout exploit kit to help it score fresh victims, researchers from McAfee and Recorded Future warn. Absent offline backups, victims have little chance of recovering from its crypto-locking attacks.

article thumbnail

3 reasons cyber security training is essential

IT Governance

Organisations are always looking for ways to improve their cyber security defences, but they often overlook the value of enrolling their employees on cyber security training courses. Here are three reasons to consider it: Reduce the risk of data breaches. If you want to keep your organisation secure, you need your employees to know what they’re doing.

Security 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Push to Allow Cybersecurity Technology Donations

Data Breach Today

Advisory Council Seeks Changes in Law to Help Smaller Healthcare Providers Improve Security An advisory council is again urging the Department of Health and Human Services to allow certain donations of cybersecurity technology and services to smaller healthcare providers. Greg Garcia of the council, who will keynote ISMG's upcoming Healthcare Security Summit in New York, explains why.

More Trending

article thumbnail

Malware Analysis for Blue Teams

Data Breach Today

At a time when security professionals are faced not only with a barrage of threats, but with a myriad of threat intelligence data sources, it can be challenging to know when to stop an investigation. Join DomainTools Senior Security Engineer Tarik Saleh to learn essential methodologies from a blue team perspective.

Security 129
article thumbnail

Ransomware, Leakware, Scareware… Oh My!

Thales Cloud Protection & Licensing

The unexplained and seemingly paranormal are actually a year-round phenomenon in IT Security. This year has been no exception. The shrieks and screams coming from CISOs and their staffs over malware has led to zombie-like stares. Because the never-ending battle against the evil forces of the dark web continues with regard to ransomware and its ghoulish close cousins – leakware and scareware.

article thumbnail

Managing Cyber Risks: A New Tool for Banks

Data Breach Today

Banks have a new tool available for developing cyber risk management programs. In an interview, architects of the Financial Services Sector Cybersecurity Profile, Denyette DePierro and Josh Magri, describe how to use it. They'll offer more details at ISMG's Legal & Compliance Summit in New York on Nov. 15.

Risk 129
article thumbnail

GDPR compliance: why you should consider BS 10012 certification

IT Governance

The EU GDPR (General Data Protection Regulation) hasn’t been around for long but we’re already seeing a huge increase in reported data breaches to the ICO (Information Commissioner’s Office). In the past two years, the number of reported data breaches has risen by 75%. Data breaches can wreak havoc, leaving organisations facing fines and reputational damage – and forcing them to admit that their personal data wasn’t secure after all.

GDPR 91
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Radisson Hotel Group has suffered a data breach

Security Affairs

The hotel chain Radisson Hotel Group suffered a security breach that exposed personal information of the members of its loyalty scheme. The hotel chain Radisson Hotel Group suffered a security breach that exposed personal information (name, address (including country of residence), email address, and in some cases, company name, phone number, Radisson Rewards member number, and any frequent flier numbers on file) of the members of its loyalty scheme.

article thumbnail

GDPR compliance: why you should consider BS 10012 certification

IT Governance

The EU GDPR (General Data Protection Regulation) hasn’t been around for long but we’re already seeing a huge increase in reported data breaches to the ICO (Information Commissioner’s Office). In the past two years, the number of reported data breaches has risen by 75%. Data breaches can wreak havoc, leaving organisations facing fines and reputational damage – and forcing them to admit that their personal data wasn’t secure after all.

GDPR 91
article thumbnail

Chinese Government Agents Charged with Hacking, IP Theft

Adam Levin

The U.S. Justice Department announced charges against ten Chinese intelligence agents for hacking into computer systems belonging to U.S. and international companies to steal aerospace technology and data. The indictment , revealed earlier this week accuses agents working for the Jiangsu Province Ministry of State Security (JSSD) of conspiring “to steal sensitive commercial technological, aviation, and aerospace data by hacking into computers in the United States and abroad.”.

article thumbnail

Cyber mercenaries and insiders hired by Chinese intelligence to hack aerospace and tech firms

Security Affairs

According to the U.S. Department of Justice, the Chinese intelligence officers recruited hackers and insiders to hack aerospace and tech firms. US DoJ accuses the Chinese intelligence to have recruited hackers and insiders to steal confidential information from companies in aerospace and tech companies. US intelligence believes that the cyber espionage operation was under the control of Zha Rong and Chai Meng, two intelligence officers working for the Jiangsu Province Ministry of State Security

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Canadian Regulator Issues Final Guidance on New Data Breach Reporting Requirements

Hunton Privacy

On October 29, 2018, the Office of the Privacy Commissioner of Canada (the “OPC”) released final guidance (“Final Guidance”) regarding how businesses may satisfy the reporting and record-keeping obligations under Canada’s new data breach reporting law. The law, effective November 1, 2018, requires organizations subject to the federal Personal Information Protection and Electronic Documents Act (“PIPEDA”) to (1) report to the OPC breaches of security safeguards involving personal information “tha

article thumbnail

Was the Triton Malware Attack Russian in Origin?

Schneier on Security

The conventional story is that Iran targeted Saudi Arabia with Triton in 2017. New research from FireEye indicates that it might have been Russia. I don't know. FireEye likes to attribute all sorts of things to Russia, but the evidence here look pretty good.

IT 77
article thumbnail

Kraken Ransomware Upgrades Distribution with RaaS Model

Threatpost

The Kraken ransomware author has released a second version of the malicious code, along with a unique affiliate program on the Dark Web. According to research into Kraken v.2 the new version is being promoted in a ransomware-as-a-service (RaaS) model to underground forum customers, via a video demoing its capabilities. Those interested can complete a […].

article thumbnail

Bureau of Consumer Finance Protection Proposed Records Schedule

National Archives Records Express

Today a notice of the availability of records schedules for comments was posted in the Federal Register. This includes a proposed schedule, DAA-0587-2018-0001, from the Bureau of Consumer Financial Protection (BCFP), also known as the Consumer Financial Protection Bureau, covering website content duplicative of original information maintained by program offices.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

9 Traits of A Strong Infosec Resume

Dark Reading

Security experts share insights on which skills and experiences are most helpful to job hunters looking for their next gig.

article thumbnail

Creating inclusive communities in tech

OpenText Information Management

OpenText™ hosted its first Women in Technology Summit at the Metro Toronto Convention Centre on July 12, 2018—and it was beyond inspiring! The conference was packed with motivational keynotes, interactive panels, and lightning talks that provided attendees with new ideas for fostering a diverse workplace, strategies for hiring and recruitment, and tangible techniques to advance and … The post Creating inclusive communities in tech appeared first on OpenText Blogs.

IT 71
article thumbnail

Hardware Cyberattacks: How Worried Should You Be?

Dark Reading

How to fit hardware threats into your security model as hardware becomes smaller, faster, cheaper, and more complex.

article thumbnail

15 top platforms for MDM and data governance

Information Management Resources

Enterworks, Informatica, Pitney Bowes and Riversand are among the providers of top platforms for master data management and data governance capabilities, says the MDM Institute.

MDM 62
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Chinese Intel Agents Indicted for 5-Year IP Theft Campaign

Dark Reading

Intelligence agents aimed for aerospace manufacturing targets, with help of cyberattackers, corporate insiders, and one IT security manager.

article thumbnail

After the Token Act: A New Data Economy Driven By Small Business Entrepreneurship

John Battelle's Searchblog

Gramercy Tavern in New York City. If Walmart can leverage data tokens to lure Amazon’s best customers away , what else is possible in a world of enabled by my fictional Token Act? Well, Walmart vs. Amazon is all about big business – a platform giant (Amazon) disrupting an OldBigCo (Walmart and its kin). Over the past two decades, Amazon bumped Walmart out of the race to a trillion-dollar market cap, and the OldCo from Bentonville had to reset and play the role of the upstart.

article thumbnail

Spooking the C-Suite: The Ephemeral Specter of Third-Party Cyber-Risk

Dark Reading

Halloween movies are the perfect metaphor for breaking down today's scariest supplier breach tropes.

Risk 80
article thumbnail

ID Systems Throughout the 50 States

Schneier on Security

Jim Harper at CATO has a good survey of state ID systems in the US.

77
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How the Power of Quantum Can Be Used Against Us

Dark Reading

There has been a palpable shift from volumetric attacks to "quantum attacks," and they look to be one of the biggest cybersecurity challenges on the rise today.

article thumbnail

Have hackers got your (fax) number?

OpenText Information Management

Earlier this year, Check Point Software managed to hack an HP all-in-one printer. The company exploited a weakness the OS of two HP models had when handling fax. It caused quite a fuss for us in the fax business. Bad news travels fast, they say. False news, it turns out, travels faster. Check Point’s conclusion … The post Have hackers got your (fax) number?

IT 45
article thumbnail

SamSam Ransomware Goes on a Tear

Dark Reading

SamSam ransomware hasn't gone away and it's adapting to meet evolving defenses.