Mon.Apr 27, 2020

article thumbnail

Contact-Tracing App Privacy: Apple, Google Refuse to Budge

Data Breach Today

Germany Changes Tack to Decentralized Model; Some US States Seek More Control Apple and Google have promised to help facilitate contact-tracing apps, but they've rejected calls to give users' location data to governments, as the U.K., France and some U.S. states are demanding. In response, Germany is among those now backing a privacy-preserving, decentralized model.

Privacy 297
article thumbnail

Hackers targeted ICS/SCADA systems at water facilities, Israeli government warns

Security Affairs

The Israeli authorities are alerting organizations in the water industry following a series of cyberattacks that hit water facilities in the country. The Israeli government has issued an alert to organizations in the water sector following a series of cyberattacks that targeted the water facilities. Israel’s National Cyber Directorate announced to have received reports of cyber attacks aimed at supervisory control and data acquisition (SCADA) systems at wastewater treatment plants, pumping stati

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Latest Phishing Campaigns Spoof Federal Reserve, SBA

Data Breach Today

Cybercriminals Pivoting to Economic Stimulus Lures Some fraudsters have pivoted from using the COVID-19 pandemic as a phishing lure to creating messages and malicious domains designed to capitalize on various U.S. economic stimulus programs.

Phishing 264
article thumbnail

Shade Ransomware gang shut down operations and releases 750K decryption keys

Security Affairs

The operators behind the Shade Ransomware (Troldesh) shut down their operations and released over 750,000 decryption keys. Good news for the victims of the infamous Shade Ransomware , the operators behind the threat have shut down their operations and released over 750,000 decryption keys. The cybercrime gang also apologized for the damages they have caused their victims.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Colorado Hospital Latest Cyberattack Victim Amid COVID-19

Data Breach Today

Healthcare Sector Continues to Battle Against a Surge in Cyber Incidents In yet another example of the surge of cyberattacks in the healthcare sector during the COVID-19 crisis, a hospital in Pueblo, Colorado, is still recovering from an apparent ransomware attack last week.

More Trending

article thumbnail

Webinar | 4 Actions to Secure Work from Home Employees

Data Breach Today

IT resources are being stretched to mobilize an urgent shift to remote access and remote work. This informational webinar will outline 4 actions you can take today to keep employees secure and productive during these challenging times, with tips straight from your identity and access management peers.

Security 227
article thumbnail

Previously undetected VictoryGate Botnet already infected 35,000 devices

Security Affairs

Experts managed to sinkhole several C2 servers of the VictoryGate botnet that already infected over 35,000 devices and propagates via infected USB devices. The VictoryGate botnet is active since at least May 2019, the botnet is more active in Latin America the most. More than 90% of the infected devices are located in Peru. Experts from ESET managed to sinkhole several C2 servers and dismantled the previously undocumented botnet that was composed of over 35,000 devices.

Mining 104
article thumbnail

Judge Approves FTC's $5 Billion Settlement With Facebook

Data Breach Today

Privacy Advocates Objected to the July 2019 Agreement Nearly 10 months after Facebook and the FTC agreed to a record-setting $5 billion settlement over misuse of user data, a federal judge has finally signed off on the deal, while questioning the adequacy of laws governing major technology firms.

Privacy 194
article thumbnail

Hackers Mount Zero-Day Attacks on Sophos Firewalls

Threatpost

A pre-auth SQL injection bug leading to remote code execution is at the heart of a data-stealing campaign against XG firewalls, using the Asnarok trojan.

Security 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

WHO Reports 'Dramatic' Increase in Cyberattacks

Data Breach Today

UN Agency Reports Five Times More Incidents Than Same Period Last Year The World Health Organization, which has been at the forefront of the global COVID-19 pandemic since the start of the year, has witnessed a "dramatic" increase in the number of cyberattacks since the crisis began, according to the organization's CIO.

188
188
article thumbnail

Accelerating digital transformation in manufacturing

OpenText Information Management

The global manufacturing sector is in the midst of a crisis on a scale not seen before. At one point, according to BCG, more than 90% of manufacturing plants in Europe and 65% in the US were closed due to COVID-19. Plant closures were initially due to part shortages from China, but as the virus … The post Accelerating digital transformation in manufacturing appeared first on OpenText Blogs.

article thumbnail

Network and Security Transformation - Enabling your Digital Business

Data Breach Today

Vistra Energy, a Texas-based power generation firm, recently underwent a network transformation project. CISO Paul Reyes, joined by Zscaler's Dan Shelton, opens up on how to make the move to cloud-based models and what it can do to support your business.

Cloud 162
article thumbnail

Top 10 Cyber Incident Response Mistakes and How to Avoid Them

Dark Reading

From lack of planning to rushing the closure of incidents, these mistakes seriously harm IR effectiveness.

117
117
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Enabling Secure Access in Complex Environments

Data Breach Today

Modern enterprises are large and complex - and so are their IT environments. How does this complexity translate to securing access in hybrid environments? Frederico Hakamine of Okta breaks down the challenge and discusses solutions.

Access 162
article thumbnail

Thrive beyond challenging times with Industry Accelerators for Cloud Pak for Data

IBM Big Data Hub

In my last blog I shared some tips and best practices for leveraging AI to prepare and plan ahead during this unprecedented time of disruption and change. I hope you found it helpful and refer back to it when needed ( here ). We are seeing an increasing impact to businesses in every industry. Supply chains are broken, demands are shifting and resources are shrinking.

Cloud 82
article thumbnail

Australia Releases 'COVIDSafe' Contact-Tracing App

Data Breach Today

2 Million Individuals Download App; 10 Million Must Use for Maximum Effectiveness Less than 24 hours after the Australian government released its COVID-19 contact-tracing app Sunday, nearly 2 million people had downloaded it. As security and privacy experts review the app, one outstanding question is if the public will trust it enough to reach the public health target of 10 million users.

Privacy 147
article thumbnail

How to select the best cloud fax service in 2020

OpenText Information Management

In a previous blog, we defined a cloud fax service and its benefits. As fax volumes continue to grow, more and more organizations are looking to the lower cost and convenience of this approach. So, what should you be looking for in the best cloud fax service? Scrap your fax machine with its hardware, paper … The post How to select the best cloud fax service in 2020 appeared first on OpenText Blogs.

Cloud 79
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Eight Common OT / Industrial Firewall Mistakes

Threatpost

Firewalls are easy to misconfigure. While the security consequences of such errors may be acceptable for some firewalls, the accumulated risks of misconfigured firewalls in a defense-in-depth OT network architecture are generally unacceptable.

Risk 79
article thumbnail

Group-IB helps to detain operators of scam-service issuing fake passes to move around Moscow amid COVID-19 virus lockdown

Security Affairs

Group-IB helped Russian Police in detaining the operators of a fraudulent online service, selling fake digital passes to move around Moscow amid COVID-19 lockdown. Group-IB, an international cybersecurity company, and the Moscow Department of Information Technology have helped Moscow police in identifying and detaining the operators of a fraudulent online service, selling fake digital passes to the residents of Moscow and Russian regions to move around the cities during the COVID-19 lockdown.

article thumbnail

U.S. Universities Hit With ‘Adult Dating’ Spear-Phishing Attack

Threatpost

More than 150,000 emails spreading the Hupigon RAT that use adult dating as a lure have been uncovered, with almost half being sent to U.S. university and college email addresses.

article thumbnail

Automatic Instacart Bots

Schneier on Security

Instacart is taking legal action against bots that automatically place orders: Before it closed, to use Cartdash users first selected what items they want from Instacart as normal. Once that was done, they had to provide Cartdash with their Instacart email address, password, mobile number, tip amount, and whether they prefer the first available delivery slot or are more flexible.

Passwords 104
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

EU: Europe’s toolbox for building compliant Corona tracking apps

DLA Piper Privacy Matters

Mobile applications supporting the EU in its fight against Covid -19: the common EU Toolbox for Member States. By Patrick Van Eecke, Heidi Waem and Alizée Stappers. On the 8 th of April 2020, the European Commission adopted Recommendation 2020/518 to address the need of a common toolbox (the “ Toolbox ”) for the use of technology and data in order to fight and exit the Covid-19 crisis, with a particular focus on the use of mobile applications.

article thumbnail

Antiquated Policy Wording: Part 4 — The Problem with “Should”

ARMA International

This is the final article of a four-part series on drafting requirements in IM policies, looking at the problems of using the words “must,” “may,” and “should.”. Of the three modal verbs discussed in this article, “should” suffers the worst identity crisis. It is the most versatile of the terms, which really means that it is the most ambiguous. Part 1.

article thumbnail

Microsoft Advisory Warns of Vulnerabilities Affecting Office

Dark Reading

The flaws exist in Autodesk's FBX Software Development Kit, which is supported in Microsoft Office 2019 and Office 365 ProPlus.

80
article thumbnail

PII headaches

OpenText Information Management

Two years have gone by since GDPR started levying strict rules on how organizations can store, view, and share personal data. Since then, other regulations have popped up, like the California Consumer Privacy Act (CCPA). As time goes by, it becomes more and more important to have a handle on being able to redact information … The post PII headaches appeared first on OpenText Blogs.

GDPR 58
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Will the Pandemic Complicate Cyber Insurance Claims?

Dark Reading

While quarantined workers are keeping safe at home, they could be jeopardizing your insurance policy.

article thumbnail

8 Management Certifications To Boost your RIM/IG Program and Career via VRC

IG Guru

Check out the latest blog post from VRC. The post 8 Management Certifications To Boost your RIM/IG Program and Career via VRC appeared first on IG GURU.

article thumbnail

Biopharmaceutical Firm Suffers Ransomware Attack, Data Dump

Dark Reading

ExecuPharm said its internal servers were hit with ransomware after attackers launched a phishing attack.