Wed.Jan 11, 2023

article thumbnail

Aflac, Zurich Policyholders in Japan Affected by Data Leaks

Data Breach Today

Subcontractor Server Hacked in Both Incidents Compromising Data of Millions Personal information for nearly 3.2 million Aflac cancer insurance and almost 760,000 Zurich Insurance auto insurance policy holders in Japan has been leaked on the dark web following hacks on a third-party contractor.

Insurance 245
article thumbnail

Catches of the Month: Phishing Scams for January 2023

IT Governance

Welcome to our January 2023 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we delve into a scam that attempts to trick cyber security professionals and look at a new banking trojan that has experts worried. Criminal hackers target infosec professionals in Flipper Zero scam.

Phishing 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Group Behind Victoria Fire Department Outage

Data Breach Today

Vice Society Claims Credit for Data Leak Affecting Current, Former Employees The Vice Society ransomware group today claimed responsibility for a December 2022 attack on an Australian state fire department that led to a widespread IT outage. Fire Rescue Victoria warned current and former employees and job applicants of data leak.

article thumbnail

CIPL & Cisco Publish Joint Report on Business Benefits and ROI of Accountable Privacy Programs

Hunton Privacy

On January 10, 2023, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP and Cisco’s Privacy Center of Excellence published a joint report on “ Business Benefits of Investing in Data Privacy Management Programs ” (the “Report”). The Report provides insights into how several leading global companies realize value from privacy management programs and demonstrates that organizations are experiencing a wide range of risk and compliance benefits as well as other tangible

Privacy 104
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cerberus Sentinel Broadens South American Footprint With M&A

Data Breach Today

Deal Allows Cerberus To Capitalize on Privacy Regs, Cloud Migration in Argentina Managed security services player Cerberus Sentinel plans to capitalize on cloud migration and strict privacy regulations in South America through its proposed purchase of RAN Security. The deal will bolster Cerberus Sentinel's penetration testing, gap analysis and infrastructure management services.

Cloud 130

More Trending

article thumbnail

Darknet Markets Using Custom Android Apps for Fulfillment

Data Breach Today

M-Club Used by at Least 7 Drug-Focused Russian-Language Markets, Researchers Report Darknet markets offering illegal drugs and fraudster tools and services are thriving, despite the constant threat of law enforcement infiltration, disruption, takedown and arrests. In response, multiple drug markets have launched customized Android apps to handle buying, selling and fulfillment.

Marketing 130
article thumbnail

Microsoft Patch Tuesday for January 2023 fixed actively exploited zero-day

Security Affairs

Microsoft Patch Tuesday security updates for January 2023 fixed 97 flaws and an actively exploited zero-day. Microsoft Patch Tuesday security updates for January 2023 addressed a total of 98 vulnerabilities in Microsoft Windows and Windows Components; Office and Office Components; NET Core and Visual Studio Code, 3D Builder, Azure Service Fabric Container, Windows BitLocker, Windows Defender, Windows Print Spooler Components, and Microsoft Exchange Server. 11 vulnerabilities are rated Critical a

article thumbnail

US Flights Resume After Reported Computer Glitch Resolved

Data Breach Today

Separately, UK's Royal Mail Blames 'Cyber Incident' for Service Disruption Anytime critical infrastructure gets disrupted, the first question inevitably seems to be: Was a cyberattack to blame? So it went Wednesday when the Federal Aviation Administration announced a "ground stop," prohibiting all U.S. flights from taking off, due to an overnight system failure.

IT 130
article thumbnail

Cyber Jobs of the Future: Sleuth, Bodyguard, 'Immunity' Developer

Dark Reading

With artificial intelligence poised to displace many SOC professionals, it's important to think ahead to potential niches for cybersmart humans — even to outer space.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Microsoft's First 2023 Patch Tuesday Fixes 0-Day, 98 Vulns

Data Breach Today

Zero Day Affects With Swath of Windows Versions Microsoft fixed an actively exploited zero-day vulnerability in 2023's first Patch Tuesday dump. The Redmond giant also issued fixes for 98 other vulnerabilities, including 11 classified as critical and 87 as important. The zero day vulnerability could be used as part of a ransomware attack.

article thumbnail

US CISA adds MS Exchange bug CVE-2022-41080 to its Known Exploited Vulnerabilities Catalog

Security Affairs

US CISA added Microsoft Exchange elevation of privileges bug CVE-2022-41080 to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog. The first issue, tracked as CVE-2022-41080 , is a Microsoft Exchange server privilege escalation vulnerability.

IT 94
article thumbnail

MSP Simeio Boosts SailPoint Skills With PathMaker Group Buy

Data Breach Today

Simeio's First-Ever Acquisition Adds SailPoint, IBM Ties to Existing Saviynt Bond Simeio has added SailPoint and IBM to its identity and access management line card through the purchase of identity services provider PathMaker Group. The first acquisition in its 17-year history will give Simeio access to senior-level personnel with deep knowledge in identity governance.

article thumbnail

Better Phishing, Easy Malicious Implants: How AI Could Change Cyberattacks

Dark Reading

Current defenses are able to protect against today's AI-enhanced cybersecurity threats, but that won't be the case for long as these attacks become more effective and sophisticated.

Phishing 126
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Guardian Says Hackers Accessed UK Employee Data

Data Breach Today

December Incident that Shut Down UK Offices Was Ransomware The Guardian newspaper told staffers Wednesday that a December cyber incident was a ransomware attack and that hackers have accessed staff information. The breach is limited to UK staff and no personal data of readers or staff in its U.S. or Australian offices has been affected.

Access 130
article thumbnail

Cyberattack Cancels Classes for Des Moines Public Schools

Dark Reading

School to resume Thursday, Jan. 12, after Iowa school district detected unusual network activity and pulled the plug.

112
112
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. divya. Thu, 01/12/2023 - 05:54. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Italian Cybercriminal Pleads Guilty to Phishing for Book Manuscripts

KnowBe4

An Italian citizen named Filippo Bernardini has pleaded guilty in New York to stealing more than a thousand unpublished book manuscripts from various well-known authors. The targeted authors included Margaret Atwood, Ian McEwan, Sally Rooney, and Ethan Hawke.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

5 Ways Cybersecurity for Cloud Workloads Will Evolve in 2023

Dark Reading

Organizations are looking for new methods to safeguard the virtual machines, containers, and workload services they use in the cloud.

Cloud 98
article thumbnail

Royal Mail is suffering service disruption due to a ‘cyber incident’

Security Affairs

Royal Mail, Britain’s postal service, announced it has suffered a “cyber incident” that caused a “severe service disruption.”. Royal Mail, the British multinational postal service and courier company, announced this week that a “cyber incident” has a severe impact on its operation. The incident only impacted Royal Mail’s international export services, the company said it is temporarily unable to despatch items to overseas destinations.

article thumbnail

21% of federal agency passwords cracked in their security audit

KnowBe4

Some excellent work here. An internal US Government agency audit audit showed that a fifth of passwords were easy to crack. Their recently published study showed that hashes for well over 80,000 AD accounts included passwords like Password1234, Password1234!, and ChangeItN0w!

article thumbnail

Why Analyzing Past Incidents Helps Teams More Than Usual Security Metrics

Dark Reading

Traditional metrics don't reflect real-world severity. Instead, analyzing previously reported incidents can help teams decide how to react, a new report says.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A Police App Exposed Secret Details About Raids and Suspects

WIRED Threat Level

SweepWizard, an app that law enforcement used to coordinate raids, left sensitive information about hundreds of police operations publicly accessible.

Access 85
article thumbnail

Catchpoint Announces Solution to Monitor and Protect Companies From BGP Incidents

Dark Reading

Catchpoint’s Internet Performance Monitoring Platform helps IT teams identify and mitigate BGP incidents, including hijack attempts and routing issues, with the industry’s broadest network of vantage points in the world drawing on real-time BGP monitoring.

IT 76
article thumbnail

Gootkit Loader campaign targets Australian Healthcare Industry

Security Affairs

Threat actors are targeting organizations in the Australian healthcare sector with the Gootkit malware loader. Trend Micro researchers warn that Gootkit Loader is actively targeting the Australian healthcare industry. The experts analyzed a series of attacks and discovered that Gootkit leveraged SEO poisoning for its initial access and abused legitimate tools like VLC Media Player.

article thumbnail

Use CircleCI? Here Are 3 Steps You Need to Take

Dark Reading

This Tech Tip outlines the steps enterprise defenders should take as they protect their data in cloud environments in response to the security incident with the CI/CD platform.

Cloud 73
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Belgian DPA Approves IAB Europe’s Action Plan For Consent Framework

Hunton Privacy

On January 11, 2023, the Belgian Data Protection Authority (“Belgian DPA”) announced that it has approved the Interactive Advertising Bureau Europe’s (“IAB Europe”) action plan with respect to its Transparency and Consent Framework (“TCF”). Background. The Belgian DPA started an investigation into IAB Europe after receiving several complaints since 2019 regarding the TCF.

GDPR 58
article thumbnail

Governance in the Cloud Shifts Left

Dark Reading

CISOs' top cloud challenge is harmonizing standards, policies, and procedures across blended environments.

Cloud 84
article thumbnail

Tips for Emerging in the Technology Industry

Micro Focus

A gamut of “breaking into tech” stories exist out there; so here’s mine in hopes of both educating and inspiring others to seek professions they truly love. The post Tips for Emerging in the Technology Industry appeared first on Micro Focus Blog.

Mining 56