Wed.Sep 01, 2021

article thumbnail

Medical Group: 655,000 Affected by 'Network Outage' Breach

Data Breach Today

Large Illinois Group Practice Says PHI Exposed After suffering a network systems outage that lasted at least a week in July, DuPage Medical Group, the largest mulispeciality group practice in Illinois, is now reporting a data breach affecting more than 655,000 individuals.

article thumbnail

15-Year-Old Malware Proxy Network VIP72 Goes Dark

Krebs on Security

Over the past 15 years, a cybercrime anonymity service known as VIP72 has enabled countless fraudsters to mask their true location online by routing their traffic through millions of malware-infected systems. But roughly two weeks ago, VIP72’s online storefront — which ironically enough has remained at the same U.S.-based Internet address for more than a decade — simply vanished.

Sales 274
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEC Sanctions 8 Firms for 'Deficient Cybersecurity Procedures'

Data Breach Today

Regulator Cites Email Takeovers, Inadequate Incident Response The U.S. Securities and Exchange Commission sanctioned eight financial firms for alleged failures related to cybersecurity policies and procedures, each stemming from email account takeovers and related incident response, the regulator announced this week.

article thumbnail

List of data breaches and cyber attacks in August 2021 – 61 million records breached

IT Governance

It has been another month of comparatively few reported cyber attacks and data breaches, with our August list containing 84 incidents accounting for 60,865,828 breached records. And it would have been even fewer if not for the attack on T-Mobile. The mobile network disclosed a hack earlier this month, which it originally said affected 7.8 million customers and 40 million records.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Attackers Keep Refining Business Email Compromise Schemes

Data Breach Today

Tactics Include Subverting Advertising Redirect Services, Hiring English Speakers Business email compromise attacks, which balance low-tech tactics with the potential for big profits, remain popular. Attackers continue to refine their tactics, including subverting legitimate redirect services as well as recruiting English-speaking business partners and cryptocurrency tumbler operators.

315
315

More Trending

article thumbnail

Dallas-Based Restaurant Chain Confirms POS Breach

Data Breach Today

Security Experts Say Restaurants Are Increasingly Targeted A Dallas-based restaurant chain has confirmed that a malware attack compromised its point-of-sale system, apparently exposing payment cards at all of its 29 locations in seven states. Security experts say POS breaches at restaurants are a growing concern.

Sales 246
article thumbnail

SEC Charges Investment Advisers and Broker-Dealers with Deficient Cybersecurity Procedures

Hunton Privacy

On August 30, 2021, the U.S. Securities and Exchange Commission (“SEC”) announced that it had settled three administrative cases involving a total of eight registered broker-dealers and investment advisers for failures in their cybersecurity policies and procedures. These failures led to email account takeovers that exposed personal information of thousands of customers at each firm.

article thumbnail

CISA Warns of Holiday Ransomware Attacks

Data Breach Today

Before Labor Day, Agency Cites Recent Attacks Centered on Holiday Weekends Citing damaging ransomware attacks that it, along with the FBI, has observed over recent holidays, the Cybersecurity and Infrastructure Security Agency issued an alert warning organizations to be prepared as the Labor Day holiday nears. CISA, however, is not tracking any immediate threats.

article thumbnail

Zero-Click iPhone Exploits

Schneier on Security

Citizen Lab is reporting on two zero-click iMessage exploits, in spyware sold by the cyberweapons arms manufacturer NSO Group to the Bahraini government. These are particularly scary exploits, since they don’t require to victim to do anything, like click on a link or open a file. The victim receives a text message, and then they are hacked. More on this here.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Bitcoin ATM Firms Seek to Shape Regulations

Data Breach Today

Sizing Up the Objectives of the Cryptocurrency Compliance Cooperative Bitcoin ATM operators and blockchain analytics firms that recently launched a "compliance cooperative" acknowledge one of their goals is to influence regulation of the sector.

article thumbnail

Information management and the energy transition

OpenText Information Management

Greetings from Anchorage, Alaska! As the new Industry Strategist for the energy industry at OpenText, I’m proud to come from a US state where the energy industry is of paramount importance. Alaska is home to Prudhoe Bay, the largest oilfield ever discovered in North America. It’s also a state where over 25% of the GDP … The post Information management and the energy transition appeared first on OpenText Blogs.

article thumbnail

House Debates Breach Notification Measure

Data Breach Today

Bill Would Require Reporting of Critical Infrastructure Attacks Within 72 Hours The House began debate Wednesday on legislation that would require companies that own or operate parts of the nation's critical infrastructure to report a cyberattack or breach within 72 hours of confirmation.

173
173
article thumbnail

Feds Warn of Ransomware Attacks Ahead of Labor Day

Threatpost

Threat actors recently have used long holiday weekends -- when many staff are taking time off -- as a prime opportunity to ambush organizations.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

'ProxyToken' Bug Put Microsoft Exchange Email at Risk

Data Breach Today

Microsoft Has Patched, But It's Another Ding in Exchange's Armor Researchers have released details of a serious vulnerability in Microsoft's Exchange email server, nicknamed "ProxyToken." The bug, which was patched by Microsoft in April, could be exploited to copy emails from Exchange inboxes.

Risk 173
article thumbnail

LockBit ransomware operators leak 200GB of data belonging to Bangkok Airways

Security Affairs

LockBit ransomware operators have breached Bangkok Airways, the airline confirmed it was the victim and discloses a data breach impacting its passengers. Bangkok Airways, a regional airline based in Bangkok, discloses a data breach as a result of a ransomware attack orchestrated by the LockBit ransomware operators. The ransomware gang had posted a message on their leak site claiming to have breached the airline and threatening to leak stolen data if the company will not pay the ransom.

article thumbnail

South Korean Privacy Regulator Fines Netflix and Facebook

Hunton Privacy

On September 1, 2021, the South Korean Personal Information Protection Commission (“PIPC”) issued fines against Netflix and Facebook for violations of the Korean Personal Information Protection Act (“PIPA”). The PIPC issued a fine to Facebook of approximately $5.6 million USD relating to six alleged violations of PIPA, including (1) collecting facial recognition data without users’ consent; (2) collecting Social Security numbers in violation of the law; (3) failing to notify users when it change

article thumbnail

Watch out, ransomware attack risk increases on holidays and weekends, FBI and CISA

Security Affairs

The FBI and CISA issued a joint cybersecurity advisory to warn organizations to remain vigilant against ransomware attacks during weekends or holidays. The FBI and CISA warn organizations to keep high their defenses against ransomware attacks during weekends or holidays. The government agencies have observed an increase in ransomware attacks occurring on holidays and weekends, the choice of these period is motivated by the lower level of defense due to the reduced presence of the personnel. R

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

BEC Scammers Seek Native English Speakers on Underground

Threatpost

Cybercrooks are posting help-wanted ads on dark web forums, promising to do the technical work of compromising email accounts but looking for native English speakers to carry out the social-engineering part of these lucrative scams.

Security 101
article thumbnail

UK children’s digital privacy code comes into effect

The Guardian Data Protection

Age Appropriate Design Code mandates apps to take ‘best interests’ of child users into account A sweeping set of regulations governing how online services should treat children’s data have been welcomed by campaigners as they come into effect. The Age Appropriate Design Code – which was written into law as part of the 2018 Data Protection Act, which also implemented GDPR in the UK – mandates websites and apps from Thursday to take the “best interests” of their child users into account, or face f

Privacy 93
article thumbnail

Gutenberg Template Library & Redux Framework Bugs Plague WordPress Sites

Threatpost

Two vulnerabilities in the site-building plugin could be useful tools in the hands of a skilled attacker, researchers warned.

Libraries 118
article thumbnail

Automating patch management with PatchBot and Jamf Pro

Jamf

Learn more about great patch management software for Jamf Pro that helps to provide apps to the fleet without human intervention.

105
105
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

QNAP will patche OpenSSL flaws in its NAS devices

Security Affairs

Network-attached storage (NAS) appliance maker QNAP is working on security patches for its products affected by recently fixed OpenSSL flaws. Taiwanese Network-attached storage (NAS) appliance maker QNAP announced that it is assessing the potential impact of two recently addressed flaws in OpenSSL on its products. The company also announced that it is working on security updates that address these vulnerabilities. “An out-of-bounds read vulnerability in OpenSSL has been reported to affect

IT 89
article thumbnail

Making ConneXions at a new OpenText Integration Summit

OpenText Information Management

Today’s business environment is one of constant change with macro-economic conditions evolving on an almost daily basis. The Suez Canal blockage, the Colonial Pipeline ransomware attack and, of course, COVID-19 have seen major supply chain disruptions occur around the world. When you look back over the past decade there have also been countless natural disasters … The post Making ConneXions at a new OpenText Integration Summit appeared first on OpenText Blogs.

article thumbnail

SEC announces sanctions against entities over email account hacking

Security Affairs

The U.S. Securities and Exchange Commission (SEC) announced sanctions against several organizations over email account hacking. The U.S. Securities and Exchange Commission (SEC) announced sanctions against eight entities belonging to three companies over email account hacking due to cybersecurity failures. The companies were not able to protect the confidential information of their customers. “The Securities and Exchange Commission today sanctioned eight firms in three actions for failures

article thumbnail

LockBit Jumps Its Own Countdown, Publishes Bangkok Air Files

Threatpost

The ransomware gang claims to have pulled off successful attacks against two airlines and one airport with help from its Accenture attack.

IT 70
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Mozi infections will slightly decrease but it will stay alive for some time to come

Security Affairs

The Mozi botnet continues to spread despite the arrest of its alleged author and experts believe that it will run for many other years. Mozi is an IoT botnet that borrows the code from Mirai variants and the Gafgyt malware , it appeared on the threat landscape in late 2019. The Mozi botnet was spotted by security experts from 360 Netlab, at the time of its discovered it was actively targeting Netgear, D-Link, and Huawei routers by probing for weak Telnet passwords to compromise them.

IT 83
article thumbnail

Privacy bills in the 117th Congress via the IAPP

IG Guru

Check out the post here. The post Privacy bills in the 117th Congress via the IAPP appeared first on IG GURU.

Privacy 80
article thumbnail

Wrapping Up Hanzo’s Innovate UK Grant: Using Artificial Intelligence to Identify Misbehaviour in Slack

Hanzo Learning Center

As we look back on the six-month grant funding Hanzo received from Innovate UK’s Sustainable Innovation Fund , we’re excited by the progress we’ve made and the new paths we have before us. If you missed my earlier posts, the fund was created to help companies recover from the disruption caused by the COVID-19 pandemic. We applied for a grant to work on building artificial intelligence models that could detect misbehaviour in Slack and other collaboration apps.