Mon.May 25, 2020

article thumbnail

Mercedes-Benz Data Leak: Embarrassing But Endurable

Data Breach Today

The Mistake Could Have Been Much Worse in an Era of Connected Vehicles Last week, a curious data breach occurred: Almost 9 GB of software development documentation from Daimler AG, the parent company of Mercedes-Benz. In an era where software underpins vehicles, the leak could have been worse, but underscored how shared code repositories much be protected.

article thumbnail

3 hacking forums have been hacked and database have been leaked online

Security Affairs

Three hacking forums Nulled.ch, Sinfulsite.com, and suxx.to have been hacked and their databases have been leaked online. Researchers from intelligence firm Cyble made the headlines again, this time they have discovered online the databases of three hacking forums. The three forums are Sinful Site , SUXX.TO and Nulled , they were all hacked. Databases of three #Hacking #Forums ( [link] , [link] , and [link] ) Got Breached.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Version of ZLoader Banking Malware Resurfaces

Data Breach Today

Researchers Observe Over 100 Campaigns Since Start of 2020 Two years after it was last seen in February 2018, a new version of the ZLoader banking malware has resurfaced, with cybercriminals distributing the malware through email campaigns, according to security firm Proofpoint.

Security 292
article thumbnail

Maze ransomware operators leak credit card data from Costa Rica’s BCR bank

Security Affairs

Maze ransomware operators published credit card details stolen from the Bank of Costa Rica (BCR) threatening to leak other lots every week. Maze ransomware operators have released credit card data stolen from the Bank of Costa Rica (BCR) threatening to leak other lots every week. Early May, Maze Ransomware operators claimed to have hacked the network of the state-owned Bank of Costa Rica Banco BCR and to have stolen internal data, including 11 million credit card credentials.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK Data Breach Reports Decline

Data Breach Today

As GDPR Hits Second Anniversary, Regional Reporting Variations Continue Britain's privacy watchdog reports it received 19% fewer data breach notifications in the first quarter than in the same period last year. While the decline may be attributed to more organizations better understanding when to report breaches, other countries have seen an increase in breach reports.

More Trending

article thumbnail

Cisco fixed a critical issue in the Unified Contact Center Express

Security Affairs

Cisco has released several security patches, including one for a critical issue, tracked as CVE-2020-3280 , in the call-center software Unified Contact Center Express. Cisco released a set of security patches , including one for a critical flaw in its call-center software Unified Contact Center Express, tracked as CVE-2020-3280. The CVE-2020-3280 vulnerability is a remote code execution issue that resides in the Java remote management interface for Unified CCE. “A vulnerability in the Jav

article thumbnail

Jamf 100 Course 4.0: Here’s what’s new

Jamf

Version 4.0 contains some key changes based on updates from Apple, Jamf and the Jamf Nation community’s feedback. Here’s what you can expect from the revamp.

96
article thumbnail

Ragnar Ransomware encrypts files from virtual machines to evade detection

Security Affairs

Ransomware encrypts from virtual machines to evade antivirus. Ragnar Locker deploys Windows XP virtual machines to encrypt victim’s files, the trick allows to evaded detection from security software. Crooks always devise new techniques to evade detection, the Ragnar Locker is deploying Windows XP virtual machines to encrypt victim’s files while bypassing security measures.

article thumbnail

ThreatList: People Know Reusing Passwords Is Dumb, But Still Do It

Threatpost

Even seeing data breaches in the news, more than half of consumers are still reusing passwords.

Passwords 104
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Crooks hacked e-shops and threaten to sell SQL databases if ransom not paid

Security Affairs

Threat actors are offering for sale more than two dozen SQL databases belonging to e-commerce websites for different countries. Hackers are offering for sale more than two dozen SQL databases stolen from online shops from multiple countries. Threat actors have compromised insecure servers exposed online and after copying the content of their websites they left a ransom note.

Sales 82
article thumbnail

70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs

Threatpost

A lack of awareness about where and how open-source libraries are being used is problematic, researchers say.

article thumbnail

What’s on in the OpenText Digital Zone

OpenText Information Management

Welcome to the OpenText™ Digital Zone “What’s on” guide. Currently divided into four separate zones, each focused on specific customers’ challenges or technologies, the OpenText Digital Zones are designed to provide customers with highly relevant and memorable digital experiences. Featured Sessions OpenText and SAP Digital Zone Beyond the pandemic: Think big, start small.

64
article thumbnail

Don't Be Fooled by Covid-19 Contact-Tracing Scams

WIRED Threat Level

Fraudsters have found yet another way to take advantage of the pandemic.

Security 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Secrets of the Scrap Metal King of Albuquerque

Information Governance Perspectives

The following is an exclusive excerpt from the book “Tomorrow’s Jobs Today: Wisdom and Career Advice from Thought Leaders in AI, Big Data, Blockchain, the Internet of Things, Privacy, and More” available soon from John Hunt Publishing. The convergence of technology and the rule of law is expected to intensify over the coming years. It’s a paradigm shift that will force organizations of all sizes, private and public, across all verticals, to balance a world ripe with innovation with an evolving u

article thumbnail

Finland: Data Protection Authority sends GDPR anniversary greetings issuing its first fines

DLA Piper Privacy Matters

THREE ADMINISTRATIVE FINES ISSUED IN FINLAND. by Aleksi Nieminen . Just as the second anniversary of the GDPR was looming close, the Data Protection Ombudsman’s collegial body, responsible for determining administrative fines in Finland, issued administrative fines against three Finnish companies for their infringements of data protection laws. The infringements concerned inadequate informing of data subjects, failure to carry out a data protection impact assessment (DPIA) and the collection of

GDPR 52
article thumbnail

Content Delivery Networks Adding Checks for Magecart Attacks

Dark Reading

Modern web applications make significant use of third-party code to drive innovation, but the software supply chain has also turned into a major source of threat. CDNs aim to change that.

52
article thumbnail

Free eBook: AutoClassification 101 from Valoratech

IG Guru

As the volume of data continues to grow within our corporate data environments, it becomes increasingly more complex to navigate, locate and contain content in common data silos such as email, file shares, digital archives, cloud storage and other data repositories. By tagging or classifying enterprise data and understanding the context of the content, organizations can better […].

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Secrets of the Scrap Metal King of Albuquerque

Information Governance Perspectives

The following is an exclusive excerpt from the book “Tomorrow’s Jobs Today: Wisdom and Career Advice from Thought Leaders in AI, Big Data, Blockchain, the Internet of Things, Privacy, and More” available soon from John Hunt Publishing. The convergence of technology and the rule of law is expected to intensify over the coming years. It’s a Continue reading.