Mon.Jun 29, 2020

article thumbnail

Co-Creator of Site That Sold Payment Card Data Pleads Guilty

Data Breach Today

Infraud Organization's Site, Shuttered in 2018, Tied to $530 Million in Fraud A Russian national charged in connection with co-creating the Infraud Organization's online cybercrime forum that sold stolen payment card data and was tied to $530 million in fraud losses has pleaded guilty.

326
326
article thumbnail

Marketers: Your Role In Social Discourse Is Critical

John Battelle's Searchblog

How Brands Can Fix the Relationship Between Platforms, Audiences, and Media Companies (Hint: It’s Not a Boycott). (Second of a series. The first post reviews the media and platform ecosystem, and laments the role brand marketers have played in its demise.) . In my first post of this series, I laid out a fundamental problem with how digital media works today.

Marketing 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UCSF Med School Pays $1.1 Million Ransom

Data Breach Today

After Ransomware Attack, School Cites Need to Restore Data Related to 'Academic Work' The University of California San Francisco says it paid a $1.14 million ransom earlier this month to obtain decryptor keys to unlock several servers within its school of medicine that were struck with ransomware.

article thumbnail

AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals

Threatpost

Comparitech’s Paul Bischoff found that Amazon’s facial recognition platform misidentified an alarming number of people, and was racially biased.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Fxmsp Hackers Behind AV Source Code Heist: Still Operating?

Data Breach Today

Remote-Access Vendor Promised to Make Buyers 'Invisible God of Networks' Is the Fxmsp hacking operation still in business? Experts say Fxmsp earned $1.5 million in illicit profits, thanks to a botnet-based business model that enabled the group to sell remote access to hacked networks. But then it advertised source code allegedly stolen from three anti-virus vendors.

Access 208

More Trending

article thumbnail

OnDemand | New Threats in the Age of the Dynamic Workforce

Data Breach Today

How the Dynamic Workforce is Changing Threat Detection and Response View this webinar to learn strategies to mitigate cyberattack risk in the 'new normal' and what you can do to continue to stay ahead of the curve.

Risk 189
article thumbnail

UCSF paid a $1.14 Million ransom to decrypt files after Ransomware attack

Security Affairs

The University of California San Francisco (UCSF) revealed that it paid roughly $1.14 million to cybercriminals to recover data after a ransomware attack. Late last week, the University of California San Francisco (UCSF) admitted having paid roughly $1.14 million to cybercriminals to recover data encrypted during a ransomware attack that took place on June 1.

article thumbnail

Data Breach Settlement Has an Unusual Provision

Data Breach Today

No 'Global Cap' on Payment of Claims A preliminary settlement in a class action data breach lawsuit against Iowa Health System - which does business as UnityPoint Health - contains an unusual provision that could prove quite costly.

article thumbnail

Experts saw 100k+ daily brute-force attacks on RDP during COVID-19 lockdown

Security Affairs

Researchers revealed that the number of daily brute-force attacks on Windows RDP has doubled during the pandemic lockdown. Security experts from ESET revealed that the number of daily brute-force attacks on Windows RDP has doubled during the COVID-19 lockdown. The phenomenon is not surprising because during the COVID-19 lockdown employees were forced to work from home remote accessing company infrastructure.

Passwords 117
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Magecart Card Skimmer Hidden in Image's EXIF Metadata

Data Breach Today

Malwarebytes Researchers Find Malicious JavaScript in WordPress Plugin Payment card hackers are now hiding malicious JavaScript inside an image's EXIF metadata and then sneaking the image onto e-commerce sites, according to the security firm Malwarebytes.

Metadata 162
article thumbnail

Empowering your workforce

OpenText Information Management

Ensuring business productivity in today’s uncertain times has put security, accessibility, and collaboration at the forefront of every business. While societal changes mandate staying home to ensure safety, business is adjusting to a new way of working. Digital transformation has long been the key to success and competitive advantage but is now a base requirement … The post Empowering your workforce appeared first on OpenText Blogs.

article thumbnail

Japan's IoT Scanning Project: Insecure Devices Found

Data Breach Today

But Port Scanning Project Found Small Number of Problematic Devices Japan has been scanning its entire IPv4 address space to find insecure home routers, web cameras and sensors. The results are encouraging, and the country's program could serve as a model for other nations aiming to avoid large-scale IoT security problems.

IoT 162
article thumbnail

How SafetyCulture saved time and money via online onboarding with Jamf

Jamf

SafetyCulture IT Manager Michael Viney says the company had to quickly find a way to equip staff with a new computing device and have them connected to the corporate IT environment. They turned to Jamf to help get the job done, and saved $80 and six hours of IT time per employee.

IT 98
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hacking Timeline: Fxmsp's Rise and Apparent Fall

Data Breach Today

Group Refined Network Intrusions and Malware to Build a Better Botnet, Experts Say How long does it take to become a reliable, trusted seller in the cybercrime-as-a-service ecosystem? For the Fxmsp hacking collective, experts say the answer is about a year. The group built a botnet that facilitated network intrusions and data exfiltration, but it was driven off cybercrime forums.

IT 147
article thumbnail

What is Apple Enterprise Management?

Jamf

Mobile device management (MDM) is no longer enough for enterprises looking to maximize their Apple initiatives. See how Jamf delivers Apple Enterprise Management to fill the gap between what Apple offers and the enterprise requires.

MDM 98
article thumbnail

Disposition 101 Webinar Now Available

The Texas Record

We are very excited to announce the newly revamped Disposition 101 webinar, which is now available on our website along with several other free records management webinars and supplemental resources. Check out the Disposition 101 webinar page for the video recording, handouts and a certificate of completion. This webinar is for state agency and local government personnel who would like to find out about the laws, rules and best practice guidelines related to the disposition of records.

article thumbnail

WWDC Recap

Jamf

With another WWDC in the books, let's look back at what was announced, what is exciting and what we can take away from it all. Here is a recap of the week-long Apple special event.

IT 98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

REvil operators threaten to leak files stolen from Australian firm Lion

Security Affairs

Australian beverage company Lion announced that it has found no evidence that hackers have stolen information from its systems. The Australian brewery and dairy conglomerate Lion suffered two cyber attacks in a few days this month. Lion is a beverage and food company that operates in Australia and New Zealand, and a subsidiary of Japanese beverage giant Kirin.

article thumbnail

Privacy issues in smart cities – Lessons learned from the Waterfront Toronto – Sidewalks project

Privacy and Cybersecurity Law

Dentons has had the privilege to act as privacy counsel to Waterfront Toronto in the development of the smart community Quayside project with Sidewalk Labs. The experience made clear that no smart city can proceed without social license and that there is no social license without addressing privacy risks. Risk #1: Surveillance both from the State and surveillance capitalism.

Privacy 89
article thumbnail

Chinese tax software bundled with GoldenSpy backdoor targets western companies

Security Affairs

A new malware dubbed GoldenSpy is being distributed embedded in tax payment software that some businesses operating in China are required to install. GoldenSpy is a new backdoor that is being distributed embedded in tax payment software (the Aisino Intelligent tax software) that some businesses operating in China are required to install. The campaign is active since at least April 2020, but experts found some samples that suggest the attacks begun at least December 2016.

article thumbnail

Driving innovation in the energy industry

OpenText Information Management

Worldwide demand for energy is growing faster than ever, leading to rapid changes in the energy industry and in the wider world beyond. Deloitte predicts companies in the oil and gas sector in 2020 will be “walking the tightrope,” and need to keep vigilant for both risks and opportunities. PwC says the sector faces a “big change… [that] may … The post Driving innovation in the energy industry appeared first on OpenText Blogs.

Risk 85
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

iPhone Apps Stealing Clipboard Data

Schneier on Security

iOS apps are repeatedly reading clipboard data , which can include all sorts of sensitive information. While Haj Bakry and Mysk published their research in March, the invasive apps made headlines again this week with the developer beta release of iOS 14. A novel feature Apple added provides a banner warning every time an app reads clipboard contents.

IT 118
article thumbnail

Five real-life Netezza performance server use cases

IBM Big Data Hub

Follow @IBMAnalytics. Right now, businesses are focused on getting the most out of their Data and AI platform without overspending to make sure it is operational and running productive workloads. This means having an always-on, 24x7 system that can handle huge spikes in workloads when needed. Many customers have turned to Netezza for this reason, depending on its record of reliability and simplicity.

IT 84
article thumbnail

At least 31 US Businesses targeted with WastedLocker Ransomware

Security Affairs

Tens of organizations in the United States have been targeted with the recently discovered WastedLocker ransomware. The malicious code was first documented by researchers from the NCC Group’s report and later Symantec published its own analysis. Security experts from Symantec reported that at least 31 organizations in the United States have been targeted with the recently discovered WastedLocker ransomware.

article thumbnail

University of California SF Pays Ransom After Medical Servers Hit

Dark Reading

As one of at least three universities hit in June, the school paid $1.14 million to cybercriminals following an attack on "several IT systems" in the UCSF School of Medicine.

IT 115
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Palo Alto Networks fixes a critical flaw in firewall PAN-OS

Security Affairs

Palo Alto Networks addressed a critical flaw in the PAN-OS of its next-generation firewalls that could allow attackers to bypass authentication. Palo Alto Networks addressed a critical vulnerability, tracked as CVE-2020-2021 , in the operating system ( PAN?OS ) that powers its next-generation firewalls that could allow unauthenticated network-based attackers to bypass authentication. “When Security Assertion Markup Language (SAML) authentication is enabled and the ‘Validate Identity

article thumbnail

Russian Cybercriminal Behind CardPlanet Sentenced to 9 Years

Dark Reading

Aleksei Burkov will go to federal prison for operating two websites built to facilitate payment card fraud, hacking, and other crimes.

101
101
article thumbnail

Ransomware Prevention and Recovery Best Practices

Quest Software

The risk Ransomware attacks represent a significant danger to all organizations. Forrester Research reported that the number of ransomware attacks on enterprises is up 500% over the previous year and will cost businesses $11.5 billion. To reduce.( read more ).