Wed.Sep 09, 2020

article thumbnail

Blackbaud Ransomware Victim Count Climbing

Data Breach Today

Health Data Breach Tally Shows Impact of Vendor Breach The May ransomware attack on cloud-based fundraising database management vendor Blackbaud continues to rack up victims in the healthcare sector. Here's the latest tally.

article thumbnail

Netwalker ransomware hit K-Electric, the major Pakistani electricity provider

Security Affairs

K-Electric, the electricity provider for the city of Karachi, Pakistan, was hit by a Netwalker ransomware attack that blocked billing and online services. K-Electric, the electricity provider for Karachi (Pakistan) is another victim of the Netwalker ransomware gang, the infection disrupted billing and online services. K-Electric (KE) (formerly known as Karachi Electric Supply Company / Karachi Electric Supply Corporation Limited) is a Pakistani investor-owned utility managing all three key stage

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Visa Warns of Fresh Skimmer Targeting E-Commerce Sites

Data Breach Today

'Baka' Avoids Detection While Stealing Customers' Payment Card Data Visa's payment fraud disruption team is warning of a recently uncovered skimmer called "Baka" that is stealing payment care data from e-commerce sites while hiding from security tools.

Security 295
article thumbnail

Tightening Mainframe Access and Security: Part 3

Micro Focus

In the first blog of three we discussed how the mainframe must meet new demands in connectivity and security. In the second, we discussed Data Privacy and Access Control. In this final blog, Barbara Ballard looks at endpoint hardening and wraps up the options for extending enterprise-level security to the mainframe. Endpoint Hardening Endpoint hardening.

Access 96
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Phishing Campaign Uses Homepage Overlay to Trick Victims

Data Breach Today

Cofense: Attacks Disguise Malicious Domains to Steal Credentials A recently uncovered phishing campaign designed to harvest credentials used companies' official webpages as an overlay to hide malicious domains, according to security firm Cofense.

Phishing 280

More Trending

article thumbnail

JPMorgan Chase Investigating Misuse of Relief Loans

Data Breach Today

Bloomberg: Bank Probing Whether Employees Played Role in Paycheck Protection Program Fraud JPMorgan Chase is investigating whether some of its employees may have enabled misuse of the federal government's Paycheck Protection Program, which provided small business loans during the COVID-19 pandemic, Bloomberg reports.

article thumbnail

Shopping around for RM software? Technical questions you need to ask – Part One

TAB OnRecord

When evaluating an RM software solution, it is essential to look beyond the features and benefits to understand the technical aspects of the solution. If a solution doesn’t work from a tech standpoint – then it simply doesn’t work! In the first of a two-part blog post, we’ll share some of the most important technical questions to consider as you evaluate a potential RM software solution.

article thumbnail

Ransomware and DDoS Attacks Disrupt More Schools

Data Breach Today

Back-to-School Plans Interrupted in School Districts From Florida to Connecticut The start of classroom instruction at Hartford Public Schools in Connecticut was canceled Tuesday as a result of a ransomware attack - the latest in a series of online attacks, including distributed denial-of-service disruptions, that have interrupted some schools' return to teaching this fall.

article thumbnail

Why We Need to Pay Attention to Attacks on the Smart-Built Environment

Dark Reading

Are attacks on IoT physical security devices real or just theoretical? Why professionals need to be aware of the real-life examples in an effort to guard against future attacks on their own businesses.

IoT 85
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Australian State Criticized for Breach Notification Delay

Data Breach Today

New South Wales Won't Notify All Victims of Months-Old Breach Until Year's End Australia's most populous state, New South Wales, continues to investigate a massive data breach that it first detected in April, but it has warned that notification of all victims - who may already be at risk of identity theft - may not conclude until the end of the year.

article thumbnail

Ransomware Attacks Disrupt School Reopenings

Dark Reading

A flurry of recent attacks is complicating attempts to deliver classes online at some schools in different parts of the country.

article thumbnail

Cybercriminals Prefer 'Old School' Money Laundering Methods

Data Breach Today

But SWIFT Report Says Use of Cryptocurrency for Laundering Could Grow Cybercriminals still prefer to use "money mules" and drug trafficking to launder money tied to their bank hacking activities rather than cryptocurrency transactions, according to a report from SWIFT, which handles intra-bank financial transactions.

162
162
article thumbnail

TeamTNT Gains Full Remote Takeover of Cloud Instances

Threatpost

Using a legitimate tool called Weave Scope, the cybercrime group is establishing fileless backdoors on targeted Docker and Kubernetes clusters.

Cloud 93
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Eyeing Bigger Targets, Ransomware Gangs Recruit Specialists

Data Breach Today

Hacking, Encryption and Negotiation Skills in d, Says Coveware's Bill Siegel When startups succeed, they typically hire more employees to handle increasingly specialized tasks. The same goes for ransomware gangs, which, as they grow, have been hiring experts with advanced hacking, encryption, negotiation and other skills to help take down larger targets, says Coveware's Bill Siegel.

article thumbnail

Legality of Security Research to be Decided in US Supreme Court Case

Dark Reading

A ruling that a police officer's personal use of a law enforcement database is "hacking" has security researchers worried for the future.

Security 130
article thumbnail

Spyware Labeled ‘TikTok Pro’ Exploits Fears of US Ban

Threatpost

Malware can take over common device functions as well as creates a phishing page to steal Facebook credentials.

Phishing 104
article thumbnail

Multiparty Encryption Allows Companies to Solve Security-Data Conundrum

Dark Reading

An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Critical Flaws in 3rd-Party Code Allow Takeover of Industrial Control Systems

Threatpost

Researchers warn of critical vulnerabilities in a third-party industrial component used by top ICS vendors like Rockwell Automation and Siemens.

89
article thumbnail

The Role of Medical Illustration in Visualizing and Understanding Microbes via Artwork Adobe

IG Guru

The use of art to illustrate and visualize microbes and other medical images may be a new record or archival classification you hadn’t considered. Link to blog post is here. The post The Role of Medical Illustration in Visualizing and Understanding Microbes via Artwork Adobe appeared first on IG GURU.

article thumbnail

Google Squashes Critical Android Media Framework Bug

Threatpost

The September Android security bulletin addressed critical- and high-severity flaws tied to 53 CVEs overall.

article thumbnail

Who are the most innovative companies?

Micro Focus

New kids on the block or old-timers? People often think that hot new tech startups, with their promises to revolutionize __ (fill in the blank with your current dream), are the primary drivers of innovation. I’m here to say that’s just not true. The company I work for, Micro Focus, was a startup a few. View Article.

73
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Top 5 Identity-Centric Security Imperatives for Newly Minted Remote Workers

Dark Reading

In the wake of COVID-19, today's remote workforce is here to stay, at least for the foreseeable future. And with it, an increase in identity-related security incidents.

article thumbnail

Schrems II: recent developments – waiting is harder

Data Protection Report

In the immediate aftermath of the Schrems II judgement, Bruno Gencarelli (Head of the International data flows and protection unit at the European Commission) said that “Schrems II is data transfers from theory to practice ”. There have been several major developments over the last couple of weeks (explained below) which show this to be an accurate assessment.

Privacy 67
article thumbnail

Chart: Does Lack of Diversity Impact the Skills Shortage?

Dark Reading

Yes, according to 21% of security pros who participated in the 2020 Black Hat Attendee Survey.

article thumbnail

CCPA – Health Research Bill Passes Legislature

Data Protection Report

Although the bill to amend the California Consumer Privacy Act (CCPA) to extend the so-called “B-to-B” and “employee” exceptions for one more year has garnered many headlines, the California legislature passed a second CCPA amendment ( AB 713 ) that will be of interest to anyone involved in medical research as the new bill would ease some CCPA restrictions on research.

Privacy 62
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Zeppelin Ransomware Returns with New Trojan on Board

Threatpost

The malware has popped up in a targeted campaign and a new infection routine.

article thumbnail

7 Cybersecurity Priorities for Government Agencies & Political Campaigns

Dark Reading

As election season ramps up, organizations engaged in the process must strengthen security to prevent chaos and disorder from carrying the day. Here's how.

article thumbnail

Hyland enters definitive agreement to acquire Alfresco

Info Source

Hyland , a leading content services provider, has signed a definitive agreement to acquire Alfresco , a content services platform and solutions provider. The transaction, expected to close in the fourth quarter of 2020, is subject to usual and customary closing conditions and regulatory approvals. Headquartered in Boston, Alfresco develops a modern, cloud-native Digital Business Platform that delivers content services solutions to connect, manage and protect organizations’ most critical informa