Mon.Dec 12, 2022

article thumbnail

Uber Says Third Party Responsible for Latest Breach

Data Breach Today

Ride Hailing App Points to Breach at Teqtivity, says Lapsus$ Incident Not Involved Ride hailing app maker Uber says a data breach at a third party is responsible for the appearance on a hacking forum of internal data. The data is unrelated to the September incident it experienced after a hacker affiliated with Lapsus$ penetrated the company network, an Uber spokesperson says.

article thumbnail

Apple Is Finally Encrypting iCloud Backups

Schneier on Security

After way too many years, Apple is finally encrypting iCloud backups : Based on a screenshot from Apple, these categories are covered when you flip on Advanced Data Protection: device backups, messages backups, iCloud Drive, Notes, Photos, Reminders, Safari bookmarks, Siri Shortcuts, Voice Memos, and Wallet Passes. Apple says the only “major” categories not covered by Advanced Data Protection are iCloud Mail, Contacts, and Calendar because “of the need to interoperate with the global email, cont

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Royal Ransomware Hitting Healthcare Targets and Dumping Data

Data Breach Today

Tongue-in-Cheek Ransom Note Claims 'Modest Royalty' for 'Pentesting Services' Attackers wielding Royal ransomware have been hitting crypto-locking healthcare targets, the U.S. Department of Health and Human Services warns, saying that in each known case, attackers "claimed to have published 100% of the data that was allegedly extracted from the victim.

article thumbnail

Metaparasites & the Dark Web: Scammers Turn on Their Own

Dark Reading

Sophos research unveiled at Black Hat Europe details a thriving subeconomy of fraud on the cybercrime underground, aimed at Dark Web forum users.

118
118
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Proofpoint to Buy Deception Firm Illusive, Boost Offerings

Data Breach Today

Ashan Willy's First Deal as CEO Gets Proofpoint Into the Identity, Deception Spaces Ashan Willy has made his first deal as Proofpoint's CEO, scooping up an identity startup established by Check Point's former cloud and document security leader. The purchase of Illusive will allow Proofpoint to add identity risk discovery and remediation and post-breach defense to its platform.

Cloud 205

More Trending

article thumbnail

CommonSpirit Ransomware Breach Affects About 624,000 So Far

Data Breach Today

Leaked Data Includes Names, Addresses and Birthdates Chicago-based hospital chain CommonSpirit reported to federal regulators that its October ransomware incident affected the protected health information of nearly 624,000 individuals. Among the information compromised were names, addresses, phone numbers and birthdates.

article thumbnail

Cryptomining campaign targets Linux systems with Go-based CHAOS Malware

Security Affairs

Researchers spotted a cryptocurrency mining campaign targeting Linux users with Go-based CHAOS malware (Trojan.Linux.CHAOSRAT). In November 2022, Trend Micro researchers discovered a cryptocurrency mining campaign targeting Linux users with Go-based CHAOS malware (Trojan.Linux.CHAOSRAT). The Chaos RAT is based on an open-source project. Like the original project, the malware is able to terminate competing malware, security software, and is used to deploy the Monero (XMR) cryptocurrency miner.

Mining 98
article thumbnail

Feds Clarify Mobile Health App Privacy, Security Reg Issues

Data Breach Today

FTC, HHS Issues Updated Guidance for App, Health IT Developers Updated guidance from the Federal Trade Commission and the Department of Health and Human Services aims to help clarify for mobile health app developers the privacy and security regulations that apply to their products.

Privacy 130
article thumbnail

Why Are People in the US Becoming Radicalized?

WIRED Threat Level

A confluence of factors is leading people in the nation to gravitate toward extremist views.

Security 132
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Snyk Raises $196.5M Weeks After Laying Off 14% of Workforce

Data Breach Today

AppSec Firm Cuts Valuation By $1.1B to Get Funding from Qatar Investment Authority Snyk hauled in nearly $200 million weeks after laying off 198 employees but had to slash its valuation by $1.1 billion to seal the deal. The company intends to use the Series G proceeds to enhance and expand its developer security platform through both organic investments as well as acquisitions.

Security 130
article thumbnail

Do We Have a Cybersecurity Skills Gap?

Thales Cloud Protection & Licensing

Do We Have a Cybersecurity Skills Gap? divya. Tue, 12/13/2022 - 05:58. The demand for cybersecurity skills has been on the rise for some considerable time, but in so many cases, supply has not kept up with demand. With many security managers seeking a quick fix for their problems, the shortage of qualified IT workers at a time of high demand has put many leaders in a difficult situation.

article thumbnail

Amid Outrage, Rackspace Sends Users Email Touting Its Incident Response

Dark Reading

More than 10 days after a ransomware attack, affected Rackspace customers are being told the incident had a "limited impact," and have been invited to a webinar for additional details.

IT 90
article thumbnail

Indian foreign ministry’s Global Pravasi Rishta portal leaks expat passport details

Security Affairs

The Cybernews research team reported that India’s government platform Global Pravasi Rishta Portal was leaking sensitive user data. Original post @ [link]. The Global Pravasi Rishta Portal, India’s government platform for connecting with its overseas population, leaked sensitive data, including names and passport details. The Cybernews research team has been alerted that the Global Pravasi Rishta Portal was leaking sensitive user data.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

[CASE STUDY] New-school Approach to Training and Simulated Phishing Shines Over Traditional LMS

KnowBe4

A U.S.-based enterprise manufacturing organization cut their Phish-prone Percentage™ (PPP) by more than 80% after five months using the KnowBe4 security awareness training and simulated phishing platform.

article thumbnail

Evilnum group targets legal entities with a new Janicab variant

Security Affairs

A hack-for-hire group dubbed Evilnum is targeting travel and financial entities with the new Janicab malware variant. Kaspersky researchers reported that a hack-for-hire group dubbed Evilnum is targeting travel and financial entities. The attacks are part of a campaign aimed at legal and financial investment institutions in the Middle East and Europe.

article thumbnail

The role of IT and the classroom educator: mortal enemies or compadres?

Jamf

Educators versus IT? Delve into each side to discover how their different approaches and contributions to the goal of educating the minds of tomorrow can be harnessed and transformed to strengthen and extend educational workflows in ways never before dreamed of, benefitting all stakeholders in the education sector.

article thumbnail

What quiet quitting means for your communications strategy

OpenText Information Management

Much ink has been spilled on quiet quitting. What began on TikTok jumped into the headlines as a natural successor to the Great Resignation. Quiet quitting re-ignited debate on the role of work in our lives and the importance of setting boundaries. It’s worth noting that quiet quitting is just a new name for an … The post What quiet quitting means for your communications strategy appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Shopify Plus Stores Can Easily Add Passwordless Login With Passkeys Support

Dark Reading

Shopify Plus stores can now easily implement passwordless login with Passkeys support to help reduce drop rate and increase conversion using the free OwnID plug-in.

70
article thumbnail

Trafficking victim wins case over Salvation Army data breach

The Guardian Data Protection

Woman receives payout and secures protections against charity sharing certain data with Home Office A victim of county lines trafficking has won a landmark victory in the high court securing new protections against the Salvation Army handing over confidential information to the Home Office. The 25-year-old British woman, who cannot be identified, has received compensation from the Home Office and secured a change in policy relating to the way the Salvation Army, which has a victim care contract

article thumbnail

Popular WAFs Subverted by JSON Bypass

Dark Reading

Web application firewalls from AWS, Cloudflare, F5, Imperva, and Palo Alto Networks are vulnerable to a database attack using the popular JavaScript Object Notation (JSON) format.

87
article thumbnail

Cloudflare Targets Security Poverty Line With Free Tools For At-Risk Groups

The Security Ledger

Humanitarian groups, local governments and non-profits will be able to use Cloudflare’s Zero Trust One suite of security tools at no cost, the company announced. The post Cloudflare Targets Security Poverty Line With Free Tools For At-Risk Groups appeared first on The Security Ledger with Paul F. Roberts. Related Stories Episode 244: ZuoRAT brings APT Tactics to Home Networks Episode 241: If Its Smart, Its Vulnerable a Conversation with Mikko Hyppönen Episode 241: If Its Smart, Its Vulnerab

Risk 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Rash of New Ransomware Variants Springs Up in the Wild

Dark Reading

Vohuk, ScareCrow, and AESRT add to the ransomware chaos that organizations have to contend with on a daily basis.

article thumbnail

7 ways energy and utility companies can act on the 2022 IPCC climate and energy system findings

CGI

“It is the defining issue of our age. It is the central challenge of our century. It is unacceptable, outrageous and self-defeating to put it on the back burner.” These were the words of UN Secretary-General António Guterres in his opening remarks ahead of the two-day Climate Implementation Summit at COP27 in Sharm el-Sheikh, Egypt.

article thumbnail

What We Can't See Can Hurt Us

Dark Reading

Visibility into every environment, including cloud, enables businesses to mitigate operating risks.

Cloud 77
article thumbnail

What CISOs Can Do to Win the Ransomware Game

The Security Ledger

In this Expert Insight, Jeffrey Wheatman, the Cyber Risk Evangelist at Black Kite, says that CISOs need to shift their approach: becoming more proactive in working to preventing ransomware attacks. And he provides some steps CISOs can take to ensure their companies stay safe. The post What CISOs Can Do to Win the Ransomware Game appeared first on. Read the whole entry. » Related Stories The Future of IoT Security Standards Hybrid Work Is Here: Is Your Security Strategy Ready for It?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

When Companies Compensate the Hackers, We All Foot the Bill

Dark Reading

Ensuring stronger in-house defenses is integral to retaining customer loyalty.

86
article thumbnail

Is Facial Recognition Ethics Important? Yes, Here’s Why.

HID Global

Biometric technologies have new modes of authenticating people using facial recognition technology that transforms images into numerical expressions.

article thumbnail

“ChatGPT and other AI bots like it are going to transform search” via Nicholas Thompson at the Atlantic

IG Guru

Check out the post on LinkedIn here.

IT 79