Wed.Jul 08, 2020

article thumbnail

DIACC: Building a Fully Digital Canada

Data Breach Today

Joni Brennan on Identity Being Core to a Socioeconomic Safety Net Joni Brennan, president of the Digital ID & Authentication Council of Canada (DIACC), says identity management is a core component to building a solid foundation for a socioeconomic safety net, particularly during a pandemic. However, engagement and education are also vital components to establishing a strong structure.

Education 274
article thumbnail

World Economic Forum outlines three steps for cyber security success

IT Governance

Digital technologies are evolving so rapidly that vulnerabilities emerge faster than they can be secured. As such, it’s getting harder to prevent data breaches and criminals have their choice of weaknesses to exploit. This is the opinion of the WEC (World Economic Forum) in its Incentivizing Secure and Responsible Innovation report, which was published earlier this month.

Security 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Card Skimmer Found Hitting Vulnerable E-Commerce Sites

Data Breach Today

Malware Specifically Targets Sites Running Unsupported ASP.NET Software A credit card skimmer that has been operating since April is specifically targeting sites hosted on Microsoft IIS servers that are currently running an out-of-date version of ASP.NET, according to security firm Malwarebytes. About 27 million websites still use this now unsupported software.

Security 252
article thumbnail

Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw

Security Affairs

Researchers have found a way to bypass F5 Networks mitigation for the actively exploited BIG-IP vulnerability, and hackers already used it. Researchers have found a way to bypass one of the mitigations proposed by F5 Networks for the actively exploited BIG-IP vulnerability. Unfortunately, threat actors in the wild were already using the bypass technique before its public disclosure.

Education 120
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Feds Indict 'Fxmsp' for Hacking Multiple Firms

Data Breach Today

Andrey Turchin is the Alleged Leader of the 'Fxmsp' Collective, Prosecutors Say The U.S. Justice Department has charged Kazakhstan national Andrey Turchin with being the hacker known as "Fxmsp," as well as running a hacking collective known by the same name that's been tied to 300 attacks worldwide, including against anti-virus vendors.

234
234

More Trending

article thumbnail

Employee Surveillance: Who's the Boss(ware)?

Data Breach Today

Pandemic Drives Increased Adoption of Workplace Monitoring Tools With so many employees working from home during the COVID-19 pandemic, vendors of time-tracking and productivity-monitoring software report surging interest in their wares. Regardless of whether organizations deploy light-touch or more Big Brother types of approaches, beware potential privacy repercussions.

Privacy 223
article thumbnail

SentinelOne released free decryptor for ThiefQuest ransomware

Security Affairs

Good news for the victims of the ThiefQuest (EvilQuest) ransomware, they can recover their encrypted files for free. The victims of the ThiefQuest (EvilQuest) ransomware victims can recover their encrypted files without needing to pay the ransom due to the availability of a free decryptor. Early July, security expert K7 Lab malware researcher Dinesh Devadoss uncovered a new piece of ransomware dubbed EvilQuest designed to encrypt macOS systems, it is also able to install additional payloads and

article thumbnail

'Keeper' Group Targeted Payment Card Data on 570 Sites

Data Breach Today

Hackers Used Magecart-Style Web Skimmers Against Online E-Commerce Sites A hacking group known as "Keeper" has been using Magecart-like web skimmers to target the online checkout sites and portals of hundreds of e-commerce sites in order to steal the payment card data from about 184,000 customers, according to Gemini Advisory. The thefts are estimated to total in the millions.

219
219
article thumbnail

Detecting, Preventing and Remediating EvilQuest Ransomware

Jamf

Once again, a new ransomware variant attacking macOS systems is in the news, dubbed EvilQuest or ThiefQuest. The fact that it is targeting Macs instead of Windows systems already makes it interesting, but let’s dig into what it means for organizations.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CCPA Enforcement: What to Expect Now

Data Breach Today

Attorney Sadia Mirza Updates on Enforcement of CCPA Privacy Law Attorney Sadia Mirza, offers an update on the July 1 California Consumer Privacy Act enforcement and what security and privacy professionals should expect over the next few months.

Privacy 208
article thumbnail

Microsoft Seizes Malicious Domains Used in Mass Office 365 Attacks

Threatpost

The phishing campaign targeted Office 365 accounts in 62 countries, using business-related reports and the coronavirus pandemic as lures.

Phishing 113
article thumbnail

The Netherlands – DPA imposes EUR 830,00 fine for access request fees

DLA Piper Privacy Matters

On the 6 th of July 2020, the Dutch Data Protection Authority ( Autoriteit Persoonsgegevens , “Dutch DPA“) published its decision to impose a fine of 830,000 EUR on Stichting Bureau Krediet Registratie (BKR). BKR keeps an electronic file of the loans and debts people have in the Netherlands, stored in a central database. Companies like financial institutions and telecom providers use this information, for example, to assess whether new customers can pay a loan.

Access 98
article thumbnail

Dutch DPA Releases 2019 Annual Report

Hunton Privacy

On July 1, 2020, the Dutch Data Protection Authority ( Autoriteit Persoonsgegevens , the “Dutch DPA”) published its 2019 annual report (the “Report”). The Report shows that in 2019, the Dutch DPA focused on enforcement actions, after having raised awareness about the EU General Data Protection Regulation (the “GDPR”) in 2018. Below are key findings from the Report.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Additional Benefits of Document Scanning Instead of Imaging

Record Nations

Businesses are connately trying to streamline operations and productivity. One of the major ways to improve workflow and efficiency is through digital documentation. However, there are multiple ways to digitize a document, including scanning and imaging. Having a digital document can improve workflow as well as accessibility. However, there is a difference between document scanning […].

Access 98
article thumbnail

Why Cybersecurity's Silence Matters to Black Lives

Dark Reading

The industry is missing an opportunity to educate the public about bad actors who capitalize off of protest, voting rights education and police brutality petitions through social engineering and phishing attacks.

Education 101
article thumbnail

15 Billion Credentials Currently Up for Grabs on Hacker Forums

Threatpost

Unprecedented amounts of data for accessing bank accounts and streaming services are being flogged on the dark web.

Access 115
article thumbnail

US Charges Kazakhstani Citizen With Hacking Into More Than 300 Orgs

Dark Reading

The accused man, and members of his cybercriminal group, allegedly made at least $1.5 million hacking into companies and selling access to systems over the past three years.

Access 112
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Scaling AI at Lufthansa: Combined talents help the airline raise efficiency

IBM Big Data Hub

Follow @IBMData. In the airline industry, timing and synchronization are everything when it comes to the customer experience. Mitigating unforeseen circumstances against customer expectations and good old supply and demand are all issues well within the wheelhouse of AI’s predictive capabilities.

article thumbnail

Half a Million IoT Passwords Leaked

Schneier on Security

It is amazing that this sort of thing can still happen: the list was compiled by scanning the entire internet for devices that were exposing their Telnet port. The hacker then tried using (1) factory-set default usernames and passwords, or (2) custom, but easy-to-guess password combinations. Telnet? Default passwords? In 2020? We have a long way to go to secure the IoT.

Passwords 108
article thumbnail

How Advanced Attackers Take Aim at Office 365

Dark Reading

Researchers discuss how adversaries use components of Office 365 that are poorly understood and not closely monitored.

98
article thumbnail

Advertising Plugin for WordPress Threatens Full Site Takeovers

Threatpost

Thousands of vulnerable websites need to apply the patch to avoid RCE.

Security 109
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Put contact center technology at the heart of your customer experience

OpenText Information Management

The contact center is at the heart of today’s customer experience. Contact center interactions are critical to customer experience in a digital age, and data from these interactions can be used to create actionable insights to help businesses optimize the customer journey. A 2017 McKinsey & Company report on customer experience highlights how we improve … The post Put contact center technology at the heart of your customer experience appeared first on OpenText Blogs.

article thumbnail

Notorious Hacker ‘Fxmsp’ Outed After Widespread Access-Dealing

Threatpost

The Kazakh native made headlines last year for hacking McAfee, Symantec and Trend Micro; but the Feds say he's also behind a widespread backdoor operation spanning six continents.

Access 66
article thumbnail

Hong Kong's Security Law Puts Big Tech at a Crossroads

WIRED Threat Level

As China exerts more power over the city, companies like Facebook and Google have stopped handing over data—for now.

article thumbnail

More Malware Found Preinstalled on Government Smartphones

Dark Reading

Researchers report the American Network Solutions UL40 smartphone comes with compromised apps.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

e-Records 2020 Announcement

The Texas Record

This year we’re going virtual! Normally by now we’ve announced the date of the annual e-Records conference and started posting presentation details. But 2020 has been anything but a normal year. Due to ongoing public health concerns, the Texas State Library and Archives Commission and the Texas Department of Information Resources have decided to move this event online.

article thumbnail

As More People Return to Travel Sites, So Do Malicious Bots

Dark Reading

Attacks against travel-related websites are on the rise as the industry begins to slowly recover from COVID-19, new data shows.

82
article thumbnail

Why 83 Percent of Large Companies Are Vulnerable to This Basic Domain Hack

Adam Levin

There is no overestimating the value of your company’s domain name. Whether you work for a big brand or run a mom-and-pop dot-com, the goal is easy navigation to your site. A prospective client or customer types your company name and their browser does the rest. What would happen if you typed in “Amazon,” the corresponding domain popped up, and you clicked, but instead of finding the world’s largest online retailer, you landed on a 1980s WarGames-themed page with a lau

Retail 52