Mon.Sep 18, 2023

article thumbnail

TransUnion Involved in Potential Hacking Incident

Data Breach Today

Hacker 'USDoD' Claims Attack, Says He Has Data of More Than 50,000 Consumers Credit reporting agency TransUnion may be the subject of a hacking incident leading to a data breach after a hacker apparently stole information of 58,505 customers across North and South America and Europe. TransUnion has not acknowledged the hack and refused to discuss the matter on the record.

article thumbnail

Who’s Behind the 8Base Ransomware Website?

Krebs on Security

The victim shaming website operated by the cybercriminals behind 8Base — currently one of the more active ransomware groups — was until earlier today leaking quite a bit of information that the crime group probably did not intend to be made public. The leaked data suggests that at least some of website’s code was written by a 36-year-old programmer residing in the capital city of Moldova.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sift, LexisNexis Top Digital Fraud Management Forrester Wave

Data Breach Today

Newcomer, Established Vendor Lead Efforts to Stop Fraudulent Payment Transactions Established provider LexisNexis Risk Solutions remains atop Forrester's digital fraud management rankings, while upstart Sift broke into the leaders category for the first time. Many providers in the space have expanded from payment transactions to account takeover fraud as well as handling scams.

Risk 287
article thumbnail

News alert: Omdia finds risk-based vulnerability management set to encompass the VM market

The Last Watchdog

LONDON, Sept. 18, 2023 – The first comparative research into the evolution of the vulnerability management market authored by Omdia has found risk-based vulnerability management (RVBM) is set to encompass the entire vulnerability management market by 2027. Omdia’s comprehensive market analysis is the first report that provides a strategic overview of RBVM and its broader evolution within cybersecurity that Omdia refers to as proactive security. “The emergence of RBVM has been driven by

Risk 130
article thumbnail

Customer Experience Management: Optimizing Your Strategy for Financial Success

Speaker: Diane Magers, Founder and Chief Experience Officer at Experience Catalysts

In the world of business, connecting the dots from experience to financial impact is an essential skill. Transforming customer engagement, Voice of Customer (VoC) insights, and Journey Maps into tangible financial outcomes poses a significant challenge for most organizations. To gain buy-in from the C-Suite and key stakeholders, it’s crucial to illustrate how Experience Management translates into clear, measurable business results.

article thumbnail

Australian Law Firm Hack Affected 65 Government Agencies

Data Breach Today

Australian Federal Police, Department of Home Affairs Reportedly Among the Victims An April ransomware attack against one of Australia's largest law firms swept up the data of 65 Australian government agencies, the country's national cybersecurity coordinator said Monday. The Russian-speaking Alphv hacking group claimed responsibility earlier this year for hacking HWL Ebsworth.

More Trending

article thumbnail

US DHS Announces New AI Guardrails

Data Breach Today

CIO Eric Hysen to Take on Additional Role as Agency's First Chief AI Officer DHS says it will eschew biased artificial intelligence decision-making and facial recognition systems as part of an ongoing federal effort to promote "trustworthy AI." "Artificial intelligence is a powerful tool we must harness effectively," said Secretary of Homeland Security Alejandro Mayorkas.

article thumbnail

FBI hacker USDoD leaks highly sensitive TransUnion data

Security Affairs

Researchers from vx-underground reported that FBI hacker ‘USDoD ‘ leaked sensitive data from consumer credit reporting agency TransUnion. TransUnion is an American consumer credit reporting agency. TransUnion collects and aggregates information on over one billion individual consumers in over thirty countries, including “200 million files profiling nearly every credit-active consumer in the United States” A threat actor who goes by the moniker “ USDoD ” announced the lea

article thumbnail

Nuance Notifying 14 NC Healthcare Clients of MOVEit Hacks

Data Breach Today

Entities Are Among Growing Tally of Health Sector Victims in Clop Mass Attack The list of healthcare entities affected by MOVEit file transfer hacks continues to grow. Nuance Communications acknowledged that hackers had stolen data belonging to 14 of its clients, all North Carolina medical providers. Hackers may have obtained diagnostic information including imaging reports.

article thumbnail

Microsoft AI research division accidentally exposed 38TB of sensitive data

Security Affairs

Microsoft AI researchers accidentally exposed 38TB of sensitive data via a public GitHub repository since July 2020. Cybersecurity firm Wiz discovered that the Microsoft AI research division accidentally leaked 38TB of sensitive while publishing a bucket of open-source training data on GitHub. The exposed data exposed a disk backup of two employees’ workstations containing secrets, private keys, passwords, and over 30,000 internal Microsoft Teams messages. “The researchers shared their fi

Security 128
article thumbnail

How to Stay Competitive in the Evolving State of Martech

Marketing technology is essential for B2B marketers to stay competitive in a rapidly changing digital landscape — and with 53% of marketers experiencing legacy technology issues and limitations, they’re researching innovations to expand and refine their technology stacks. To help practitioners keep up with the rapidly evolving martech landscape, this special report will discuss: How practitioners are integrating technologies and systems to encourage information-sharing between departments and pr

article thumbnail

Dragos Raises $74M to Advance OT Protection in Europe, Asia

Data Breach Today

Money Will Address Enhanced OT Security Rules From Regulators, Insurance Providers Dragos completed a Series D extension to help organizations address enhanced OT security requirements from regulators and cyber insurance providers. The money will allow Dragos to help EU businesses affected by updated cybersecurity directives requiring many smaller organizations to boost security.

article thumbnail

German intelligence warns cyberattacks could target liquefied natural gas (LNG) terminals

Security Affairs

The head of Germany’s foreign intelligence service warns of state-sponsored attacks aimed at liquefied natural gas (LNG) terminals in the country. Bruno Kahl, the President of the Bundesnachrichtendienst intelligence service since 2016, warned of state-sponsored attacks aimed at liquefied natural gas (LNG) terminals in the country. After the Russian invasion of Ukraine, the German government has chartered three new LNG terminals to reach independence from on gas pipelined from Moscow.

article thumbnail

Payment Card-Skimming Campaign Now Targeting Websites in North America

Dark Reading

"Silent Skimmer" is a technically complex campaign that has successfully targeted online businesses in the Asia Pacific region for over a year.

138
138
article thumbnail

Deepfake and smishing. How hackers compromised the accounts of 27 Retool customers in the crypto industry

Security Affairs

Software development company Retool was the victim of a smishing attack that resulted in the compromise of 27 accounts of its cloud customers. Software development company Retool revealed that 27 accounts of its cloud customers were compromised as a result of an SMS-based social engineering attack. The company states that one of its employees was compromised on August 27, 2023, via a spear phishing attack.

article thumbnail

The Essential Guide to Analytic Applications

Embedding dashboards, reports and analytics in your application presents unique opportunities and poses unique challenges. We interviewed 16 experts across business intelligence, UI/UX, security and more to find out what it takes to build an application with analytics at its core. No matter where you are in your analytics journey, you will learn about emerging trends and gather best practices from product experts.

article thumbnail

LockBit Is Using RMMs to Spread Its Ransomware

Dark Reading

The LockBit group is using native IT management software to live off the land, planting and then spreading itself before deploying its ransomware.

article thumbnail

Using Hacked LastPass Keys to Steal Cryptocurrency

Schneier on Security

Remember last November, when hackers broke into the network for LastPass—a password database—and stole password vaults with both encrypted and plaintext data for over 25 million users? Well, they’re now using that data break into crypto wallets and drain them: $35 million and counting, all going into a single wallet. That’s a really profitable hack.

Passwords 103
article thumbnail

AI in Software Development: The Good, the Bad, and the Dangerous

Dark Reading

Just like with using open source, organizations need to be diligent about testing AI components and understanding where and how it is used in their software.

IT 123
article thumbnail

The International Joint Commission Falls Victim to Ransomware Attack; 80GB Of Data Stolen

KnowBe4

The International Joint Commission (ICJ), an organization that handles water issues along the Canada–United States border, was hit by a ransomware attack, the Register reports.

article thumbnail

ABM Evolution: How Top Marketers Are Using Account-Based Strategies

In times of economic uncertainty, account-based strategies are essential. According to several business analysts and practitioners, ABM is a necessity for creating more predictable revenue. Research shows that nearly three-quarters of marketers (74%) already have the resources needed to build successful ABM programs.

article thumbnail

A Playbook for Bridging Africa's Cybersecurity Skills Shortage

Dark Reading

A pledge to solve the skills and talent shortage by the US government has seen one Nigerian company join the effort and aid Africa.

article thumbnail

iFoodDS and IBM forge new path to food safety with IBM Food Trust™

IBM Big Data Hub

Picture this: You’re at your local supermarket, eagerly exploring the fresh produce section. You carefully select a carton of ripe, juicy fresh-cut strawberries, envisioning them as the star ingredient in your weekend’s mouthwatering desserts. You’re all set to enjoy a delightful culinary adventure. But as you savor your first bite of a luscious strawberry shortcake, you receive a notification on your smartphone.

article thumbnail

Microsoft Azure Data Leak Exposes Dangers of File-Sharing Links

Dark Reading

Shared Access Signature (SAS) link exposed a storage bucket with 38TB of private data, including passwords, Teams messages, and the backups of two Microsoft AI research employees' workstations.

Passwords 139
article thumbnail

Weekly Vulnerability Recap – September 18, 2023 – Patch Tuesday Also For Adobe, Apple and More

eSecurity Planet

Microsoft’s Patch Tuesday dominates the headlines because of near-universal Windows adoption. However, many other companies time their updates for the same week, such as Adobe, SAP, and VMware. Active exploits also lead to new versions of all major browsers as well as older versions of Apple products. Organizations of all sizes need to review the active exploits and announced patches and ensure that vulnerabilities in all of their high value and high risk systems are mitigated.

article thumbnail

7+ Graphics Libraries to Enhance Your Embedded Analytics

When your customers come to your app, what do they see: clunky, outdated dashboards or a sleek, modern interface? If your embedded analytics are looking stale, leverage these free graphics libraries to take your embedded analytics offerings above and beyond. This e-book details a number of graphics libraries plus a few bonus tools to modernize your embedded dashboards.

article thumbnail

Supporting Africa's Cybersecurity Talent Makes the World Safer

Dark Reading

The global infosec community needs to help African nations defend against growing threats.

article thumbnail

The Clock is Ticking for PCI DSS 4.0 Compliance

Thales Cloud Protection & Licensing

The Clock is Ticking for PCI DSS 4.0 Compliance madhav Tue, 09/19/2023 - 05:17 It is essential for any business that stores, processes, and transmits payment card information to comply with the Payment Card Industry Data Security Standard (PCI DSS). Consumers’ payment data is a compelling target for criminals who continue to circumvent IT security defenses.

article thumbnail

Companies Explore Ways to Safeguard Data in the Age of LLMs

Dark Reading

Generative AI models are forcing companies to become creative in how they keep employees from giving away sensitive data.

118
118
article thumbnail

The big Australian companies cashing in on healthcare – podcast

The Guardian Data Protection

Some of Australia’s largest companies are getting into the business of healthcare, claiming they are making medical appointments and prescriptions easier to access. But not everyone is convinced. Health reporter Natasha May tells Laura Murphy-Oates why some experts are concerned about the rise of ‘McMedicine’ You can subscribe for free to Guardian Australia’s daily news podcast Full Story on Apple Podcasts , Spotify and Google Podcasts Read more: Continue reading.

Access 72
article thumbnail

ABM Success Recipe: Mastering the Crawl, Walk, Run Approach

Shifting to an account-based marketing (ABM) strategy can be both exciting and challenging. Well-implemented ABM motions build engagement with high-value accounts and drive impactful campaigns that resonate with your audience. But where do you begin, and how do you progress from crawling to running? Watch now as Demand Gen experts delve into the essentials of each stage of the ABM process.

article thumbnail

Security Conferences Keep Us Honest

Dark Reading

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — in public.

Security 115
article thumbnail

IBM Connected Trade Platform helps power the digitization of trade and supply chain financing

IBM Big Data Hub

Today, we are seeing significant digital disruption in the business of trade and supply chain financing that is largely influenced by global events and geopolitics, changing regulations, compliance and control requirements, advancements in technology and innovation, and access to capital. When examining these disruptors more closely, it’s clear there are a wide variety of factors that can impact global trade and supply chain financing.

article thumbnail

Evaluating New Partners and Vendors From an Identity Security Perspective

Dark Reading

Before working with new vendors, it's important to understand the potential risks they may pose to your digital environments.

Security 111