Mon.Sep 18, 2023

article thumbnail

TransUnion Involved in Potential Hacking Incident

Data Breach Today

Hacker 'USDoD' Claims Attack, Says He Has Data of More Than 50,000 Consumers Credit reporting agency TransUnion may be the subject of a hacking incident leading to a data breach after a hacker apparently stole information of 58,505 customers across North and South America and Europe. TransUnion has not acknowledged the hack and refused to discuss the matter on the record.

article thumbnail

Who’s Behind the 8Base Ransomware Website?

Krebs on Security

The victim shaming website operated by the cybercriminals behind 8Base — currently one of the more active ransomware groups — was until earlier today leaking quite a bit of information that the crime group probably did not intend to be made public. The leaked data suggests that at least some of website’s code was written by a 36-year-old programmer residing in the capital city of Moldova.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Australian Law Firm Hack Affected 65 Government Agencies

Data Breach Today

Australian Federal Police, Department of Home Affairs Reportedly Among the Victims An April ransomware attack against one of Australia's largest law firms swept up the data of 65 Australian government agencies, the country's national cybersecurity coordinator said Monday. The Russian-speaking Alphv hacking group claimed responsibility earlier this year for hacking HWL Ebsworth.

article thumbnail

News alert: Omdia finds risk-based vulnerability management set to encompass the VM market

The Last Watchdog

LONDON, Sept. 18, 2023 – The first comparative research into the evolution of the vulnerability management market authored by Omdia has found risk-based vulnerability management (RVBM) is set to encompass the entire vulnerability management market by 2027. Omdia’s comprehensive market analysis is the first report that provides a strategic overview of RBVM and its broader evolution within cybersecurity that Omdia refers to as proactive security. “The emergence of RBVM has been driven by

Marketing 130
article thumbnail

Solving Open Source Complexity with a Managed Data Infrastructure Platform

With its unparalleled flexibility, rapid development and cost-saving capabilities, open source is proving time and again that it’s the leader in data management. But as the growth in open source adoption increases, so does the complexity of your data infrastructure. In this Analyst Brief developed with IDC, discover how and why the best solution to this complexity is a managed service, including: Streamlined compliance with some of the most complex regulatory guidelines Simplified operations, li

article thumbnail

US DHS Announces New AI Guardrails

Data Breach Today

CIO Eric Hysen to Take on Additional Role as Agency's First Chief AI Officer DHS says it will eschew biased artificial intelligence decision-making and facial recognition systems as part of an ongoing federal effort to promote "trustworthy AI." "Artificial intelligence is a powerful tool we must harness effectively," said Secretary of Homeland Security Alejandro Mayorkas.

More Trending

article thumbnail

Sift, LexisNexis Top Digital Fraud Management Forrester Wave

Data Breach Today

Newcomer, Established Vendor Lead Efforts to Stop Fraudulent Payment Transactions Established provider LexisNexis Risk Solutions remains atop Forrester's digital fraud management rankings, while upstart Sift broke into the leaders category for the first time. Many providers in the space have expanded from payment transactions to account takeover fraud as well as handling scams.

Risk 281
article thumbnail

How to Get Your Board on Board With Cybersecurity

Dark Reading

CISOs can refine their soft skills to help get their cybersecurity best-practices message across. Steps include increasing staff incident-response training and staying current with the threat landscape.

article thumbnail

Nuance Notifying 14 NC Healthcare Clients of MOVEit Hacks

Data Breach Today

Entities Are Among Growing Tally of Health Sector Victims in Clop Mass Attack The list of healthcare entities affected by MOVEit file transfer hacks continues to grow. Nuance Communications acknowledged that hackers had stolen data belonging to 14 of its clients, all North Carolina medical providers. Hackers may have obtained diagnostic information including imaging reports.

article thumbnail

German intelligence warns cyberattacks could target liquefied natural gas (LNG) terminals

Security Affairs

The head of Germany’s foreign intelligence service warns of state-sponsored attacks aimed at liquefied natural gas (LNG) terminals in the country. Bruno Kahl, the President of the Bundesnachrichtendienst intelligence service since 2016, warned of state-sponsored attacks aimed at liquefied natural gas (LNG) terminals in the country. After the Russian invasion of Ukraine, the German government has chartered three new LNG terminals to reach independence from on gas pipelined from Moscow.

article thumbnail

Provide Real Value in Your Applications with Data and Analytics

The complexity of financial data, the need for real-time insight, and the demand for user-friendly visualizations can seem daunting when it comes to analytics - but there is an easier way. With Logi Symphony, we aim to turn these challenges into opportunities. Our platform empowers you to seamlessly integrate advanced data analytics, generative AI, data visualization, and pixel-perfect reporting into your applications, transforming raw data into actionable insights.

article thumbnail

Dragos Raises $74M to Advance OT Protection in Europe, Asia

Data Breach Today

Money Will Address Enhanced OT Security Rules From Regulators, Insurance Providers Dragos completed a Series D extension to help organizations address enhanced OT security requirements from regulators and cyber insurance providers. The money will allow Dragos to help EU businesses affected by updated cybersecurity directives requiring many smaller organizations to boost security.

Insurance 269
article thumbnail

Payment Card-Skimming Campaign Now Targeting Websites in North America

Dark Reading

"Silent Skimmer" is a technically complex campaign that has successfully targeted online businesses in the Asia Pacific region for over a year.

131
131
article thumbnail

The International Joint Commission Falls Victim to Ransomware Attack; 80GB Of Data Stolen

KnowBe4

The International Joint Commission (ICJ), an organization that handles water issues along the Canada–United States border, was hit by a ransomware attack, the Register reports.

article thumbnail

Weekly Vulnerability Recap – September 18, 2023 – Patch Tuesday Also For Adobe, Apple and More

eSecurity Planet

Microsoft’s Patch Tuesday dominates the headlines because of near-universal Windows adoption. However, many other companies time their updates for the same week, such as Adobe, SAP, and VMware. Active exploits also lead to new versions of all major browsers as well as older versions of Apple products. Organizations of all sizes need to review the active exploits and announced patches and ensure that vulnerabilities in all of their high value and high risk systems are mitigated.

article thumbnail

Entity Resolution: Your Guide to Deciding Whether to Build It or Buy It

Adding high-quality entity resolution capabilities to enterprise applications, services, data fabrics or data pipelines can be daunting and expensive. Organizations often invest millions of dollars and years of effort to achieve subpar results. This guide will walk you through the requirements and challenges of implementing entity resolution. By the end, you'll understand what to look for, the most common mistakes and pitfalls to avoid, and your options.

article thumbnail

iFoodDS and IBM forge new path to food safety with IBM Food Trust™

IBM Big Data Hub

Picture this: You’re at your local supermarket, eagerly exploring the fresh produce section. You carefully select a carton of ripe, juicy fresh-cut strawberries, envisioning them as the star ingredient in your weekend’s mouthwatering desserts. You’re all set to enjoy a delightful culinary adventure. But as you savor your first bite of a luscious strawberry shortcake, you receive a notification on your smartphone.

article thumbnail

LockBit Is Using RMMs to Spread Its Ransomware

Dark Reading

The LockBit group is using native IT management software to live off the land, planting and then spreading itself before deploying its ransomware.

article thumbnail

AI and government: Why data governance is key in our AI-era

Collibra

This year, AI catapulted to the front pages, introducing chatbots and generative AI capabilities to a mainstream audience. If you work in a government agency you aren’t isolated or immune from the hype. In fact, many Americans are wanting to know how the government will use this technology to provide cheaper and faster services. AI offers tremendous value for agencies across every level and branch of government.

article thumbnail

AI in Software Development: The Good, the Bad, and the Dangerous

Dark Reading

Just like with using open source, organizations need to be diligent about testing AI components and understanding where and how it is used in their software.

IT 100
article thumbnail

Deliver Mission Critical Insights in Real Time with Data & Analytics

In the fast-moving manufacturing sector, delivering mission-critical data insights to empower your end users or customers can be a challenge. Traditional BI tools can be cumbersome and difficult to integrate - but it doesn't have to be this way. Logi Symphony offers a powerful and user-friendly solution, allowing you to seamlessly embed self-service analytics, generative AI, data visualization, and pixel-perfect reporting directly into your applications.

article thumbnail

The Clock is Ticking for PCI DSS 4.0 Compliance

Thales Cloud Protection & Licensing

The Clock is Ticking for PCI DSS 4.0 Compliance madhav Tue, 09/19/2023 - 05:17 It is essential for any business that stores, processes, and transmits payment card information to comply with the Payment Card Industry Data Security Standard (PCI DSS). Consumers’ payment data is a compelling target for criminals who continue to circumvent IT security defenses.

article thumbnail

Microsoft Azure Data Leak Exposes Dangers of File-Sharing Links

Dark Reading

Shared Access Signature (SAS) link exposed a storage bucket with 38TB of private data, including passwords, Teams messages, and the backups of two Microsoft AI research employees' workstations.

Passwords 127
article thumbnail

Federal Judge Blocks the California Age-Appropriate Design Code

Hunton Privacy

On September 18, 2023, Judge Beth Labson Freeman of the U.S. District Court for the Northern District of California granted NetChoice’s request for preliminary injunction in NetChoice v. Bonta , finding that NetChoice is likely to succeed on its claim that the California Age-Appropriate Design Code (“CA AADC”) violates the First Amendment. Specifically, the Court found that, as a speech restriction, the CA AADC would likely fail both strict scrutiny and a lesser standard of scrutiny.

article thumbnail

A Playbook for Bridging Africa's Cybersecurity Skills Shortage

Dark Reading

A pledge to solve the skills and talent shortage by the US government has seen one Nigerian company join the effort and aid Africa.

article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

[New PhishER Feature] Immediately Add User-Reported Email Threats to Your M365 Blocklist

KnowBe4

Now there's a super easy way to keep malicious emails away from all your users through the power of the KnowBe4 PhishER platform!

85
article thumbnail

Supporting Africa's Cybersecurity Talent Makes the World Safer

Dark Reading

The global infosec community needs to help African nations defend against growing threats.

article thumbnail

The big Australian companies cashing in on healthcare – podcast

The Guardian Data Protection

Some of Australia’s largest companies are getting into the business of healthcare, claiming they are making medical appointments and prescriptions easier to access. But not everyone is convinced. Health reporter Natasha May tells Laura Murphy-Oates why some experts are concerned about the rise of ‘McMedicine’ You can subscribe for free to Guardian Australia’s daily news podcast Full Story on Apple Podcasts , Spotify and Google Podcasts Read more: Continue reading.

Access 66
article thumbnail

Companies Explore Ways to Safeguard Data in the Age of LLMs

Dark Reading

Generative AI models are forcing companies to become creative in how they keep employees from giving away sensitive data.

96
article thumbnail

Using Data & Analytics for Improving Healthcare Innovation and Outcomes

In the rapidly evolving healthcare industry, delivering data insights to end users or customers can be a significant challenge for product managers, product owners, and application team developers. The complexity of healthcare data, the need for real-time analytics, and the demand for user-friendly interfaces can often seem overwhelming. But with Logi Symphony, these challenges become opportunities.

article thumbnail

The next wave of payments modernization: Minimizing complexity to elevate customer experience

IBM Big Data Hub

The payments ecosystem is at an inflection point for transformation, especially as we see the rise of disruptive digital entrants who are introducing new payment methods, such as cryptocurrency and central bank digital currencies (CDBC). With more choices for customers, capturing share of wallet is becoming more competitive for traditional banks. This is just one of many examples that show how the payments space has evolved.

article thumbnail

Security Conferences Keep Us Honest

Dark Reading

Conferences are where vendors and security researchers meet face to face to address problems and discuss solutions — in public.

article thumbnail

Optimism abounds in the world of functional testing

OpenText Information Management

In the fast-paced world of technology, partnerships and acquisitions often hold the key to innovation and growth. The OpenText acquisition of Micro Focus has sent ripples of excitement through the tech community, with promises of enhanced capabilities in functional testing for critical business applications. This strategic move marks a new chapter in the evolution of … The post Optimism abounds in the world of functional testing appeared first on OpenText Blogs.

62