Mon.Nov 09, 2020

article thumbnail

Hackers Stealing and Selling VoIP Access

Data Breach Today

Attackers Exploit a Vulnerability in Asterisk VoIP PBX Servers Check Point Research has uncovered a large and likely profitable business model that involves hackers attacking and gaining control of certain VoIP services, which enables them to make phone calls through a company's compromised system.

Access 363
article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on the temperature and availability of their favorite beverages. Related: Companies sustain damage from IoT attacks That was back in 1982. Since then, IoT devices have become widely and deeply integrated into our homes, businesses, utilities and transportations systems.

IoT 277
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RansomEXX Ransomware Can Now Target Linux Systems

Data Breach Today

Kaspersky: Malware Goes Beyond Windows Devices Researchers at Kaspersky have uncovered a Linux version of the RansomEXX ransomware that until now had targeted only Windows devices. The ransomware has been tied to several high-profile attacks over the last several months.

article thumbnail

The EU’s draft Data Governance Act: an own goal?

Data Protector

The EU’s draft Data Governance Act is designed to facilitate the greater sharing of non-Personal data within the EU. Such big data ought to provide new insights and benefit the lives of EU citizens, the EU thinking goes. The Act is also designed to prevent access and use by non-EU based data intermediaries such as those that may be established in the UK, or elsewhere in the world.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

FTC Settlement With Zoom Sets Security Requirements

Data Breach Today

Agency Requires Comprehensive Security Program As part of a settlement of allegations that Zoom "engaged in a series of deceptive and unfair practices that undermined the security of its users," the U.S. Federal Trade Commission is requiring the video conferencing provider to implement and maintain a comprehensive security program within the next 60 days.

Security 354

More Trending

article thumbnail

Analysis: HIPAA Enforcement in a Biden Administration

Data Breach Today

HHS Issues 10th 'Right of Access' Settlement; Will Such Actions Continue? The Department of Health and Human Services last week issued its 10th settlement involving a HIPAA "right of access" case since launching its patient records access initiative last year. But how might HIPAA enforcement priorities at HHS' Office for Civil Rights change under a Biden administration?

Access 348
article thumbnail

Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak

Threatpost

A cloud misconfiguration affecting users of a popular reservation platform threatens travelers with identity theft, scams, credit-card fraud and vacation-stealing.

Cloud 138
article thumbnail

Pay2Key Ransomware Hits Israeli Targets

Data Breach Today

Check Point Researchers Uncovered New Malware Strain Security analysts at Check Point Research are warning about a recently uncovered ransomware strain called Pay2Key that is primarily targeting Israeli firms.

article thumbnail

E-commerce platform X-Cart hit by a ransomware attack

Security Affairs

The e-commerce software platform X-Cart suffered a ransomware attack at the end of October, e-stores hosted by the company went down. At the end of October, the e-commerce software platform X-Cart suffered a ransomware attack, the infection brought down customers’ e-stores hosted by the company on its platform. The software and services company X-Cart was recently acquired by Seller Labs, the premier software and services provider for Amazon sellers and brands.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Online Supermarket BigBasket Investigates Data Leak Report

Data Breach Today

Researchers Say 15 GB Database Offered for Sale on Darknet BigBasket, one of the largest online grocery stores in India, is investigating a report of a data leak that could involve as many as 20 million of its customer records. Leaked records are being offered for sale on a darknet site, according to security intelligence firm Cyble.

Sales 264
article thumbnail

Tianfu Cup 2020 – 5 minutes to hack Windows 10, Ubuntu iOS, VMWare EXSi, and others

Security Affairs

Many popular OS and applications have been hacked during this year’s edition of the Tianfu Cup hacking competition. This year’s edition of the Tianfu Cup hacking competition was very prolific, bug bounty hackers have discovered multiple vulnerabilities in multiple software and applications. The Tianfu Cup is the most important hacking contest held in China, the total bonus of the contest this year was up to 1 million US dollars.

Security 133
article thumbnail

Webinar on the California Privacy Rights Act

Hunton Privacy

On November 19, 2020, Hunton Andrews Kurth will host a webinar examining the recently approved California Privacy Rights Act (“CPRA”) and how it revises the California Consumer Privacy Act of 2018 (“CCPA”). On November 3, 2020, California voters approved ballot initiative Proposition 24, the CPRA. The CPRA amends the CCPA to create new privacy rights and obligations in California, and to establish a new agency to enforce the CCPA.

Privacy 97
article thumbnail

FBI warns of attacks on unsecured SonarQube used by US govt agencies and businesses

Security Affairs

The FBI warns that threat actors are abusing misconfigured SonarQube applications to steal source code from US government agencies and businesses. The Federal Bureau of Investigation has issued an alert warning that threat actors are abusing misconfigured SonarQube applications to access and steal source code repositories from US government agencies and businesses.

Passwords 115
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Data Privacy Gets Solid Upgrade With Early Adopters

Dark Reading

The United Kingdom and the regional government of Flanders kick off four pilots of the Solid data-privacy technology from World Wide Web inventor Tim Berners-Lee, which gives users more control of their data.

article thumbnail

xHunt hackers hit Microsoft Exchange with two news backdoors

Security Affairs

While investigating a cyber attack on the Microsoft Exchange server of an organization in Kuwait, experts found two new Powershell backdoors. Security experts from Palo Alto Networks have spotted two never-before-detected Powershell backdoors while investigating an attack on Microsoft Exchange servers at an organization in Kuwait. Experts attribute the attack to a known threat actor tracked as xHunt , aka Hive0081, which was first discovered in 2018.

article thumbnail

What’s New in macOS Big Sur Security

Jamf

Apple's newest operating systems is nearly here and there is plenty of reason to be excited, but underneath the new OS are major changes for Mac security.

article thumbnail

Microsoft Exchange Attack Exposes New xHunt Backdoors

Threatpost

An attack on the Microsoft Exchange server of an organization in Kuwait revealed two never-before-seen Powershell backdoors.

Cloud 109
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

European Data Protection Supervisor Issues Schrems II Guidelines

Data Matters

Following the Court of Justice of the European Union’s (“CJEU”) decision in Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems on 16 July 2020 (“ Schrems II ”), the European Data Protection Supervisor, tasked with overseeing compliance with EU data protection laws by the EU institutions (“EUIs” and “EDPS”), issued guidance on 29 October 2020 on how EU institutions should comply with the Schrems II ruling (“EDPS Guidance”).

article thumbnail

Cyberattack on UVM Health Network Impedes Chemotherapy Appointments

Threatpost

The cyberattack has halted chemotherapy, mammogram and screening appointments, and led to 300 staff being furloughed or reassigned.

article thumbnail

Preventing and Mitigating DDoS Attacks: It's Elementary

Dark Reading

Following a spate of cyberattacks nationwide, school IT teams need to act now to ensure their security solution makes the grade.

IT 108
article thumbnail

Ultimate Member Plugin for WordPress Allows Site Takeover

Threatpost

Three critical security bugs allow for easy privilege escalation to an administrator role.

Security 111
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Aetna Pays $1,000,000 to Settle Three HIPAA Breaches via DHHS OCR Listserv

IG Guru

Aetna Life Insurance Company and the affiliated covered entity (Aetna) has agreed to pay $1,000,000 to the Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) and to adopt a corrective action plan to settle potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security […].

article thumbnail

Insecure APIs a Growing Risk for Organizations

Dark Reading

Security models for application programming interfaces haven't kept pace with requirements of a non-perimeter world, Forrester says.

Risk 92
article thumbnail

What is In-Place Records Management?

Gimmal

Storing critical business information across various repositories can be a complicated and daunting burden often placed upon end-users. As your organization continues to grow, the odds are the number of content repositories used is also growing. In order to build an effective information governance strategy to manage the totality of content, it’s important to explore all records management methods to find the right one for your organization.

article thumbnail

7 Online Shopping Tips for the Holidays

Dark Reading

The holidays are right around the corner, and that means plenty of online shopping. These tips will help keep you safe.

90
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CISSPs from Around the World

Roger's Information Security

ISC2’s blog has an feature where they interview CISSPs from around the world, and I see this month they interview Javvad Malik. Its a nice interview, but nothing compared to his original piece on the benefits of being a CISSP. Watch this video on YouTube. The post CISSPs from Around the World appeared first on Roger's Information Security Blog.

article thumbnail

Hotels.com & Expedia Provider Exposes Millions of Guests' Data

Dark Reading

Hotel reservation platform Prestige Software compromised personal data belonging to millions of travelers through a misconfigured AWS S3 bucket.

article thumbnail

Remote Training for Local Governments and State Agencies!

The Texas Record

We are excited to announce that we will be conducting free introductory records management classes via Zoom for both state agencies and local governments on: Local Governments: Records Management Basics Tuesday, November 17, 2020 – 9:00 a.m.-12:00 p.m. (Central) – Register here! Tuesday, December 15, 2020 – 9:00a.m.-12:00 p.m. (Central) – Registration not open.