Wed.Jun 16, 2021

article thumbnail

Biden Warns Putin of Cyber Retaliation

Data Breach Today

U.S Wants 16 Critical Infrastructure Entities Off-Limits to Attack At their Geneva summit meeting Wednesday, U.S. President Joe Biden told Russian President Vladimir Putin that if Russia continued to wage cyberattacks against the U.S., it would face retaliation.

IT 361
article thumbnail

Ukrainian Police Nab Six Tied to CLOP Ransomware

Krebs on Security

Authorities in Ukraine this week charged six people alleged to be part of the CLOP ransomware group , a cybercriminal gang said to have extorted more than half a billion dollars from victims. Some of CLOP’s victims this year alone include Stanford University Medical School , the University of California , and University of Maryland. A still shot from a video showing Ukrainian police seizing a Tesla, one of many high-end vehicles seized in this week’s raids on the Clop gang.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researcher: 1 Billion CVS Health Website Records Exposed

Data Breach Today

Database Contains Website Visitor Activity Logs, But Not Personal Information The discovery of an unsecured database containing over 1 billion records related to CVS Health website visitor activity illustrates yet again how security missteps can potentially leave sensitive data exposed, some security experts say.

Security 345
article thumbnail

Ukraine Police Disrupt Cl0p Ransomware Operation

Dark Reading

Growing list of similar actions in recent months may finally be scaring some operators into quitting, but threat is far from over, security experts say.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How 'SEO Poisoning' Is Used to Deploy Malware

Data Breach Today

PDF Documents Stuffed With SEO Keywords Lead to Malware Attacks SolarMarker malware operators are using "SEO poisoning" techniques to deploy the remote access Trojan to steal sensitive information, Microsoft reports.

Access 307

More Trending

article thumbnail

Apple Patches 3 Flaws Affecting Certain Devices

Data Breach Today

Two Zero-Days Were Being Exploited Apple has released patches for two zero-day vulnerabilities and a fix for another security issue, all of which affected devices running iOS version 12.5.3. It says the zero-day flaws are being exploited in the wild.

Security 307
article thumbnail

VPNs and Trust

Schneier on Security

TorrentFreak surveyed nineteen VPN providers, asking them questions about their privacy practices: what data they keep, how they respond to court order, what country they are incorporated in, and so on. Most interesting to me is the home countries of these companies. Express VPN is incorporated in the British Virgin Islands. NordVPN is incorporated in Panama.

Privacy 114
article thumbnail

Forcepoint, Deloitte and Cerberus Sentinel Make Acquisitions

Data Breach Today

Cybersecurity M&A Activity Continues on a Torrid Pace Three cybersecurity deals were announced Tuesday with Forcepoint, Deloitte and Cerberus Sentinel all making acquisitions.

article thumbnail

China Issues Data Security Law

Hunton Privacy

After two rounds of public comments, the Data Security Law of the People’s Republic of China (the “DSL”) was formally issued on June 10, 2021, and will become effective on September 1, 2021. Compared to previous drafts of the law, the final version of the DSL differs with respect to: establishing a work coordination mechanism and clarifying the duties of each governmental authority; establishing an administration system for state core data; encouraging data development and use to make public ser

Security 114
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ukraine Arrests 6 Clop Ransomware Operation Suspects

Data Breach Today

Clop's Data Leak Extortion Site Hosted Stolen Accellion File Transfer Appliance Data Just before Wednesday's U.S.-Russia summit, at which cybercrime was high on the agenda, authorities in Ukraine announced they had busted six suspected members of the Clop ransomware operation. Security experts say these apparently were midlevel players, with Clop's main operators likely based in Russia.

article thumbnail

An international joint operation resulted in the arrest of Clop ransomware members

Security Affairs

Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an international joint operation. Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an international operation conducted by law enforcement from Ukraine, South Korea, and the US.

article thumbnail

In Ransomware Battle, Bitcoin May Actually Be an Ally

Data Breach Today

Webs of Criminality Are Recorded on Bitcoin's Blockchain Bitcoin has enabled fast payments to cybercriminals pushing ransomware. How to deal with bitcoin is subject of a spirited debate, with some arguing to restrict it. But bitcoin doesn't always favor cybercriminals, and it may actually be more of an ally than a foe by revealing webs of criminality.

article thumbnail

5 recommendations to become a customer-centered operation

CGI

5 recommendations to become a customer-centered operation. This CGI blog post five recommendations to become a customer-centered operation. dharini.s@cgi.com. Wed, 06/16/2021 - 08:13.

105
105
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DHS Preparing More Cybersecurity Requirements for Pipelines

Data Breach Today

New Rules Come as Colonial Pipeline Ransomware Attack Investigations Continue The Department of Homeland Security unit that's responsible for the safety of the nation's interstate pipelines is preparing new cybersecurity requirements for oil and gas companies in the wake of the Colonial Pipeline Co. ransomware attack.

article thumbnail

Ransomware Poll: 80% of Victims Don’t Pay Up

Threatpost

Meanwhile, in a separate survey, 80 percent of organizations that paid the ransom said they were hit by a second attack.

article thumbnail

DuckDuckGo’s Quest to Prove Online Privacy Is Possible

WIRED Threat Level

The company best known for its search engine is launching a new set of tools aimed at creating an “easy button” for protecting your data online.

Privacy 102
article thumbnail

Takeaways from the Colonial Pipeline Ransomware Attack

Threatpost

Hank Schless, senior manager of security solutions at Lookout, notes basic steps that organizations can take to protect themselves as ransomware gangs get smarter.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The U.S. Innovation and Competition Act: Senate Passes Sweeping $250 Billion Bill to Bolster Scientific Innovation and Compete With China

Data Matters

On Tuesday, June 8, 2021, the U.S. Senate adopted by a 68-32 vote S. 1260, the United States Innovation and Competition Act, a nearly 2,400-page, $250 billion bill designed to boost U.S. semiconductor production, scientific research, development of artificial intelligence, and space exploration in the face of growing economic, technological, and military competition from China.

article thumbnail

5 Tips to Prevent and Mitigate Ransomware Attacks

Threatpost

Ransomware attacks are increasing in frequency, and the repercussions are growing more severe than ever. Here are 5 ways to prevent your company from becoming the next headline.

article thumbnail

Is an Attacker Living Off Your Land?

Dark Reading

Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.

Risk 95
article thumbnail

IKEA Fined $1.2M for Elaborate ‘Spying System’

Threatpost

A French court fined the furniture giant for illegal surveillance on 400 customers and staff.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Russian National Convicted on Charges Related to Kelihos Botnet

Dark Reading

Oleg Koshkin was arrested in 2019 and faces a maximum penalty of 15 years in prison, the DoJ reports.

96
article thumbnail

Researchers: Booming Cyber-Underground Market for Initial-Access Brokers

Threatpost

Ransomware gangs are increasingly buying their way into corporate networks, purchasing access from 'vendors' that have previously installed backdoors on targets.

Access 85
article thumbnail

Takeaways from the recent OpenText Core Content webinar

OpenText Information Management

If you attended the recent webinar, “Introducing OpenText™ Core Content, the next generation SaaS content services platform” then you are already familiar with how lively it was. If not, you missed very knowledgeable presenters, a live demo of the product, and a very spirited Q&A session. You can watch the replay here. Here’s a quick … The post Takeaways from the recent OpenText Core Content webinar appeared first on OpenText Blogs.

article thumbnail

Peloton Bike+ Bug Gives Hackers Complete Control

Threatpost

An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.

Access 86
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

We Care About Your Feedback: erwin by Quest Partners with Gartner Peer Insights

erwin

You probably can’t remember the last time you made a purchase without first taking a look at the product or service’s online reviews. Have you ever thought about why that is? We tend to trust what other consumers like ourselves have to say about their experience with a product or service more than the company who obviously believes in their product’s value. erwin by Quest agrees that reviews are among the most helpful ways for customers to feel confident they’ve researched the top market offerin

article thumbnail

Avaddon Ransomware Gang Evaporates Amid Global Crackdowns  

Threatpost

Ransomware group releases decryptors for nearly 3,000 victims, forfeiting millions in payouts. .

article thumbnail

ICYMI: Day 1 of Data Citizens recap

Collibra

Today we kicked off our best Data Citizens yet with 45 speakers across 8 industries including retail, financial services, telecommunications, technology, healthcare and education. We heard approximately 10 hours of knowledge sharing and attendees had the opportunity to network in 4 insightful roundtable discussions. . Our Data Citizens community came together to share best practices, learn from each other, collaborate, and network.