Wed.Jun 16, 2021

article thumbnail

Biden Warns Putin of Cyber Retaliation

Data Breach Today

U.S Wants 16 Critical Infrastructure Entities Off-Limits to Attack At their Geneva summit meeting Wednesday, U.S. President Joe Biden told Russian President Vladimir Putin that if Russia continued to wage cyberattacks against the U.S., it would face retaliation.

IT 361
article thumbnail

Ukrainian Police Nab Six Tied to CLOP Ransomware

Krebs on Security

Authorities in Ukraine this week charged six people alleged to be part of the CLOP ransomware group , a cybercriminal gang said to have extorted more than half a billion dollars from victims. Some of CLOP’s victims this year alone include Stanford University Medical School , the University of California , and University of Maryland. A still shot from a video showing Ukrainian police seizing a Tesla, one of many high-end vehicles seized in this week’s raids on the Clop gang.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researcher: 1 Billion CVS Health Website Records Exposed

Data Breach Today

Database Contains Website Visitor Activity Logs, But Not Personal Information The discovery of an unsecured database containing over 1 billion records related to CVS Health website visitor activity illustrates yet again how security missteps can potentially leave sensitive data exposed, some security experts say.

Security 344
article thumbnail

Ukraine Police Disrupt Cl0p Ransomware Operation

Dark Reading

Growing list of similar actions in recent months may finally be scaring some operators into quitting, but threat is far from over, security experts say.

article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

How 'SEO Poisoning' Is Used to Deploy Malware

Data Breach Today

PDF Documents Stuffed With SEO Keywords Lead to Malware Attacks SolarMarker malware operators are using "SEO poisoning" techniques to deploy the remote access Trojan to steal sensitive information, Microsoft reports.

Access 300

More Trending

article thumbnail

Apple Patches 3 Flaws Affecting Certain Devices

Data Breach Today

Two Zero-Days Were Being Exploited Apple has released patches for two zero-day vulnerabilities and a fix for another security issue, all of which affected devices running iOS version 12.5.3. It says the zero-day flaws are being exploited in the wild.

Security 300
article thumbnail

VPNs and Trust

Schneier on Security

TorrentFreak surveyed nineteen VPN providers, asking them questions about their privacy practices: what data they keep, how they respond to court order, what country they are incorporated in, and so on. Most interesting to me is the home countries of these companies. Express VPN is incorporated in the British Virgin Islands. NordVPN is incorporated in Panama.

Privacy 118
article thumbnail

Forcepoint, Deloitte and Cerberus Sentinel Make Acquisitions

Data Breach Today

Cybersecurity M&A Activity Continues on a Torrid Pace Three cybersecurity deals were announced Tuesday with Forcepoint, Deloitte and Cerberus Sentinel all making acquisitions.

article thumbnail

China Issues Data Security Law

Hunton Privacy

After two rounds of public comments, the Data Security Law of the People’s Republic of China (the “DSL”) was formally issued on June 10, 2021, and will become effective on September 1, 2021. Compared to previous drafts of the law, the final version of the DSL differs with respect to: establishing a work coordination mechanism and clarifying the duties of each governmental authority; establishing an administration system for state core data; encouraging data development and use to make public ser

Security 114
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

Ukraine Arrests 6 Clop Ransomware Operation Suspects

Data Breach Today

Clop's Data Leak Extortion Site Hosted Stolen Accellion File Transfer Appliance Data Just before Wednesday's U.S.-Russia summit, at which cybercrime was high on the agenda, authorities in Ukraine announced they had busted six suspected members of the Clop ransomware operation. Security experts say these apparently were midlevel players, with Clop's main operators likely based in Russia.

article thumbnail

An international joint operation resulted in the arrest of Clop ransomware members

Security Affairs

Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an international joint operation. Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an international operation conducted by law enforcement from Ukraine, South Korea, and the US.

article thumbnail

In Ransomware Battle, Bitcoin May Actually Be an Ally

Data Breach Today

Webs of Criminality Are Recorded on Bitcoin's Blockchain Bitcoin has enabled fast payments to cybercriminals pushing ransomware. How to deal with bitcoin is subject of a spirited debate, with some arguing to restrict it. But bitcoin doesn't always favor cybercriminals, and it may actually be more of an ally than a foe by revealing webs of criminality.

article thumbnail

5 recommendations to become a customer-centered operation

CGI

5 recommendations to become a customer-centered operation. This CGI blog post five recommendations to become a customer-centered operation. dharini.s@cgi.com. Wed, 06/16/2021 - 08:13.

105
105
article thumbnail

10 Rules for Managing Apache Kafka

Without proper guidance, it’s easy to miss out on Kafka’s full capabilities. While not the easiest technology to optimize, Kafka rewards those willing to explore its depths. Under the hood, it is an elegant system for stream processing, event sourcing, and data integration. Download this white paper to learn the 10 critical rules that will help you optimize your Kafka system and unlock its full potential.

article thumbnail

DHS Preparing More Cybersecurity Requirements for Pipelines

Data Breach Today

New Rules Come as Colonial Pipeline Ransomware Attack Investigations Continue The Department of Homeland Security unit that's responsible for the safety of the nation's interstate pipelines is preparing new cybersecurity requirements for oil and gas companies in the wake of the Colonial Pipeline Co. ransomware attack.

article thumbnail

Ransomware Poll: 80% of Victims Don’t Pay Up

Threatpost

Meanwhile, in a separate survey, 80 percent of organizations that paid the ransom said they were hit by a second attack.

article thumbnail

DuckDuckGo’s Quest to Prove Online Privacy Is Possible

WIRED Threat Level

The company best known for its search engine is launching a new set of tools aimed at creating an “easy button” for protecting your data online.

Privacy 101
article thumbnail

Takeaways from the Colonial Pipeline Ransomware Attack

Threatpost

Hank Schless, senior manager of security solutions at Lookout, notes basic steps that organizations can take to protect themselves as ransomware gangs get smarter.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

The U.S. Innovation and Competition Act: Senate Passes Sweeping $250 Billion Bill to Bolster Scientific Innovation and Compete With China

Data Matters

On Tuesday, June 8, 2021, the U.S. Senate adopted by a 68-32 vote S. 1260, the United States Innovation and Competition Act, a nearly 2,400-page, $250 billion bill designed to boost U.S. semiconductor production, scientific research, development of artificial intelligence, and space exploration in the face of growing economic, technological, and military competition from China.

article thumbnail

5 Tips to Prevent and Mitigate Ransomware Attacks

Threatpost

Ransomware attacks are increasing in frequency, and the repercussions are growing more severe than ever. Here are 5 ways to prevent your company from becoming the next headline.

article thumbnail

Is an Attacker Living Off Your Land?

Dark Reading

Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.

Risk 95
article thumbnail

IKEA Fined $1.2M for Elaborate ‘Spying System’

Threatpost

A French court fined the furniture giant for illegal surveillance on 400 customers and staff.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Russian National Convicted on Charges Related to Kelihos Botnet

Dark Reading

Oleg Koshkin was arrested in 2019 and faces a maximum penalty of 15 years in prison, the DoJ reports.

96
article thumbnail

Researchers: Booming Cyber-Underground Market for Initial-Access Brokers

Threatpost

Ransomware gangs are increasingly buying their way into corporate networks, purchasing access from 'vendors' that have previously installed backdoors on targets.

Access 85
article thumbnail

Takeaways from the recent OpenText Core Content webinar

OpenText Information Management

If you attended the recent webinar, “Introducing OpenText™ Core Content, the next generation SaaS content services platform” then you are already familiar with how lively it was. If not, you missed very knowledgeable presenters, a live demo of the product, and a very spirited Q&A session. You can watch the replay here. Here’s a quick … The post Takeaways from the recent OpenText Core Content webinar appeared first on OpenText Blogs.

article thumbnail

Peloton Bike+ Bug Gives Hackers Complete Control

Threatpost

An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.

Access 86
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

We Care About Your Feedback: erwin by Quest Partners with Gartner Peer Insights

erwin

You probably can’t remember the last time you made a purchase without first taking a look at the product or service’s online reviews. Have you ever thought about why that is? We tend to trust what other consumers like ourselves have to say about their experience with a product or service more than the company who obviously believes in their product’s value. erwin by Quest agrees that reviews are among the most helpful ways for customers to feel confident they’ve researched the top market offerin

article thumbnail

Avaddon Ransomware Gang Evaporates Amid Global Crackdowns  

Threatpost

Ransomware group releases decryptors for nearly 3,000 victims, forfeiting millions in payouts. .

article thumbnail

ICYMI: Day 1 of Data Citizens recap

Collibra

Today we kicked off our best Data Citizens yet with 45 speakers across 8 industries including retail, financial services, telecommunications, technology, healthcare and education. We heard approximately 10 hours of knowledge sharing and attendees had the opportunity to network in 4 insightful roundtable discussions. . Our Data Citizens community came together to share best practices, learn from each other, collaborate, and network.