Wed.May 20, 2020

article thumbnail

Phishing Attack Bypassed Office 365 Multifactor Protections

Data Breach Today

Researchers: Campaign Designed to Steal Users' Credentials, Launch Other Attacks A recent phishing campaign bypassed multifactor authentication protections within Microsoft Office 365 to steal users' credentials stored in the cloud or launch other attacks, according to the security firm Cofense.

Phishing 345
article thumbnail

Serco accidentally shares contact tracers' email addresses

The Guardian Data Protection

Outsourcer apologises for leaking details of 296 people assisting UK’s Covid-19 fight Coronavirus – latest updates See all our coronavirus coverage The outsourcing company Serco accidentally shared the email addresses of almost 300 contact tracers recruited to assist in the UK government’s coronavirus “test, track and trace” strategy. The email addresses were shared when Serco was contacting new recruits about training.

IT 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How CISOs Can Achieve Better Network Visibility

Data Breach Today

Cybersecurity Adviser Ed Moyle on the Need to Keep Up With Security Architecture Changes To achieve better network visibility, security practitioners must improve their knowledge of tools that support web services, containers and the evolution of development practices, says Ed Moyle, co-founder of the cybersecurity advisory firm Security Curve.

article thumbnail

Data Governance as an Emergency Service

erwin

Data governance (DG) as a an “emergency service” may be one critical lesson learned coming out of the COVID-19 crisis. During times of crises, many of the less critical programs of work may be put on hold however ground-breaking they are. Organizations need to understand what the most critical operational activities are and the most impactful projects that need to proceed.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Insider Threat: Lessons From 3 Incidents

Data Breach Today

How to Detect, Prevent Inappropriate Access by Authorized Users Three recent incidents involving inappropriate use of patient information by insiders illustrate how difficult it is for healthcare organizations to deal with the insider threat. Security experts offer risk mitigation advice.

Risk 279

More Trending

article thumbnail

Verizon: Breaches Targeting Cloud-Based Data Doubled in 2019

Data Breach Today

Analysts Predict Attacks in the Cloud Will Continue to Surge This Year Attacks targeting cloud-based data nearly doubled in 2019 as companies shifted more of their valuable information off-premises and misconfigurations and other issues made it more vulnerable, according to the 2020 Verizon Data Breach Investigations Report. Observers expect the trend to continue this year.

Cloud 252
article thumbnail

Researchers disclose five Microsoft Windows zero-days

Security Affairs

Security experts have disclosed five unpatched vulnerabilities in Microsoft Windows, four of which rated as high-risk severity. Security experts from Trend Micro’s Zero Day Initiative (ZDI) have published information on five unpatched vulnerabilities in Microsoft Windows. Four vulnerabilities are classified as high-risk severity, three of them are zero-day vulnerabilities tracked as CVE-2020-0916, CVE-2020-0986, and CVE-2020-0915.

Risk 121
article thumbnail

Toll Group Data Leaked Following Second Ransomware Incident

Data Breach Today

To Suffer One May Be Regarded As a Misfortune; To Suffer Two Looks Like Carelessness Australian shipping giant Toll Group recently suffered its second ransomware outbreak of the year, with Thomas Knudsen, the company's managing director, branding the latest attack as being "serious and regrettable." But was it preventable?

article thumbnail

Secure Together: Britons scammed out of £3.5 million and essential services under attack

IT Governance

Two months into lockdown and the country is getting restless. There were protests in London last weekend, schools could be forced to reopen against the wishes of many teachers and councils, and those wanting to see the return of football in the UK have been frustrated as action resumed elsewhere in Europe. But we must remember that life won’t be going back to normal any time soon.

Security 118
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Police Allege Hacker Sold Millions of Email Credentials

Data Breach Today

Secret Service of Ukraine Arrests 'Sanix' for Serving as Broker on Darknet The Security Service of Ukraine this week arrested a hacker known as "Sanix" who allegedly sold combinations of millions of email passwords and usernames on darknet forums.

Passwords 214
article thumbnail

Swiss Game Developer Settles FTC Allegations Over COPPA Safe Harbor Claims

Hunton Privacy

On May 19, 2020, the Federal Trade Commission (“FTC”) announced that it reached an agreement with Swiss digital game developer Miniclip, S.A. (“Miniclip”) to settle allegations that Miniclip misled consumers about its membership in a COPPA safe harbor program. Under COPPA, the FTC may approve self-regulatory safe harbor programs that implement the protections of the FTC’s final COPPA Rule.

article thumbnail

9 million people affected by easyJet cyber attack

IT Governance

Nine million easyJet customers have had their data stolen in a “highly sophisticated cyber attack”. The budget airline said that criminal hackers accessed a database containing email addresses and travel details. The credit card details of 2,208 customers were also compromised. The organisation has informed the ICO (Information Commissioner’s Office), which is set to investigate the incident and determine whether the airline violated the GDPR (General Data Protection Regulation).

Phishing 105
article thumbnail

Adobe fixed several memory corruption issues in some of its products

Security Affairs

Adobe addressed multiple memory corruption vulnerabilities, including one that allows arbitrary code execution, in several of its products. Adobe addressed multiple memory corruption vulnerabilities in several of its products, including an arbitrary code execution. The issues affect Character Animation, Premiere Rush, Premiere Pro, and Audition, they were reported to Adobe by researcher Mat Powell of Trend Micro’s Zero Day Initiative (ZDI).

IT 101
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Cloud Storage Streamlines Work Collaboration

Record Nations

Today, there is an increase in remote workers. In the past, workers have used paper files which has its own set of benefits. However, paper can be expensive, difficult to manage, and hard to collaborate with. The business world is shifting towards digital accessibility, including cloud storage. During these strange times, it makes normal company activities […].

Cloud 98
article thumbnail

Three flaws in Nitro Pro PDF reader expose businesses to hack

Security Affairs

Two vulnerabilities in the Nitro Pro PDF editor could be exploited by threat actors to execute code remotely on vulnerable hosts. Security experts from Cisco Talos have discovered three vulnerabilities in the Nitro Pro PDF editor, two of which rated as critical (CVSS score of 8.8) could be exploited by attackers for remote code execution. Nitro Pro is a PDF application designed for creating, reading, editing, signing, converting, and protecting PDFs.

article thumbnail

Verizon DBIR: Web App Attacks and Security Errors Surge

Threatpost

Threatpost talks to Verizon DBIR co-author Gabriel Bassett about the top takeaways from this year's Data Breach Investigations Report.

article thumbnail

VMware fixes CVE-2020-3956 Remote Code Execution issue in Cloud Director

Security Affairs

VMware has addressed a high-severity remote code execution vulnerability, tracked as CVE-2020-3956, that affects its Cloud Director product. VMware has patched a high-severity remote code execution vulnerability, tracked as CVE-2020-3956, in its Cloud Director product. The vulnerability is a code injection issue that could be exploited by an authenticated attacker to send malicious traffic to Cloud Director, which could allow executing arbitrary code. “A code injection vulnerability in VMw

Cloud 93
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

60% of Insider Threats Involve Employees Planning to Leave

Dark Reading

Researchers shows most "flight-risk" employees planning to leave an organization tend to start stealing data two to eight weeks before they go.

Risk 107
article thumbnail

Fraudulent Unemployment, COVID-19 Relief Claims Earn BEC Gang Millions

Threatpost

The business email compromise (BEC) gang Scattered Canary has filed more than 200 fraudulent claims for unemployment benefits and for COVID-19 relief funds.

article thumbnail

Apple whistleblower goes public over 'lack of action'

The Guardian Data Protection

Thomas le Bonniec says firm violating rights and continues massive collection of data A former Apple contractor who helped blow the whistle on the company’s programme to listen to users’ Siri recordings has decided to go public, in protest at the lack of action taken as a result of the disclosures. In a letter announcing his decision, sent to all European data protection regulators, Thomas le Bonniec said: “It is worrying that Apple (and undoubtedly not just Apple) keeps ignoring and violating f

IT 89
article thumbnail

NetWalker Ransomware Gang Hunts for Top-Notch Affiliates

Threatpost

The operators behind the Toll Group attack are taking applications for technically advanced partners.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Coronavirus-Themed Phishing Fears Largely Overblown, Researchers Say

Dark Reading

As COVID-19-themed spam rises, phishing-not so much. An analysis of newly registered domains finds that only 2.4% are actually phishing sites aiming to steal credentials.

Phishing 112
article thumbnail

Alleged Hacker Behind Massive ‘Collection 1’ Data Dump Arrested

Threatpost

The threat actor known as ‘Sanix’ had terabytes of stolen credentials at his residence, authorities said.

article thumbnail

Is Zero Trust the Best Answer to the COVID-19 Lockdown?

Dark Reading

Enterprises need to recognize that remote access and other pandemic-related security challenges cannot be fixed with buzzwords or silver-bullet security tools.

Access 88
article thumbnail

Two-Factor Authentication – What Is It and Why You Should Use It via PixelPrivacy

IG Guru

This article does a good job of explaining two-factor authentication, covers how-too’s and the risks. Article here. The post Two-Factor Authentication – What Is It and Why You Should Use It via PixelPrivacy appeared first on IG GURU.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Digital Transformation Risks in Front-end Code

Dark Reading

Why making every front-end developer a DevSecOps expert will lead to a more holistic approach to web and native application security.

article thumbnail

Security Service of Ukraine arrested the popular hacker Sanix who sold billions of stolen credentials

Security Affairs

The Ukrainian Secret Service (SSU) has arrested a hacker known as Sanix, who was selling billions of stolen credentials on hacking forums and Telegram channels. The popular hacker Sanix has been arrested by the Ukrainian Secret Service (SSU). The man is known in the cybercrime underground for selling billions of stolen credentials. The officials did not disclose the man of the cybercriminals, they only said that the man has been arrested in Ivano-Frankivsk, Ukraine. “The Security Service o

Sales 60
article thumbnail

How to Conduct a Business Deal from Home Using a Virtual Data Room (Without Looking Unprofessional)

OneHub

Chances are, you’re an expert at conducting business deals for your company. After all, those deals are what keep your business going. But do you know how to conduct a business deal from home? Knowing how to bring in new clients and revenue from deals finalized in places other than your office is important. The first half of 2020 has shown us we can find ourselves working from our dining room tables with little warning.

Paper 59