Mon.Jun 28, 2021

article thumbnail

Cajee Brothers Deny $3.6 Billion Bitcoin Fraud

Data Breach Today

Lawyer Says Contract to Assist the Cajee Brothers Terminated Two brothers who run Africrypt, a currency exchange service based in Johannesburg, South Africa, have been accused by law firm Hanekom Attorneys, acting on behalf of investors, of 'vanishing' along with $3.6 billion in cryptocurrency investments.

332
332
article thumbnail

Welcoming the Slovak Republic Government to Have I Been Pwned

Troy Hunt

Today I'm very happy to welcome the 23rd national government to Have I Been Pwned, the Slovak Republic. As of now, CSIRT.sk has full and free access to query all their government domains via an API that returns all their email addresses impacted by each data breach in HIBP. Granting governments this level of access gives them visibility into not just the 11.4 billion records that are already in HIBP but provides an early warning system for the billions of records yet to come.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 Dell Bugs Could Affect 30 Million Users

Data Breach Today

Dell Issues Security Advisory to Address Flaws Security researchers at Eclypsium have reported that they had identified four vulnerabilities that could affect 30 million users of computer technology company Dell's laptops, desktops and tablets. The vulnerabilities have a cumulative CVSS score of 8.3 (high).

Security 312
article thumbnail

Data for 700M LinkedIn Users Posted for Sale in Cyber-Underground

Threatpost

After 500 million LinkedIn enthusiasts were affected in a data-scraping incident in April, it's happened again - with big security ramifications.

Sales 143
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Lawsuits: Patients 'Harmed' by Scripps Health Cyberattack

Data Breach Today

Complaints Allege Patient Care Was Delayed, Data at Risk Several proposed class action lawsuits against Scripps Health allege that a recent ransomware attack put personal and health information of nearly 150,000 individuals at risk for fraud. But one of the lawsuits claims that the network disruption also resulted in delay of critical patient care.

More Trending

article thumbnail

Data-Wiping Attacks Hit Outdated Western Digital Devices

Data Breach Today

Manufacturer Stopped Supporting Targeted Network-Attached Storage Devices in 2015 Owners of Western Digital My Book Live devices have seen their data remotely wiped by attackers targeting a flaw first detailed in 2019. But WD stopped supporting these devices in 2015, which is a reminder that the best way to secure some types of internet of things devices may be to discard them.

article thumbnail

Microsoft investigates threat actor distributing malicious Netfilter Driver

Security Affairs

Microsoft is investigating an strange attack, threat actor used a driver signed by the company, the Netfilter Driver, to implant a Rootkit. Microsoft announced it is investigating a threat actor distributing malicious drivers in attacks aimed at the gaming industry in China. The actor submitted drivers that were built by a third party for certification through the Windows Hardware Compatibility Program (WHCP).

article thumbnail

European Commission adopts UK Adequacy Decision

DLA Piper Privacy Matters

Today, the European Commission has adopted two adequacy decisions for transfers of personal data to the United Kingdom, one under the General Data Protection Regulation (“ GDPR ”) and the other for the Law Enforcement Directive (“ LED ”). The GDPR and LED impose restrictions on the transfer of personal data to a ‘third country’ unless that country benefits from (i) an adequacy decision; (ii) appropriate safeguards (e.g. standard contractual clauses ( SCCs )); or (iii) one of the limited exceptio

GDPR 116
article thumbnail

NFC Flaws in POS Devices and ATMs

Schneier on Security

It’s a series of vulnerabilities : Josep Rodriguez, a researcher and consultant at security firm IOActive, has spent the last year digging up and reporting vulnerabilities in the so-called near-field communications reader chips used in millions of ATMs and point-of-sale systems worldwide. NFC systems are what let you wave a credit card over a reader — rather than swipe or insert it — to make a payment or extract money from a cash machine.

Sales 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Information Governance and the Records Lifecycle

The Texas Record

When we talk about records management on this blog, we often use the “R.I.M.” or “RIM” acronym as a shorthand way to refer to the “records and information management” field. Records management (RM) is no longer a siloed discipline; RIM practitioners need to manage records within the entire information landscape of their organizations.

article thumbnail

The builder for Babuk Locker ransomware was leaked online

Security Affairs

The builder for the Babuk Locker ransomware was leaked online, threat actors can use it to create their own ransomware strain. The Record first reported that the builder for the Babuk Locker ransomware was leaked online, threat actors could use it to create their own version of the popular ransomware. The Babuk Locker operators halted their operations at the end of April after the attack against the Washington, DC police department.

article thumbnail

Critical CISO Initiatives for the Second Half of 2021

Threatpost

Saryu Nayyar, CEO at Gurucul, goes over what defenses CISOs need now, and how and why to prioritize the options.

104
104
article thumbnail

SolarWinds Hackers Continue Assault With New Microsoft Breach

WIRED Threat Level

The company says the Nobelium hacking group compromised a support agent's computer and levied brute-force attacks against some of its customers.

IT 89
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

5G Security Vulnerabilities Fluster Mobile Operators

Threatpost

A survey from GSMA and Trend Micro shows a concerning lack of security capabilities for private 5G networks (think factories, smart cities, industrial IoT, utilities and more).

IoT 75
article thumbnail

Attacks Erase Western Digital Network-Attached Storage Drives

Dark Reading

The company suspects a remote code execution vulnerability affecting My Book Live and My Book Live Duo devices and recommends that business and individual users turn off the drives to protect their data.

92
article thumbnail

OpenText employee wins The Outstanding Workers of the Republic Awards (TOWER)

OpenText Information Management

We are excited to announce that one of our employees, Nell D. Pagkalinawan, Principal Cloud Applications Consultant, has been recognized as one of this year’s The Outstanding Workers of the Republic (TOWER) in the Philippines. The Outstanding Workers of the Republic (TOWER) Awards program honors the nation’s most outstanding non-supervisory blue-collar and white-collar workers.

Cloud 62
article thumbnail

NVIDIA Patches High-Severity GeForce Spoof-Attack Bug

Threatpost

A vulnerability in NVIDIA’s GeForce Experience software opens the door to remote data access, manipulation and deletion.

Access 77
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Challenging the Status Quo of IAM

HID Global

Challenging the Status Quo of IAM. pjones. Mon, 06/28/2021 - 14:43.

98
article thumbnail

Attackers Breach Microsoft Customer Service Accounts

Threatpost

American IT companies and government have been targeted by the Nobelium state-sponsored group. .

article thumbnail

EU rules UK data protection is ‘adequate’ in boost for business

The Guardian Data Protection

Long-awaited decision allows information to continue to flow to and from Britain British data protection standards are “adequate”, the EU has ruled in a long-awaited decision that lets digital information continue to flow between the UK and the bloc. But Brussels warned Boris Johnson’s government against weakening UK standards. Failure to get a positive decision would have risked plunging British businesses into disarray, leaving industries from banking to logistics scrambling to set up more cos

Risk 58
article thumbnail

How to Move Your Business Files From Local Storage to Cloud Storage

OneHub

So, you’ve decided it’s time to level up your business storage and join the cloud. It’s a smart decision that will improve the security of your business files, increase productivity and collaboration, and allow easier remote access. It will also generate big savings since you won’t have to worry about expensive server maintenance and upgrades. These benefits are great motivation, but transferring all of your company’s valuable data can still be a daunting task.

Cloud 52
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

EU – UK data transfers can continue: UK receives much welcome adequacy decision

Data Protection Report

The European Commission has today published a positive adequacy finding in respect of the UK’s data protection regime (the Decision ). This means that personal data can continue to flow freely from the EU to the UK without the need for organisations to take further measures. For the time-being, however, the Decision does not concern personal data transferred for United Kingdom immigration control purposes or which otherwise falls within the scope of the exemption from certain data subject right

article thumbnail

Applied Threat Modeling at Blackhat 2021!

Adam Shostack

At Blackhat USA, I’ll be teaching Applied Threat Modeling. This hands-on, interactive class will focus on learning to threat model by executing each of the steps. Students will start threat modeling early on the first day and then going deep into each of the four questions: what are we working on, what can go wrong, what are we going to do about it, and did we do a good job?

IT 52
article thumbnail

New House Bill Aims to Drive Americans' Security Awareness

Dark Reading

The legislation requires the National Telecommunications and Information Administration to establish a cybersecurity literacy campaign.

article thumbnail

Pentagon Releases Cloud Strategy for Operations Outside U.S. via NextGov

IG Guru

Check out the article here. The post Pentagon Releases Cloud Strategy for Operations Outside U.S. via NextGov appeared first on IG GURU.

Cloud 54
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Danger of Action Bias: Is It Always Better to Act Quickly?

Dark Reading

Experts discuss the meaning of action bias and how it presents a threat to IT security leaders, practitioners, and users.

IT 68
article thumbnail

SHARED INTEL: Microsoft discloses how the Nobelium hacking ring engages in routine phishing

The Last Watchdog

Microsoft has blunted the ongoing activities of the Nobelium hacking collective, giving us yet another glimpse of the unceasing barrage of hack attempts business networks must withstand on a daily basis. Related: Reaction to Biden ‘s cybersecurity executive order. Nobelium is the Russian hacking collective best known for pulling off the milestone SolarWinds supply chain hack last December.

Phishing 208
article thumbnail

The Role of Encryption in Protecting LGBTQ+ Community Members

Dark Reading

The Internet is a vital tool that helps LGBTQ+ community members communicate without fear of persecution -- and strong encryption is a critical part of this equation.