Wed.Jul 27, 2022

article thumbnail

Titanium Blockchain CEO Convicted of $21 Million Fraud

Data Breach Today

Michael Stollery Scammed Investors via Cryptocurrency Initial Coin Offering Fraud Michael Alan Stollery, the chief executive of Titanium Blockchain, pleaded guilty in U.S. federal court to securities fraud in a scheme involving a fraudulent cryptocurrency initial coin offering in which $21 million was stolen. Stollery faces up to 20 years of imprisonment.

article thumbnail

FIRESIDE CHAT: ‘Attack surface management’ has become the centerpiece of cybersecurity

The Last Watchdog

Post Covid 19, attack surface management has become the focal point of defending company networks. Related: The importance of ‘SaaS posture management’ As digital transformation continues to intensify, organizations are relying more and more on hosted cloud processing power and data storage, i.e. Platform as a Service ( PaaS ,) as well as business tools of every stripe, i.e.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Human to Merge with PerimeterX to Thwart Bot Attacks, Fraud

Data Breach Today

The Combined 450-Person Company Will Also Address Account Abuse, Expanded Use Cases Human and PerimeterX will join forces to prevent fraud and account abuse and address a broader range of use cases. The combination will create a bot mitigation monster with 450 employees, more than $100 million in annual recurring revenue and more than 500 customers across media and e-commerce.

243
243
article thumbnail

Arizona Adds Breach Notification Obligation  

Hunton Privacy

On July 22, 2022, companies are required to notify the Arizona Department of Homeland Security when they experience a data breach impacting more than 1,000 Arizona residents. This notification requirement is in addition to obligations to notify affected individuals, the Arizona state attorney general and the three largest national consumer reporting agencies.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Feds Double Reward for Tips on North Korean-Backed Actors

Data Breach Today

$10 Million and Possible Relocation for Anyone Who Can Identify DPKR Hackers A nice $10 million awaits tipsters capable of providing the U.S. federal government with information leading to the identification of state-sponsored hackers who attack systems vital to America's day-to-day operations. Of special interest are hackers employed by North Korea.

More Trending

article thumbnail

iPad Theft Is Reminder That Devices Still Cause PHI Breaches

Data Breach Today

Kaiser Permanente Says Tablet Contained COVID Testing Information, Photos While reports of big health data compromises involving unencrypted computers have been sinking for years, the recent theft of an iPad from a locked storage room - along with the tablet's password - is a reminder that mobile device mishaps can lead to breaches affecting tens of thousands of patients.

Passwords 236
article thumbnail

Multiple Windows, Adobe Zero-Days Anchor Knotweed Commercial Spyware

Dark Reading

Microsoft flagged the company's Subzero tool set as on offer to unscrupulous governments and shady business interests.

article thumbnail

Attackers increasingly abusing IIS extensions to establish covert backdoors

Security Affairs

Threat actors are increasingly abusing Internet Information Services (IIS) extensions to maintain persistence on target servers. Microsoft warns of threat actors that are increasingly abusing Internet Information Services (IIS) extensions to establish covert backdoors into servers and maintain persistence in the target networks. IIS backdoors are also hard to detect because they follow the same code structure as legitimate and harmless modules. “Malicious IIS extensions are less frequently

Access 104
article thumbnail

California Privacy Protection Agency to Hold Meeting on Proposed Federal Privacy Legislation

Hunton Privacy

On July 28, 2022, the California Privacy Protection Agency (“CPPA”) Board will hold a remote, special public meeting at 9AM PDT to discuss possible action on proposed federal privacy legislation, including the American Data Privacy and Protection Act (“ADPPA”), according to the Board’s publicly released agenda. According to a memo released in advance of the meeting, CPPA staff have recommended that the Board oppose any bill that seeks to preempt the California Consumer Privacy Act (“CCPA”), or o

Privacy 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New Report Reveals that Ransomware and Business Email Compromise Attacks Cause Nearly 70% of Cyber Incidents

KnowBe4

Do you know your organizations true security risk and where to prioritize your resources? A new report from Palo Alto Networks sheds some light on these questions and shows multiple insights on incident response work from security teams.

article thumbnail

AIOps reimagines hybrid multicloud platform operations

IBM Big Data Hub

Today, most enterprises use services from more than one Cloud Service Provider (CSP). Getting operational visibility across all vendors is a common pain point for clients. Further, modern architecture such as a microservices architecture introduces additional operational complexity. Figure 1 Hybrid Multicloud and Complexity Evolution. Traditionally this calls for more manpower.

article thumbnail

Is Your Home or Small Business Built on Secure Foundations? Think Again…

Dark Reading

Did you know that the standard router relied upon in homes and by thousands of small businesses is the most frequently attacked IoT device? James Willison, Project and Engagement Manager, IoT Security Foundation, explores the issue and reveals an ongoing initiative from the foundation that is designed to better secure the devices.

IoT 88
article thumbnail

Nearly Half of Organizations Have Experienced Vishing

KnowBe4

Forty-seven percent of organizations have experienced voice phishing (vishing) attacks over the past year, according to researchers at Mutare. Additionally, the researchers found that nine percent of all phone calls received by organizations are unwanted, and nearly half of these are malicious.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Overcoming the Fail-to-Challenge Vulnerability With a Friendly Face

Dark Reading

Ahead of their Black Hat USA talk in August, Simon Pavitt and Stephen Dewsnip explain the value of helping people practice cyber defense via a "malicious floorwalker" exercise.

87
article thumbnail

The strange similarities between Lockbit 3.0 and Blackmatter ransomware

Security Affairs

Researchers found similarities between LockBit 3.0 ransomware and BlackMatter, which is a rebranded variant of the DarkSide ransomware. Cybersecurity researchers have found similarities between the latest version of the LockBit ransomware, LockBit 3.0 , and the BlackMatter ransomware. The Lockbit 3.0 ransomware was released in June with important novelties such as a bug bounty program, Zcash payment, and new extortion tactics.

article thumbnail

US Offers $10M Double-Reward for North Korea Cyberattacker Info

Dark Reading

North Korean state-sponsored actors, who help economically prop up Kim Jong Un's dictatorship, continue to pummel US infrastructure.

90
article thumbnail

See Movies from Your Car! (If You Can Beat the Traffic)

Unwritten Record

Sidney Lust’s Drive In Theatre, U.S. Route 1, Beltsville, Maryland (NAID: 169136694 ). It’s summertime and that means that it is drive-in movie season! In their heyday, there were thousands of drive-in theaters across the United States. Some of these drive-ins could accommodate over a thousand vehicles at a time, so you can imagine the kind of traffic you’d encounter before and after a show.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

8 Hot Summer Fiction Reads for Cybersecurity Pros

Dark Reading

A reading list of recommended novels curated by cybersecurity experts for cybersecurity experts.

article thumbnail

A Retrospective on the 2015 Ashley Madison Breach

Krebs on Security

It’s been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. The leak led to the public shaming and extortion of many Ashley Madison users, and to at least two suicides. To date, little is publicly known about the perpetrators or the true motivation for the attack. But a recent review of Ashley Madison mentions across Russian cybercrime forums and far-right websites in the months leading up to the hack revealed s

Sales 47
article thumbnail

When Human Security Meets PerimeterX

Dark Reading

Dark Reading's analysis suggests that the merger between Human Security and PerimeterX will bring modern defense strategies to disrupt cybercrime and fraud.

article thumbnail

Kodak Alaris launches Mail-in Ballot Processing Solution to improve the speed and efficiency of ballot envelope verification

Info Source

ROCHESTER, N.Y., July 27, 2022 — Kodak Alaris has introduced a new scanning solution to automate the processing of mail-in ballot envelopes for elections in the United States. The Mail-in Ballot Processing Solution will help county election offices to successfully process ballot envelopes and verify voter signatures. When ballots are received by mail, a Kodak i4000 Series Scanner is used to scan both sides of each ballot envelope.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Great BizApp Hack: Cyber-Risks in Your Everyday Business Applications

Dark Reading

IT admins can lock some of the obvious open doors in business applications, but system visibility is key. Build automatic monitoring defenses and adopt a Git-like tool so you can "version" your business apps to restore prior states.

Risk 72
article thumbnail

Kodak Alaris launches Mail-in Ballot Processing Solution to improve the speed and efficiency of ballot envelope verification

Info Source

ROCHESTER, N.Y., July 27, 2022 — Kodak Alaris has introduced a new scanning solution to automate the processing of mail-in ballot envelopes for elections in the United States. The Mail-in Ballot Processing Solution will help county election offices to successfully process ballot envelopes and verify voter signatures. When ballots are received by mail, a Kodak i4000 Series Scanner is used to scan both sides of each ballot envelope.

article thumbnail

Average Data Breach Costs Soar to $4.4M in 2022

Dark Reading

Call it a 'cyber-tax': Those costs are usually passed on to consumers, not investors, as compromised businesses raise prices for goods and services.

article thumbnail

Preserving and collecting mobile device data via Reuters

IG Guru

Check out the article here.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

First Cohort Graduates from PSM Cyber Stars Program at Liverpool FC

Dark Reading

New careers in IT open up for former footballers.

IT 75
article thumbnail

AI driving the future of data intelligence

Collibra

As Dave Mosley — CEO of Seagate Technology — states, “the value that a company derives from data directly affects its success.” To be consistently successful, you have to tap into every stream of data, and ensure the data used for analytics is reliable and trustworthy. However, doing so can be difficult. . Around two-thirds of the data that is available to businesses is not utilized.

article thumbnail

OneTouchPoint, Inc. Provides Notice of Data Privacy Event

Dark Reading