Fri.Jul 20, 2018

article thumbnail

Bank Hackers Exploit Outdated Router to Steal $1 Million

Data Breach Today

PIR Bank Robbed by Russia's MoneyTaker Gang, Investigators Say Hackers stole at least $920,000 from Russia's PIR Bank after they successfully compromised an outdated, unsupported Cisco router at a bank branch office and used it to tunnel into the bank's local network, reports incident response firm Group-IB.

IT 198
article thumbnail

CIP Exam Now Available in Online Proctored Format

AIIM

I am pleased to announce that we have introduced another exam option for CIP candidates. To recap, there are now three ways you can take the CIP exam: At any Kryterion exam center world-wide. At an AIIM-taught CIP prep course. Online proctored via Kryterion. Online proctoring has been available for years, but has sometimes suffered from confusion with online certificate programs and the perception that "it's just an online exam.

Access 82
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LabCorp Still Recovering From Ransomware Attack

Data Breach Today

SamSam, Other Ransomware Still Menacing Healthcare Sector Medical testing laboratory firm LabCorp is still working to fully recover systems functionality nearly a week after a cyberattack that the company now claims involved "a new variant" of ransomware. What can other organizations do to avoid becoming the next victim?

article thumbnail

New Report on Chinese Intelligence Cyber-Operations

Schneier on Security

The company ProtectWise just published a long report linking a bunch of Chinese cyber-operations over the past few years. The always interesting gruqq has some interesting commentary on the group and its tactics. Lots of detailed information in the report, but I admit that I have never heard of ProtectWise or its research team 401TRG. Independent corroboration of this information would be helpful.

IT 73
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers Grab 1.5 Million Patients' Details in Singapore

Data Breach Today

'Deliberate' Attack Targeted Prime Minister's Medical Details, Authorities Say Singapore's largest healthcare group has suffered a hack attack that exposed 1.5 million residents' personal details. But authorities say the "deliberate, targeted and well-planned attack" appears to have been principally designed to steal medical information pertaining to the country's prime minister.

124
124

More Trending

article thumbnail

The Midterm Elections Are Already Under Attack

WIRED Threat Level

Phishing attempts and DDoS attacks have begun hitting 2018 campaigns. The US seems ill-prepared to meet the challenge.

article thumbnail

Fortnum & Mason customers’ personal data exposed in breach

IT Governance

As the saying goes, you’re only as strong as your weakest link, which is as true for data security as any other situation. Unfortunately, world-famous retailer Fortnum & Mason was recently let down by a weak link – survey company Typeform – that exposed the personal data of 23,000 of its customers. Fortnum & Mason partnered with Typeform for its food and drink awards.

article thumbnail

Anarchy botmaster builds a botnet of 18,000 Huawei routers in a few hours

Security Affairs

The popular Anarchy botmaster builds a botnet of 18,000 Huawei routers in a few hours, and it is also planning to target vulnerable Realtek routers. NewSky Security first reported the born a new huge botnet, in just one day the botmaster compromised more than 18,000 Huawei routers. NewSky security researcher Ankit Anubhav announced that the botnet had already infected 18,000 routers.

IoT 48
article thumbnail

Tech & Media Podcast: Client X – Physical Technology, Hardware

IT Governance

Episode 2. Welcome to the IT Governance Technology & Media Podcast: Client X. This week’s episode investigates governance, risk and compliance solutions for organisations in the physical technology sector (hardware). Account Manager Zak Rush joins us again for our second episode. Zak is a Technology & Media sector specialist at IT Governance.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weekly Update 96

Troy Hunt

This week I'm doing my best "dress like a professional" impersonation as I prepare to record the next episode in our quarterly Creating a Security-centric Culture series. We're putting these out for free every few months and right after wrapping up this week's update, I recorded the next Pluralsight one and that's now gone off to them for editing.

GDPR 46
article thumbnail

MoneyTaker hacking group stole 1 million US dollars from Russian PIR Bank

Security Affairs

The cybersecurity firm Group-IB is involved in the incident response on an attack on the Russian PIR Bank conducted by MoneyTaker hacking group. MoneyTaker hacker group has stolen 1 million US dollars from the Russian bank, the cyber heist occurred on July 3 through the Russian Central Bank’s Automated Workstation Client (an interbank fund transfer system similar to SWIFT ).

Access 45
article thumbnail

Struggling to find a DPO? Consider outsourcing

IT Governance

If your organisation is within the scope of the EU GDPR (General Data Protection Regulation) , you might be required to appoint a DPO (data protection officer). This will be the case if you: Are a public authority or body; Regularly and systematically monitor data subjects; or. Process special categories of data on a large scale. However, DPOs aren’t exclusively for such organisations.

GDPR 45
article thumbnail

What the Incident Responders Saw

Dark Reading

New report on IR professionals' experiences reveals just how advanced attackers, such as nation-state hackers, dig in even after they're detected.

50
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Microsoft uncovered and stopped attempts to launch spear-phishing attacks on three 2018 congressional candidates

Security Affairs

Microsoft helped the US Government is protecting at least three 2018 midterm election candidates from attacks of Russian cyberspies. Microsoft revealed that Russian cyberspies attempted to hack at least three 2018 midterm election candidates and it has helped the US government to repeal their attacks. A Microsoft executive speaking at the Aspen Security Forum revealed the hacking attempts against at least three unnamed congressional candidates, all the attacks were detected this year, The compan

article thumbnail

US Intel Officials Share Their National Cybersecurity Concerns

Dark Reading

Leaders in the security sector discuss the most pressing cyberthreats threatening the United States and what can be done to mitigate them.

article thumbnail

Experts discloses dangerous flaws in robotic Dongguan Diqee 360 smart vacuums

Security Affairs

Positive Technologies discovered two flaws affecting Dongguan Diqee 360 smart vacuums that can be used to perform video surveillance. Security researchers from Positive Technologies have discovered two vulnerabilities affecting Dongguan Diqee 360 smart vacuum cleaners that could be exploited by an attacker to run malicious code on a device with superuser privileges.

article thumbnail

Microsoft: Three Hacking Attempts Made on Midterm Elections

Dark Reading

Microsoft detected data indicating three congressional candidates were being hit with cyberattacks - the first to target midterm elections.

47
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

ThreatList: A Ranking of Airports By Riskiest WiFi Networks

Threatpost

Airport TSA agents don’t check terminals for insecure WiFi networks, so stay on your toes when using hotspots at these airports.

Privacy 50
article thumbnail

Goodman of ARMA’s Board Sees New California Privacy Act as ‘De Facto’ National Law

IG Guru

July 16, 2018 California’s new Consumer Privacy Act of 2018 is likely to be treated as a de facto nationwide requirement, says information privacy expert Susan Goodman, a member of ARMA’s Board of Directors. That is largely because the law, passed on June 28, will apply to more than a half-million U.S. organizations that do business with California residents, […].

Privacy 40
article thumbnail

Newsmaker Interview: Troy Mursch on Why Cryptojacking Isn’t Going Away

Threatpost

Criminals have found a mischievous way to mine cryptocurrency. Security researcher Troy Mursch sounds off on why this tricky trend isn't going away anytime soon.

Mining 43
article thumbnail

Webinar Invitation — California Consumer Privacy Act: What You Need to Know Now

HL Chronicle of Data Protection

On June 28, 2018, California’s governor signed Assembly Bill 375, a ground-breaking new data privacy law that some are calling the United States’ answer to the European Union’s General Data Protection Regulation (GDPR). Particularly in light of California’s status as the world’s 5th largest economy, many are wondering how the new California Consumer Privacy Act (CCPA) will affect them.

Privacy 40
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Data Breach Cost Update: U.S. Companies Rise to the Top

Rippleshot

The latest data breach report signals both good and bad news as it relates to the costs of breaches since 2017. The bad news? Research from the Ponemon Institute and IBM Security shows losses related to data breaches have increased 6.4 percent in the past year. The good news? For those companies that were able to contain the breach within 30 days, their losses have been less significant.

article thumbnail

Why Artificial Intelligence Is Not a Silver Bullet for Cybersecurity

Dark Reading

Like any technology, AI and machine learning have limitations. Three are detection, power, and people.

article thumbnail

3 culinary techniques for enterprise data chefs

Information Management Resources

When great chefs and first-tier enterprise architects are at the top of their game, they can create works of art. These experts are the people to watch and learn from as they hone their craft and develop into bona fide artists.

article thumbnail

Singapore Health Services Data Breach Exposes Info on 1.5 Million People

Dark Reading

Attackers, repeatedly and specifically, targeted Singapore Prime Minister Lee Hsien Loong's medication data.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Massive Malspam Campaign Finds a New Vector for FlawedAmmyy RAT

Threatpost

Hundreds of thousands of emails are delivering weaponized PDFs containing malicious SettingContent-ms files.

44
article thumbnail

HR Services Firm ComplyRight Suffers Major Data Breach

Dark Reading

More than 7,500 customer companies were affected, and the number of individuals whose information was leaked is unknown.

article thumbnail

D-Link, Dasan Routers Under Attack In Yet Another Assault

Threatpost

Dasan and D-Link routers running GPON firmware are being targeted by hackers in an attempt to create a botnet.

IoT 43