Fri.Sep 13, 2019

article thumbnail

Analysis: The Impact of Business Email Compromise Attacks

Data Breach Today

This week's ISMG Security Report analyzes the cost of business email compromise attacks and the recent arrest of dozens of suspects. Also featured: updates on the easy availability of low-cost hacking tools and the latest payment card fraud trends.

Security 206
article thumbnail

6 Questions to Ask Once You've Learned of a Breach

Dark Reading

With GDPR enacted and the California Consumer Privacy Act on the near horizon, companies have to sharpen up their responses. Start by asking these six questions.

GDPR 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Credit Card Theft Ringleader Pleads Guilty

Data Breach Today

Fin7 Gang Tied to Theft of 15 Million Payment Cards From Restaurant Chains and Others One of the three Ukrainian men charged with leading the notorious Fin7 hacking group, which prosecutors say stole 15 million payment cards, has pleaded guilty to two federal charges.

214
214
article thumbnail

The US Treasury placed sanctions on North Korea linked APT Groups

Security Affairs

The US Treasury placed sanctions on three North Korea-linked hacking groups, the Lazarus Group, Bluenoroff, and Andarial. The US Treasury sanctions on three North Korea-linked hacking groups, the Lazarus Group , Bluenoroff , and Andarial. The groups are behind several hacking operations that resulted in the theft of hundreds of millions of dollars from financial institutions and cryptocurrency exchanges worldwide and destructive cyber-attacks on infrastructure.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Gangs Practice Customer Relationship Management

Data Breach Today

Ransomware-wielding attackers treat infecting endpoints as a business and put customer relationship management principles to work, says Bill Siegel, CEO of ransomware incident response firm Coveware. He notes criminals "go after the low-hanging fruit because it's cheap and the conversion rate is high.

More Trending

article thumbnail

For Sale: Admin Access Credentials to Healthcare Systems

Data Breach Today

Cybercriminals are "upping their game" by stealing and then auctioning off on the dark web administrative access credentials to healthcare organizations' clinician and patient portals, says Etay Maor of IntSights.

Access 166
article thumbnail

Taking a Fresh Look at Security Ops: 10 Tips

Dark Reading

Maybe you love your executive team, your security processes, tools, or strategy. Maybe you hate them. Whatever the situation, it's likely at some point that things will have changed.

article thumbnail

PSD2 Authentication Requirements: The Implementation Hurdles

Data Breach Today

Banks, Merchants, Processors Struggling to Comply With Mandate Because banks, fintech firms, merchants and payments processors in the EU have struggled to meet the Sept. 14 deadline for compliance with the new PSD2 "strong customer authentication" requirements for electronic payments, it may take a while for European consumers to notice authentication changes.

article thumbnail

Monetary Authority of Singapore Invites Applications for New Digital Bank Licences

Data Matters

On August 29, 2019, the Monetary Authority of Singapore (MAS) announced that it will begin accepting applications for new digital bank licenses. Interested parties have until December 31 to submit their applications. This follows the MAS’ initial announcement in June to issue up to two digital full bank (DFB) licenses and three digital wholesale bank (DWB) licenses, effectively opening up digital bank licenses to nonbank players.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Calif. May Ban Facial Recognition in Police Body Cameras

Data Breach Today

Legislation Awaits Governor's Signature Lawmakers in California have voted to ban the use of facial recognition technology within the body cameras that police wear. The measure now awaits the governor's signature.

162
162
article thumbnail

3 ways a data catalog can help optimize your business

IBM Big Data Hub

The best data catalogs can automate the process to collect, classify and profile data to ensure the highest standards of quality. Here are three popular use cases detailing why companies are moving towards IBM’s Watson Knowledge Catalog.

73
article thumbnail

Tips on Countering Insider Threat Risks

Data Breach Today

Insider threats are difficult to counter. What happens when an employee goes rogue, and how do you catch them? Charles Carmakal of Mandiant, who says his firm is dealing with more insider threat investigations, shares tips for better defenses.

Risk 153
article thumbnail

No Quick Fix for Security-Worker Shortfall

Dark Reading

Security professionals see acquiring skills as the way forward, but only half of companies are training their workers, with more continuing to search for highly skilled employees.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Smart Watches and Cheating on Tests

Schneier on Security

The Independent Commission on Examination Malpractice in the UK has recommended that all watches be banned from exam rooms, basically because it's becoming very difficult to tell regular watches from smart watches.

IT 71
article thumbnail

Malware Linked to Ryuk Targets Financial & Military Data

Dark Reading

A newly discovered campaign, packing traces of Ryuk ransomware, aims to steal confidential information.

article thumbnail

Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks

Threatpost

At every turn, the info-stealer uses legitimate services to get around normal email, endpoint and network defenses.

article thumbnail

US Sanctions 3 Cyber Attack Groups Tied to DPRK

Dark Reading

Lazarus Group, Bluenoroff, and Andariel were named and sanctioned by the US Treasury for ongoing attacks on financial systems.

78
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Will the CCPA define the future of data privacy in the U.S.?

Information Management Resources

California’s privacy law is already spurring other states to develop new legislation. Hundreds of bills that address privacy, cybersecurity and data breaches are pending across the 50 states, territories and the District of Columbia.

Privacy 68
article thumbnail

North Korean Spear-Phishing Attack Targets U.S. Firms

Threatpost

Researchers warn that U.S. firms are being targeted with legitimate - but trojanized - documents that are often socially engineered to a tee.

article thumbnail

Weekly Update 156

Troy Hunt

Turns out it's actually a sunny day in Oslo today, although it's the last one I'll see here for quite some time before heading off to Denmark then other European things for the remainder of this trip. I'm talking a little about those events ( all listed on my events page ), this week's changes to EV, more data breaches and a somewhat semantic argument about the definition of "theft".

article thumbnail

Cybercriminals Adding Sophistication to BEC Threats

Threatpost

New tactics aimed at business executives and users are being used to reap greater reward from email based fraud, which continues to rise, researchers said.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How Do Patient Portals Work?

Record Nations

A patient portal is a secure online platform that allows patients to access their health records at any time and anywhere, as long as they have an internet connection. Patients can log on from their computer or smartphone using a secure username and password. As a physician, having a patient portal is a great way […]. The post How Do Patient Portals Work?

article thumbnail

iPhone iOS 13 Lockscreen Bypass Flaw Exposes Contacts

Threatpost

Apple will not fix the glitch until the release of iOS 13.1 later in September.

article thumbnail

How Patient Portals Benefit You As Well As Your Patients

Record Nations

A patient portal is a secure website that gives patients easy, 24-hour access to their personal health information from anywhere with an internet connection. Portals benefit both patients as well as providers. For patients, they allow them to send messages, view test results, and schedule appointments online, in turn helping providers to save time, money, […].

Access 62
article thumbnail

WordPress XSS Bug Allows Drive-By Code Execution

Threatpost

Sites that use the Gutenberg (found in WordPress 5.0 to 5.2.2) are open to complete takeover.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The consequence of valuing data

Information Management Resources

I have read widely in information theory and despite the rhetoric, there remains ample disagreement in research circles that data has an implied value independent of use or context.

article thumbnail

News Wrap: IoT Radio Telnet Backdoor And ‘SimJacker’ Active Exploit

Threatpost

Threatpost editors Tara Seals and Lindsey O'Donnell talk about the top news stories of the week - from leaky databases to SIM card attacks.

IoT 56
article thumbnail

AI and the Impact On Fighting Card Fraud

Rippleshot

Increasingly, as fraudsters get smarter and faster, you'll find the mention of AI in discussions about tools to combat the rise of card fraud. Security professionals have already bought in and are leading the charge for more advanced technology investments. In fact, a recent Forbes article cited a stat saying "80% of fraud specialists using AI-based platforms believe the technology helps reduce payments fraud.

IT 40