Thu.Oct 18, 2018

article thumbnail

Report: Cryptocurrency Exchanges Lost $882 Million to Hackers

Data Breach Today

Launching an ICO? You're a Target, Group-IB Warns An analysis of attacks against cryptocurrency exchanges over nearly two years shows hackers have inflicted $882 million in damages, according to the Russian security firm Group-IB. The tally of losses is likely to grow next year, the company warns.

Security 222
article thumbnail

GreyEnergy cyberespionage group targets Poland and Ukraine

Security Affairs

Security researchers from ESET published a detailed analysis of a recently discovered cyber espionage group tracked as GreyEnergy. Security experts from ESET published a detailed analysis of a recently discovered threat actor tracked as GreyEnergy, its activity emerged in concurrence with BlackEnergy operations. ESET researchers have spotted a new strain of malware tracked as Exaramel that links the not Petya wiper to the Industroyer ICS malware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook Eyes Spammers for Mega-Breach

Data Breach Today

Social Network Reportedly Sees No Signs of Nation-State Hackers Facebook is eyeing spammers as being the culprits behind its recently disclosed mega-breach, The Wall Street Journal reports. Preliminary findings from Facebook's internal investigation suggest that the attackers were not affiliated with a nation-state, but rather part of a known spam ring, the newspaper reports.

IT 216
article thumbnail

Group-IB: 14 cyber attacks on crypto exchanges resulted in a loss of $882 million

Security Affairs

Group-IB has estimated that crypto exchanges suffered a total loss of $882 million due to targeted attacks between 2017 and 2018. Group-IB, an international company that specializes in preventing cyber attacks, has estimated that cryptocurrency exchanges suffered a total loss of $882 million due to targeted attacks in 2017 and in the first three quarters of 2018.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cryptocurrency Exchanges Lost $882 Million To Hackers

Data Breach Today

Launching An ICO? You're a Target, Group-IB Warns An analysis of attacks against cryptocurrency exchanges over nearly two years shows hackers have inflicted $882 million in damages, according to the Russian security firm Group-IB. The tally of losses is likely to grow next year, the company warns.

Security 150

More Trending

article thumbnail

The author of the LuminosityLink RAT sentenced to 30 Months in Prison

Security Affairs

The author of the infamous LuminosityLink RAT, Colton Grubbs (21), was sentenced to 30 months in federal prison. Colton Grubbs, 21, of Stanford, Kentucky, the author of the infamous LuminosityLink RAT , was sentenced to 30 months in federal prison, In February, the Europol’s European Cybercrime Centre (EC3) along with the UK National Crime Agency (NCA) disclosed the details of an international law enforcement operation that targeted the criminal ecosystem around the Luminosity RAT (aka Luminos

article thumbnail

CNIL Adopts Referentials On DPO Certification

Hunton Privacy

On October 11, 2018, the French data protection authority (the “CNIL”) announced that it adopted two referentials ( i.e. , guidelines) on the certification of the data protection officer (“DPO”). View the announcement (in French). The referentials include: a certification referential that sets forth the conditions regarding the admissibility of DPO applications, and lists 17 qualifications that the DPO must have in order to be certified as a DPO by a certification body approved by the CNIL; and.

GDPR 73
article thumbnail

Government Perspective on Supply Chain Security

Schneier on Security

This is an interesting interview with a former NSA employee about supply chain security. I consider this to be an insurmountable problem right now.

article thumbnail

Cyber Espionage Campaign Reuses Code from China's APT1

Dark Reading

US, Canadian organizations in crosshairs of group with apparent links to a Chinese military hacking unit that wreaked havoc several years ago.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Are Data Breaches the New Reality for Retail?

Thales Cloud Protection & Licensing

As digital transformation takes hold, the retail industry is under siege from cyber criminals and nation states attempting to steal consumers’ personal information, credit card data and banking information. Lines are now blurred between physical and digital experiences. And criminals are moving online. At the same time, customers expect faster checkout and order fulfillment, both online and offline.

Retail 66
article thumbnail

Audits: The Missing Layer in Cybersecurity

Dark Reading

Involving the audit team ensures that technology solutions are not just sitting on the shelf or being underutilized to strategically address security risks.

article thumbnail

Gartner's top 10 strategic technology trends for 2019

Information Management Resources

Augmented analytics, digital twins, quantum computing and AI-driven development are among the top strategic technology trends that will disrupt business operations, according to a new Gartner report.

article thumbnail

Apache Access Vulnerability Could Affect Thousands of Applications

Dark Reading

A recently discovered issue with a common file access method could be a major new attack surface for malware authors.

Access 85
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

AlienVault Unified Security Management (USM) - SIEM Product Overview and Insight

eSecurity Planet

We take an in-depth look at AlienVault Unified Security Management (USM), a lower-cost SIEM option thanks to its open source Open Threat Exchange (OTX).

article thumbnail

Inside the Dark Web's 'Help Wanted' Ads

Dark Reading

How cybercriminals recruit everyone from car drivers to corporate insiders and pay them according to the risk they assume.

Risk 80
article thumbnail

Author podcast: Security in the Digital World with Graham Day

IT Governance

Cyberspace, the Internet, computer networks, the digital world – call it what you will – is always developing. And so are the threats and risks of being online. We caught up with Graham Day author of October’s book of the month, Security in the Digital World , to find out more. Listen to the podcast below to learn more about the author and to find out what encouraged him to write the book.

article thumbnail

Strategic decision making with low-code applications

OpenText Information Management

Organizations make decisions every day. From developing a marketing campaign to managing a fleet of vehicles, organizations rely on data and information to help them make strategic decisions that benefit the business. Being able to garner deep and meaningful insights from your data to help make these decisions quickly can be the deciding factor in … The post Strategic decision making with low-code applications appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

GreyEnergy Spy APT Mounts Sophisticated Effort Against Critical Infrastructure

Threatpost

The group is a successor to BlackEnergy and a subset of the TeleBots gang--and its activity is potentially a prelude to a much more destructive attack.

IT 58
article thumbnail

Former Equifax Manager Sentenced for Insider Trading

Dark Reading

Sudhakar Bonthu bought and sold Equifax stock options prior to the public disclosure of its 2017 data breach.

article thumbnail

Data management and predictive analytics now top strategic issues at many firms

Information Management Resources

Data management and analytics issues are now top of mind concerns at many organizations, as CFOs and other finance executives say data management (including security, privacy, and governance) and predictive data analytics are among their most significant issues to address.

article thumbnail

Getting Up to Speed with "Always-On SSL"

Dark Reading

Websites can avoid the negative consequences of a "not secure" label from Google Chrome 68 by following four AOSSL best practices.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New APT Could Signal Reemergence of Notorious Comment Crew

Threatpost

A custom malware used in a five-pronged APT espionage campaign was largely built from the defunct Comment Crew's proprietary code.

article thumbnail

Can you convince small suppliers to go digital?

OpenText Information Management

We’re all part of a new, exciting digital world. The possibilities of digital technology are endless. My car tells me when it needs a service. My watch helps me stay healthy. But my supplier still prints out my invoice and mails it to me. Why are some suppliers reluctant to move to digital and what … The post Can you convince small suppliers to go digital?

IT 45
article thumbnail

Six steps for comprehensive and robust data cleansing

Information Management Resources

it is possible for marketers and data analysts to create a data cleansing process that ensures the accuracy of insights and strategies. Here are six steps that will enable that process.

article thumbnail

FAQ: Is Metadata a Part of an Electronic Record or Not?

The Texas Record

Recently, we have received many questions about metadata. Most of the inquiries about metadata revolve around two questions – What is metadata and why is it important. The purpose of this article is to discuss whether metadata is part of an electronic record and if so why. So, what is metadata? Metadata is the information attached to a record that gives context to the record.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Meet Your 2018-2019 Records Management Section Steering Committee

The Schedule

The Records Management Section (RMS) Steering Committee exists to direct and focus the annual business of the section, as well as to foster connections and professional growth amongst section members. Steering committee members participate in monthly conference calls, lead ad hoc initiatives, and contribute to the progress of the section throughout the annual cycle.

article thumbnail

The Internet of Things Webinar Series: Overcoming IoT Litigation Challenges

HL Chronicle of Data Protection

On October 2, 2018, Hogan Lovells hosted the most recent installment in its Internet of Things Webinar (IoT) Series. Two of our experienced litigation partners, Christine Gateau in Paris and Michelle Kisloff in Washington DC, discussed current regulatory actions and cutting-edge IoT litigation debates in the U.S. and Europe, as well as litigation risks to keep in mind when designing IoT products.

IoT 40
article thumbnail

Travellers refusing digital search now face $5000 Customs fine in NZ

IG Guru

10:40 am on 1 October 2018 Previously, Customs could stop anyone at the border and demand to see their electronic devices. However, the law did not specify that people had to also provide a password. The updated law makes clear that travellers must provide access – whether that be a password, pin-code or fingerprint – […]. The post Travellers refusing digital search now face $5000 Customs fine in NZ appeared first on IG GURU.