Fri.Apr 24, 2020

article thumbnail

Genetic Testing Lab Hack Affects 233,000

Data Breach Today

Second Largest Health Data Breach So Far This Year A California-based genetic testing laboratory has reported an email hacking incident that may have exposed medical information on nearly 233,000 individuals. It's the second-largest health data breach posted to the federal health data breach tally so far in 2020.

article thumbnail

5 best practices to maximizing your EIM investment

OpenText Information Management

As the volume and variety of data in every business explodes, Enterprise Information Management (EIM) solutions are becoming an increasingly vital part of the IT infrastructure. Estimates suggest that the market for EIM solutions will reach $70 billion by 2025. Yet, organizations often struggle to achieve full benefit from their EIM investments. Attaining the benefits … The post 5 best practices to maximizing your EIM investment appeared first on OpenText Blogs.

Marketing 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Joker's Stash Sells Fresh US, South Korean Payment Cards

Data Breach Today

Stolen APAC Cards Command Five Times Higher Asking Price Than US Cards, Group-IB Says The notorious carder marketplace Joker's Stash is advertising a fresh batch of 400,00 stolen payment cards issued by both South Korea and U.S. banks, warns Group-IB. It says that on average, stolen APAC payment card data sells for five times more than stolen U.S. payment card data.

IT 295
article thumbnail

Nintendo Confirms Breach of 160,000 Accounts

Threatpost

After gamers reported unauthorized logins and purchases, Nintendo confirmed that over 160,000 accounts had been hacked.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Botnet Designed to Mine Virtual Currency Shut Down

Data Breach Today

ESET: 'VictoryGate' Infected 35,000 Devices VictoryGate, a recently discovered botnet that infected about 35,000 devices with malware, has been disabled by researchers from security firm ESET. The botnet's main purpose was mining monero cryptocurrency.

Mining 264

More Trending

article thumbnail

Attackers Increasingly Using Web Shells to Create Backdoors

Data Breach Today

NSA, Australian Signals Directorate, Offer Mitigation Tips The U.S. National Security Agency and the Australian Signals Directorate offer guidance on how to mitigate the growing threat posed by attackers using web shells to create backdoors.

Security 250
article thumbnail

SeaChange video delivery software solutions provider hit by Sodinokibi ransomware

Security Affairs

The popular SeaChange video platform is the latest victim of the Sodinokibi Ransomware gang, which is threatening to leak the stolen data. SeaChange International, the multinational supplier of video delivery software solutions, was the victim of the Sodinokibi Ransomware gang. The crew has published images of the data they claim to have stolen before encrypting the systems at the company.

article thumbnail

GDPR and COVID-19: Privacy Regulator Promises 'Flexibility'

Data Breach Today

While Breach Notification Rules Still Apply, Expect Lower Fines As the COVID-19 pandemic continues, Britain's privacy watchdog has signaled that although privacy rights and transparency - as enshrined under GDPR - remain paramount, it will take a more "flexible" regulatory approach. But this is no data breach "get out of jail" card, legal experts warn.

GDPR 147
article thumbnail

Mozilla offers bigger rewards for Firefox flaws under its bug bounty program

Security Affairs

Mozilla announced some changes to its Firefox bug bounty program, it promises bigger rewards for vulnerabilities and will accept duplicate reports if necessary. Mozilla announced some major changes to its bug bounty program that was first launched in 2004. The organization paid out $965,750 for roughly 350 vulnerabilities, the average payout for each issue was approximately $2,700.

IT 100
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Aussie Contact-Tracing App: Details Slowly Emerge

Data Breach Today

Australia Opting for a Centralized Model for Its Effort to Help Combat COVID-19 Australia's pandemic contact-tracing app may be released by the end of the month. The app will collect names and phone numbers, enabling health authorities to contact those who've been exposed to people who have been infected with COVID-19.

IT 147
article thumbnail

Nintendo confirms that hackers might have hijacked 160,000 user accounts

Security Affairs

Nintendo has disconnected the NNID legacy login system from main Nintendo profiles after it has discovered a massive account hijacking campaign. The gaming giant Nintendo announced that hackers gained accessed at least 160,000 user accounts as part of an account hijacking campaign since early April. The company launched an investigation after it has received several complaints from its users. “This time, using a login ID and password information obtained illegally by some means other than

article thumbnail

Analysis: COVID-19 Contact-Tracing Privacy Issues

Data Breach Today

The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-10 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust.

Privacy 147
article thumbnail

Global Surveillance in the Wake of COVID-19

Schneier on Security

OneZero is tracking thirty countries around the world who are implementing surveillance programs in the wake of COVID-19: The most common form of surveillance implemented to battle the pandemic is the use of smartphone location data, which can track population-level movement down to enforcing individual quarantines. Some governments are making apps that offer coronavirus health information, while also sharing location information with authorities for a period of time.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Latest Apple Text-Bomb Crashes iPhones via Message Notifications

Threatpost

Sindhi-language characters can crash iPhones and other iOS/macOS devices if a victim views texts, Twitter posts or messages within various apps containing them.

article thumbnail

Content services: A key to organizational resilience

OpenText Information Management

Resilience is the capacity to recover quickly from difficulties. As organizations regroup, reorganize and reprioritize over the rest of this year, they’ll be doing so in a new normal. The operational landscape of early 2020 is gone forever. Personal interaction has changed. Business goals, plans and strategies have been upended. The nature of work has … The post Content services: A key to organizational resilience appeared first on OpenText Blogs.

article thumbnail

3 tech strategies emerge as vital for transit industry transformation

DXC Technology

Last fall, while attending the American Public Transportation Association (APTA) annual conference – and then earlier this year at APTA’s Business Member Board of Governors Meeting – I had the opportunity to interact with some of our leading GMs, CEOs, and CIOs to discuss how they were managing everything from public opinion and funding to […].

80
article thumbnail

Creating a new normal for operations and maintenance

OpenText Information Management

Operations and maintenance teams in asset-intensive industries such as chemicals, utilities, resources, and oil and gas are learning to live in the new normal that recent events have forced on all of us. While we shelter in place to stay safe, these teams must venture into the field to run and repair the assets and … The post Creating a new normal for operations and maintenance appeared first on OpenText Blogs.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Cybercrime Group Steals $1.3M from Banks

Dark Reading

A look at how the so-called Florentine Banker Group lurked for two months in a sophisticated business email compromise attack on Israeli and UK financial companies.

87
article thumbnail

What’s new in OpenText Enterprise Applications Cloud Edition (CE) 20.2

OpenText Information Management

While the major driver for OpenText™ Cloud Editions (CE) 20.2 is the new cloud-first architecture, there is plenty of new functionality also being released into many of the Enterprise Applications solutions to support customers’ business transformation and business continuity requirements. The OpenText Enterprise Applications products provide deep integrations into an organization’s leading applications.

Cloud 67
article thumbnail

WHO Confirms Email Credentials Leak

Dark Reading

Washington Post had identified the group as one among several whose passwords and emails were dumped online and abused.

Passwords 129
article thumbnail

UK: A recent prosecution for a criminal offence under the Freedom of Information Act 2000 illustrates how forgiving our Data Protection Act 2018 is

DLA Piper Privacy Matters

Facts of the matter. On 11 March 2020, the ICO brought its first successful conviction under the Freedom of Information Act 2000 (“ FOIA ”). An individual had made a Freedom of Information (“FOI”) request to the council for an audio recording of a council meeting. The requester was advised by the clerk that the recording had been deleted in line with council policy.

FOIA 66
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Sextortion Campaigns Net Cybercriminals Nearly $500K in Five Months

Dark Reading

Tracking the cryptocurrency paid by victims finds that, even with a low rate of payout, the scheme netted a cool half million for the various groups involved.

80
article thumbnail

Apple Pushes Back Against Zero-Day Exploit Claims

Threatpost

Company said there is no evidence that iOS bugs revealed by ZecOps earlier this week were ever used against customers.

article thumbnail

COVID-19 and Business Continuity in the EU

Hunton Privacy

As the COVID-19 outbreak continues to unfold, businesses are dealing with new and unprecedented operational and legal challenges. There also are key data protection considerations for businesses in connection with the COVID-19 pandemic, including compliance with the requirements around the processing of personal data for health monitoring purposes, crisis management issues and steps to be implemented to ensure the continuity of privacy compliance programs.

article thumbnail

News Wrap: Nintendo Account Hacks, Apple Zero Days, NFL Security

Threatpost

Nintendo account hacks, two Apple zero days reportedly being exploited in the wild, and the NFL virtual draft were all hot topics in the security space this week.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Sneaky Zero-Click Attacks Are a Hidden Menace

WIRED Threat Level

Hacks that can play out without any user interaction may be more common than we realize, in part because they’re so difficult to detect.

article thumbnail

SAS@home Virtual Summit Showcases New Threat Intel, Industry Changes

Threatpost

The free online conference, scheduled for April 28-30, will feature top security researchers from across the industry.

article thumbnail

Exercising Social Distancing With Online Doctor Appointments

Record Nations

At a time where pandemics like the COVID-19 virus are widespread and signs or symptoms of infection are still unclear, many people will obviously want to be able to consult their doctor about preventative measures and treatment options. Unfortunately though, some of those preventative measures include social distancing and stay at home standards, which in […].

59