Fri.Nov 13, 2020

article thumbnail

APT Groups Target Firms Working on COVID-19 Vaccines

Data Breach Today

Microsoft Says Attacks on Seven Companies Blocked Three state-sponsored advanced persistent threat groups - one Russian, two North Korean - have been targeting companies across the globe involved with COVID-19 vaccine and treatment development, Microsoft says.

360
360
article thumbnail

The Scammer Who Wanted to Save His Country

WIRED Threat Level

Last fall, a hacker gave Glenn Greenwald a trove of damning messages between Brazil’s leaders. Some suspected the Russians. The truth was far less boring.

Security 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Gang Devises Innovative Extortion Tactic

Data Breach Today

Ragnar Locker's Facebook Ad Stunt a Harbinger of New Approaches The gang behind the Ragnar Locker ransomware posted an ad on Facebook in an attempt to publicly shame a victim so it would pay a ransom. Security experts say the innovative tactic is indicative of things to come.

article thumbnail

The Future of Enterprise Architecture

erwin

The business challenges facing organizations today emphasize the value of enterprise architecture (EA) , so the future of EA is closer than you think. Are you ready for it? See also: What Is Enterprise Architecture? . COVID-19 has forced organizations around the globe to re-examine or reimagine themselves. However, even in “normal times,” business leaders need to understand how to grow, bring new products to market through organic growth or acquisition, identify new trends and opportunities, de

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Banking on Cloud Security

Data Breach Today

"Better, cheaper, faster." These are the results that banking institutions can receive by shifting security to the cloud, says David Vergara of OneSpan. At a time when multi-channel fraud is surging and the customer experience is paramount, cloud needs serious consideration, he says.

Cloud 202

More Trending

article thumbnail

Vertafore data breach exposed data of 27.7 million Texas drivers

Security Affairs

Vertafore announced that information of 27.7 million Texas drivers has been exposed in a data breach caused by a human error. Vertafore announced that information of 27.7 million Texas drivers has been accidentally exposed due to a human error. The company disclosed this security breach this week, data was stored on an unsecured external storage service and they were accessed by an external party.

article thumbnail

Inrupt’s Solid Announcement

Schneier on Security

Earlier this year, I announced that I had joined Inrupt , the company commercializing Tim Berners-Lee’s Solid specification : The idea behind Solid is both simple and extraordinarily powerful. Your data lives in a pod that is controlled by you. Data generated by your things — your computer, your phone, your IoT whatever — is written to your pod.

IoT 116
article thumbnail

Weekly Update 217

Troy Hunt

This week's update had a load of questions so even whilst the planned content didn't consume a lot of time, audience engagement was great and I appreciate all the input. The big excitement for me was that Ubiquiti doorbell and whilst that might seem like a small thing, I'm absolutely loving it and the ability to answer it from anywhere whilst also integrating it into Home Assistant and triggering events like Sonos text to speech is really cool.

article thumbnail

Three APT groups have targeted at least seven COVID-19 vaccine makers

Security Affairs

At least the three nation-state actors have targeted seven COVID-19 vaccine makers, they are Strontium, Lazarus Group, and Cerium, Microsoft warns. Microsoft revealed that at least three APT groups have targeted seven companies involved in COVID-19 vaccines research and treatments. “In recent months, we’ve detected cyberattacks from three nation-state actors targeting seven prominent companies directly involved in researching vaccines and treatments for Covid-19.” reads the post publ

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

European Commission Publishes Draft of New Standard Contractual Clauses

Hunton Privacy

On November 12, 2020, the European Commission published a draft implementing decision on standard contractual clauses for the transfer of personal data to third countries pursuant to the EU General Data Protection Regulation (“GDPR”), along with its draft set of new standard contractual clauses (the “SCCs”). Key Takeaways. Key takeaways regarding the draft implementing decision and the SCCs include: The SCCs seek to take into account the complexity of modern processing chains by combining a

article thumbnail

New TroubleGrabber malware targets Discord users

Security Affairs

TroubleGrabber is a recently discovered credential stealer that spreads via Discord attachments and uses Discord webhooks to exfiltrate data. Netskope security researchers have spotted a new credential stealer dubbed TroubleGrabber that spreads via Discord attachments and uses Discord webhooks to transfer stolen data to its operators. The malware the same functionalities used by other malware that target Discord gamers, like AnarchyGrabber , but it appears to be the work of different threat acto

Passwords 117
article thumbnail

Credential-Stuffing Attack Hits The North Face

Threatpost

The North Face has reset an undisclosed number of customer accounts after detecting a credential-stuffing attack on its website.

IT 121
article thumbnail

Security flaws in Schneider Electric PLCs allow full take over

Security Affairs

Schneider Electric released advisories for multiple flaws, including issues that can allow taking control of Modicon M221 PLCs. Schneider Electric released security advisories for multiple vulnerabilities impacting various products, including four issues that can be exploited by attackers to take control of Modicon M221 programmable logic controllers (PLCs).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Three COVID-19 Vaccine-Makers are Under Active Attack

Threatpost

Three major APTs are involved in ongoing compromises at pharma and clinical organizations involved in COVID-19 research, Microsoft says.

article thumbnail

CISA Director Expects to Be Fired Following Secure Election

Dark Reading

Meanwhile, key legislators and former DHS officials are speaking out in support of CISA director Chris Krebs, who has led the agency's efforts in election security.

Security 109
article thumbnail

European data export bonanza: revised SCCs and EDPB Schrems II guidance published

Data Protection Report

On 12 November, the European Commission published revised Standard Contractual Clauses (SCCs) and a draft implementing decision. A feedback period on the draft documents will run until 10 December. Therefore, it is not possible to give a precise date for when the draft SCCs will become final but it could be by the end of the year. The new SCCs aim to modernise the clauses in line with the GDPR and to cover a multitude of different types of transfers to cater for “ the complexity of modern proc

article thumbnail

Botnet Attackers Turn to Vulnerable IoT Devices

Threatpost

Cybercriminals are leveraging the multitudes of vulnerable connected devices with botnets that launch dangerous distributed denial-of-service (DDoS) attacks.

IoT 101
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Hacker stole $2 million worth of Dai cryptocurrency from Akropolis

Security Affairs

Threat actors have stolen $2 million worth of Dai cryptocurrency from the cryptocurrency borrowing and lending service Akropolis. Cryptocurrency borrowing and lending service Akropolis disclosed a “flash loan” attack, hackers have stolen roughly $2 million worth of Dai cryptocurrency. The attack took place on November 12, in response to the attack the platform halted all the transactions to prevent hackers from stealing further funds.

IT 100
article thumbnail

Legendary Help: Providing Services to Farmers

Rocket Software

Farming is an essential industry. Farmers feed citizens, create jobs, and help stimulate the economy. It’s an industry that’s been around since the beginning of civilization. For that reason though, many people don’t see farming as an innovative industry. They assume that over the years, farming practices may have mechanized, but they probably haven’t changed too much.

article thumbnail

The iOS Covid App Ecosystem Has Become a Privacy Minefield

WIRED Threat Level

An analysis of nearly 500 Covid-related apps worldwide shows major differences in how much data they expect you to give up.

Privacy 102
article thumbnail

Amazon Sues Instagram, TikTok Influencers Over Knockoff Scam

Threatpost

'Order This, Get This': Social-media influencers are in Amazon’s legal crosshairs for promoting generic Amazon listings with the promise to get prohibited counterfeit luxury items instead.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Whitepaper: The Impact of Emoji in Workplace Communication via RICOH

IG Guru

Check out this very informative whitepaper by Matt Mahon @ Ricoh eDiscovery. The post Whitepaper: The Impact of Emoji in Workplace Communication via RICOH appeared first on IG GURU.

article thumbnail

Ticketmaster Scores Hefty Fine Over 2018 Data Breach

Threatpost

The events giant faces a GDPR-related penalty in the U.K., and more could follow.

article thumbnail

A Hacker's Holiday: How Retailers Can Avoid Black Friday Cyber Threats

Dark Reading

Starting on Nov. 27, online retailers of all sizes will find out if their e-commerce capabilities are ready for prime time or not.

Retail 96
article thumbnail

European Commission Proposes Revised Standard Contractual Clauses

Data Matters

The European Commission (EC), on 12 November 2020, published a draft adequacy decision implementing revised Standard Contractual Clauses (draft SCCs) – (the EC’s Draft). The EC’s Draft was published following the Court of Justice of the European Union’s (CJEU) decision in Data Protection Commissioner v Facebook Ireland Ltd and Maximillian Schrems on 16 July 2020 ( Schrems II ), which found (amongst other things) that supplementary protections may need to be implemented when SCCs are used to ensu

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Self-Service Security for Developers Is the DevSecOps Brass Ring

Dark Reading

DevOps teams with full security integration and self-service capabilities are 80% more likely to fix critical vulnerabilities in under a day, according to the ninth annual "State of DevOps Report.

article thumbnail

Europe: European Commission publishes draft updated Standard Contractual Clauses

DLA Piper Privacy Matters

On 12 November, the European Commission published its long awaited updated draft Implementing Decision on standard contractual clauses (“ SCCs ”) for the transfer of personal data to third countries. The update to the SCCs has been expected for some time to address the entry into force of the General Data Protection Regulation (“ GDPR ”) in May 2018, as the existing set of SCCs were implemented under the old Data Protection Directive and still referenced that legacy regime.

GDPR 64
article thumbnail

The Sameness of Every Day: How to Change Up Audit Fatigue

Dark Reading

And with more data compliance laws on the way, audit fatigue could be a real challenge for infosec professionals.