Sat.Dec 05, 2020

article thumbnail

Google Play Source Code Flaw Makes Apps Vulnerable

Data Breach Today

Check Point: Apps Vulnerable to a Source Code Flaw in Google Play A source code flaw in the Google Play store platform could enable attackers to perform remote code execution for credential theft on several prominent apps, a new report by security firm Check Point Research finds.

Security 292
article thumbnail

Human resource consulting giant Randstad hit by Egregor ransomware

Security Affairs

Multinational human resource consulting firm Randstad NV announced that they were a victim of the Egregor ransomware. Egregor ransomware operators have breached the network of the multinational human resource consulting firm Randstad NV and have stolen unencrypted files during the attack. Randstad operates in 39 countries and employs over 38,000 people and generated €23.7 billion in revenue for 2019.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Exfiltrated From Alaskan Voter Registration Servers

Data Breach Today

Officials Believe Stolen Data Used for Voter Intimidation, Propaganda Hackers exfiltrated voters' personally identifiable information from online voter registration servers in Alaska in September, and the information likely was used for voter intimidation and propaganda purposes, state officials say.

263
263
article thumbnail

The US Used the Patriot Act to Justify Logging Website Users

WIRED Threat Level

Plus: Better Twitter two-factor, a Spotify hack, and more of the week’s top security news.

Security 110
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hacker-for-Hire Group DeathStalker Implements New Malware

Data Breach Today

'PowerPepper' Backdoor Targets Smaller Firms The hacker-for-hire group DeathStalker, known for conducting espionage campaigns against small and medium-sized businesses, has started using a new malware strain called PowerPepper, according to a report from the security firm Kaspersky.

Security 252

More Trending

article thumbnail

US Senators Warn of National Security Threats From China

Data Breach Today

Intelligence Committee's Top Republican And Democrat Back DNI Assessment The top Republican and Democrat on the U.S. Senate Intelligence Committee have issued a warning about the national security threats posed by the Chinese government. The statement follows an opinion article published by DNI Director John Ratcliffe that called out China's cyber and other capabilities.

Security 216
article thumbnail

COVID-19 – Johnson & Johnson saw a 30% uptick in cyber-attacks

Security Affairs

Healthcare organizations like Johnson & Johnson are observing a surge of cyber attacks carried by state-sponsored hackers during COVID-19 pandemic. Nation-state actors are intensifying their attacks against organizations in the healthcare industry, like Johnson & Johnson, that are involved in the development of the COVID-19 vaccine. Johnson & Johnson, along with other COVID-19 research companies, has been recently hit by North Korea-linked hackers. “North Korean hackers have ta