Thu.Dec 10, 2020

article thumbnail

Payment Processing Giant TSYS: Ransomware Incident “Immaterial” to Company

Krebs on Security

Payment card processing giant TSYS suffered a ransomware attack earlier this month. Since then reams of data stolen from the company have been posted online, with the attackers promising to publish more in the coming days. But the company says the malware did not jeopardize card data, and that the incident was limited to administrative areas of its business.

article thumbnail

Following FireEye Hack, Ensure These 16 Bugs Are Patched

Data Breach Today

Hunters Could Become the Hunted After Theft of Cybersecurity Firm's Hacking Tools Because 2020 wasn't already exciting enough, now we have to worry about being hunted by adversaries wielding FireEye's penetration testing tools, thanks to the company having suffered a big, bad breach. Here's a list of targeted flaws that every organization should ensure they've patched.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Learn. Transform. Advance.

erwin

Learn. Transform. Advance. That was the theme of the global conference we produced in October, but I’d venture to say it’s the mantra global organizations need to adopt as we continue to deal with the most disruptive event of our lifetime: COVID-19. Learn. When I look back, I should not be surprised that 2020 has been incredibly busy for us here at erwin.

article thumbnail

Guilty Plea in 2016 Dyn DDoS Attack

Data Breach Today

Attack Took Down Amazon, PayPal, Spotify, Twitter and Others One of those responsible for the massive Mirai-based DDoS attack launched in October 2016 that targeted domain name resolver Dyn and knocked Amazon, PayPal, Spotify, Twitter and others offline has pleaded guilty to federal charges.

300
300
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Finnish Data Theft and Extortion

Schneier on Security

The Finnish psychotherapy clinic Vastaamo was the victim of a data breach and theft. The criminals tried extorting money from the clinic. When that failed, they started extorting money from the patients : Neither the company nor Finnish investigators have released many details about the nature of the breach, but reports say the attackers initially sought a payment of about 450,000 euros to protect about 40,000 patient records.

More Trending

article thumbnail

Adrozek malware silently inject ads into search results in multiple browsers

Security Affairs

Microsoft warns of a new malware named Adrozek that infects devices and hijacks Chrome, Edge, and Firefox browsers by changing their settings. Microsoft warned of a new malware named Adrozek that infects devices and hijacks Chrome, Edge, and Firefox browsers by changing their settings and inject ads into search results pages. Users are redirected to fraudulent domains where they are tricked into installing tainted software.

Security 127
article thumbnail

Phishing Emails With COVID-19 Themes Delivered Zebrocy Malware

Data Breach Today

Researchers: Backdoor Tied to Russia-Linked Group Russia-linked hackers used phishing emails with COVID-19 themes as a way to infect devices with a backdoor called Zebrocy, the security firm Intezer reports.

Phishing 287
article thumbnail

Critical Steam Flaws Could Let Gamers Crash Opponents’ Computers

Threatpost

Valve fixed critical bugs in its Steam gaming client, which is a platform for popular video games like Counter Strike: Global Offensive, Dota2 and Half Life.

IT 117
article thumbnail

Norway Says Russia-Linked APT28 Hacked Parliament

Data Breach Today

Officials: Hackers Used Brute-Force Methods to Hack Email Accounts The Norwegian parliament's investigation into the hacking of email accounts of some elected officials and government employees in August has found that the Russian-linked APT28, also known as Fancy Bear, is likely responsible.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Russia-linked APT28 uses COVID-19 lures to deliver Zebrocy malware

Security Affairs

Russia-link cyberespionage APT28 leverages COVID-19 as phishing lures to deliver the Go version of their Zebrocy (or Zekapab) malware. Russia-linked APT28 is leveraging COVID-19 as phishing lures in a new wave of attacks aimed at distributing the Go version of their Zebrocy (or Zekapab) malware. The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations

Phishing 102
article thumbnail

Hacking Group Dropping Malware Via Facebook, Cloud Services

Data Breach Today

Researchers: 'Molerats' Group Continues to Target Victims in Middle East "Molerats," an Arabic-speaking advanced persistent threat group that has been targeting victims for several years, is now abusing Facebook accounts, as well as other cloud-based platforms, to deploy previously undocumented malware as part of an ongoing espionage campaign, according to Cybereason.

Cloud 261
article thumbnail

How to choose the best cloud content management solutions

OpenText Information Management

In our previous blog, we discussed the reasons that companies are moving to cloud-based content management solutions . In this blog, we’ll cover the features and capabilities that you should look for when selecting a cloud content management platform. Let’s start with a little fresh perspective on the question “what is cloud content management?”. With the … The post How to choose the best cloud content management solutions appeared first on OpenText Blogs.

Cloud 105
article thumbnail

OnDemand Webinar | The Third Question: What CISOs Aren't Asking, and What's at Stake

Data Breach Today

Watch this webinar with renowned cybersecurity innovator and former CISO of Citi, JP Morgan, and Deutsche Bank, Charles Blauner to lean about the biggest challenges facing security teams today.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Expert published PoC exploit code for Kerberos Bronze Bit attack

Security Affairs

The proof-of-concept exploit code for the Kerberos Bronze Bit attack was published online, it allows intruders to bypass authentication and access sensitive network services. The proof-of-concept exploit code for the Kerberos Bronze Bit attack, tracked as CVE-2020-17049 , was published online this week. The hacking technique could be exploited by attackers to bypass the Kerberos authentication protocol in Windows environments and access sensitive network-connected services.

article thumbnail

Ex-Cisco Engineer Sentenced to 2 Years in Prison for Hacking

Data Breach Today

Prosecutors Say Sudhish Ramesh Caused $1.4 Million in Damages A former Cisco engineer has been sentenced to serve two years in federal prison after pleading guilty to charges that he hacked his former company, causing $1.4 million in damages.

246
246
article thumbnail

The Line Between Physical Security & Cybersecurity Blurs as World Gets More Digital

Dark Reading

Security teams are being challenged by the connected nature of IP devices, and preventing them from being compromised by cybercriminals has become an essential part of keeping people and property safe.

Security 109
article thumbnail

Vendor to Dental Practices Hacked; 1 Million Affected

Data Breach Today

Information Exposed Includes Payment Card Numbers A Florida-based company that provides support services to hundreds of dental practices in 20 states says it's been hacked, exposing information - including payment card numbers - on more than 1 million patients.

IT 210
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

PLEASE_READ_ME Ransomware Attacks 85K MySQL Servers

Threatpost

Ransomware actors behind the attack have breached at least 85,000 MySQL servers, and are currently selling at least compromised 250,000 databases.

article thumbnail

London-based mobile marketing start-up Bubbl is a data innovator

Information Matters

Our interviews with founders and leaders of data-driven start-ups continue with this fascinating insight into the work and ambitions of mobile and location-based marketing company, Bubbl. Jo Eckersley, Bubbl’s founder and CEO, shares her experiences of growing a young company in the midst of the COVID-19 epidemic and adapting to a rapidly-changing environment.

article thumbnail

MoleRats APT Returns with Espionage Play Using Facebook, Dropbox

Threatpost

The threat group is increasing its espionage activity in light of the current political climate and recent events in the Middle East, with two new backdoors.

IT 106
article thumbnail

Europe: Cookies – heavy Sanction by the CNIL in France For Google LLC and Google Ireland

DLA Piper Privacy Matters

On December 7 2020, the French Supervisory Authority (CNIL) sanctioned Google LLC (60 million EUR) and Google Ireland (40 million EUR) for installing advertising cookies on users devices without their prior consent and with proper information. In addition, the CNIL issued an injunction to inform properly the users of google.fr in compliance with Article 82 of the French Data Protection Act within three (3) months from the notification of this decision with a late payment penalty of 100.000 EUR p

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What are the different types of cloud content services?

OpenText Information Management

In previous blogs we’ve covered what constitutes cloud content management and the benefits a cloud-based content management system can bring to your organization. In the final part of our blog series, we’ll take a brief look at the different types of cloud content services available and why hybrid cloud is becoming the preferred adoption model … The post What are the different types of cloud content services?

article thumbnail

Attack on Vermont Medical Center is costing the hospital $1.5M a day

Security Affairs

The attack that hit the University of Vermont Medical Center at the end of October is costing the hospital about $1.5 million a day. In October, ransomware operators hit the Wyckoff Heights Medical Center in Brooklyn and the University of Vermont Health Network. The ransomware attack took place on October 28 and disrupted services at the UVM Medical Center and affiliated facilities.

article thumbnail

C-11 – The act to enact the Consumer Privacy Protection Act: Five top measures to get ready

Privacy and Cybersecurity Law

Chantal Bernier, National Practice Leader, Privacy and Cybersecurity, Dentons Canada LLP Former Interim Privacy Commissioner of Canada. C-11, An Act to enact the Consumer Privacy Protection Act (CPPA) and the Personal Information and Data Protection Tribunal Act, is arguably so balanced and pragmatic that it is reasonable to expect it will become law, essentially as is, before the end of 2021 – barring an election.

Privacy 89
article thumbnail

Cisco addresses critical RCE vulnerability in Jabber

Security Affairs

Cisco addressed a new critical RCE vulnerability that affects several versions of Cisco Jabber for Windows, macOS, and mobile platforms. Cisco has released security updates to address a critical remote code execution (RCE) flaw affecting several versions of Cisco Jabber for Windows, macOS, and mobile platforms. Cisco Jabber is an instant messaging and web conferencing desktop app that delivers messages between users using the Extensible Messaging and Presence Protocol (XMPP).

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Misery of Ransomware Hits Hospitals the Hardest

Threatpost

Ransomware attacks targeting hospitals have exacted a human cost as well as financial.

article thumbnail

Avoiding Four Common Pitfalls When Moving to the Cloud

OpenText Information Management

As organizations increasingly move mission-critical workloads to the cloud, it’s important to recognize some of the common pitfalls and how best to mitigate their impact. Selecting the correct level of service It is crucial that organizations select the right cloud partners to operate their systems.

Cloud 87
article thumbnail

FireEye Breach Fallout Yet to Be Felt

Dark Reading

Aftermath of the FireEye breach by Russia's foreign service agency raises concerns over what the attackers could do next - and how to defend against it.

IT 131