Wed.Oct 12, 2022

article thumbnail

Everything We Know About the Mango Markets Hack

Data Breach Today

A Hacker Wants the People He Stole From to Approve His Theft A hacker who stole cryptocurrency says he should walk away with the majority of his loot and put that plan up for a vote to the people from who he stole, using votes tied to the stolen cryptocurrency to vote yes. "Seriously though, wtf is wrong with our industry?" tweeted a web3 consultant.

Marketing 189
article thumbnail

Google to Pay $85 Million to Settle Arizona Geolocation Tracking Privacy Suit

Hunton Privacy

On October 3, 2022, Google LLC (“Google”) agreed to pay the State of Arizona $85 million to settle a consumer privacy lawsuit that alleged the company surreptitiously collected consumers’ geolocation data on smartphones even after users disabled location tracking. . Arizona’s lawsuit followed a 2018 Associated Press article that alleged Google continued to track the location of Android devices even after users disabled the Location History setting on the device.

Privacy 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Fixes 1 Zero-Day, Leaves 2 Exchange Bugs Unpatched

Data Breach Today

October's Patch Tuesday Includes Fixes for 84 Bugs One zero-day down but two Microsoft Exchange zero-days to go in this month's dose of patches from the Redmond, Washington computing giant. Microsoft fixed a COM+ flaw being exploited in the wild but for now is relying on workarounds for two known email server bugs.

217
217
article thumbnail

Android Leaks Wi-Fi Traffic Even When VPN Protection Features Are On

Dark Reading

The platform lets network connectivity data escape outside of the secure tunnel when connected to a public network, posing a "privacy concern" for users with "certain threat models," researchers said.

Privacy 125
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Lloyd's of London Says It Found No Evidence of Breach

Data Breach Today

Insurance Marketplace Giant Teamed With Mandiant and NTT Lloyd's of London says it has fully restored network services and that an investigation uncovered no evidence of a compromise. The insurance and reinsurance marketplace giant took systems offline last week after detecting what it called "suspicious activity.

Insurance 130

More Trending

article thumbnail

Immersive Labs Raises $66M to Aid Cyber Workforce Resilience

Data Breach Today

Series C+ Funding to Help Firm Provide More Visibility Into Azure, Google Cloud Immersive Labs completed a funding round just weeks after laying off 10% of its workforce to cover more developer languages and safeguard Azure and Google Cloud. The Ten Eleven Ventures-led funding will help Immersive Labs expand its coverage from frontline cybersecurity staff to development teams.

Cloud 130
article thumbnail

Aruba fixes critical vulnerabilities in EdgeConnect Enterprise Orchestrator

Security Affairs

Aruba addressed multiple critical severity vulnerabilities in the EdgeConnect Enterprise Orchestrator. Aruba addressed multiple critical severity vulnerabilities in the EdgeConnect Enterprise Orchestrator that can be exploited by remote attackers to compromise the vulnerable host. Aruba EdgeConnect Orchestrator is a centralized SD-WAN management solution that allows enterprises to control their WAN.

article thumbnail

Former Doctor Pleads Guilty to HIPAA Charges in Fraud Case

Data Breach Today

Alleged Conspiracy Involved Drug Sales Rep Accessing Patient Records A former doctor who practiced internal medicine in several states has pleaded guilty in a New Jersey federal court to criminal HIPAA violations in a case that also involved a pharmaceutical salesman and a larger alleged $2.5 million healthcare fraud conspiracy.

article thumbnail

Airborne Drones Are Dropping Cyber-Spy Exploits in the Wild

Dark Reading

Drone-based cyberattacks to spy on corporate targets are no longer hypothetical, one incident from this summer shows.

138
138
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

KnowBe4 Agrees to Vista Equity's $4.6B Take-Private Deal

Data Breach Today

Higher $24.90-Per-Share Bid Comes 18 Months After the Cyber Awareness Firm's IPO Vista Equity Partners and KnowBe4 have struck a deal to take the security awareness giant private for $4.6 billion in this week's second massive security acquisition. The agreement comes after the Austin, Texas-based investment firm upped its offer by $380 million, or nearly 4%, to $24.90 per share.

article thumbnail

WhatsApp Users Beware: Dangerous Mobile Trojan Being Distributed via Malicious Mod

Dark Reading

Among other things, users who download the app could end up having their WhatsApp account details stolen.

144
144
article thumbnail

Microsoft Patch Tuesday for October 2022 doesn’t fix Exchange Server flaws

Security Affairs

Microsoft Patch Tuesday security updates for October 2022 addressed a total of 85 security vulnerabilities, including an actively exploited zero-day. Microsoft Patch Tuesday security updates for October 2022 addressed 85 new vulnerabilities in multiple products, including Microsoft Windows and Windows Components; Azure, Azure Arc, and Azure DevOps; Microsoft Edge (Chromium-based); Office and Office Components; Visual Studio Code; Active Directory Domain Services and Active Directory Certificate

Security 109
article thumbnail

Microsoft Patch Tuesday Leaves ProxyNotShell Exposed

eSecurity Planet

Microsoft’s October 2022 Patch Tuesday includes security updates that fix well over 80 vulnerabilities in more than 50 different parts of its product range – but the ProxyNotShell flaws in Exchange Server that were reported last month are not on the list. Key vulnerabilities patched include CVE-2022-41033 , a zero-day flaw in the Windows COM+ Event System Service that’s being actively exploited and can provide an attacker with system privileges; and CVE-2022-34689 , a Windows CryptoA

Passwords 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Key Takeaways From Omdia's IGA Market Radar

Dark Reading

Identity governance administration (IGA) started life as a tool for organizations to meet a sudden surge of legal and regulatory requirements, but? it has grown into a key enabler of security.

article thumbnail

79 Million Malicious Domains Flagged in the First Half of 2022

KnowBe4

Security researchers at Akamai identify an average of 13 million newly observed domains (NOD) each month this year, representing about 20% of the NODs resolved in the same timeframe.

article thumbnail

KnowBe4 to Be Acquired for $4.6B by Private Equity Firm Vista

Dark Reading

Vista Equity Partners plans take the publicly traded security-awareness training vendor private.

article thumbnail

A New Phishing-as-a-Service Kit

KnowBe4

Researchers at Mandiant have published an analysis of a phishing -as-a-service kit called “Caffeine,” which further lowers the bar for inexperienced cybercriminals by offering a publicly available, easy-to-use phishing service.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Thoma Bravo to Acquire ForgeRock in $2.3B Deal

Dark Reading

This marks the third identity and access management (IAM) company acquired by Thoma Bravo in just the past few months.

Access 108
article thumbnail

Encrypted Files are the Overwhelming Way Organizations “Detect” Ransomware Attacks

KnowBe4

New analysis of cyberattacks shows that organizations aren’t able to properly detect ransomware attacks, resulting in a majority of victims paying the ransom to retrieve data.

article thumbnail

IBM Watson and ESPN use AI to transform fantasy football data into insight

IBM Big Data Hub

If you play fantasy football, you are no stranger to the concept of data-driven decision making. Every week during football season, an estimated 60 million Americans pore over player statistics, point projections, and trade proposals, looking for that elusive insight that will guide their roster decisions and lead them to victory. But numbers only tell half the story.

article thumbnail

Three-Quarters of Ethical Hackers Can Collect and (Potentially) Exfiltrate Data in 10 Hours or Less

KnowBe4

New insight from the SANS Institute surveying 300 ethical hackers sheds some light on how they perceive your security stance – and how easy it is for them to break in despite your efforts.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

5 Signs That It's Time to Invest in Data Loss Prevention

Dark Reading

Automation means more attacks. It also means smarter, easier-to-implement prevention techniques. Here are five signs it is time to put your own data loss prevention strategy into place.

IT 78
article thumbnail

Top 6 highlights from OpenText World 2022

OpenText Information Management

The ultimate information management conference was back in-person October 4-6 in Las Vegas! OpenText World 2022 featured keynotes from global leaders, peer networking, expert meet ups, hands-on labs, and more. Here are a few of the highlights—some you can catch on-demand right now: 1. Opening keynote: Elevate business with the information advantage During his opening … The post Top 6 highlights from OpenText World 2022 appeared first on OpenText Blogs.

63
article thumbnail

Cyolo Receives Investment from IBM Ventures for Zero Trust Secure Access Platform

Dark Reading

The investment by IBM Ventures enables further collaboration to accelerate the adoption of modernized, identity-based connectivity for today's digital organizations.

Access 75
article thumbnail

Second Annual Hanzo Diversity Equity & Inclusion Transparency Report Results

Hanzo Learning Center

It is year two on Hanzo's road to taking concrete steps toward our diversity, equity, and inclusion (DEI). Our observation is that this journey is neither linear nor speedy. However, we realize it is ok because our primary motivation, our why, is about infusing DEI into our culture to be a great workplace and a company that successfully delivers against its vision and mission.

IT 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cloud Data Breaches Are Running Rampant. What Are the Common Characteristics?

Dark Reading

Protecting against data breaches requires detailed analysis of recent attacks for remediation and prevention.

article thumbnail

iOS 16 for healthcare

Jamf

Apple's new iOS 16, iPadOS 16 and watchOS 9 give healthcare institutions and workers resources they need to deliver patient care while keeping their devices secure.

article thumbnail

Beachhead Solutions Adds Windows Security Management to the BeachheadSecure® Platform

Dark Reading

Included at no added cost, BeachheadSecure now provides accountwide management of Microsoft Defender AV, Firewall, and Controlled Folders for the most complete PC and device security available.