Mon.Sep 17, 2018

article thumbnail

GovPayNow.com Leaks 14M+ Records

Krebs on Security

Government Payment Service Inc. — a company used by thousands of U.S. state and local governments to accept online payments for everything from traffic citations and licensing fees to bail payments and court-ordered fines — has leaked more than 14 million customer records dating back at least six years, including names, addresses, phone numbers and the last four digits of the payer’s credit card.

article thumbnail

Wielding EternalBlue, Hackers Hit Major US Business

Data Breach Today

Luckily, Firm Was Only Infected With Cryptocurrency-Mining Malware Attack code known as EternalBlue, designed to exploit a Windows SMB flaw, continues to work for attackers despite Microsoft having issued patches more than a year ago. One major U.S. business was reportedly a recent victim, as part of a cryptocurrency-mining malware campaign.

Mining 230
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are You Ever Finished With Information Governance?

Weissman's World

We at Holly Group spend our days working with clients to help them improve their Current State of information and move them towards their desired Future State. But a recent conversation with one of them raised a very interesting question: Is it possible for an organization to ever be finished? I know this sounds like […]. The post Are You Ever Finished With Information Governance?

article thumbnail

Police in Europe Tie Card Fraud to People-Smuggling Gang

Data Breach Today

Two Syrians Accused of Buying Stolen Corporate Card Data to Mask Activities Coordinated police raids in Germany and Sweden have resulted in the arrest of two Syrian nationals suspected of running a cyber fraud operation that purchased stolen card data to book hundreds of airline and train tickets to help smuggle people from the Middle East into Europe.

223
223
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

UK CEOs: cyber attacks are inevitable

IT Governance

New research from KPMG has found that 39% of UK CEOs “believe that becoming a victim of a cyber attack is now a case of ‘when’ and not ‘if’ for their organisation.” This is in contrast to CEOs from abroad, 49% of whom could envision a cyber attack against their organisation. Other key findings included the increasing awareness of cyber security. 39% of UK CEOs believe that their organisations are ‘well’ or ‘very well’ prepared for future cyber attacks.

Risk 91

More Trending

article thumbnail

NSA Attacks Against Virtual Private Networks

Schneier on Security

A 2006 document from the Snowden archives outlines successful NSA operations against "a number of "high potential" virtual private networks, including those of media organization Al Jazeera, the Iraqi military and internet service organizations, and a number of airline reservation systems.". It's hard to believe that many of the Snowden documents are now more than a decade old.

article thumbnail

Health Information Exchange: The Missing Links

Data Breach Today

Making bigger advances in implementing nationwide health information exchange will require a multipronged effort, including getting patients more involved and using a variety of technical approaches, says Scott Stuewe, the new president and CEO of DirectTrust.

141
141
article thumbnail

New XBash malware combines features from ransomware, cryptocurrency miners, botnets, and worms

Security Affairs

Palo Alto Network researchers discovered a new malware, tracked as XBash, that combines features from ransomware, cryptocurrency miners, botnets, and worms. Security researchers at Palo Alto Networks have discovered a new piece of malware, dubbed XBash piece that is targeting both Linux and Microsoft Windows servers. Xbash was developed using Python, then the authors converted into self-contained Linux ELF executables by abusing the legitimate tool PyInstaller for distribution.

article thumbnail

Software Company Settles with New Jersey AG Over Data Breach

Hunton Privacy

On September 7, 2018, the New Jersey Attorney General announced a settlement with data management software developer Lightyear Dealer Technologies, LLC, doing business as DealerBuilt, resolving an investigation by the state Division of Consumer Affairs into a data breach that exposed the personal information of car dealership customers in New Jersey and across the country.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

One year later BlueBorne disclosure, over 2 Billion devices are still vulnerable

Security Affairs

One year after the discovery of the BlueBorne Bluetooth vulnerabilities more than 2 billion devices are still vulnerable to attacks. In September 2017, experts with Armis Labs devised a new attack technique, dubbed BlueBorne, aimed at mobile, desktop and IoT devices that use Bluetooth. The BlueBorne attack exposes devices to a new remote attack, even without any user interaction and pairing, the unique condition for BlueBorne attacks is that targeted systems must have Bluetooth enabled.

IoT 82
article thumbnail

The 7 Habits of Highly Effective Security Teams

Dark Reading

Security requires smart people, processes, and technology. Too often, the "people" portion of the PPT equation is neglected.

article thumbnail

My Health Record: big pharma can apply to access data

The Guardian Data Protection

‘Each application would be assessed on its own merits,’ senators told Pharmaceutical companies will be allowed to apply for data from the controversial My Health Record system, a Senate committee hearing has been told. Caroline Edwards, the deputy secretary of the Department of Health, told the committee third-party access arrangements would allow medical and public health researchers access to de-identified data.

Access 76
article thumbnail

Greek authorities approved extradition of Russian hacker Alexander Vinnik to Russia

Security Affairs

Greek authorities have approved the extradition of Russian Alexander Vinnik to Russia, Supreme Civil and Criminal Court of Greece overruled previous ones. The Greek authorities have approved the extradition of Russian Alexander Vinnik to Russia, the decision has surprised the media because the man was expected to be extradited in the US or France as previously announces.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How to advance your data consistency strategy

IBM Big Data Hub

Data application resiliency is high on the agenda for CIOs. Gary Brunell from IBM looks at the in-house solution developed by Hotels.com, and how the IBM Big Replicate offering compares.

73
article thumbnail

New Xbash Malware a Cocktail of Malicious Functions

Dark Reading

The new malware tool targeting Windows and Linux systems combines cryptomining, ransomware, botnet, and self-propagation capabilities.

article thumbnail

Old WordPress Plugin Being Exploited in RCE Attacks

Threatpost

Old instances of the popular WordPress Duplicator Plugin are leaving sites open to remote code execution attacks.

90
article thumbnail

RDP Ports Prove Hot Commodities on the Dark Web

Dark Reading

Remote desktop protocol access continues to thrive in underground markets, primarily to hackers who lack expertise to find exposed ports themselves.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The IT Security Mistakes that Led to the Equifax Breach

eSecurity Planet

Patching failures alone didn't lead to the massive data breach at Equifax. Here are a half-dozen other mistakes that Equifax made.

article thumbnail

Ransomware Takes Down Airport's Flight Information Screens

Dark Reading

The attack left airport staff to post flight times and gates on whiteboards at Bristol Airport in Britain.

article thumbnail

Zero-Day Bug Allows Hackers to Access CCTV Surveillance Cameras

Threatpost

Firmware used in up to 800,000 CCTV cameras open to attack thanks to buffer overflow zero-day bug.

Access 88
article thumbnail

California’s Controversial IoT Security Bill Passes

Adam Levin

The first major piece of cybersecurity legislation to address vulnerabilities in Internet of Things (IoT) devices has passed in California, and is ready to be signed into law by Governor Jerry Brown. First introduced in 2017 by State Senator Hannah-Beth Jackson, SB-327 calls for “a manufacturer of a connected device… to equip [it] with a reasonable security feature or features that are appropriate to the nature and function of the device… to protect the device and any information contained there

IoT 57
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CSS-Based Attack Causes iOS, macOS Devices to Crash

Threatpost

The attack stems from a glitch in WebKit, an HTML layout browser engine in Apple’s Safari browser.

article thumbnail

Yahoo Class-Action Suits Set for Settlement

Dark Reading

Altaba tells SEC it will incur $47 million to settle consumer litigation for massive Yahoo data breaches.

article thumbnail

Facebook Now Offers Bounties For Access Token Exposure

Threatpost

The newly expanded Facebook bug bounty program sniffs out access token exposure flaws.

Access 79
article thumbnail

Humans of OpenText: Gill Lloyd

OpenText Information Management

Meet Gill Lloyd, OpenText™ colleague from Preston, UK. In this Humans of OpenText post, Gill talks about the joys of running marathons and achieving true wellness for the mind and body. When did you start running? I started running in October of 2017, after a 10-year gap and a creeping waistline! I decided it was … The post Humans of OpenText: Gill Lloyd appeared first on OpenText Blogs.

IT 50
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Middle East: Kingdom of Bahrain publishes Personal Data Protection Law

DLA Piper Privacy Matters

On 12 July 2018, the Kingdom of Bahrain (Bahrain) issued Law No. 30 of 2018 on the Personal Data Protection Law (PDPL). The PDPL will enter into force on 1 August 2019, giving businesses just under one year from the date of this article to prepare for the new regime. The PDPL will be a paradigm shift for how business is done in Bahrain. It will provide individuals with rights in relation to how their personal data can be collected, processed and stored.

article thumbnail

How Interactive Social Media Capture Can Help Firms Comply With FINRA Regulatory Notice 18-15

Hanzo Learning Center

If you’re in the securities industry, you’re probably keenly attuned to recent regulatory guidance about determining who needs heightened supervision and designing a plan to provide that supervision. But are you making full use of an interactive social media web capture tool to expedite that process and improve your results?

article thumbnail

Data on thousands of children used to predict risk of gang exploitation

The Guardian Data Protection

Brent and Essex councils work with IBM on system to try to identify problems before they arise Predictive software has been assessing data on the lives of thousands of children, from their potential exploitation by gangs to their risk of not being ready for primary school. Related: Councils use 377,000 people's data in efforts to predict child abuse Related: Child abuse algorithms: from science fiction to cost-cutting reality Continue reading.

Risk 44