Tue.Dec 15, 2020

article thumbnail

POS Device Makers Push Patches for Vulnerabilities

Data Breach Today

Researchers Found Flaws in Devices Made by Verifone, Ingenico Point-of-sale device manufacturers Verifone and Ingenico have released fixes for flaws in some of their devices after researchers found the vulnerabilities could have enabled attackers to steal payment card data, clone cards or install malware.

article thumbnail

PyMICROPSIA Windows malware includes checks for Linux and macOS

Security Affairs

Experts discovered a new Windows info-stealer, named PyMICROPSIA, linked to AridViper group that is rapidly evolving to target other platforms. Experts from Palo Alto Networks’s Unit 42 discovered a new Windows info-stealing malware, named PyMICROPSIA, that might be used soon to also target Linux and macOS systems. Experts spotted the PyMICROPSIA info stealer while investigating attacks of the AridViper group (also tracked as Desert Falcon and APT-C-23 ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SolarWinds Breach: 'The Scale, the Scope, the Subtlety'

Data Breach Today

Cybereason's Sam Curry Shares Insights on the Attack and Response In 2011, Sam Curry headed the response team for RSA's then-landmark breach. Today, as CSO at Cybereason, he looks at the SolarWinds supply chain attack and sees similarities - but also is struck by "the scale, the scope, the subtlety" of the incident.

273
273
article thumbnail

Norwegian cruise company Hurtigruten was hit by a ransomware

Security Affairs

Norwegian cruise company Hurtigruten disclosed a cyber attack that impacted its entire worldwide digital infrastructure. The Norwegian cruise company Hurtigruten announced its entire worldwide digital infrastructure was the victim of a cyber attack. “It’s a serious attack,” said the Hurtigruten’s chief digital officer Ole-Marius Moe-Helgesen in a statement. “The entire worldwide digital infrastructure of Hurtigruten seems to have been hit.” “The attack s

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Twitter Fined $547,000 Under GDPR for 2018 Data Breach

Data Breach Today

Penalty Marks First Time US Tech Firm Penalized Under EU's Privacy Regulation For the first time, a U.S. technology firm has been fined under the European Union's General Data Protection Regulation. Ireland's Data Protection Commission Tuesday hit social media giant Twitter with a $547,000 fine for failing to report and document a data breach within 72 hours, as required under GDPR.

More Trending

article thumbnail

Fresh Python-Based Trojan Designed as Information Stealer

Data Breach Today

Researchers: 'PyMicropsia' Malware Targets Outlook, Web Browsers A new Python-based information-stealing Trojan dubbed "PyMicropsia" is linked to a hacking group called AridViper, which is active mainly in the Middle East, according to Palo Alto Networks' Unit 42.

237
237
article thumbnail

Embracing the new normal; 2021 tech predictions from Jamf CEO

Jamf

2020 taught us to embrace change and proved that technology will play a defining role in the productivity and satisfaction of employees, students and healthcare patients. So what's in store for 2021? Let's find out.

111
111
article thumbnail

SolarWinds Breach Reports: 'Just the Tip of the Iceberg'

Data Breach Today

Philip Reitinger of Global Cyber Alliance on Responding to Supply Chain Breach Philip Reitinger has held senior cybersecurity leadership roles in both the public and private sectors. He's seen big breaches. And what he says what he sees so far in the SolarWinds attack may be just the "tip of the iceberg" in terms of government and business entities that have been compromised.

article thumbnail

2020 in review: January to June

IT Governance

Unprecedented. Challenging. In it together. New normal. Now more than ever. It’s hard to summarise 2020 without resorting to cliché, considering that our experiences have been so universal and subject to such little variety. There was toilet roll hoarding, Zoom quizzes, doomscrolling ONS figures, homeschooling, more Zoom quizzes, pubs closing, pubs reopening, and debates about what constitutes a substantial meal.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Target Selection: SolarWinds Orion 'Big Fish' Most at Risk

Data Breach Today

Suspected Cyber Espionage Operators Likely Only Hacked the Juiciest of Targets Following the discovery that attackers Trojanized SolarWinds' Orion software, expect the list of organizations that were running the backdoored network monitoring tool to keep increasing. But with this being a suspected cyber espionage operation, attackers likely focused on only the juiciest targets.

Risk 227
article thumbnail

Another Massive Russian Hack of US Government Networks

Schneier on Security

The press is reporting a massive hack of US government networks by sophisticated Russian hackers. Officials said a hunt was on to determine if other parts of the government had been affected by what looked to be one of the most sophisticated, and perhaps among the largest, attacks on federal systems in the past five years. Several said national security-related agencies were also targeted, though it was not clear whether the systems contained highly classified material. […].

article thumbnail

Inside Job: Grabbing Patient Records for Fraud

Data Breach Today

Medicare Contractor's Service Rep Sentenced to Prison A former seasonal worker at a tech contractor supporting Medicare open enrollment has been sentenced to serve 42 months in prison after pleading guilty in connection with improperly accessing patient records, some of which were used to open fraudulent credit lines.

Access 204
article thumbnail

The Zodiac Killer's Cipher Is Finally Cracked After 51 Years

WIRED Threat Level

Amateur and professional cryptographers, including those at the FBI, had been trying to decode the infamous serial killer's message to the media for decades.

Security 107
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Private Sector Needs a Cybersecurity Transformation

Dark Reading

Cybersecurity must get to the point where it's equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away.

article thumbnail

Flaws in Medtronic MyCareLink can allow attackers to take over implanted cardiac devices

Security Affairs

Experts reported flaws in Medtronic ’s MyCareLink Smart 25000 Patient Reader product that could be exploited to take control of a paired cardiac device. Experts from IoT security firm Sternum discovered vulnerabilities discovered in Medtronic’s MyCareLink Smart 25000 Patient Reader product that could be exploited to take control of a paired cardiac device.

article thumbnail

Millions of Unpatched IoT, OT Devices Threaten Critical Infrastructure

Threatpost

Industrial, factory and medical gear remain largely unpatched when it comes to the URGENT/11 and CDPwn groups of vulnerabilities.

IoT 115
article thumbnail

CIPL Submits Response to European Commission’s Article 28 Standard Contractual Clauses

Hunton Privacy

On December 10, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth submitted its response to the European Commission’s invitation for comments on its draft implementing decision on standard contractual clauses (“SCCs”) between controllers and processors for purposes of Article 28 of the EU General Data Protection Regulation (the “GDPR”).

GDPR 80
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Firefox Patches Critical Mystery Bug, Also Impacting Google Chrome

Threatpost

Mozilla Foundation releases Firefox 84 browser, fixing several flaws and delivering performance gains and Apple processor support.

Security 109
article thumbnail

Concerns Run High as More Details of SolarWinds Hack Emerge

Dark Reading

Enterprises running company's Orion network management software should assume compromise and respond accordingly, security experts say.

Security 127
article thumbnail

Ransomware and IP Theft: Top COVID-19 Healthcare Security Scares

Threatpost

From ransomware attacks that crippled hospitals, to espionage attacks targeting COVID-19 vaccine supply chain, Beau Woods discusses the top healthcare security risks.

article thumbnail

Sweet & Maxwell Publishes the Fifth Edition of Data Protection Law and Practice Written by Rosemary Jay

Hunton Privacy

Hunton Andrews Kurth is pleased to announce the release of Sweet & Maxwell’s fifth edition of Data Protection Law and Practice , written by Rosemary Jay , Hunton Andrews Kurth’s senior consultant attorney. This edition has been re-written to provide a thorough review of the current state of data protection law in the UK, along with details of relevant background context.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

45 Million Medical Images Left Exposed Online

Threatpost

A six-month investigation by CybelAngel discovered unsecured sensitive patient data available for third parties to access for blackmail, fraud or other nefarious purposes.

Access 87
article thumbnail

Nowhere to Hide: Don't Let Your Guard Down This Holiday Season

Dark Reading

Harden your defenses to ensure that your holiday downtime doesn't become an open door for cyber threats.

107
107
article thumbnail

Subway Sandwich Loyalty-Card Users Suffer Ham-Handed Phishing Scam

Threatpost

Subway loyalty program members in U.K. and Ireland have been sent scam emails to trick them into downloading malware.

Phishing 105
article thumbnail

HHS Issues Proposed Rule Modernizing HIPAA Privacy Rule

Data Matters

On December 10, 2020, the U.S. Department of Health and Human Services (HHS) Office of Civil Rights (OCR) released a proposed rule (the Proposed Rule) that would make a number of key changes to the Privacy Rule under the Health Insurance Portability and Accountability Act of 1996 and the Health Information Technology for Economic and Clinical Health Act of 2009 (collectively, HIPAA).

Privacy 68
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Gitpaste-12 Worm Widens Set of Exploits in New Attacks

Threatpost

The worm returned in recent attacks against web applications, IP cameras and routers.

IoT 116
article thumbnail

ICRM Approves Donation to ARMA International Educational Foundation (AIEF) La ARMA Nostra in Memory of Past Members

IG Guru

We are pleased to announce that the ICRM Board of Regents has approved a donation to the ARMA International Educational Foundation (AIEF) La ARMA Nostra in the amount of $1,500 in memory of Les Bossert, CRM, Regent, Legislation and Appeals who passed away this past September. The board also approved an annual donation to the […]. The post ICRM Approves Donation to ARMA International Educational Foundation (AIEF) La ARMA Nostra in Memory of Past Members appeared first on IG GURU.

article thumbnail

Agent Tesla Keylogger Gets Data Theft and Targeting Update

Threatpost

The infamous keylogger has shifted its targeting tactics and now collects stored credentials for less-popular web browsers and email clients.

IT 86