Mon.Apr 20, 2020

article thumbnail

COVID-19 Phishing Emails Mainly Contain TrickBot: Microsoft

Data Breach Today

Phishing Campaigns Up Since the Onset of Pandemic TrickBot is the malware most commonly distributed in phishing emails that use the COVID-19 pandemic as a lure to entice victims to open up attached files or malicious links, according to Microsoft.

Phishing 290
article thumbnail

267 Million Facebook identities available for 500 euros on the dark web

Security Affairs

Over 267 million Facebook profiles are offered for sale on dark web sites and hacker forums, the dump is offered for £500 ($623) and doesn’t include passwords. Hackers are offering for sale over 267 million Facebook profiles for £500 ($623) on dark web sites and hacker forums, the archive doesn’t include passwords. Early March, the security expert Bob Diachenko uncovered an Elasticsearch cluster containing more than 267 million Facebook user IDs, phone numbers, and names.

Sales 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Economic Stimulus Payments: A Fraud Target

Data Breach Today

US Treasury on Guard for Scams Tied to Billions in Payments Being Distributed The U.S. Treasury Department is anticipating fraud as the IRS distributes about $300 billion in direct cash payments to Americans to provide economic relief during the COVID-19 pandemic. Russian-speaking fraudsters already appear to be trying to game the IRS's online systems, one security expert notes.

Security 238
article thumbnail

Bitcoin Stealers Hide in 700+ Ruby Developer Libraries

Threatpost

Cybercriminals uploaded typosquatted malicious libraries to RubyGems, which contains open-source components that are used as basic application building blocks by software developers.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Contact-Tracing Apps Must Respect Privacy, Scientists Warn

Data Breach Today

Trust Hinges on Transparency, 200 Top Scientists and Researchers Say in Open Letter All contact-tracing apps for combating COVID-19 must be developed in an open and transparent manner, remain voluntary, be based on Bluetooth, and allow users to opt in, or else they risk making the global pandemic even worse, 200 of the world's leading scientists and researchers have warned.

Privacy 208

More Trending

article thumbnail

Will Telehealth Fraud Grow Amid the COVID-19 Crisis?

Data Breach Today

Recent Case Illustrates How Telemedicine Can Be Abused The use of telehealth is ramping up as a result of the COVID-19 pandemic. Now, the latest arrest in connection with a $410 million healthcare fraud case that includes a multi-million dollar telemedicine-related fraud scheme serves as a cautionary tale of how fraudsters can abuse telehealth.

202
202
article thumbnail

Earth Day 2020’s call for climate action: Can AI address the challenge?

IBM Big Data Hub

With 2019 emerging as the warmest on record for the world’s oceans , the call to climate action continues as the theme for the 50-year anniversary of Earth Day 2020, described as the world’s largest environmental movement to drive transformative change for people and planet.

90
article thumbnail

Equifax Settles With Massachusetts, Indiana Over 2017 Breach

Data Breach Today

Company Will Pay $38 Million to Settle 2 Lawsuits Massachusetts and Indiana have reached separate settlements with Equifax over the 2017 data breach that exposed the personal information of millions of residents of both states. The company will pay a total of almost $38 million to settle with the states.

article thumbnail

US Government concerned by cyber attacks on Czech hospitals during COVID19 crisis

Security Affairs

US Secretary of State Mike Pompeo expressed concerns for cyber cyber attacks that have targeted Czech hospitals involved in the fight against the Coronavirus. US Secretary of State Mike Pompeo expressed concerns for cyber cyber attacks that recently hit Czech hospitals involved in the fight against the Coronavirus. “As the world battles the COVID-19 pandemic, malicious cyber activity that impairs the ability of hospitals and healthcare systems to deliver critical services could have deadly

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Tom Jermoluk on 'The End of Passwords'

Data Breach Today

Beyond Identity Co-Founder Discusses Mission, Timing of Latest Start-Up With $30 million in funding, Silicon Valley icons Jim Clark and Tom (TJ) Jermoluk launched Beyond Identity, a new identity management platform that promises "the end of passwords." Jermoluk discusses the technology and how this is a continuation of what he and Clark started 25 years ago.

Passwords 175
article thumbnail

Foxit PDF Reader, PhantomPDF Open to Remote Code Execution

Threatpost

Foxit Reader and PhantomPDF are plagued by several high-severity flaws that, if exploited, could enable remote code execution.

104
104
article thumbnail

Why Transaction Authentication Is More Critical Now

Data Breach Today

Phil Dunkelberger of Nok Nok Labs Discusses Evolving Payment Fraud Schemes As e-commerce explodes during the global CIVD-19 pandemic, transaction authentication is more critical for fraud prevention, says Phil Dunkelberger of Nok Nok Labs, who discusses the latest fraud trends.

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. The qualifications you’ll gain can help you boost your career in cyber security, or help you enter the industry at a time when IT skills are more in demand than ever. To help you on your way, we have made a number of our courses available remotely, enabling you to study from the comfort of your own home and without

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

7 Habits of Highly Effective (Remote) SOCs

Data Breach Today

Insights on What's Working So Far As organizations shift to a remote workforce for their SOCs, they need to keep in mind seven daily habits. Here's a guide.

147
147
article thumbnail

Maze Ransomware Attack Hits Cognizant

Threatpost

Cognizant has confirmed that a Friday evening Maze ransomware attack has disrupted its systems.

article thumbnail

Vulnerability Finding Using Machine Learning

Schneier on Security

Microsoft is training a machine-learning system to find software bugs : At Microsoft, 47,000 developers generate nearly 30 thousand bugs a month. These items get stored across over 100 AzureDevOps and GitHub repositories. To better label and prioritize bugs at that scale, we couldn't just apply more people to the problem. However, large volumes of semi-curated data are perfect for machine learning.

IoT 106
article thumbnail

Mootbot Botnet Targets Fiber Routers with Dual Zero-Days

Threatpost

Researchers saw several IoT botnets using one of the bugs in the wild after a proof-of-concept was published in March.

IoT 96
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How Can I Help My Users Spot Disinformation?

Dark Reading

A combination of clever tools, good education, and better mindfulness might keep users from being manipulated.

article thumbnail

UK Supreme Court Rules Morrisons Not Vicariously Liable for Malicious Data Breach by Employee

Data Matters

Case: WM Morrison Supermarkets plc v Various Claimants [2020] UKSC 12. In a decision that employers will welcome, the UK Supreme Court recently ruled that Morrison Supermarkets (Morrisons) was not vicariously liable for a data breach committed maliciously by a former employee who, acting to satisfy a personal vendetta against Morrisons, disclosed employee payroll data online.

article thumbnail

CNIL Publishes Standard on HR Data Processing

Hunton Privacy

On April 15, 2020, the French Data Protection Authority (the “CNIL”) published the final version of its standard (“Referential”) concerning the processing of personal data for core Human Resources (“HR”) management purposes. That Referential was adopted following a public consultation launched by the CNIL on April 11, 2019. The CNIL also published a set of questions and answers (“FAQs”), which aim to answer some practical questions that the CNIL are regularly asked regarding HR data processing a

article thumbnail

Remote Access Makes a Comeback: 4 Security Challenges in the Wake of COVID-19

Dark Reading

As companies continue to support increasing numbers of work-from-home employees, the pressure to secure access and reduce risk has never been greater.

Access 109
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Law enforcement and Microsoft join forces to dismantle botnet using LED Light Control Console

Security Affairs

Cybercriminals have abused LED light control console to launch malicious attacks, Microsoft’s security experts warn. Microsoft researchers shared details of a new incident discovered in Taiwan, where crooks abused LED light control consoles to launch malicious attacks. Threat actors used the consoles to deliver malware and ransomware through an IoT botnet that was also used to launch distributed denial-of-service (DDoS) attacks.

IoT 68
article thumbnail

Second Circuit Panel Sides With Ninth Circuit on What Qualifies as an Autodialer

HL Chronicle of Data Protection

A recent decision by the U.S. Court of Appeals for the Second Circuit in Duran v. La Boom Disco, Inc. has interrupted the emerging consensus around the definition of “autodialer” in the Telephone Consumer Protection Act (TCPA). On April 7, 2020, a Second Circuit panel joined a Ninth Circuit panel in adopting a broad reading of the statutory definition of “automatic telephone dialing system” (ATDS), commonly referred to as an autodialer.

article thumbnail

ABBYY Appoints Renowned Tech Executive Robert Youngjohns as Chairman of the Board to Drive Growth Strategy

Info Source

Industry veteran elected to help accelerate ABBYY’s Digital Intelligence strategy. MILPITAS, Calif. April 20, 2020 – ABBYY , a Digital Intelligence company, has appointed industry veteran Robert Youngjohns as Chairman of the Board. In this position Robert will work with the CEO and executive management team to shape ABBYY’s global enterprise growth strategy and execution.

article thumbnail

Stimulus Payments Are Popular Leverage for Cyberattacks

Dark Reading

More than 4,300 domains related to stimulus and relief packages, many of them malicious, have been registered since January.

109
109
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

ARMA Provides Special Webpage for RIM Month April 2020

IG Guru

ARMA Member “RIM Month” Discounts and InfoCon 2019 Session Packages are available as well as RIM posters here. The post ARMA Provides Special Webpage for RIM Month April 2020 appeared first on IG GURU.

article thumbnail

IT Services Firm Cognizant Hit with Maze Ransomware

Dark Reading

Cognizant is working with cyber defense firms and law enforcement to investigate the attack, disclosed April 17.

IT 104
article thumbnail

RIM Month Fun: Memes

The Texas Record

SLRM likes to make a fun post every April to celebrate RIM month. In the past, we’ve done Emoji Retention and RIM Mad Libs. It’s been a difficult RIM Month 2020 – with event cancellations, folks working from home, and everyone figuring out new workflows to serve Texans. We could all use a mirthful chuckle right about now. Without further adieu, SLRM is pleased to present some original memes we’ve been kicking around internally.