Tue.Jul 28, 2020

article thumbnail

Anatomy of a Breach: Criminal Data Brokers Hit Dave

Data Breach Today

Evidence Points to 'ShinyHunters' Hacking Team Phishing Employees of Mobile Bank Mobile banking startup Dave is just the latest victim of criminal data brokers. Extensive evidence now points to Dave having been hit by a ShinyHunters, which has been tied to the sale of millions of stolen records to fraudsters - either via a phishing attack or hack of a third-party service provider.

Phishing 318
article thumbnail

[Podcast] IIM Challenges and Opportunities in the Energy Industry

AIIM

The energy industry plays a crucial role in all our lives. Without it, we wouldn't be able to keep the lights on.or the wifi, or the computers.and so on, but what is it that powers this critical industry? Information—energy utilities run on millions of documents to accomplish complex business operations and support their foundational principles: ensuring worker safety and providing reliable energy to end-users at a reasonable cost.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SEI Investments: Vendor Hit by Ransomware, Data Leaked

Data Breach Today

Vendor M.J. Brunner Confirms a Mid-May Cyber Incident Fund administrator SEI Investments Co. acknowledged Monday that it suffered a data breach after one of its vendors was struck with a ransomware attack, resulting in some of its customers' data being made public by the malicious actors.

article thumbnail

ShinyHunters leaked over 386 million user records from 18 companies

Security Affairs

ShinyHunters, a trusted threat actor, is offering on a hacker forum the databases stolen from eighteen companies, over 386 million user records available online. The known threat actor ShinyHunters has begun leaking for free the databases of multiple companies on a hacker forum. A couple of days ago, the popular digital banking app Dave.com disclosed a security breach after ShinyHunters leaked 7,516,625 user records on a crime forum.

Passwords 133
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Mitigating Brand Impersonation Fraud

Data Breach Today

Social media analytics tools can play a key role in mitigating the risk of brand impersonation fraud, says Barika Pace, senior director analyst at Gartner.

Analytics 272

More Trending

article thumbnail

US, UK Agencies Warn: QNAP NAS Devices Vulnerable

Data Breach Today

Over 62,000 Storage Devices Infected by QSnatch Data-Stealing Malware U.S. and U.K. cybersecurity agencies issued a joint warning this week that over 62,000 QNAP network-attached storage devices worldwide have been infected with data-stealing malware.

article thumbnail

Universities across the UK and North America confirm cyber attack

IT Governance

A software supplier used by some of the UK’s biggest universities has confirmed that it suffered a cyber attack in May. Blackbaud, which provides education administration, fundraising and financial management software, was infected with ransomware, giving cyber criminals access to a wealth of sensitive information. At least eight educational institutions in the US and Canada were also affected, as well as several charities on both sides of the Atlantic.

GDPR 124
article thumbnail

HCA Healthcare's CSO on Leadership Under Fire

Data Breach Today

Paul Connelly on Lessons from COVID-19, Public Service and 18 Years on the Job Paul Connelly has been CSO at HCA Healthcare for more than 18 years. But no year has been more trying than this one. What has he learned from the COVID-19 experience and the challenge of accelerating digital transformation amid a pandemic?

article thumbnail

FBI warns US companies on the use of Chinese Tax Software

Security Affairs

The FBI has issued an alert to warn US organizations of the risk associated with the use of Chinese tax software that could be infected with malware. The Federal Bureau of Investigation has issued an alert to inform organizations in the United States of the risk associated with the use of Chinese tax software. The alert aims at informing US companies in the healthcare, chemical, and finance sectors of cyber espionage activity by the Chinese government against their business and branches operatin

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Phishing Campaign Uses Fake SharePoint Alerts

Data Breach Today

Fraudsters Leverage Automated Messages in Effort to Steal Office 365 Credentials Fraudsters are mimicking automated messages from Microsoft SharePoint for a phishing campaign that attempts to steal Office 365 credentials, according to the security firm Abnormal Security.

Phishing 176
article thumbnail

Nefilim ransomware operators leaked data alleged stolen from the Dussmann group

Security Affairs

Cyble researchers reported that Nefilim ransomware operators allegedly targeted the Dussmann group, the German largest private multi-service provider. Researchers from threat intelligence firm Cyble reported that Nefilim ransomware operators allegedly targeted the Dussmann group, the German largest private multi-service provider. The Dussmann Group has over 64,500 employees in 22 countries, it is one of the largest private multi-service providers worldwide.

article thumbnail

Researchers Warn of High-Severity Dell PowerEdge Server Flaw

Threatpost

A path traversal vulnerability in the iDRAC technology can allow remote attackers to take over control of server operations.

122
122
article thumbnail

QSnatch malware infected over 62,000 QNAP NAS Devices

Security Affairs

US and UK cybersecurity agencies issued a joint advisory about the spread of QSnatch Data-Stealing Malware that already infected over 62,000 QNAP NAS devices. The United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC) issued a joint advisory about a massive ongoing campaign spreading the QSnatch data-stealing malware.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Why healthcare needs big data and analytics

IBM Big Data Hub

The COVID-19 global pandemic has heightened the focus on collecting, analyzing, and leveraging big data to drive positive and lifesaving outcomes. Yet the volume, velocity, and variety of data generated by COVID-19 is too vast and complex to be analyzed by traditional means.

article thumbnail

North Korea-Linked Lazarus APT is behind the VHD ransomware

Security Affairs

Security experts from Kaspersky Lab reported that North Korea-linked hackers are attempting to spread a new ransomware strain known as VHD. North Korean-linked Lazarus APT Group continues to be very active, the state-sponsored hackers are actively employing new ransomware, tracked as VHD, in attacks aimed at enterprises. The activity of the Lazarus Group surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks.

article thumbnail

UK ICO Publishes First Two Reports from its Data Protection Sandbox Pilot

Hunton Privacy

On July 23, 2020, the UK Information Commissioner’s Office (the “ICO”) published the first two reports of its Data Protection Regulatory Sandbox Beta phase (the “Beta phase”) involving projects by Jisc (a not-for-profit organization serving the higher and further education and skills sectors) and Heathrow Airport Ltd. The ICO introduced the Regulatory Sandbox service with the goal of demonstrating that data protection can be combined with real world innovative solutions.

IT 91
article thumbnail

Podcast: Security Lessons Learned In Times of Uncertainty

Threatpost

Derek Manky, Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs, discusses the top threats and lessons learned from the first half of 2020.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Survey of Supply Chain Attacks

Schneier on Security

The Atlantic Council has a released a report that looks at the history of computer supply chain attacks. Key trends from their summary : Deep Impact from State Actors: There were at least 27 different state attacks against the software supply chain including from Russia, China, North Korea, and Iran as well as India, Egypt, the United States, and Vietnam.States have targeted software supply chains with great effect as the majority of cases surveyed here did, or could have, resulted in remote cod

Access 117
article thumbnail

Lazarus Group Brings APT Tactics to Ransomware

Threatpost

A new ransomware, VHD, was seen being delivered by the nation-state group's multiplatform malware platform, MATA.

article thumbnail

Dell Technologies has named DXC Technology as a Titanium Black Partner. What does it mean for our customers?

DXC Technology

I’m very excited and proud to announce that DXC Technology recently achieved Dell Technologies’ highest level of partner status – Titanium Black. Only 13 companies in Dell Technologies’ partner network, one of the largest in the industry, have been recognized at this level. In fact, we are now one of only three global cloud service […]. The post Dell Technologies has named DXC Technology as a Titanium Black Partner.

IT 82
article thumbnail

Burners, Dots, and Pluses: Protecting Your Email in the Post-Privacy Age

Adam Levin

If you find your personal email account bombarded with unwanted marketing emails, there’s a good chance your account was compromised in a breach. That said, email these days is a minefield we all need to learn how to traverse safely. . Your email address could present the greatest liability when it comes to cybersecurity and privacy. A recent report found that email was the delivery method for 94% of malware attacks in 2019; a more recent study in 2020 indicated that email-based phishing may be

Privacy 75
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Schrems II Fallout — Understanding Essential Equivalence and What Businesses Should Do Now

Data Matters

Schrems II — Legal Analysis. With the EU-U.S. Privacy Shield declared invalid as a result of the Schrems II decision, there will be an immediate impact on the future of international data flows and potentially for your business. Join OneTrust DataGuidance, Sidley, and speakers from industry for a webinar taking a detailed look at the Schrems II decision and discussing what additional safeguards may be required for international transfers following the decision, as well as legal analysis int

Privacy 68
article thumbnail

7.5M Banking Customers Affected in Dave Security Breach

Dark Reading

The financial services app confirms user data was compromised in a data breach at its former third-party provider, WayDev.

article thumbnail

Pirate Ship Sailing to Developing World: Group-IB Uncovers Real Captains of Online Piracy Crew

Security Affairs

Group-IB’s report uncovers major players and driving forces of a criminal digital piracy syndicate which has been flourishing in the post-Soviet space. Group-IB , a global threat hunting and intelligence company headquartered in Singapore, today presented its report “ Jolly Roger’s patrons. Group-IB exposes financial crime network of online pirates in developing countries.“ The document uncovers major players and driving forces of a criminal digital piracy syndicate which has been flouris

article thumbnail

As Businesses Move to the Cloud, Cybercriminals Follow Close Behind

Dark Reading

In the wake of COVID-19, data theft is by far the top tactic, followed by cryptomining and ransomware.

Cloud 99
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Jamf releases enhancements and delivers on community feature requests

Jamf

Jamf Pro 10.23 is here and with it comes a feature directly from your requests.

IT 98
article thumbnail

Lazarus Group Shifts Gears with Custom Ransomware

Dark Reading

The North Korea-linked APT group has developed its own ransomware strain to better conduct financial theft, researchers report.

article thumbnail

Where are you on your digital transformation journey?

Micro Focus

Take our digital transformation survey Micro Focus recently launched a short survey about digital transformation, and I’m excited to share that we already have a significant number of respondents! The survey gathers insights into how organizations are approaching digital transformation and where organizations are in that journey. Aggregated results will be interesting, particularly given our new.