Mon.Feb 10, 2020

article thumbnail

Law Firms Race to File Phishing Breach Lawsuits

Data Breach Today

Class Action Suits Would Focus on PIH Health Breach That Affected 200,000 Several law firms are racing to be among the first to file class action lawsuits against PIH Health in the wake of the California-based regional healthcare network reporting last month that a 2019 phishing breach affected nearly 200,000 individuals. Why the rush?

Phishing 283
article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans. DOJ officials said the four men were responsible for carrying out the largest theft of sensitive personal information by state-sponsored hackers ever recorded.

Military 231
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Was Internet in Iran Hit by DDoS Attack?

Data Breach Today

NetBlocks Describes Extensive Disruption of Service Over the weekend, an extensive disruption to Iran's telecommunication networks knocked out about 25 percent of the country's internet service for several hours, according to NetBlocks, which tracks internet freedom across the globe.

259
259
article thumbnail

Malaysia’s MyCERT warns cyber espionage campaign carried out by APT40

Security Affairs

Malaysia’s MyCERT issued a security alert to warn of a hacking campaign targeting government officials that was carried out by the China-linked APT40 group. Malaysia’s Computer Emergency Response Team (MyCERT) warns of a cyber espionage campaign carried out by the China-linked APT40 group aimed at Malaysian government officials. The attackers aimed at stealing confidential documents from government systems after having infected them with malware. “ MyCERT observed an increase i

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

4 in Chinese Army Charged With Breaching Equifax

Data Breach Today

Justice Department Unveils Indictments Against Members of China's PLA Four members of China's People's Liberation Army have been indicted for allegedly hacking Equifax in 2017 and stealing the personal data of over 145 million Americans as well as a vast trove of the company's trade secrets and intellectual property, the U.S. Justice Department announced Monday.

More Trending

article thumbnail

Facebook's Privacy Practices Targeted by Canadian Regulator

Data Breach Today

To Force Changes, Regulator Must Prove Facebook Violated Canada's Privacy Law Canada's privacy commissioner is taking Facebook to court to try and force the social network to make specific changes to its privacy practices. The regulator has no power to issue fines or binding orders, meaning it must petition the federal court to force Facebook to make changes.

Privacy 214
article thumbnail

CISCO 2020 Privacy Benchmark Study Measures Return on Investing in Privacy Accountability

Hunton Privacy

On January 27, 2020, CISCO released its 2020 Data Privacy Benchmark Study entitled “From Privacy to Profit: Achieving Positive Returns on Privacy Investments” (the “Study”). The Study explores the return on investing in privacy compliance for organizations, examines how such return correlates with an organization’s accountability level and details the value of privacy certifications in the buying process.

Privacy 100
article thumbnail

10 Hot Cybersecurity Topics at RSA Conference 2020

Data Breach Today

From the Human Element and Frameworks to Secure Engineering, Privacy and More Which cybersecurity topics are hot? One topical answer to that question comes via the upcoming RSA Conference 2020. Organizers say they received 2,400 responses to their call for speakers, and they've have highlighted 10 predominant themes, including secure design, frameworks, privacy and the human element.

article thumbnail

1.2 million CPR numbers for Danish citizen leaked through tax service

Security Affairs

A glitch in the TastSelv Borger ta x service has sent over one million Danish CPR numbers to the US companies Google and Adobe. The Danish Agency for Development and Simplification has discovered the data leak that involved the TastSelv Borger service, which is managed by the US company DXC Technology. The TastSelv service allows everyone with a tax liability to Denmark to view and change his tax return, annual statement and pay residual tax. .

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

As if cybersecurity weren’t already a red-letter issue, the United States and, most likely, its allies–in other words, the global economic community–are in Iran’s cyber sites, a major player in cyber warfare and politically divisive disinformation campaigns. The “slap” as Ayatollah Ali Khamenei described it was a ballistic missile attack on a target that had three hours to get out of harm’s way.

IT 98
article thumbnail

7 best practices in customer experience

OpenText Information Management

In today’s world, customer experience determines success. Regardless of your organization’s size, products, service or industry, providing your customers with a consistently great experience only means good things for your bottom line. Many organizations are already realizing the benefits of customer experience. A recent Gartner survey found that more than 80% of marketing leaders expect to compete mainly on customer experience, … The post 7 best practices in customer experience appeared f

article thumbnail

Chinese Military personnel charged with hacking into credit reporting agency Equifax

Security Affairs

The United States Department of Justice charged 4 Chinese military hackers with hacking into credit reporting agency Equifax. The United States Department of Justice officially charged 4 members of the China’s PLA’s 54th Research Institute, a division of the Chinese military, with hacking into credit reporting agency Equifax. The four members of the Chinese military unit are Wu Zhiyong (???

article thumbnail

China's Military Behind 2017 Equifax Breach: DoJ

Dark Reading

Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens.

Military 124
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Docker Registries Expose Hundreds of Orgs to Malware, Data Theft

Threatpost

Misconfigured Docker registries could leak confidential data, lead to a full-scale compromise and interrupt the business operations.”.

Cloud 95
article thumbnail

A sad story of pedophilia on how disgusting images fed the web

Security Affairs

The journalist Livio Varriale sheds the light on a story about pedophilia that starts from afar and still today finds its roots in the darker side of the internet. Today, I’m going to tell you a horrible story that dwells on the dark web , a story abou t pedophilia that starts from afar and still today finds its roots in the darker side of the internet.

article thumbnail

Apple's Tracking-Prevention Feature in Safari has a Privacy Bug

Schneier on Security

Last month, engineers at Google published a very curious privacy bug in Apple's Safari web browser. Apple's Intelligent Tracking Prevention, a feature designed to reduce user tracking, has vulnerabilities that themselves allow user tracking. Some details : ITP detects and blocks tracking on the web. When you visit a few websites that happen to load the same third-party resource, ITP detects the domain hosting the resource as a potential tracker and from then on sanitizes web requests to that dom

Privacy 110
article thumbnail

Active PayPal Phishing Scam Targets SSNs, Passport Photos

Threatpost

Phishing emails have been uncovered that request a full rundown of personal data - even asking for photos of passports.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Why you don’t want to run a roll-your-own cloud

DXC Technology

Thanks to my job, I have accounts on many public clouds. I also have production private clouds — open-source OpenStack and NextCloud spring to mind. But, but, as someone who cut his teeth on Unix system administration back in the 80s, I also run my own smaller private clouds using a homebrew of programs. Self-hosting […].

Cloud 81
article thumbnail

How 4 Chinese Hackers Allegedly Took Down Equifax

WIRED Threat Level

The Department of Justice has pinned the hack on China. Here's how it was done, according to the indictment.

IT 98
article thumbnail

UK ICO Releases Draft Direct Marketing Code of Practice for Public Consultation

Data Matters

On 8 January 2020, the UK’s Information Commissioner’s Office ( ICO ) published a draft Direct Marketing Code of Practice ( Draft Code ) for public consultation. The Draft Code is intended to update existing guidance published pre-GDPR and provide clarity on certain important issues. Summarised below are the key takeaways from the Draft Code: Service messages: According to the Draft Code, consent is not required under the Privacy and Electronic Communications Regulation ( PECR ) where an organis

article thumbnail

BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver

Threatpost

The RobbinHood ransomware is using a deprecated Gigabyte driver as the tip of the spear for taking out antivirus products.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

6 Factors That Raise The Stakes For IoT Security

Dark Reading

Developments that exacerbate the risk and complicate making Internet of Things devices more secure.

IoT 79
article thumbnail

BREAKING: The California Attorney General Has Issued a Revised Version of the Modified Draft CCPA Regulations

Hunton Privacy

On February 10, 2020, the California Attorney General issued a slightly revised version of the modified draft regulations implementing the California Consumer Privacy Act of 2018, having omitted a revision in Section 999.317(g) from the version published on February 7, 2020. The deadline to submit written comments has been extended to February 25, 2020, at 5:00 p.m.

Privacy 58
article thumbnail

ibml unveils world’s fastest, ultra-high-volume, intelligent scanner: the ibml FUSiON, the most comprehensive intelligent information capture solution

Info Source

New product offers transformative solutions for outdated information management processes. London, February 10, 2020 – Imaging Business Machines, LLC (ibml) , the leading global provider of intelligent information capture solutions, unveiled its next generation of ultra-high-volume scanners. The new ibml FUSiON Series ignites the fusion of disparate capture processes into one streamlined solution, using in-line intelligence at blazing fast throughput speeds up to 730 A4 pages per minute and 938

article thumbnail

Exclusive interview with EMMA screenwriter Eleanor Catton

CILIP

Exclusive interview with EMMA screenwriter Eleanor Catton. CILIP were delighted to have the opportunity to interview the screenwriter for EMMA, Eleanor Catton, here she talks to us about her journey in adapting the well-known and loved book, her relationship with books and reading and passion for libraries. What was the process for writing the screenplay for Emma ?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Equifax Breach: Four Members of Chinese Military Charged with Hacking

Threatpost

Feds have charged four members of the Chinese People’s Liberation Army (PLA) in connection with the infamous 2017 Equifax breach.

article thumbnail

NSL Podcast Series: Part 1 on Cybersecurity and Protecting “the Keys to the Kingdom”

Hunton Privacy

In a recent podcast by Never Stop Learning , Lisa Sotto , partner and chair of Hunton Andrews Kurth’s Privacy and Cybersecurity practice, and Eric Friedberg, Co-President of Stroz Friedberg, LLC, and Aon’s Cyber Solutions Group, discuss “ Cybersecurity: How Concerned Should We Be? ” As threats from cyber attacks continue to grow in both scope and complexity, it is imperative for companies and individuals alike to have a better understanding of cyber threats and the risks involved.

article thumbnail

Zdenek Hanzal gives a global cosmetics company an analytics makeover

IBM Big Data Hub

Analytics Hero blog celebrating how Zdenek Hanzal finds success.