Fri.Oct 08, 2021

article thumbnail

Data Breach Reports Rise as Supply Chain Attacks Surge

Data Breach Today

US Breach Notification Transparency Declining, Identity Theft Resource Center Warns The number of breach reports filed by U.S. organizations looks set to break records, as breaches tied to phishing, ransomware and supply chain attacks keep surging, the Identity Theft Resource Center warns. It says that there's also been a rise in tardy breach notifications containing little detail.

article thumbnail

ESET PROTECT Advanced Review: Features & Benefits

eSecurity Planet

ESET might not have the name recognition of some other long-time cybersecurity companies , but at around 30 years old, the Slovakia-based company has been around longer than many of its rivals. And like other old-guard companies, ESET knows it needs to innovate to stay competitive, which the company has done with its cloud-based endpoint protection platform, ESET PROTECT.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nobelium Makes Russia Leader in Cyberattacks

Data Breach Today

Microsoft: 58% of Attacks Reported Worldwide Originated From Russia Microsoft, in its annual threat review report, Digital Defense, says 58% of cyberattacks worldwide over the past year originated in Russia. And 92% of the Russia-based threat activity came from the nation-state threat group Nobelium.

IT 340
article thumbnail

CIPL Publishes White Paper on Organizational Accountability in Privacy Enforcement

Hunton Privacy

On October 6, 2021, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth published a white paper on “Organizational Accountability in Data Protection Enforcement – How Regulators Consider Accountability in their Enforcement Decisions” (the “Paper ”). The Paper elaborates on a key recommendation made in CIPL’s 2018 white paper “ Incentivising Accountability: How Data Protection Authorities and Law Makers Can Encourage Accountability.

Paper 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Apache Issues Another Emergency Patch for Exploited Flaws

Data Breach Today

110,000 Servers Exposed to Active Attacks; US Government Urges Immediate Patching Apache HTTP Server users are being warned to install yet another patch, as a fix released Wednesday was incomplete and introduced a new flaw. The U.S. Cybersecurity and Infrastructure Security Agency has urged all users to update immediately, citing in-the-wild attacks exploiting Apache's software.

More Trending

article thumbnail

Principles of Sustainable Cybersecurity

Data Breach Today

Deepayan Chanda Discusses Reliability, Accuracy, Architecture and Resiliency Deepayan Chanda discusses the four principles of cybersecurity - reliability, accuracy, architecture and resiliency - that he believes cover most of the aspects of how CISOs can maintain the level of cybersecurity that their organzations need to sustain attacks.

article thumbnail

Google warns of APT28 attack attempts against 14,000 Gmail users

Security Affairs

Google warned more than 14,000 Gmail users that they have been the target of nation-state spear-phishing campaigns. On Wednesday, Google announced to have warned approximately 14,000 Gmail users that they had been targeted by nation-state hackers. Shane Huntley, the head of the Threat Analysis Group (TAG), wrote on Twitter that his group had sent an above-average batch of government-backed security warnings. .

article thumbnail

Netherlands Says Armed Forces May Combat Ransomware Attacks

Data Breach Today

Officials and Experts Debate Legality, Diplomatic Ramifications of the Statement The Dutch government says it may use intelligence agencies or military services to counter cyberattacks - including ransomware attacks - that threaten the country's national security. This comes in a letter from Dutch Minister of Foreign Affairs Ben Knapen in response to a parliamentary inquiry.

article thumbnail

OCR Issues Guidance on HIPAA, COVID-19 Vaccinations, and the Workplace via OCR Listserv

IG Guru

Today, the U.S. Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) issued guidance to help the public understand when the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule applies to disclosures and requests for information about whether a person has received a COVID-19 vaccine. The guidance reminds the […].

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Finding New Ways to Disrupt Ransomware Operations

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the arrest of two suspects tied to a major ransomware group in Ukraine. Also featured: Introducing "The Ransomware Files" and defining the next-gen CISO.

article thumbnail

'FontOnLake' Malware Family Targets Linux Systems

Dark Reading

Researchers report that the location of its C2 server and the countries where samples were uploaded may indicate targets include Southeast Asia.

IT 84
article thumbnail

ISMG Editors’ Panel: First Fatality Linked to Ransomware?

Data Breach Today

Discussion Also Addresses the Importance of Product Security In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the importance of product security, the impact of ransomware on healthcare sector entities during the pandemic and thinking about cybersecurity awareness creatively.

article thumbnail

North American Orgs Hit With an Average of 497 Cyberattacks per Week

Dark Reading

A new analysis confirms a surge in global cyberattacks since the COVID-19 pandemic began.

99
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Silicon Valley VC Firm Leaked 'Deal Flow' Data

Data Breach Today

Plug and Play Ventures Left an Amazon S3 Bucket Open to the Internet A Silicon Valley venture capital firm that runs a matchmaker service linking investors with startups exposed 6GB of data, including deal flow information pertaining to investors and startups. The exposure has been closed, but it's unclear if the company will notify regulators.

IT 200
article thumbnail

Mental Health And The Workplace

Hanzo Learning Center

It's stressful for workers these days, and Covid-19's impact has been far-reaching on economic activity and our way of working both now and in the future. With the recurring waves of the virus spreading throughout global communities, life's rules for engagement seem to be held hostage by the pandemic. Workers must deal with business closures, quarantine requirements, social distancing recommendations, battles over masks, and vaccine mandates for work and school.

IT 57
article thumbnail

Efforts to Incentivize Healthcare Sector Cyber Investments

Data Breach Today

Erik Decker, CISO of Intermountain Health, on Ways to Bolster Security Posture A federal law signed earlier this year amending the HITECH Act could help incentivize many healthcare sector entities to bolster their cybersecurity programs, says federal adviser Erik Decker, CISO of Intermountain Health, who suggest other incentives, as well.

article thumbnail

Apache rolled out a new update in a few days to fix incomplete patch for an actively exploited flaw

Security Affairs

Apache Software Foundation has released HTTP Web Server 2.4.51 to completely address a vulnerability that has been actively exploited in the wild. Apache Software Foundation has released HTTP Web Server 2.4.51 to address an actively exploited path traversal vulnerability ( CVE-2021-41773 ) that was only partially addressed with a previous release. An attacker can trigger the flaw to map URLs to files outside the expected document root.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Says Russian APT Targeting Journalists, Politicians

Data Breach Today

Company Outlines Added Security for High-Profile Users, Announces 2FA Enrollment Some 14,000 Google users were warned of being suspected targets of Russian government-backed threat actors on Thursday. The next day, the tech giant announced cybersecurity updates - particularly for email accounts of high-profile users, including politicians and journalists.

article thumbnail

Electronic Records Day 2021

The Texas Record

Today we celebrate Electronic Records Day, which raises awareness about the crucial need to manage and preserve government electronic records (e-records). The Council of State Archivists (CoSA) provides free informational resources, graphics, and webinars related to Electronic Records Day on their website. We like to raise awareness of the challenges of managing e-records throughout the year, so here is a selection of previously published blog articles on various topics: Social Media and Text Me

article thumbnail

Analyzing the Results of the 2021 Cybersecurity Complexity Study, EU & UK

Data Breach Today

Martin Cook, Sr. Solutions Engineer, Reliaquest Discusses How to Streamline Your Time to Response In this exclusive interview, Martin Cook, Senior Solutions Engineer with ReliaQuest, discusses how to reduce complexity, increase visibility and tap into new resources to enhance your own abilities to detect, investigate and respond to attacks.

article thumbnail

Continuous Authentication Tech Looms Large in Deployment Plans

Dark Reading

Security leaders are interested in continuous authentication technologies, especially behavioral-based capabilities.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Qualys Automates Ransomware Risk Assessment

eSecurity Planet

Qualys this week launched a new Ransomware Risk Assessment Service that’s designed to help enterprises understand their potential exposure to ransomware and automate the process of patching any associated vulnerabilities or misconfigurations. The service is being offered with a 60-day free trial, after which pricing is based on volume and assets.

article thumbnail

71% of Security Pros Find Patching to be Complex and Time Consuming, Ivanti Study Confirms

Dark Reading

Challenges with lack of time and vulnerability and patching prioritization are putting organizations at increased risk of cyberattacks.

Risk 64
article thumbnail

58% of all nation-state attacks in the last year were launched by Russian nation-state actors

Security Affairs

Microsoft revealed that Russia-linked cyberespionage groups are behind the majority of the nation-state cyber attacks on US government agencies. Microsoft revealed that most of the cyber attacks on US government agencies are orchestrated by Russia-linked cyberespionage groups. According to the IT giant, approximately 58% of all nation-state attacks between July 2020 and June 2021 were launched by Russian nation-state actors.

article thumbnail

Hardware Bolsters Medical Device Security

Dark Reading

New microprocessor technologies like secure enclaves and cryptography acceleration enable hardware to better safeguard medical devices.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Friday Squid Blogging: Strawberry Squid

Schneier on Security

Pretty pictures of a strawberry squid ( Histioteuthis heteropsis ). As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

Patch 'Immediately': Apache Issues Software Fix Amid Zero-Day Attacks

Dark Reading

CISA reports it's seeing ongoing scanning for the flaws and expects the activity to accelerate.

IT 69
article thumbnail

White House, Congress Target Ransomware Payments

eSecurity Planet

The surge in ransomware attacks in the last year have spurred attempts by government officials to bolster cybersecurity defenses, and those actions advanced on multiple fronts this week. In an op-ed piece published by CNBC, U.S. Deputy Attorney General Lisa Monaco wrote that the threat of ransomware to the country’s national security and public safety is growing and that a full-throttled response is needed from the government to protect the United States – including government agencies, private