Fri.Mar 26, 2021

article thumbnail

COVID-19-Related Fraud: 474 Charged So Far

Data Breach Today

Prosecutors: Fraudsters Tried to Swindle More Than $569 Million Over 12 Months Over the last 12 months, federal prosecutors have charged 474 suspects with trying to steal more than $569 million through COVID-19-related fraud schemes, including attempts to swindle the Paycheck Protection Program for small businesses.

313
313
article thumbnail

FBI published a flash alert on Mamba Ransomware attacks

Security Affairs

The Federal Bureau of Investigation (FBI) issued an alert to warn that the Mamba ransomware is abusing the DiskCryptor open source tool to encrypt entire drives. The Federal Bureau of Investigation (FBI) published an alert to warn that the Mamba ransomware is abusing the DiskCryptor open-source tool (aka HDDCryptor, HDD Cryptor) to encrypt entire drives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OpenSSL Fixes Flaws That Could Lead to Server Takedowns

Data Breach Today

System Administrators Advised to Update to Latest Version That Addresses 2 Vulnerabilities Users of the OpenSSL crypto library should upgrade immediately to the latest version to eliminate serious flaws that attackers could exploit to shut down servers, some security experts warn.

article thumbnail

Hacking Weapons Systems

Schneier on Security

Lukasz Olejnik has a good essay on hacking weapons systems. Basically, there is no reason to believe that software in weapons systems is any more vulnerability free than any other software. So now the question is whether the software can be accessed over the Internet. Increasingly, it is. This is likely to become a bigger problem in the near future.

Access 139
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

ISMG Panel Discussion: Hot Cybersecurity Issues

Data Breach Today

Editors Address Exchange Hacks, Insider Threats and More Four editors at Information Security Media Group review the latest cybersecurity issues, including Microsoft Exchange server hacks, insider threat management and implementing a "collective defense.

More Trending

article thumbnail

Fat Face's 'Strictly Private' Data Breach Notification

Data Breach Today

So Are We Supposed to Keep This Data Breach Notification Just Between Us Friends? What happens when an e-commerce retailer sends customers a data breach notification email with a subject line that reads "strictly private and confidential"? "Clearly trying to make people stay quiet," responded one unamused Fat Face customer. Others report being none the wiser as to what risks they now face.

article thumbnail

Top 4 reasons to attend OpenText World Europe

OpenText Information Management

Twelve months ago, we made the difficult – but vital – decision to move OpenText™ World Europe from a physical event in Prague to a virtual event in your office, dining room or kitchen! One year on, and we would have loved to get together in person to update you on the latest innovations from OpenText, … The post Top 4 reasons to attend OpenText World Europe appeared first on OpenText Blogs.

105
105
article thumbnail

Retailer Fat Face Pays $2 Million Ransom to Conti Gang

Data Breach Today

News Follows 'Private and Confidential' Breach Notification Fat Face Sent to Victims Left unsaid in Fat Face's "strictly private and confidential" data breach notification to affected customers this week was any indication that the fashion clothing retailer had paid a reported $2 million ransom to the Conti gang to unlock its systems. Fat Face has now confirmed the ransomware hit.

Retail 272
article thumbnail

Record Management Plan for Disasters

Record Nations

It’s imperative that every business has a record management plan in case of a disaster. If an unexpected interruption should occur, it’s critical that your business has a way to be up and running ASAP. Record management plans often account for things like fires, floods, blizzards, and even hurricanes. It seems that the one thing […]. The post Record Management Plan for Disasters appeared first on Record Nations.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ISMG Editors' Panel: Hot Cybersecurity Issues

Data Breach Today

Exchange Hacks, Insider Threats and More Four editors at Information Security Media Group review the latest cybersecurity issues, including Microsoft Exchange server hacks, insider threat management and implementing a "collective defense.

article thumbnail

Solarwinds Orion Platform updates fix two remote code execution issues

Security Affairs

Solarwinds released security updates that address multiple vulnerabilities, including two flaws that be exploited by attackers for remote code execution. Solarwinds has released a major security update to address multiple security vulnerabilities affecting the Orion Platform , the one that was involved in the Solarwinds supply chain attack. The software vendors released the Orion Platform version 2020.2.5 to fix the issues, the most severe one is a critical remote code execution vulnerability.

article thumbnail

Analysis: Takeaways From Ransomware Gang Interviews

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of recent “tell-all” interviews with members of ransomware gangs. Also featured: insights on securing IoT devices and mitigating insider threat risks.

article thumbnail

German Parliament Bundestag targeted again by Russia-linked hackers

Security Affairs

Several members of the German Parliament (Bundestag) and other members of the state parliament were hit by a targeted attack allegedly launched by Russia-linked hackers. German newspaper Der Spiegel revealed that email accounts of multiple members of the German Parliament (Bundestag) were targeted with a spearphishing attack. The messages were sent by threat actors to the private emails of the German politicians.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

After Breach, Mental Healthcare Provider Sues Amazon

Data Breach Today

SalusCare Seeks to Protect Exfiltrated Data Found in AWS Buckets A Florida-based mental healthcare provider is taking legal steps to help ensure that sensitive patient data that apparently was exfiltrated from its systems and stored in Amazon Web Service buckets is protected from further exposure.

IT 227
article thumbnail

More Digital, More Cloud – To Trust, or Not to Trust

Thales Cloud Protection & Licensing

More Digital, More Cloud – To Trust, or Not to Trust. sparsh. Fri, 03/26/2021 - 14:46. In the past, cloud adoption by many organizations was directed towards a “cloud first” strategy, meaning that new applications would be built for cloud deployment. However, in the wake of the pandemic, many have pivoted to a “cloud now” approach. What does this mean in the greater scheme of corporate security?

Cloud 83
article thumbnail

Applying CIAM Principles to Employee Authentication

Data Breach Today

Streamlining and Enhancing Authentication for the Workforce Many organizations have updated the authentication process for customers to help ensure frictionless transactions. Now, some are starting to take similar steps to streamline and enhance authentication of their employees - especially those working remotely.

article thumbnail

Weekly Update 236

Troy Hunt

This ?????? DAC! I mean it's a lovely device, but it's just impossible to use it as an audio source in the browser without it killing the camera. I'm very close to being out of ideas right now, only remaining thing I can think of is to set everything up on the laptop and see if it suffers a similar fate to what's happening on my desktop. The last thing I feel like doing now is burning more precious hours, but it's getting to that point.

IT 86
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Insurance Giant CNA Hit with Novel Ransomware Attack

Threatpost

The incident, which forced the company to disconnect its systems, caused significant business disruption.

Insurance 112
article thumbnail

Microsoft Autoupdate hangs Excel 16.47.21032301

Adam Shostack

Microsoft AutoUpdate for Mac has gotten exceptionally aggressive about running. Even if you use launchctl to disable it, you get a pop up roughly every 15 minutes of using an Office program. That’s probably a good thing, overall. There’s plenty of evidence that update failures leave folks vulnerable. Note that I’m saying “update failures,” rather than “failure to update”, because updates fail.

IT 77
article thumbnail

Employee Lockdown Stress May Spark Cybersecurity Risk

Threatpost

Younger employees and caregivers report more stress than other groups-- and more shadow IT usage.

Risk 114
article thumbnail

Activists accuse YouTube of destroying digital evidence of Syria war via TRT World

IG Guru

"It's not just videos that have been deleted, it's an entire archive of our life," said Sarmad Jilane, a Syrian activist and close friend of Al Mutez Billah, who was killed at the age of 21. The post Activists accuse YouTube of destroying digital evidence of Syria war via TRT World appeared first on IG GURU.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Apple Patches iOS Zero-Day

Dark Reading

Apple today released iOS 14.4.2 to address a security vulnerability that may have been actively exploited.

article thumbnail

MER Announces John Mancini as IG Analyst and VP of Content Marketing

IG Guru

The post MER Announces John Mancini as IG Analyst and VP of Content Marketing appeared first on IG GURU.

article thumbnail

Supercharge your contact center with real-time speech analytics

OpenText Information Management

Customer satisfaction, more than ever, has become a key metric for measuring business success. The quality of your products and level of support are paramount. And in today’s market conditions, there is no margin for error—companies simply cannot afford to lose a customer. Your customers will be loyal and will continue to buy from you … The post Supercharge your contact center with real-time speech analytics appeared first on OpenText Blogs.

article thumbnail

Executive Order Would Strengthen Cybersecurity Requirements for Federal Agencies

Threatpost

The post-SolarWinds EO could be issued as soon as next week, according to a report.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

A Day in the Life of a DevSecOps Manager

Dark Reading

"Most days are good days," says Rally Health's Ari Kalfus. But they sure are busy, he tells The Edge.

92
article thumbnail

Take control of your content with OpenText Core applications

OpenText Information Management

What’s the biggest business priority you’re focusing on to compete in today’s world of remote work? Streamlining paper-based processes? Delivering compelling digital experiences faster? Or ensuring that your team can access and share content securely from anywhere? If you work in a line of business inside an enterprise, you’ve likely had to advance all of … The post Take control of your content with OpenText Core applications appeared first on OpenText Blogs.

Paper 64
article thumbnail

SolarWinds Experimenting With New Software Build System in Wake of Breach

Dark Reading

CISO of SolarWinds now has complete autonomy to stop product releases if security concerns exist, CEO says.