Wed.Jan 04, 2023

article thumbnail

Leaked Emails of 200M Twitter Users Now Available for Free

Data Breach Today

63GB Database of Names, Email Addresses Posted to Hacker Forum for All to Download A member of a criminal data breach forum that tried to sell the email addresses of 400 million Twitter users to CEO Elon Musk last month has now posted the stolen data for free for anyone to download. The 63 GB of data includes names, handles, creation dates, follower counts and email addresses.

article thumbnail

Five Guys Data Breach Puts HR Data Under a Heat Lamp

Dark Reading

Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Irish Privacy Watchdog Fines Meta 390 Million Euros for Ads

Data Breach Today

Social Media Company Fined for GDPR Violation Related to Ad Personalization The Irish Data Protection Commission has imposed a fine of 390 million euros against Meta Ireland for violating the General Data Protection Regulation related to user data processing. Meta confirmed it will contest the penalty, which targets ad personalization by Facebook and Instagram.

Privacy 244
article thumbnail

Critical flaws found in Ferrari, Mercedes, BMW, Porsche, and other carmakers

Security Affairs

BMW, Mercedes, Toyota, and other popular carmakers use vulnerable APIs that could have allowed attackers to perform malicious activities. Cybersecurity researcher Sam Curry and his colleagues discovered many vulnerabilities in the vehicles manufactured by tens of carmakers and services implemented by vehicle solutions providers. The vulnerabilities could have been exploited by threat actors to perform a broad range of malicious activities, from unlocking cars to tracking them.

Sales 98
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Cyberattack on Records Vendor Affects Scores of US Counties

Data Breach Today

Government Offices Revert to Pen and Paper; Up to 400 Counties Affected by Attack Hundreds of U.S. counties continue to work with pen and paper after a cyberattack on their digital records management vendor last week disrupted methods to view, add and edit government records. The attack slowed the processing of birth certificates, marriage licenses and real estate transactions.

Paper 230

More Trending

article thumbnail

Wabtec Discloses Data Breach; LockBit Claims Responsibility

Data Breach Today

Personal Information Compromised After Rail Giant Refused to Pay $30M Ransom Rail and locomotive company Wabtec Corp. notified customers about a data breach that exposed some individuals' personal and sensitive information. Ransomware-as-a-service group LockBit posted the data on its leak site after the company refused to pay a $30 million ransom.

article thumbnail

Fortinet fixed multiple command injection bugs in FortiADC and FortiTester

Security Affairs

Fortinet addressed multiple vulnerabilities impacting its products and warned of a high-severity command injection flaw in FortiADC. Cybersecurity vendor Fortinet addressed several vulnerabilities impacting its products. The compaby also warned customers of a high-severity command injection flaw, tracked as CVE-2022-39947 (CVSS score of 8.6), affecting the Application Delivery Controller FortiADC.

article thumbnail

Report: Airbus Eyes Minority Stake in Atos Security Business

Data Breach Today

Owning a Piece of Evidian Would Help Airbus Guard Communication Systems in Vehicles Airbus has once again expressed interest in Atos' $4.8 billion cybersecurity, big data and digital business - this time as a minority stakeholder, Les Echos reports. The Dutch aircraft manufacturer has started exploratory talks to take a noncontrolling interest in Atos' Evidian business.

Big data 130
article thumbnail

New shc Linux Malware used to deploy CoinMiner

Security Affairs

Researchers discovered a new Linux malware developed with the shell script compiler ( shc ) that was used to deliver a cryptocurrency miner. The ASEC analysis team recently discovered that a Linux malware developed with shell script compiler ( shc ) that threat actors used to install a CoinMiner. The experts believe attackers initially compromised targeted devices through a dictionary attack on poorly protected Linux SSH servers, then they installed multiple malware on the target system, includi

Mining 92
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CEO Matthew Prince on Why Cloudflare Got Into Email Security

Data Breach Today

Cloudflare CEO Shares Why Anti-Phishing Belongs on a Network Protection Platform Acquiring Area 1 Security has allowed Cloudflare to extend its network protection capabilities from DDoS attacks to phishing emails, says co-founder and CEO Matthew Prince. Area 1's technology means customers will enjoy a better rate of detection with fewer false positives than legacy offerings.

Phishing 130
article thumbnail

US. rail and locomotive company Wabtec hit with Lockbit ransomware

Security Affairs

US. rail and locomotive company Wabtec Corporation disclosed a data breach after it was hit with Lockbit ransomware attack. Wabtec Corporation is an American company formed by the merger of the Westinghouse Air Brake Company (WABCO) and MotivePower Industries Corporation in 1999. It manufactures products for locomotives, freight cars and passenger transit vehicles, and builds new locomotives up to 6,000 horsepower.

article thumbnail

Rackspace Blames Zero-Day Exploit for Ransomware Hit Success

Data Breach Today

Hosting Giant Says Microsoft's Patch Notes Didn't Detail Remote Code Execution Risk Rackspace says the ransomware-wielding attackers who disrupted its hosted Microsoft Exchange Server environment last month wielded a zero-day exploit, described by CrowdStrike as being "a previously undisclosed exploit method for Exchange," to gain remote, direct access to servers it hosted.

article thumbnail

Meta dealt blow by EU ruling that could result in data use ‘opt-in’

The Guardian Data Protection

Irish regulator fines Facebook owner €390m after EU rejects argument for use of data to drive personalised ads The business model of Mark Zuckerberg’s Meta empire has been dealt a blow following a ruling that its legal justification for targeting users with personalised ads broke EU data laws. Campaigners said the move could force the Facebook and Instagram owner to ask users to “opt-in” to having their data used for targeted ads.

IT 85
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

US Attorney's Office Task Force to Trace Missing FTX Funds

Data Breach Today

New York District Hopes to Recover Missing Assets, Probe Crypto Firm's Collapse The U.S. attorney in New York has established a task force to trace and recover funds missing from FTX and manage probes related to the firm's collapse. The team comprises prosecutors with expertise in securities and commodities fraud, money laundering and asset forfeiture and cybersecurity.

article thumbnail

Cops Hacked Thousands of Phones. Was It Legal?

WIRED Threat Level

When police infiltrated the EncroChat phone system in 2020, they hit an intelligence gold mine. But subsequent legal challenges have spread across Europe.

Mining 92
article thumbnail

Understanding Infrastructure-as-Code Risks in the Cloud

Dark Reading

Improve overall IT administration and establish a framework to identify misconfigurations and automate the process of checking IaC before it makes it into the production environment.

Risk 84
article thumbnail

Database of the Cricketsocial.com platform left open online

Security Affairs

CyberNews reported that Cricketsocial.com, a social platform for the cricket community, exposed private customer data and admin credentials. Cricketsocial.com, is a social platform developed for the cricket community online. CyberNews discovered that a database used by the platform was left open online, it contains a huge trove of data. The Social platform for the cricket community exposed over 100k entries of private customer data and credentials.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Rackspace: Ransomware Attack Bypassed ProxyNotShell Mitigations

Dark Reading

The hosting provider had not applied Microsoft's new patch due to publicly reported issues with the update.

article thumbnail

Write a letter to yourself each year

Ascent Innovations

New Year Resolutions aren’t working. Try a better method to start the New Year off right. The beginning of the year is a natural time for reflection. Many of us look back at the past year and think of the year ahead. While we can make changes at any time, the New Year is the best time to commit. A study indicated that only 9% of people feel that their New Year’s resolutions were successful at the end of the year, and people are left feeling like they didn’t hit the mark.

IT 59
article thumbnail

BitRat Malware Gnaws at Victims With Bank Heist Data

Dark Reading

Attackers have compromised a Colombian financial institution and are using a bevy of leaked customer details in further malicious activity to spread an info-gathering remote access Trojan (RAT).

Access 77
article thumbnail

Bing, Google, and Conversational Search – Is OpenAI an Arms Merchant, Or a Microsoft Ally?

John Battelle's Searchblog

The Mac represented a new interface paradigm for computing, one that Microsoft ignored – until it couldn’t. Will Google do the same? Just last week I predicted that Google would leverage ChatGPT to create a conversational interface to its search business, and that Microsoft would do the same in the enterprise data market. I briefly considered that I might have gotten it exactly backwards – Google has a robust enterprise data business in its cloud business (known as GCP), and of

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Effective and Efficient Automation for Security Teams

Dark Reading

Even very short tasks may be worth automating if you do them frequently. Here's how to decide what to tackle first.

article thumbnail

A Pen Tester’s Guide to Content Security Policy

Outpost24

A Pen Tester’s Guide to Content Security Policy. 10.Jan.2023. Florian Barre. Wed, 01/04/2023 - 08:53. Jimmy Bergqvist, Application Security Expert, Outpost24. Penetration Testing. Teaser. In this article, we’ll look at Content Security Policy through the eyes of a penetration tester. We will outline the advantages of CSP, explain why you should have it on your site, and share some common misconfigurations that can be exploited, along with the relevant bypass scenarios.

article thumbnail

UK: Data adequacy post-Brexit – the UK’s first ‘data bridge’

DLA Piper Privacy Matters

Author: James Clark. On 19 December 2022 the UK government’s first data adequacy decision of the post-Brexit era came into effect. Under the Data Protection (Adequacy) (Republic of Korea) Regulations 2022, the UK formally determined that the Republic of Korea provides an adequate level of data protection for the purposes of the UK GDPR. Consequently, UK businesses can now freely transfer personal data to recipients in South Korea without needing to take any additional steps (such as entering int

GDPR 52
article thumbnail

Artificial Intelligence (AI) and Machine Learning (ML) Market Size and Forecasts

Information Matters

Finding “reliable” data about the market size and forecasts for the Artificial Intelligence (AI) and Machine Learning (ML) sectors is not easy and can be expensive if you have to Read more. The post Artificial Intelligence (AI) and Machine Learning (ML) Market Size and Forecasts appeared first on Information Matters - Technology Market Data and Forecasts.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

How Mayhem Fits Into the Federal Guidance for Securing the Software Supply Chain

ForAllSecure

In a previous blog post , we looked at the federal government’s recent release of the Securing The Software Supply Chain series, in particular, p art one: guidance for developers. In this blog post, we’ll take a deeper look at the National Institute of Standards and Technology (NIST) guidance for software development. In particular, we’ll look at PW 8.2 in NIST 800-218 which is cited.

article thumbnail

What Are Some Ways to Make APIs More Secure?

Dark Reading

Developers should go beyond the basics to make it harder to exploit the API.

article thumbnail

Cyber attack leaves 6 NC counties locked out of their online records via WRAL

IG Guru

Check out the article here.