Fri.Jun 26, 2020

article thumbnail

Breach Notification Delay: A Step-by-Step Timeline

Data Breach Today

Senior Care Facility Operator Describes Investigation Why are some breach notifications delayed for months? This week, a company that operates senior care facilities in North Carolina and South Carolina issued a statement offering a step-by-step explanation.

341
341
article thumbnail

Developer of DDoS Mirai based botnets sentenced to prison

Security Affairs

A man accused to have developed distributed denial of service (DDoS) botnets based on the Mirai botnet was sentenced to 13 months in federal prison. Kenneth Currin Schuchman, 22, of Vancouver, Washington, was sentenced to 13 months in federal prison because it has developed distributed denial of service (DDoS) botnets based on the source code of Mirai botnet.

IoT 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Amazon and Walmart Could Fix IoT Security

Data Breach Today

Bruce Schneier Says Pressure on Retailers Could Fix Insecure IoT Supply Chains IoT devices can be made cheaply and quickly. But as a result, they may lack adequate security features. The Atlantic Council is proposing regulations that would require technology retailers to sell devices that meet security standards, which would, in turn, put pressure on IoT component makers.

IoT 293
article thumbnail

Do I Need a Data Catalog?

erwin

If you’re serious about a data-driven strategy , you’re going to need a data catalog. Organizations need a data catalog because it enables them to create a seamless way for employees to access and consume data and business assets in an organized manner. Given the value this sort of data-driven insight can provide, the reason organizations need a data catalog should become clearer.

Metadata 132
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Payment Card Skimmer Attacks Hit 8 Cities

Data Breach Today

Trend Micro: 5 of the Cities Had Previously Been Victims of Magecart-Style Attacks Eight U.S. cities recently had payment card data stolen via point-of-sale skimming malware on their Click2Gov online payment platforms, according to Trend Micro, which says five of those cities had already been victims of similar Magecart-style attacks in recent years.

Sales 292

More Trending

article thumbnail

Hackers Used Malicious Docker Images to Mine Monero

Data Breach Today

Researchers Found Images on Docker Hub That Contained Cryptominers A recently uncovered cryptomining scheme used malicious Docker images to hide cryptocurrency mining code, according to an analysis from Palo Alto Networks' Unit 42.

Mining 284
article thumbnail

New Lucifer DDoS botnet targets Windows systems with multiple exploits

Security Affairs

A new botnet, tracked as Lucifer, appeared in the threat landscape, it leverages close to a dozen exploits to hack Windows systems. A new botnet tracked as Lucifer appeared in the threat landscape, it leverages a dozen exploits for high and critical severity flaws affecting Windows systems. Upon infecting a system the bot turns it into a cryptomining client and could use it to launch distributed denial-of-service (DDoS) attacks.

Passwords 120
article thumbnail

PCI Council's Efforts to Fight Fraud During COVID-19 Crisis

Data Breach Today

Troy Leach of the PCI Security Standards Council discusses how the shift to card-not-present transactions during the COVID-19 pandemic has created new fraud-fighting challenges and offers an update on pending standards revisions.

Security 274
article thumbnail

Police arrested 32 people while investigating underground economy forum

Security Affairs

German Police have arrested 32 individuals and detained 11 after a series of raids targeting users of an illegal underground economy forum. According to prosecutors in Frankfurt and Bamberg, the German Police have arrested 32 individuals and detained 11 after a series of raids targeting users of the “ crimenetwork.co ” illegal underground economy forum.

Security 119
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Breach Aftermath: Authorities Order Lab to Improve Security

Data Breach Today

LifeLabs' 2019 Breach Exposed Data on 15 Million Canadians Canadian information privacy regulators have ordered medical testing laboratory LifeLabs to improve its data security practices following their investigation of a 2019 breach that exposed the health data of 15 million individuals.

Security 268
article thumbnail

An Embattled Group of Leakers Picks Up the WikiLeaks Mantle

WIRED Threat Level

After releasing over a million hacked law enforcement files, DDoSecrets got banned from Twitter. But it has no plans to slow down.

IT 134
article thumbnail

Attackers Target Vulnerable Exchange Servers

Data Breach Today

Microsoft Urges Patching, Other Mitigation Steps Microsoft is warning its customers that attackers are increasingly targeting unpatched Exchange servers, with a significant uptick in activity since April.

IT 254
article thumbnail

Five steps to jumpstart your data integration journey

IBM Big Data Hub

As coined by British mathematician Clive Humby, "data is the new oil." Like oil, data is valuable but it must be refined in order to provide value. Organizations need to collect, organize, and analyze their data across multi-cloud, hybrid cloud, and data lakes. Yet traditional ETL tools support only a limited number of delivery styles and involve a significant amount of hand-coding.

Analytics 109
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Analysis: Keeping IoT Devices Secure

Data Breach Today

This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity?

IoT 202
article thumbnail

TikTok To Stop Clipboard Snooping After Apple Privacy Feature Exposes Behavior

Threatpost

App will stop reading users’ device cut-and-paste data after a new banner alert in an Apple update uncovered the activity.

Privacy 132
article thumbnail

Satori Botnet Co-Creator Sentenced

Data Breach Today

Justice Department Also Unseals Indictments of Alleged Co-Conspirators in DDoS Attacks A man from the state of Washington has been sentenced to 13 months in federal prison for his role in developing the Satori botnet, which was used to conduct several large-scale DDoS attacks. The Justice Department also unsealed indictments naming co-conspirators.

185
185
article thumbnail

UPDATE: Registration deadlines for VERB?S extended

Data Protection Report

The deadline for data controllers to register with the Data Protection Authority’s publicly accessible data controller registry, known as VERB?S, has been extended. In its June 23, 2020 decision, the Authority extends the VERB?S registration deadline until September 30, 2020 for the following data controllers: Turkish data controllers employing more than 50 people annually or whose annual total financial statement exceeds TL 25 million (approx.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How companies can lessen financial impacts through DX and technology

Micro Focus

The ‘new normal’ I’ve been chatting with many colleagues over the last few months as I learn more about digital transformation (DX) and work on DX assets for Micro Focus. We’re all dealing with the pandemic in our own way, and most of us share truths on many common topics: the high demand on toilet. View Article.

article thumbnail

Fake Contact Tracing Apps Spreading Malware, Ransomware

Adam Levin

Phony contact-tracing apps meant to mitigate the spread of the Covid-19 pandemic are installing ransomware on mobile devices. One app billed itself, “The Covid-19 Tracer App,” claiming to be an official mobile app of the Canadian government’s coronavirus contact tracing effort. “The more Canadians who voluntarily download and use the app, the safer we’ll be, and the faster we can reopen the economy,” stated the scam website.

article thumbnail

Crooks hide e-skimmer code in favicon EXIF Metadata

Security Affairs

Malwarebytes experts observed crooks hiding a software skimmer in the EXIF metadata of an image that was surreptitiously loaded by compromised online stores. While investigating a Magecart attack, experts found an e-skimmer code hidden in the EXIF metadata of an image file and surreptitiously loaded by compromised online stores. The malicious script detected by the researchers was loaded from an e-store running the WooCommerce plugin for WordPress.

article thumbnail

5 New InfoSec Job Training Trends: What We're Studying During COVID-19

Dark Reading

With the pandemic uprooting networks and upending careers, which security skills are hot -- and which are not?

Security 114
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

8 U.S. City Websites Targeted in Magecart Attacks

Threatpost

Researchers believe that Click2Gov, municipal payment software, may be at the heart of this most recent government security incident.

article thumbnail

The resilient procurement organization

OpenText Information Management

Recently, the world has dramatically changed – including the marketplace for goods and services, up-ending and shifting supply and demand dynamics for procurement professionals. Procurement professionals are masters at cost savings and keeping the wheels of production turning, but supply chain disruption presents big challenges as vendor operations are interrupted and market demand fluctuates.

article thumbnail

SOC Wins & Losses

Dark Reading

While the security operations center is enjoying a higher profile these days, just one-fourth of security operations centers actually resolve incidents quickly enough.

article thumbnail

The Unintended Harms of Cybersecurity

Schneier on Security

Interesting research: " Identifying Unintended Harms of Cybersecurity Countermeasures ": Abstract: Well-meaning cybersecurity risk owners will deploy countermeasures (technologies or procedures) to manage risks to their services or systems. In some cases, those countermeasures will produce unintended consequences, which must then be addressed. Unintended consequences can potentially induce harm, adversely affecting user behaviour, user inclusion, or the infrastructure itself (including other ser

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Major US Companies Targeted in New Ransomware Campaign

Dark Reading

Evil Corp. group hit at least 31 customers in campaign to deploy WastedLocker malware, according to Symantec.

article thumbnail

Will telehealth fundamentally change Life Sciences?

OpenText Information Management

Telehealth has come to prominence with the Covid-19 pandemic. A technology area that we’d been talking about for decades suddenly became front and center in healthcare delivery. Telehealth is only going to grow moving forward so what could this mean for the Life Sciences sector? The post Will telehealth fundamentally change Life Sciences? appeared first on OpenText Blogs.

article thumbnail

Weekly Update 197

Troy Hunt

I'm literally surrounded by broken pieces of half finished repairs. My office is usually a pretty organised place so it's kinda frustrating, but then I'm replacing equipment that's seen up to a decade or more of solid use so that's not a bad run. Amidst all that, I've well and truly gone down the IoT rabbit hole with all sorts of bits now connected through Home Assistant (just understanding the basics of this is actually one of those draft blog posts I mentioned).

Mining 71