Fri.Feb 07, 2020

article thumbnail

UK's Brexit Transition Period: Keep Complying With GDPR

Data Breach Today

Privacy Rules Remain in Effect Pending Eventual Outcome of UK-EU Negotiations As former U.K. Prime Minister Theresa May famously declared: "Brexit means Brexit." But what Britain's exit from the EU means for the nation's data privacy rules and future EU-U.K. data flows remains to be seen, as the country navigates its post-Brexit transition period.

GDPR 253
article thumbnail

2020 Oscar Nominees Used to Spread Malware

Adam Levin

Online scammers are using the 2020 Oscars to spread malware. A recent study released by Kaspersky Labs uncovered several hacking and phishing campaigns promising their targets free and early access to Best Picture nominees for this year’s Academy Awards. The study found over twenty phishing websites hosting at least 925 malicious files using the movies as bait, requiring would-be victims to either provide personal information (including credit card numbers), or to install adware applications to

Phishing 123
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Barr: US Should Invest in Nokia, Ericsson

Data Breach Today

Attorney General Calls for Supporting Huawei's Competitors to Help Boost 5G Security U.S. Attorney General William Barr says the United States and its allies should take a "controlling stake" in Huawei's chief competitors, Findland's Nokia and Sweden's Ericsson, to help make them more viable and improve the security of emerging 5G networks.

Security 241
article thumbnail

RobbinHood ransomware exploit GIGABYTE driver flaw to kill security software

Security Affairs

The operators behind the infamous RobbinHood ransomware are exploiting a vulnerable GIGABYTE driver to kill antivirus products. Cybercriminals behind the RobbinHood Ransomware are exploiting a vulnerable GIGABYTE driver to install a malicious and unsigned driver into Windows with the intent of disabling security products. Ransomware operators leverage a custom antivirus killing p ackage that is delivered to workstations to disable security solution before starting encryption.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Financial Firms Targeted With New Type of Backdoor: Report

Data Breach Today

FireEye Researchers First Spotted 'Minebridge' in Early January FireEye researchers are tracking a hacker campaign using a new type of backdoor they call "Minebridge" that has primarily been targeting U.S. financial firms this year.

211
211

More Trending

article thumbnail

Joker's Stash Advertises Second Batch of Indian Card Data

Data Breach Today

Haul of 460,000 Bank Cards Retailing for $4.2 Million, Group-IB Finds Indian banks are again facing a fraudster field day, as cybersecurity firm Group-IB warns that the notorious Joker's Stash carder forum is listing more than 460,000 stolen Indian credit and debit cards for sale as "fullz," meaning they include personally identifiable information.

Retail 197
article thumbnail

Critical Android Bluetooth flaw CVE-2020-0022 could be exploited without user interaction

Security Affairs

Google addressed a critical vulnerability in its Android OS that affects the Bluetooth subsystem and could be exploited without user interaction. Google has addressed a critical flaw in Android OS that affects the Bluetooth subsystem and could be exploited without user interaction. The vulnerability tracked as CVE-2020-0022 is a remote code execution flaw that could allow attackers to execute code on the device with the elevated privileges of the Bluetooth daemon when the wireless module is acti

article thumbnail

Report: U.S. Struggled to Counter 2016 Election Interference

Data Breach Today

Senate Committee Releases Third Report on Russian Efforts to Disrupt Presidential Election The U.S. Senate Intelligence Committee released its third report on Russian interference during the 2016 presidential election, finding that the Obama administration struggled to respond and more needs to be done to avoid disruption this year.

IT 177
article thumbnail

Japanese defense contractors Pasco and Kobe Steel disclose security breaches

Security Affairs

Japanese defense contractors Pasco and Kobe Steel have disclosed security breaches that they have suffered back in 2016 and 2018. Pasco is Japan’s largest geospatial provider and Kobe Steel is one of the major steel manufacturers. Just last week, Japan’s Ministry of Defense announced in addition to Mitsubishi Electric and the NEC defense business division other two unnamed contractors suffered a data breach.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Security in 2020: Revisited

Schneier on Security

Ten years ago, I wrote an essay : "Security in 2020." Well, it's finally 2020. I think I did pretty well. Here's what I said back then: There's really no such thing as security in the abstract. Security can only be defined in relation to something else. You're secure from something or against something. In the next 10 years, the traditional definition of IT security -- that it protects you from hackers, criminals, and other bad guys -- will undergo a radical shift.

Security 134
article thumbnail

From 1s & 0s to Wobbly Lines: The Radio Frequency (RF) Security Starter Guide

Dark Reading

Although radio frequency energy (RF) communications are increasingly essential to modern wireless networking and IoT, the security of RF is notoriously lax.

IoT 101
article thumbnail

Wacom Tablet Data Exfiltration Raises Security Concerns

Threatpost

Wacom stated that its data collection is done only in aggregate -- but that doesn't fix the issues, according to security experts.

article thumbnail

New Ransomware Targets Industrial Control Systems

Schneier on Security

EKANS is a new ransomware that targets industrial control systems: But EKANS also uses another trick to ratchet up the pain: It's designed to terminate 64 different software processes on victim computers, including many that are specific to industrial control systems. That allows it to then encrypt the data that those control system programs interact with.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

BREAKING: The California Attorney General Has Issued Modified Draft CCPA Regulations

Hunton Privacy

On February 7, 2020, the California Attorney General (“AG”) issued modified draft regulations implementing the California Consumer Privacy Act of 2018 (“CCPA”). The AG has provided a redline to the initial draft regulations about which we previously reported. According to the AG’s website , the modified draft regulations are subject to another public comment period.

Privacy 92
article thumbnail

5 Measures to Harden Election Technology

Dark Reading

Voting machinery needs hardware-level security. The stakes are the ultimate, and the attackers among the world's most capable.

Security 103
article thumbnail

Google Chrome To Bar HTTP File Downloads

Threatpost

Downloads of files like images may be banned if they use HTTP connections - even if they are available from an HTTPS website.

article thumbnail

Retail Privacy Network

Data Matters

You are invited to join privacy professionals in the retail sector for topical conversation, learning and networking at the first Retail Privacy Network meeting. This interactive meeting will include hot topics in UK/EU data privacy and cybersecurity with practical case studies on retail industry issues. The agenda will include discussions on: Lessons learned from GDPR enforcement actions and update on cookies.

Retail 68
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Phishing Campaign Targets 250 Android Apps with Anubis Malware

Threatpost

New attacks discovered by Cofense can perform keylogging, steal data and completely hijack a mobile device.

article thumbnail

Cloud companies chase future in cybersecurity ‘Wild West’

Information Management Resources

Companies spent $112.7 billion on information security and risk management in 2018, and are projected to increase that outlay almost 9% more per year through 2022, says Gartner.

Cloud 76
article thumbnail

Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs

Threatpost

RCE and myriad other types of attacks could take aim at the 19 percent of vulnerable companies that haven't yet patched CVE-2019-19781.

Cloud 81
article thumbnail

How automated data lineage improves regulatory compliance

Collibra

In 2007, the United States experienced the largest financial crash since The Great Depression. The crisis, which started in the United States as a result of a collapse in the housing market, threatened to destroy the entire international financial system. The Great Recession led to a loss of more than $2 trillion in global economic growth and the fall of one of the world’s largest banks, Lehman Brothers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Critical Android Bluetooth Bug Enables RCE, No User Interaction Needed

Threatpost

The flaw was recently patched in Android's February Security Bulletin.

Security 109
article thumbnail

RobbinHood Kills Security Processes Before Dropping Ransomware

Dark Reading

Attackers deploy a legitimate, digitally signed hardware driver to delete security software from machines before encrypting files.

article thumbnail

The California Consumer Privacy Act Surfaces in Recent Data Breach Class Action Complaint

Hunton Privacy

At this point, most companies doing business in California are aware of the California Consumer Privacy Act (“CCPA”), and most have been bracing for the eventual onslaught of class action litigation to follow its passage. On February 3, 2020, a class action lawsuit was filed that expressly references the CCPA— Barnes v. Hanna Andersson, LLC, et al., N.D.

article thumbnail

CCPA and GDPR: The Data Center Pitfalls of the 'Right to be Forgotten'

Dark Reading

Compliance with the new privacy rules doesn't always fall on data center managers, but when it does, it's more difficult than it may sound.

GDPR 81
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Modified CCPA Regulations Released—Comments Due February 24

HL Chronicle of Data Protection

On Friday, February 7, 2020, the California Attorney General (CA AG) released notice of changes to the California Consumer Privacy Act (CCPA) draft regulations. Initial draft regulations were published for public comment on October 11, 2019 (as previously covered by Hogan Lovells here ). Public comments on these modified draft CCPA regulations will be accepted by the CA AG until Monday, February 24, 2020 , at 5 pm PST.

Privacy 59
article thumbnail

CIPL Submits Comments to Brazil MCTIC on Creating a National AI Strategy for Brazil

Hunton Privacy

On January 30, 2020, the Centre for Information Policy Leadership (“CIPL”) at Hunton Andrews Kurth LLP submitted formal comments to the Department of Telecommunications at the Brazilian Ministry of Science, Technology, Innovations and Communications (“MCTIC”) on its public consultation on creating a national Artificial Intelligence (“AI”) strategy for Brazil (the “Consultation”).

article thumbnail

Google Takeout Serves Up Video Files to Strangers

Dark Reading

A limited number of user videos were shared with others in a five-day incident from November.

86