Thu.Oct 15, 2020

article thumbnail

Another Threat Group Joins Ransomware Extortion Racket

Data Breach Today

FireEye: 'FIN11' Deploys Clop Ransomware A newly identified financially motivated threat group, dubbed "FIN11," is deploying Clop ransomware and exfiltrating data from its targets for extortion efforts, according to researchers at FireEye Mandiant.

article thumbnail

[Podcast] Are You Data Rich, or Data Poor?

AIIM

In this episode of AIIM On Air I am joined by Greg Council, VP Marketing and Product Management at Parascript. Greg is a member of the AIIM leadership council and an expert in digital transformation using tools like advanced data extraction, taxonomy, and search. We discuss document processing automation and the rising application of Machine Learning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Barnes & Noble Investigates Hacking Incident

Data Breach Today

System Housing Customer Data Accessed; Company Takes Down Nook E-Book Platform Books retailer Barnes & Noble is investigating a security incident involving unauthorized access to its corporate systems, including those storing customers' information. To begin its mitigation efforts, the company shut down its systems, which meant its Nook e-book platform was offline.

Retail 258
article thumbnail

Customised Ubiquiti Clients and Randomised MAC Addresses on Apple Devices

Troy Hunt

You know how some people are what you'd call "house proud" in that they like everything very neat and organised? You walk in there and everything is in its place, nice and clean without clutter. I'm what you'd call "network proud" and the same principle applies to how I manage my IP things: That's just a slice of my Ubiquiti network map which presently has 91 IP addresses on it between clients and network devices.

Privacy 142
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'Lemon Duck' Cryptominer Activity Spikes

Data Breach Today

Cisco Talos: Botnet Targets Windows, Linux Devices to Mine for Monero Researchers at Cisco Talos are warning about a sudden spike in activity related to the "Lemon Duck" cryptominer botnet that mines for monero.

Mining 222

More Trending

article thumbnail

Criminals Still Going Crazy for Cryptocurrency

Data Breach Today

Innovation and Privacy Enhancements Complicate Law Enforcement Investigations Cybercrime wouldn't exist as we know it today without there being a multitude of technologies and services that criminals have been able to turn to their advantage, and cryptocurrency is one of the prime examples, not least when it comes to ransomware, darknet markets and money laundering.

article thumbnail

Cyber insurance: A guide for businesses

IT Governance

Cyber threats are so numerous that it’s impossible to prevent security incidents altogether. That’s why they organisations increasingly relying on cyber insurance policies to cover the costs when data breaches and cyber attacks occur. But just how helpful is cyber insurance? We take at a look at everything you need to know in this blog. What is cyber insurance?

Insurance 122
article thumbnail

Iranian Hacking Group Again Targets Universities

Data Breach Today

Malwarebytes: 'Silent Librarian' Seeks Intellectual Property A hacking group with suspected ties to Iran's government is again targeting universities in the U.S. and around the world, according to researchers with security firm Malwarebytes. "Silent Librarian" typically attempts to steal intellectual property.

article thumbnail

Twitter Hack Analysis Drives Calls for Greater Security Regulation

Dark Reading

New York's Department of Financial Services calls for more cybersecurity regulation at social media firms following the "jarringly easy" Twitter breach.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Critical Magento Holes Open Online Shops to Code Execution

Threatpost

Adobe says the two critical flaws (CVE-2020-24407 and CVE-2020-24400) could allow arbitrary code execution as well as read or write access to the database.

Access 123
article thumbnail

Crooks hit Puerto Rico Firefighting Department Servers

Security Affairs

Puerto Rico’s firefighting department discloses a security breach, hackers breached its database and demanded $600,000. Puerto Rico’s firefighting department discloses a security breach, hackers breached its database and demanded a $600,000 ransom. According to the department’s director, Alberto Cruz, the ability of the department to respond to emergencies was not impacted by the attack.

article thumbnail

US Cyber Command and Microsoft Are Both Disrupting TrickBot

Schneier on Security

Earlier this month, we learned that someone is disrupting the TrickBot botnet network. Over the past 10 days, someone has been launching a series of coordinated attacks designed to disrupt Trickbot, an enormous collection of more than two million malware-infected Windows PCs that are constantly being harvested for financial data and are often used as the entry point for deploying ransomware within compromised organizations.

article thumbnail

U.S. Bookstore giant Barnes & Noble hit by cyberattack

Security Affairs

U.S. Bookstore giant Barnes & Noble has disclosed a cyber attack and that the threat actors have exposed the customers’ data. Barnes & Noble, Inc. , is an American bookseller with the largest number of retail outlets in the United States in fifty states. The bookseller also operated the Nook Digital, which is a spin-off division that sells eBook and e-Reader platform.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Media Just Passed a Test It Failed Four Years Ago

WIRED Threat Level

In an interview with WIRED, dean of the Columbia Journalism School Steve Coll says the media has learned some important lessons since 2016 about covering stolen email leaks.

IT 106
article thumbnail

EDPB Adopts Guidelines on Relevant and Reasoned Objection under Article 60 of the GDPR

Hunton Privacy

During its 39th plenary session on October 8, 2020, the European Data Protection Board (“EDPB”) adopted guidelines on relevant and reasoned objection under the General Data Protection Regulation (“GDPR”) (the “Guidelines”). The Guidelines relate to the cooperation and consistency provisions set out in Chapter VII of the GDPR, under which a lead supervisory authority (“LSA”) has a duty to cooperate with other concerned supervisory authorities (“CSAs”) in order to reach a consensus.

GDPR 103
article thumbnail

Carnival Corp. Ransomware Attack Affects Three Cruise Lines

Threatpost

Hackers accessed personal information of guests, employees and crew for Carnival Cruise, Holland America and Seabourn as well as casino operations.

article thumbnail

Microsoft Office 365 Accounts a Big Target for Attackers

Dark Reading

Just as they did with PowerShell for Windows, threat actors are abusing native O365 capabilities for lateral movement, command-and-control communication, and other malicious activity.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Barnes & Noble Hack: A Reading List for Phishers and Crooks

Threatpost

Customers' lists of book purchases along with email addresses and more could have been exposed -- and that's a problem.

article thumbnail

Zoom now supports end-to-end encrypted (E2EE) calls

Security Affairs

The Video conferencing platform Zoom announced the implementation of end-to-end encryption (E2EE) and its availability starting next week. The popular Video conferencing platform Zoom announced the availability of the end-to-end encryption (E2EE) starting next week. The new E2EE feature will be made available for both paid and free accounts. “We’re excited to announce that starting next week, Zoom’s end-to-end encryption (E2EE) offering will be available as a technical preview, which means

article thumbnail

US Indicts Members of Transnational Money-Laundering Organization

Dark Reading

Members of the QQAAZZ group helped cybercriminals conceal origins of stolen funds, DoJ alleges.

122
122
article thumbnail

Zoom Rolls Out End-to-End Encryption After Setbacks

Threatpost

After backlash over false marketing around its encryption policies, Zoom will finally roll out end-to-end encryption next week.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Prolific Cybercrime Group Now Focused on Ransomware

Dark Reading

Cybercriminal team previously associated with point-of-sale malware and data theft has now moved almost completely into the more lucrative crimes of ransomware and extortion.

article thumbnail

How long should you keep your US tax records?

IG Guru

Check out the guidance from the IRS here. The post How long should you keep your US tax records? appeared first on IG GURU.

article thumbnail

Seamlessly discover and extract metadata from your ERP and CRM systems

Collibra

If you have been using enterprise ERP and CRM systems for a long time, you know that they have a vast organizational impact. Your organization has invested heavily in these systems, and they continuously generate valuable operational and transactional data. This data is essential to power analytics and support critical business decisions. You need a reliable way of getting it with the right business context.

article thumbnail

The Ruthless Cyber Chaos of Business Recovery

Dark Reading

Critical technology initiatives leveraging the best of technology solutions are the only way through the cyber chaos of 2020.

94
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FIFA 21 Blockbuster Release Gives Fraudsters an Open Field for Theft

Threatpost

In-game features of the just-released FIFA 21 title give scammers easy access its vast audience.

Access 96
article thumbnail

Overcoming the Challenge of Shorter Certificate Lifespans

Dark Reading

We could be in the middle of a major transition to shorter and shorter certificate life spans, which has significant implications for how IT organizations manage certificates across the enterprise.

IT 74
article thumbnail

Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts

Threatpost

Companies that use Broadvoice's cloud-based VoIP platform may find their patients, customers, suppliers and partners to be impacted by a massive data exposure.

Cloud 75