Wed.Nov 25, 2020

article thumbnail

FBI Warns of Uptick in Ragnar Locker Ransomware Activity

Data Breach Today

Bureau Says the Attacks Are Hitting Many Sectors The FBI has sent out a private industry alert warning about increasing attacks using Ragnar Locker ransomware. The operators behind this crypto-locking malware have recently targeted companies that include EDP, Campari and Capcom, researchers note.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

In part 1 of this series, I posited that the IoT landscape is an absolute mess but Home Assistant (HA) does an admirable job of tying it all together. In part 2 , I covered IP addresses and the importance of a decent network to run all this stuff on, followed by Zigbee and the role of low power, low bandwidth devices. I also looked at custom firmware and soldering and why, to my mind, that was a path I didn't need to go down at this time.

IoT 143
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Home Depot Settles 2014 Breach Lawsuit for $17.5 Million

Data Breach Today

Home Supply Retailer Must Also Implement Several Cybersecurity Protocols The Home Depot reached a $17.5 million settlement in a class-action lawsuit stemming from a 2014 data breach that compromised the payment card data of 40 million of the retailer's customers. The company will also implement new security procedures as part of the agreement.

Retail 328
article thumbnail

IoT Unravelled Part 4: Making it All Work for Humans

Troy Hunt

The first few parts of this series have all been somewhat technical in nature; part 1 was how much of a mess the IoT ecosystem is and how Home Assistant aims to unify it all, part 2 got into the networking layer with both Wi-Fi and Zigbee and in part 3 , I delved into security. Now let's tackle something really tricky - humans. I love the idea of automating stuff in the home, but I love the idea of a usable home even more.

IoT 136
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Google Removes 2 Android Apps That Collected User Data

Data Breach Today

Palo Alto Networks Discovers Problem in Baidu Apps Google removed two Android apps made by Baidu, a Chinese company, from its Google Play store after security researchers found they were collecting and possibly leaking data that could have been used to track individuals.

Security 279

More Trending

article thumbnail

Hackers Exploit MobileIron Flaw

Data Breach Today

NCSC: Nation-State Hackers, Others Leveraging Remote Code Execution Bug The U.K. National Cyber Security Center is warning that nation-state hackers and cybercriminals are exploiting a remote vulnerability in MobileIron's mobile device management tool to target organizations in the country.

Security 279
article thumbnail

Laser-Based Hacking from Afar Goes Beyond Amazon Alexa

Threatpost

The team that hacked Amazon Echo and other smart speakers using a laser pointer continue to investigate why MEMS microphones respond to sound.

IoT 138
article thumbnail

Linux Botnet Disguises Itself as Apache Server

Data Breach Today

Researchers: Operators of Stantinko Botnet Putting More Emphasis on Stealth The latest Linux version of the Stantinko botnet is designed to disguise the malware as an Apache server to help better avoid security tools and remain hidden, according to Intezer Labs.

Security 278
article thumbnail

Retail giant Home Depot agrees to a $17.5 million settlement over 2014 data breach

Security Affairs

Retail giant Home Depot has agreed to a $17.5 million settlement in a multi-state investigation of the data breach that the company suffered in 2014. The US largest home improvement retailer giant Home Depot agrees to $17.5 million settlement over the 2014 data breach. In 2014, Home Depot revealed that the data breach impacted 56 million customers across the US and Canada.

Retail 119
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Insurance Fraud is Evolving: So Must Our Response

Data Breach Today

Dennis Toomey explains why the industry must turn not only to sophisticated tools and technologies, but also unite around a strategy based on collaboration - in order to tackle insurance fraud.

Insurance 246
article thumbnail

Critical MobileIron RCE Flaw Under Active Attack

Threatpost

Attackers are targeting the critical remote code-execution flaw to compromise systems in the healthcare, local government, logistics and legal sectors, among others.

article thumbnail

Botnet Operators Drop Banking Trojans for Ransomware

Data Breach Today

Profits Drive Demand for Initial Access Brokers, Affiliates Driven by the profits to be achieved via ransomware, most botnet operators have dropped banking Trojans in favor of supporting and running crypto-locking malware attacks, according to security experts who spoke Wednesday at cybersecurity firm Group-IB's CyberCrimeCon 2020 virtual conference.

article thumbnail

Belden discloses data breach as a result of a cyber attack

Security Affairs

Belden, the manufacturer of networking and cable products, disclosed a data breach, threat actors have stolen employee and business information. The manufacturer of networking and cable products Belden disclosed a data breach, the company revealed that attackers gained “unauthorized access and copying of some current and former employee data, as well as limited company information regarding some business partners.”. “Belden was the target of a sophisticated attack by a party outside the co

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bringing Focus to Information Governance for Credit Unions via Credit Union Times

IG Guru

Photo by rupixen.com on Unsplash Check out the article here. The post Bringing Focus to Information Governance for Credit Unions via Credit Union Times appeared first on IG GURU.

article thumbnail

Look Beyond the 'Big 5' in Cyberattacks

Dark Reading

Don't ignore cyber operations outside US and European interests, researcher says. We can learn a lot from methods used by attackers that aren't among the usual suspects.

104
104
article thumbnail

Watch out, WAPDropper malware could subscribe you to premium services

Security Affairs

Researchers spotted a new mobile malware dubbed WAPDropper that subscribes users to legitimate premium-rate services. Security researchers from Check Point have spotted a new malware family dubbed WAPDropper that targets mobile phone users to subscribe them to legitimate premium-rate services. Check Point experts observed the WAPDropper subscribing unaware users to premium services from legitimate telecommunications providers in Malaysia and Thailand.

article thumbnail

Cyber Public Health

Schneier on Security

In a lecture, Adam Shostack makes the case for a discipline of cyber public health. It would relate to cybersecurity in a similar way that public health relates to medicine.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Top Enterprise Encryption Products

eSecurity Planet

Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.

article thumbnail

EU Parliament Approves Collective Redress Directive

Hunton Privacy

On November 24, 2020, the European Parliament endorsed the new directive on representative actions for the protection of the collective interests of consumers (the “ Collective Redress Directive ”). The Collective Redress Directive requires all EU Member States to put in place at least one effective procedural mechanism allowing qualified entities to bring representative actions to court for the purpose of injunction or redress.

article thumbnail

How To Keep Cybersecure Over the Holidays

Adam Levin

The holiday season is one of the busiest times of the year for scammers and hackers. Shoppers and philanthropists are both easier targets during the busy holiday season. The Covid-19 pandemic has meant increased virtual visits with loved ones, and of course remote work. The number of people willing to use their personal devices for holiday shopping has also increased as a result of the pandemic.

article thumbnail

Do You Know Who's Lurking in Your Cloud Environment?

Dark Reading

A security researcher explains the dangers of poor visibility in the cloud and a new strategy to evaluate IAM exposure in Google Cloud Platform.

Cloud 118
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Major BEC Phishing Ring Cracked Open with 3 Arrests

Threatpost

Some 50,000 targeted victims have been identified so far in a massive, global scam enterprise that involves 26 different malwares.

Phishing 108
article thumbnail

Why Security Awareness Training Should Be Backed by Security by Design

Dark Reading

Cybersecurity training needs an overhaul, though the training itself is only one small part of how security teams can influence user behavior.

article thumbnail

Metadata management best practices

Collibra

Metadata management is a cross-organizational agreement on how to define informational assets. The first blog of this series discusses how businesses are increasingly realizing the need for metadata management to drive data governance, compliance, collaboration and higher data quality. This blog focuses on the best practices for metadata management.

article thumbnail

Home Depot Agrees to Pay $17.5 Million in Multistate Settlement Following 2014 Data Breach

Hunton Privacy

On November 24, 2020, a multistate coalition of Attorneys General announced that The Home Depot, Inc. (“Home Depot”) agreed to pay $17.5 million and implement a series of data security practices in response to a data breach the company experienced in 2014. The $17.5 million payment will be divided among the 46 participating states and the District of Colombia.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Tips for Building a Robust Secure Coding Program

Rocket Software

Software code — whether it’s on mobile devices, personal computers, servers or mainframes — runs the risk of getting hacked. In turn, this can give hackers control of a device or application and lead to loss of user access, service and organizational secrets, and damage to the system. Although only 7 percent of software defects emerge from the coding phase, these defects can be costly and risky.

article thumbnail

Remote Training for Local Governments!

The Texas Record

We are excited to announce that we will be conducting free introductory records management classes via Zoom for local governments on: Local Governments: Records Management Basics Tuesday, December 15, 2020 – 9:00a.m.-12:00 p.m. (Central) – Register here! Register for classes by clicking on the links above! These classes will be free for local government employees in Texas until the end of 2020.

article thumbnail

Webinar Recap: The Results of Our Benchmark Survey on Collaboration Data and Corporate Readiness

Hanzo Learning Center

This fall, the team at Hanzo and the Association of E-Discovery Specialists (ACEDS) conducted a benchmark survey to learn how organizations were addressing what we broadly refer to as “collaboration data”—chat-based discussions and associated shared documents from platforms like Slack, Microsoft Teams, Google Chat, and more. We collected responses from a cross-section of different sizes and types of organizations, about half of which manage 10 or more ediscovery matters per month.