Mon.Jan 30, 2023

article thumbnail

JD Sports Details Data Breach Affecting 10 Million Customers

Data Breach Today

Exposed: Online Customer Details, But Not Complete Payment Card Data JD Sports, a sports fashion retailer with global operations, says personal details pertaining to about 10 million online customers of JD Sports and its Size?, Millets, Blacks, Scotts and MilletSport brands from 2018 to 2020 have been stolen by attackers and warns customers to beware of scammers.

article thumbnail

Open Source Security Index Lists Top Projects

eSecurity Planet

Two venture investors have launched an index to track the most popular open source security projects. Chenxi Wang of Rain Capital and Andrew Smyth of Atlantic Bridge unveiled the Open Source Security Index last month. The website leverages GitHub application programming interfaces (APIs) to make “finding open-source security projects easier for everyone.” Anyone can go to the site to discover “the most popular and fastest-growing open-source security (OSS) projects.” OSS

Security 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HHS, AHA Warn of Surge in Russian DDoS Attacks on Hospitals

Data Breach Today

Alerts Come as Attack Threats Spike in Recent Days Government authorities and industry groups are warning the healthcare sector of ongoing distributed denial-of-service attacks on hospitals and other medical entities by Russian nuisance hacking group KillNet, whose name comes from a tool used to launch DDoS attacks.

article thumbnail

Russian and Iranian Spear Phishing Campaigns are Running Rampant in the UK

KnowBe4

The UK’s National Cyber Security Centre (NCSC) has described two separate spear phishing campaigns launched by Russia’s SEABORGIUM threat actor and Iran’s TA453 (also known as Charming Kitten). The NCSC says both threat actors have targeted entities in the UK, including “academia, defence, governmental organisations, NGOs, think-tanks, as well as politicians, journalists, and activists.

Phishing 109
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Are We Doomed? Not If We Focus on Cyber Resilience

Data Breach Today

In this episode of "Cybersecurity Unplugged," Patricia Muoio, a partner at SineWave Ventures, discusses the need for cyber resilience as security leaders face the inevitable stream of cybercrimes, how to achieve it through a zero trust approach, and how CISOs and the government can help.

More Trending

article thumbnail

Researcher received a $27,000 bounty for 2FA bypass bug in Facebook and Instagram

Security Affairs

A researcher disclosed technical details of a two-factor authentication bypass vulnerability affecting Instagram and Facebook. The researcher Gtm Manoz received a $27,000 bug bounty for having reported a two-factor authentication bypass vulnerability affecting Instagram and Facebook. The flaw resides in a component used by the parent company Meta for confirming a phone number and email address.

article thumbnail

Convincing, Malicious Google Ads Look to Lift Password Manager Logins

Dark Reading

Users searching for Bitwarden and 1Password's Web vaults on Google have recently reported seeing paid ads with links to cleverly spoofed sites for stealing credentials to their password vaults.

article thumbnail

QNAP addresses a critical flaw impacting its NAS devices

Security Affairs

Taiwanese vendor QNAP is warning customers to install QTS and QuTS firmware updates to address a critical flaw impacting its NAS devices. QNAP released QTS and QuTS firmware updates to address a critical vulnerability, tracked as CVE-2022-27596 (CVSS v3 score: 9.8), that affects QNAP NAS devices. A remote attacker can exploit the vulnerability to inject malicious code on QNAP NAS devices.

IT 98
article thumbnail

Building a Quantum-Safe Blockchain Today

Thales Cloud Protection & Licensing

Building a Quantum-Safe Blockchain Today divya Tue, 01/31/2023 - 06:18 Public-key cryptography is used to establish a distributed consensus of trust, which is essential for financial Blockchain solutions. While the chain itself is relatively secure, the “wallets” at the endpoints have already been demonstrated to be "hackable," and quantum computing techniques will further expose the network to fraudsters and criminals.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

JD Sports discloses a data breach impacting 10 million customers

Security Affairs

Sports fashion retail JD Sports discloses a data breach that explosed data of about 10M customers who placed orders between 2018 and 2020. UK sports fashion chain JD Sports disclosed a data breach that exposed customer data from orders placed between November 2018 and October 2020. The company discovered unauthorized access to a server that contained data related to order placed by 10 million customers. “JD Sports Fashion Plc (“JD Sports”) has been the target of a cyber incide

article thumbnail

Facebook Bug Allows 2FA Bypass Via Instagram

Dark Reading

The Instagram rate-limiting bug, found by a rookie hunter, could be exploited to bypass Facebook 2FA in vulnerable apps, researcher reports.

93
article thumbnail

Sandworm APT group hit Ukrainian news agency with five data wipers

Security Affairs

The Ukrainian (CERT-UA) discovered five different wipers deployed on the network of the country’s national news agency, Ukrinform. On January 17, 2023, the Telegram channel “CyberArmyofRussia_Reborn” reported the compromise of the systems at the Ukrainian National Information Agency “Ukrinform” The Ukrainian Computer Emergency Response Team (CERT-UA) immediately investigated the claims and as of January 27, 2023, found five samples of data wipers: CaddyWiper (Window

article thumbnail

Alert: Refund Scam Targeting Federal Agencies via RMM Software

KnowBe4

At least two federal civilian agencies were the unfortunate victims of a refund scam campaign, perpetrated through the use of remote monitoring and management (RMM) software. CISA, the NSA and the MS-ISAC discovered the campaign in October, but it appears the cybercriminals had been at work since June, and were still going strong in September.

IT 80
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Spotlight on 2023 DevSecOps Trends

Dark Reading

Solutions that provide more actionable results — remediation that frees up engineers, processes which integrate security into software development from its design, along with automation, IAC, and tool consolidation — are among the DevSecOps strategies that will prevail this year.

article thumbnail

Lights, Camera, AMC Action!

Micro Focus

This year the AMC Product Group have been delighted to welcome 15 new candidates onto the FY22 Application Modernisation and Connectivity (AMC) Engineering Graduate Programme. With intakes in both July and October, the successful candidates beat off the competition for the opportunity to join an intensive (but enjoyable!) training programme, to help kick start their.

71
article thumbnail

Russia's Sandworm APT Launches Swarm of Wiper Attacks in Ukraine

Dark Reading

The incidents are the latest indication of the growing popularity of dangerous disk wipers, created to disrupt and degrade critical infrastructure and other organizations.

72
article thumbnail

What is employee document management?

OpenText Information Management

What is employee document management? Employee document management is the practice of keeping an official record for all current and past employees. It includes all key documents generated or collected through the hire-to-retire lifecycle and is subject to multiple audits and controls. This information must remain private and protected, readily available to those who need … The post What is employee document management?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

California AG Announces CCPA Enforcement Sweep Aimed at Mobile Apps and Authorized Agent Requests

Hunton Privacy

On January 27, 2023, California Attorney General Rob Bonta announced a new enforcement sweep aimed at businesses with mobile apps and other businesses that fail to comply with the California Consumer Privacy Act (“CCPA”). The sweep focused on popular apps in the retail, travel and food service industries that allegedly fail to comply with, or do not provide a mechanism for, consumers’ requests to opt out of the sale of their personal information.

Sales 61
article thumbnail

Cybercrime Ecosystem Spawns Lucrative Underground Gig Economy

Dark Reading

The complex nature of cyberattacks has increased demand for software developers, reverse engineers, and offensive specialists — attracting workers facing financial insecurity.

85
article thumbnail

What is ML?

Jamf

In this blog series on AI, we delve into a subset of this technology called Machine Learning (ML) and how it’s designed to effectively “learn” from all manner of resources available to grow its understanding and skills. In the case of cybersecurity, ML can be taught to increase the security posture of your endpoints – and your organization’s overall network – by monitoring, identifying, hunting, detecting and remediating against known and unknown threats as pa

article thumbnail

Make information your superpower

OpenText Information Management

Have you ever pictured yourself as a superhero? Tall stance, hands on hips, cape waving behind you. Looks good, doesn’t it? At OpenText, we give you the tools to become a superhero by working smarter. Working hard delivers results but working smarter gets you better results faster. It helps you make the right decisions, focus … The post Make information your superpower appeared first on OpenText Blogs.

IT 58
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Untold Story of a Crippling Ransomware Attack

WIRED Threat Level

More than two years ago, criminals crippled the systems of London’s Hackney Council. It's still fighting to recover.

article thumbnail

Expanding Capstone Webinar

National Archives Records Express

Our office held a webinar for federal agencies on January 24, 2023. Topics presented in this webinar included: a discussion of NARA Bulletin 2023-02, Expanding the Use of a Role-Based Approach (Capstone) for Electronic Messages ; the expanded GRS 6.1, Email and Other Electronic Messages Managed under a Capstone Approach ; and the resubmission requirements for the form NA-1005, Verification for the Use of GRS 6.1.

52
article thumbnail

Make Developers the Driver of Software Security Excellence

Dark Reading

Those who are wrangling code every day could fuel a genuinely transformational approach to security — if they are adequately upskilled.

article thumbnail

NIST Is Updating Its Cybersecurity Framework

Schneier on Security

NIST is planning a significant update of its Cybersecurity Framework. At this point, it’s asking for feedback and comments to its concept paper. Do the proposed changes reflect the current cybersecurity landscape (standards, risks, and technologies)? Are the proposed changes sufficient and appropriate? Are there other elements that should be considered under each area?

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

10M JD Sports Customers' Info Exposed in Data Breach

Dark Reading

UK sportswear retailer asks exposed customers to stay "vigilant" against phishing attempts following cyberattack.

article thumbnail

Tenable's $25M Venture Capital Fund Seeks Early-Stage Firms

Data Breach Today

New Tenable Ventures Fund Focuses on Cloud, OT, Code, Identity and Backs 3 Startups Tenable has debuted a $25 million corporate investment program to support prevention-focused startups focused on technologies such as cloud, OT and identity. The Baltimore-area exposure management vendor says Tenable Ventures plans to scour Israel and the United States for startups.

Cloud 130
article thumbnail

Long Con Impersonates Financial Advisers to Target Victims

Dark Reading

Cybercriminals are co-opting the identities of legitimate US financial advisers to use them as fodder for relationship scams (aka "pig butchering"), which end with the theft of investments.

68