Thu.Oct 07, 2021

article thumbnail

New Bill Would Require Ransom Disclosure Within 48 Hours

Data Breach Today

Legislation Would Also Direct US DHS to Study Ransomware, Cryptocurrencies U.S. lawmakers have introduced legislation that would require the reporting of ransom payments within 48 hours of the transaction. The bill would also require DHS to create a voluntary website to log ransom payments and task the department with studying ransomware and cryptocurrencies.

article thumbnail

PoC exploit for 2 flaws in Dahua cameras leaked online

Security Affairs

A proof of concept exploit for two authentication bypass vulnerabilities in Dahua cameras is available online, users are recommended to immediately apply updates. Experts warn of the availability of proof of concept (PoC) exploit code for a couple of authentication bypass vulnerabilities in Dahua cameras, tracked as CVE-2021-33044 and CVE-2021-33045. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach of Syniverse Reveals Yet Another Supply Chain Attack

Data Breach Today

5-Year Intrusion Is the Latest Incident Involving Lesser-Known - Yet Key - Provider Who had heard of Syniverse before it recently disclosed a five-year breach, potentially exposing call-routing data and text messages for hundreds of mobile phone networks? The incident is just the latest supply chain attack to hit a lesser-known but nevertheless critical service provider.

IT 278
article thumbnail

New Regulations Are Coming — Get a Handle on Your App Portfolio

Dark Reading

With the realization that any app could be a gateway for a larger attack, there will be more pressure than ever on companies to fully protect their entire application landscape.

113
113
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

HHS Warns Healthcare Sector About LockBit 2.0 Threats

Data Breach Today

Ransomware Variant Updated; Group Claimed Credit for Accenture Attack Federal regulators are warning healthcare and public health sector organizations of potential attacks by the ransomware group LockBit 2.0 and its affiliates. The group claimed credit for the August attack on consultancy firm Accenture. What preventative steps should healthcare sector entities take?

More Trending

article thumbnail

US DOJ to Fine Contractors for Failure to Report Incidents

Data Breach Today

DOJ Also Announces Formation of National Cryptocurrency Enforcement Team The U.S. Department of Justice said this week it will pursue government contractors that fail to report cybersecurity incidents. The department also announced the formation of a Cryptocurrency Enforcement Team to prosecute the misuse of virtual currencies.

article thumbnail

Navy Warship’s Facebook Page Hacked to Stream ‘Age of Empires’ Gaming

Threatpost

The destroyer-class USS Kidd streamed hours of game play in a funny incident that has serious cybersecurity ramifications.

article thumbnail

Operation GhostShell: MalKamak APT targets aerospace and telco firms

Security Affairs

Operation GhostShell: Threat actors used ShellClient malware in cyberespionage campaigns aimed at companies in the aerospace and telecommunications sectors. Hackers use stealthy ShellClient malware on aerospace, telco firms. Cybereason Nocturnus and Incident Response Teams discovered a new threat actor that is targeting organizations in the aerospace and telecommunications sectors with the ShellClient malware as part of Operation GhostShell.

Military 110
article thumbnail

Catches of the month: Phishing scams for October 2021

IT Governance

Welcome to our monthly review of phishing scams, in which we examine the latest campaigns and the tactics being used by cyber criminals to fool you into handing over your information. This month, we concentrate on scams affecting banking and the financial sector, and why 2FA (two-factor authentication) isn’t as secure as you might think (although it’s still better than nothing).

Phishing 105
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison

The Security Ledger

Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related Stories Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson Spotlight: When Ransomware Comes Calling Spotlight: Is There A Cure For InfoSec’s Headcount Headache?

article thumbnail

SEC Settles with Alternative Data Provider for $10 Million

Hunton Privacy

On September 14, 2021, the Securities and Exchange Commission (“SEC”) announced that analytics firm, App Annie Inc., and its co-founder and former CEO and Chairman Bertrand Schmitt, agreed to pay approximately $10 million to settle securities fraud charges for engaging in deceptive practices and making material misrepresentations about “alternative data” sold by the company.

article thumbnail

Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson

The Security Ledger

Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Roberts. Click the icon below to listen. Related Stories Spotlight: When Ransomware Comes Calling Spotlight: Is There A Cure For InfoSec’s Headcount Headache?

article thumbnail

Saudi Arabia’s New Data Protection Law – What you need to know

DLA Piper Privacy Matters

The Middle East’s data protection regulatory landscape is complex, and continues to develop with Saudi Arabia’s ( KSA ) newly published Personal Data Protection Law ( PDPL ). While the PDPL contains the main features of a modern data protection law, it cannot be considered a direct analogue of the GDPR. For example, an unlawful transfer of personal data outside of KSA can result in a criminal conviction and imprisonment.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Microsoft: 58% of Nation-State Cyberattacks Come From Russia

Dark Reading

A wealth of Microsoft data highlights trends in nation-state activity, hybrid workforce security, disinformation, and supply chain, IoT, and OT security.

IoT 109
article thumbnail

Twitch data breach updates: login credentials or card numbers not exposed

Security Affairs

An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent file posted on 4chan. An anonymous 4chan user has published a torrent link to a 128GB file on the 4chan discussion board, the leaked archive contains sensitive data stolen from 6,000 internal Twitch Git repositories. The leaker, who used the #DoBetterTwitch hashtag, claims to have leaked the data in response to harassment raids targeting the platform streamers this summer.

article thumbnail

HP Extends Security Features to Work-from-Home Devices

Dark Reading

HP aims to let admins secure work-from-home endpoints by extending cloud security management that can remotely track, detect and self-heal remote company devices -- including printers.

article thumbnail

4 Key Questions for Zero-Trust Success

Threatpost

Anurag Kahol, CTO & co-founder at Bitglass, offers tips for avoiding implementation pitfalls for zero trust.

Cloud 95
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Rapid RYUK Ransomware Attack Group Christened as FIN12

Dark Reading

Prolific ransomware cybercrime group's approach underscores a complicated, layered model of cybercrime.

article thumbnail

The Risks and Benefits of Ephemeral Messages

eDiscovery Daily

What are Ephemeral Messages? In the corporate world, Gmail, Microsoft Teams, and Slack are the most common forms of communication. Though these platforms are traditional and efficient, they create privacy and storage challenges. Ephemeral messages counteract these issues by disappearing shortly after the recipient has read the message. [1]. Platforms with disappearing messages: Snapchat.

Risk 78
article thumbnail

New Kaspersky Service Delivers Cyberthreat Insights on Request

Dark Reading

Kaspersky's new Ask the Analyst service will allow businesses to reach out to the company's researchers for their opinions and guidance on cyberthreats and security issues.

article thumbnail

Book Recommendation: Cybersecurity for Grandparents: Q3 2021 Edition: Credit Reports, Device Updates, and Social Media

IG Guru

In honor of Grandparents Day 2021, Privacy & Security Brainiacs created this 3-volume set of booklets to review with loved ones to help them better protect their personal data, devices, and privacy. While some seniors are quite savvy when it comes to protecting their online security, others may not be as security or privacy savvy […]. The post Book Recommendation: Cybersecurity for Grandparents: Q3 2021 Edition: Credit Reports, Device Updates, and Social Media appeared first on IG GURU

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Apple iOS 15’s new privacy features that industries should know

Data Protection Report

Apple recently released the latest version of its iPhone operating system, iOS 15. While iOS 15 currently has only a 15% adoption rat e , the new operating system brings a slew of new features that are privacy-specific and can impact businesses. Read more on the NT Analyzer blog.

Privacy 57
article thumbnail

Former Google Employees Launch Supply Chain Security Startup

Dark Reading

Chainguard aims to make the software supply chain secure by default as supply chain-focused attacks continue to rise.

article thumbnail

Everything You Need to Know to Find a Great Client Portal Provider

OneHub

What is a client portal? Client portals , or customer portals, are secure digital workspaces that companies use to share information, communicate, and collaborate with clients. Clients access this area by logging into the portal from your business website. . Once they’ve logged in, your customers will be able to access the documents you’ve made available to them.

article thumbnail

CyberArk Leads the PAM Omdia Universe

Dark Reading

With more staff working remotely, privileged access management (or PAM) has never been more important. Market forecasts, drivers, and trends are explored.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Paving the path to a digitalized energy system

CGI

The role of data and digitalization in energy and climate transitions is unquestionably growing. As other sectors look to accelerate their own journeys toward net zero by decarbonizing their energy use, the energy sector is increasingly recognized to be at the vanguard of the battle to limit climate change.

52
article thumbnail

Meet Team Hanzo: Gerardo Madrid, Bringing Empathy & Creativity To Help People Thrive At Work

Hanzo Learning Center

As Hanzo celebrates National Hispanic Heritage Month , I have the excellent opportunity to highlight another fellow team member representing the Hispanic community. This month, I am featuring Gerardo Madrid. He's a genuinely kind, hard-working person who also happens to have some phenomenal artisanal talents that make me crave going to New York and meeting him in person.

52
article thumbnail

Hong Kong: Bill to combat doxxing acts passed

Data Protection Report

The Personal Data (Privacy) (Amendment) Bill 2021 (the Bill ) aimed at combatting doxxing in Hong Kong was passed on 29 September 2021. As discussed in our earlier post , the Bill amends the Personal Data (Privacy) Ordinance ( PDPO ) by: introducing offences to criminalize doxxing acts; empowering the Privacy Commissioner for Personal Data (the Commissioner ) to conduct criminal investigations and institute prosecution for doxxing cases; and. conferring on the Commissioner’s statutory powers to