Tue.Mar 17, 2020

article thumbnail

Coronavirus Widens the Money Mule Pool

Krebs on Security

With many people being laid off or working from home thanks to the Coronavirus pandemic, cybercrooks are almost certain to have more than their usual share of recruitable “ money mules ” — people who get roped into money laundering schemes under the pretense of a work-at-home job offer. Here’s the story of one upstart mule factory that spoofs a major nonprofit and tells new employees they’ll be collecting and transmitting donations for an international “Corona

Security 326
article thumbnail

DOD Warns of Cyber Risks as Employees Work From Home

Data Breach Today

Defense Department to Issue Detailed Security Guidance As more of its employees shift to working from home due to the COVID-19 pandemic, the U.S. Department of Defense is warning workers to take security precautions to guard against potential hackers. It plans to release detailed guidance soon.

Risk 313
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[Podcast] Pepsi's AP Automation Case Study

AIIM

I don't know about you, but when I think of Pepsi, I think of cool and refreshing. In fact, the last thing to come to mind is labor-intensive. But, for the staff at PepsiCo's Imaging Technology - the creator of document imaging and management solutions for PepsiCo’s worldwide network of business entities - labor-intensive, time-consuming, and error-prone were exactly what they were experiencing.

Libraries 125
article thumbnail

COVID-19 Response: 5 Tips for Securing Remote Workplace

Data Breach Today

It's no exaggeration to say that, in the midst of the COVID-19 pandemic, we now have the largest-ever global remote workforce. And with it comes an expanded attack surface that requires extra attention. Phil Reitinger of the Global Cyber Alliance shares five tips for securing the remote workforce.

Security 247
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

NEW TECH: Can MPC — Multi Party Computation — disrupt encryption, boost cloud commerce?

The Last Watchdog

Encryption is a cornerstone of digital commerce. But it has also proven to be a profound constraint on the full blossoming of cloud computing and the Internet of Things. Related: A ‘homomorphic-like’ encryption solution We know very well how to encrypt data in transit. And we’ve mastered how to encrypt — and decrypt — data at rest.

More Trending

article thumbnail

Using Enterprise Architecture, Data Modeling & Data Governance for Rapid Crisis Response

erwin

Because of the coronavirus pandemic, organizations across the globe are changing how they operate. Teams need to urgently respond to everything from massive changes in workforce access and management to what-if planning for a variety of grim scenarios, in addition to building and documenting new applications and providing fast, accurate access to data for smart decision-making.

article thumbnail

Security Firm Checkmarx Getting New Owner

Data Breach Today

Deal Values the Company at $1.15 Billion Checkmarx, an Israeli security company that has made its mark in DevOps and application security testing, soon will have a new owner. Private equity firm Insight Partners is selling the company to another private equity firm, Hellman & Friedman, in a $1.15 billion deal.

Security 222
article thumbnail

Ursnif campaign targets Italy with a new infection Chain

Security Affairs

Malware researchers from Cybaze-Yoroi ZLab have uncovered a new Ursnif campaign that is targeting Italy with a new infection chain. Introduction. Ursnif is one of the most and widespread common threats today delivered through malspam campaigns. It appeared on the threat landscape about 13 years ago and gained its popularity since 2014 when its source code was leaked online giving the opportunity to several threat actors to develop their own version.

Archiving 124
article thumbnail

ACLU Files Lawsuit Over Facial Recognition at US Airports

Data Breach Today

Civil Liberties Group Wants More Clarity From DHS The ACLU has filed a Freedom of Information Act lawsuit against the Department Of Homeland Security and three of its agencies in an effort to learn more about how the department uses facial recognition technology at airports and the country's borders.

Security 187
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hackers exploit coronavirus fears as cyber attacks soar

IT Governance

Cyber security experts have found that the 2019 novel coronavirus (COVID-19) has led to a surge in phishing scams , with both individuals and organisations at risk. Things could get worse in the coming weeks, as organisations scramble to find solutions for the disruption that COVID-19 is causing. For example, millions of employees will likely to be forced to work remotely, as the UK government prepares for a lockdown scenario.

Phishing 114
article thumbnail

Why Not MFA?

Data Breach Today

In cybersecurity circles, multi-factor authentication today is considered table stakes. Yet, many organizations and users are hesitant to embrace MFA because of friction or other concerns. Corey Nachreiner and Marc Laliberte of WatchGuard Technologies dispel some of the MFA myths.

article thumbnail

Most ransomware attacks take place outside the working hours

Security Affairs

Most of the ransomware attacks targeting the enterprises occur outside working hours, during the nighttime or during the weekend. Security experts from FireEye published an interesting report on the Ransomware deployment trends, it revealed that most of the attacks (76%) against the enterprise sector occur outside working hours. FireEye compiled the report using data from dozens of ransomware infections that it has investigated from 2017 to 2019. 49% of the ransomware deployments take place duri

article thumbnail

COVID-19: HHS Issues Limited HIPAA Waivers

Data Breach Today

Designed to Improve Patient Care Through Telehealth, Including Video Chats The Trump administration on Tuesday announced immediate limited waivers of certain HIPAA privacy provisions to help improve patient care during the growing COVID-19 pandemic. For example, it's now OK for providers to offer telehealth services through certain applications that allow for video chats.

Privacy 170
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Corporate Finance firms leak 500K+ legal and financial documents online

Security Affairs

Security experts from vpnMentor have discovered two corporate finance companies that leak half a million legal and financial documents online. vpnMentor experts uncovered a database exposed online on Amazon Web Services (AWS) that is leaking a huge amount of sensitive legal and financial documents. “Whatever the intended purpose of this database was, over 500,000 highly sensitive and private legal and financial documents were exposed, compromising numerous parties to the risk of fraud and

article thumbnail

COVID-19: How to Adjust Business Continuity Plans

Data Breach Today

The COVID-19 pandemic present new challenges to healthcare IT and security teams, including the need to reassess and adjust business continuity plans, says Christopher Frenz, who leads information security at New York's Interfaith Medical Center. He's chair of an industry committee that developed guidance.

article thumbnail

Operators behind Nefilim Ransomware threaten to release stolen data

Security Affairs

Operators behind a new piece of ransomware dubbed Nefilim have started threatening victims to release stolen data like other cybercrime gangs. A new ransomware dubbed Nefilim appeared in the threat landscape at the end of February, it borrows its code from other malware, the Nemty ransomware. The main difference between the two threats is that Nefilim doesn’t include the Ransomware-as-a-Service (RaaS) component and doesn’t use Tor for the payment process.

article thumbnail

Free Threat Modeling Training

Adam Shostack

The current situation is scary and anxiety-provoking, and I can’t do much to fix that. One thing I can do is give people a chance to learn, and so I’m making my Linkedin Learning classes free this week. (I’m told that each class is free for the day, so you’ll need to watch each within a day of starting the course.). These links should open the courses (and as I understand it, start the clock).

IT 98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The parabola of a prolific cyber-criminal known as Dton

Security Affairs

Check Point researchers detailed the activity of a prolific cyber-criminal known as ‘Dton’ that earned at least $100,000 US from his operations. Over the past few months, experts at Check Point have monitored the activity of a prolific cyber-criminal known as ‘ Dton ’. The man is active at least since 2013 and already earned at least $100,000 US from his ‘work,’ but researchers believe he has earned several times that amount.

Sales 102
article thumbnail

Security Lessons We've Learned (So Far) from COVID-19

Dark Reading

Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times.

Security 121
article thumbnail

Attackers use a new CoronaVirus Ransomware to cover Kpot Infostealer infections

Security Affairs

Coronavirus -themed attacks continue to increase, experts observed new Coronavirus ransomware that acts as a cover for Kpot Infostealer. Last week, security experts from MalwareHunterTeam detected new ransomware dubbed CoronaVirus has been distributed through a malicious web site that was advertising a legitimate system optimization software and utilities from WiseCleaner.

article thumbnail

A COVID-19 Cybersecurity Poll: Securing a Remote Workforce

Threatpost

COVID-19 is changing how we work. Weigh in on how your organization is securing its remote footprint with our short Threatpost poll.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Overcoming barriers to business transformation – reflections on our enterprise survey

DXC Technology

About that business transformation journey that companies are on … what’s really happening? Are companies making real progress toward their transformation goals or are they stuck in a holding pattern? Are they believers or doubters? Leaders or followers? Our recent global survey of business leaders, “Connecting digital islands: Bridging the business transformation gap,” would suggest […].

article thumbnail

Working Remotely? Remember to Secure Your Webcam

Adam Levin

The COVID19 pandemic, also known as the novel coronavirus, has affected daily life in unprecedented ways. Because of home-work and homeschooling measures, millions of Americans are using video conferencing for the first time. With this surge in new users, there will be many cyber security challenges. Workplace meetings, college classes, and even children’s playdates are now being held via webcam in the hopes of preventing the spread of the virus.

article thumbnail

CNIL Unveils 2020 Inspection Strategy and Announces Cookie Investigations

Hunton Privacy

On March 12, 2020, the French Data Protection Authority (the “CNIL”) released its annual inspection strategy for 2020. The CNIL carries out approximately 300 inspections every year. These inspections are initiated (1) following complaints lodged with the CNIL; (2) in light of current topics in the news; (3) after the CNIL has adopted corrective measures ( e.g. , formal notices, sanctions) in order to verify whether the organization in question adopted the measures or remedied the situation; and

article thumbnail

Doing Well By Doing The Right Thing: How The CCPA Is Good For Businesses And Consumers

Reltio

The California Consumer Privacy Act (CCPA), the sweeping piece of legislation designed to enhance the privacy rights of California consumers, was signed into law more than 18 months ago and enacted on January 1 of this year. How is it that many companies doing business in California are still not compliance-ready? This is a bad state of affairs for a few reasons.

GDPR 78
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Many Ransomware Attacks Can be Stopped Before They Begin

Dark Reading

The tendency by many attackers to wait for the right time to strike gives defenders an opening, FireEye says.

article thumbnail

Where to get credits now that conferences are canceled: IG GURU

IG Guru

Valued Reader, The past few days have been eye opening to say the least. COVID-19 will most certainly go down as the pandemic we all remember. As we adjust to the new, and hopefully temporary normal, I want you to know we here at IG GURU are with you. Many of you planned on earning […]. The post Where to get credits now that conferences are canceled: IG GURU appeared first on IG GURU.

72
article thumbnail

InfoSec Pros Uncertain About Relationships With Partner Security Teams

Dark Reading

Only half of respondents to a recent Dark Reading study felt confident that their third-party business partners would, at least, tell them if a compromise occurred.