Wed.Mar 31, 2021

article thumbnail

Biden's Infrastructure Plan: 3 Cybersecurity Provisions

Data Breach Today

Funding for Supply Chain Security, Electrical Grid Enhancements, R&D Projects with potential cybersecurity components included in the Biden administration's $2 trillion infrastructure spending proposal include upgrading the insecure electrical grid, addressing supply chain vulnerabilities and supporting research on artificial intelligence and quantum computing.

article thumbnail

GUEST ESSAY: Remote workforce exposures exacerbate cybersecurity challenges in 2021

The Last Watchdog

The start of 2021 brings forth a cyber security crossroads. Many people are in the process of shifting back into office operations while balancing the potential risks and benefits of remote work. Related: Breaches spike during pandemic. For some malicious hackers and IT experts, this could represent an opening. From the known compromise vectors to the most recent threats, hackers are constantly on the lookout for new strategies to bypass IT notice, out maneuver defense setups, and take advantage

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Victims Piling Up in Wake of Cloud Vendor Attack

Data Breach Today

Impact of Apparent Ransomware Attack on Netgain Technology Continues to Grow Months after an apparent ransomware attack against cloud hosting and managed service provider Netgain Technology, the list of healthcare sector entities reporting major health data breaches linked to the incident is growing.

Cloud 312
article thumbnail

Child Tweets Gibberish from U.S. Nuke Account

Threatpost

Telecommuting social-media manager for the U.S. Strategic Command left the laptop open and unsecured while stepping away.

Security 131
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Fighting SIM-Swap Fraud

Data Breach Today

JT Group's Clare Messenger on How Banks, Mobile Network Operators Can Collaborate Banks and mobile network operators should collaborate to mitigate the risks of SIM-swap fraud, which can lead to account takeovers, says Clare Messenger, global head of fraud protection at the U.K. telecom firm JT Group Ltd.

Risk 312

More Trending

article thumbnail

Iran-Linked Phishing Campaign Targeted Medical Researchers

Data Breach Today

Proofpoint: Attackers Tried to Harvest Microsoft Office Credentials The Iranian-linked threat group TA453, also known as Charming Kitten and Phosphorus, conducted a phishing campaign, dubbed "BadBlood," in late 2020 that targeted senior U.S. and Israeli medical researchers in an attempt to obtain their Microsoft Office credentials, according to Proofpoint.

Phishing 280
article thumbnail

The Bucketing Strategy as a Precautionary Solution

The Texas Record

Agencies or local governments that are tight on storage space might look forward to speedily carrying out disposition on records that have met their full retention periods, but there are cases when reaching a destruction eligibility date may not put the records manager in the clear to destroy or transfer those records. In those cases, having an eye toward assessing potential risks as records near their destruction eligibility dates has its benefits for anyone who has a responsibility for or a ne

article thumbnail

Buying Breached Data: When Is It Ethical?

Data Breach Today

Payment Information From WeLeakInfo Shows Security Companies Were Customers Security practitioners often tread a fine and not entirely well-defined legal line in collecting current and meaningful research. This research can also pose ethical questions when commercial sources for stolen data fall into a gray area.

IT 219
article thumbnail

Privacy: Professing Principles of Digital Ethics and Privacy

Information Governance Perspectives

For me, trust has to be earned. It’s not something that can be demanded or pulled out of a drawer and handed over. And the more government or the business sector shows genuine regard and respect for peoples’ privacy in their actions, as well as in their word and policies, the more that trust will come into being. The post Privacy: Professing Principles of Digital Ethics and Privacy appeared first on Rafael Moscatel.

Privacy 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

As SolarWinds Announces More Patches, Analysts Offer Advice

Data Breach Today

Experts Note Patching Alone Will Not Mitigate Threats Although SolarWinds has released a second round of patches for flaws in its Orion network monitoring platform that was targeted in a supply chain attack, some security experts say organizations need to go far beyond patching to manage the risks involved.

Risk 199
article thumbnail

OCR Continues to Settle HIPAA Right of Access Initiative Cases

Hunton Privacy

The U.S. Department of Health and Human Services (“HHS”) Office for Civil Rights (“OCR”) recently announced more settlements associated with its HIPAA Right of Access Initiative. The settlements with Village Plastic Surgery (“VPS”) and The Arbour, Inc. (“Arbour”) resulted in combined civil monetary penalties of $95,000. These latest actions bring the total number of actions taken by OCR under the HIPAA Right of Access Initiative to 18 and collectively have resulted in over $1 million

Access 98
article thumbnail

5-star customer service: fraudsters launch massive campaign against Indonesia’s major banks on Twitter

Security Affairs

Experts warn that cybercriminals are targeting Indonesia’s major banks posing as bank representatives or customer support team members on Twitter. Group-IB , a global threat hunting and adversary-centric cyber intelligence company, warns of an ongoing fraudulent campaign targeting Indonesia’s largest banks that cybercriminals run on social media with the ultimate goal of stealing bank customers’ money.

Risk 92
article thumbnail

83% of Businesses Hit With a Firmware Attack in Past Two Years

Dark Reading

A new Microsoft-commissioned report finds less than 30% of organizations allocate security budget toward preventing firmware attacks.

Security 110
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

North Korea-linked hackers target security experts again

Security Affairs

Researchers from Google’s Threat Analysis Group (TAG) reported that North Korea-linked hackers are targeting security researchers via social media. The cyberspies used fake Twitter and LinkedIn social media accounts to get in contact with the victims. Experts identified two accounts impersonating recruiters for antivirus and security companies.

article thumbnail

Apple, Google Both Track Mobile Telemetry Data, Despite Users Opting Out

Threatpost

Google’s Pixel and Apple’s iPhone both in privacy hot seat for siphoning mobile device data without consent.

Privacy 116
article thumbnail

Listening to the Voice of Our Clients: Informing strategies to drive a shared value future in the retail, consumer and services industry

CGI

Listening to the Voice of Our Clients: Informing strategies to drive a shared value future in the retail, consumer and services industry. In my previous blog, I talked about the pandemic accelerating the impetus for retail, consumer and services organizations to become truly digital. I also shared how this was a tremendous opportunity to reshape the future and offered six recommendations for retailers to accelerate their digital journey. shobana.lv@cgi.com.

Retail 85
article thumbnail

IETF deprecates TLS 1.0 and TLS 1.1, update to latest versions

Security Affairs

IETF has formally deprecated the TLS 1.0 and TLS 1.1 cryptographic protocols because they lack support for recommended cryptographic algorithms and mechanisms. The Internet Engineering Task Force (IETF) formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Both versions lack support for current and recommended cryptographic algorithms and mechanisms.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Future-proofing your business with the cloud

OpenText Information Management

It is no secret that technology has changed the way we work, socialize and learn. Most people cannot imagine their life or career without technology. These advancements are not slowing down, and the cloud is the platform needed to support many of them. The COVID-19 pandemic accelerated the adoption of cloud-based technology. Within a month … The post Future-proofing your business with the cloud appeared first on OpenText Blogs.

Cloud 77
article thumbnail

Chinese experts earned $20,000 for reporting a Chrome Sandbox Escape

Security Affairs

Researchers have reported to Google a sandbox escape vulnerability in the Chrome web browser to Google that awarded them $20,000. Experts from the Chinese cybersecurity company Qihoo 360 have reported to Google another sandbox escape vulnerability (CVE-2021-21194) affecting the Chrome web browser. The tech giant awarded the researchers Leecraso and Guang Gong from the 360 Alpha Lab at Qihoo 360 with a $20,000 payout.

article thumbnail

Advice From Security Experts: How to Approach Security in the New Normal

Dark Reading

Here are the biggest lessons they've learned after a year of work from home, and how they advise their counterparts at organizations to proceed as a result of those lessons.

article thumbnail

Free Webinar: Reducing the Costs & Mitigating the Risks of eDiscovery through Better Information Governance via ARMA Detroit on Wednesday, April 14 at 12pm Eastern

IG Guru

Are there major gaps in your IG program? Waiting until you are hit with litigation or other investigations to “discover” the holes in your information strategy exposes your organization to unnecessary costs and risks. An effective IG program accounts for likely uses of organizational information throughout its useful lifecycle, and that must include eDiscovery.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

APT Charming Kitten Pounces on Medical Researchers

Threatpost

Researchers uncover a credential-stealing campaign targeting genetic, neurology and oncology professionals.

article thumbnail

Weakness in EDR Tools Lets Attackers Push Malware Past Them

Dark Reading

A technique called hooking used by most endpoint detection and response products to monitor running processes can be abused, new research shows.

78
article thumbnail

Collibra and GCP: Driving Data Management Standards for Cloud Migration

Collibra

Organizations undergoing digital transformation need to leverage cloud infrastructure, platforms and software to accelerate their journeys. But transitioning to the cloud is not a simple process, particularly for those in regulated industries, or with a sprawl of legacy systems and technical debt to untangle. Data management plays a pivotal role in successful cloud adoption.

Cloud 59
article thumbnail

Top 5 Attack Techniques May Be Easier to Detect Than You Think

Dark Reading

New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years.

75
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Fraud Ring Launders Money Via Fake Charity Donations

Threatpost

The Cart Crasher gang is testing stolen payment cards while cleaning ill-gotten funds.

article thumbnail

What's So Great About XDR?

Dark Reading

XDR is a significant advance in threat detection and response technology, but few enterprises understand why. Omdia identifies four catalysts driving the emergence of XDR.

59
article thumbnail

Creating ForAllSecure’s Culture During A Pandemic

ForAllSecure

With one year of remote work under our belt, it’s a good time to look back on what we have accomplished in the People space here at ForAllSecure. Zoom lunch meetups and happy hours replaced team lunches and dinners, we celebrated company milestones virtually, welcomed new team members through our screens and slack channels, continued our work to make the world’s software safe, and reimagined what our company culture looks like in this new era of work.

Sales 52