Wed.Oct 06, 2021

article thumbnail

Text Messaging Routing Firm Syniverse Reveals 5-Year Breach

Data Breach Today

Syniverse Routes Over 1 Trillion Messages Annually for AT&T, Verizon, Others Telecommunications service provider Syniverse, which routes 1 trillion messages annually for many of the world's mobile phone carriers, has disclosed a five-year breach of its systems, which handle call metadata and text messages. Experts say the exposed data poses serious criminal and espionage risks.

Metadata 293
article thumbnail

Exclusive: Researchers dumped Gigabytes of data from Agent Tesla C2Cs

Security Affairs

Resecurity researchers dumped Gigabytes of data from Agent Tesla C2Cs, one of the most well-known cyberespionage tools suffers a data leakage. Agent Tesla , first discovered in late 2014, is an extremely popular “malware-as-a-service” Remote Access Trojan (RAT) tool used by threat actors to steal information such as credentials, keystrokes, clipboard data and other information from its operators’ targets.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Video Game Streamer 'Twitch' Confirms Massive Data Breach

Data Breach Today

Reports: Platform's Entire Source Code Compromised in 125GB Leak Amazon-owned video streaming service Twitch, which focuses on video games and e-sports broadcasts, reportedly suffered a massive data breach, which the company vaguely confirmed via Twitter. A post on the anonymous online forum 4chan reportedly indicates that the entire platform was compromised.

article thumbnail

VMware ESXi Servers Encrypted by Lightning-Fast Python Script

Threatpost

The little snippet of Python code strikes fast and nasty, taking less than three hours to complete a ransomware attack from initial breach to encryption.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Medtronic Insulin Pump Devices Recalled Due to Serious Risks

Data Breach Today

FDA Warns Exploitation of Security Flaw Could Cause Death The Food and Drug Administration on Tuesday issued a warning notifying patients that medical device maker Medtronic has expanded a recall of remote controllers for certain wireless insulin pumps that were part of an earlier recall. The FDA has classified the recall as the most serious type due to issues that could result in serious injury or death.

Risk 345

More Trending

article thumbnail

Apache Fixes Zero-Day Flaw Exploited in the Wild

Data Breach Today

Shodan Search Shows 112,000 HTTP Servers Running Vulnerable Version Apache, a popular open-source web server software for Unix and Windows, says it has fixed a zero-day vulnerability in its HTTP server that it says has been exploited in the wild. The path traversal and file disclosure vulnerability only affects Apache HTTP servers upgraded to version 2.4.49.

IT 291
article thumbnail

Twitch source code and sensitive data leaked online

Security Affairs

An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent file posted on 4chan. An anonymous individual has leaked online the source code and streamers and users data of the popular video streaming platform Twitch. The anonymous 4chan user has published a torrent link to a 128GB file on the 4chan discussion board, the leaked archive contains sensitive data stolen from 6,000 internal Twitch Git repositories.

Archiving 108
article thumbnail

Understanding the Real Threat of Ransomware

Data Breach Today

Cybersecurity Specialist John Walker on How Attackers Work Cyber extortion through digital means is nothing new, says U.K.-based cybersecurity expert John Walker, but the concerning aspect of today's ransomware attacks is that they are "low-cost in the macro sense and so easy to achieve.

article thumbnail

OCR Guidance Regarding HIPAA’s Applicability to COVID-19 Vaccination Information

Hunton Privacy

On September 30, 2021, the U.S. Department of Health and Human Services’ (“HHS”) Office for Civil Rights (“OCR”) issued guidance regarding when the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy Rule applies to disclosures and requests for information about a person’s COVID-19 vaccination status. The guidance is a reminder that the HIPAA Privacy Rule applies only to HIPAA covered entities (and, in some cases, to their business associates) and does not apply to empl

Privacy 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Patient Safety Concerns Grow Over Medical Gear Security

Data Breach Today

Recent Cyber-Related Incidents Spotlight the Serious Potential Risks Facing Patients The expanded recall of insulin pump devices due to vulnerabilities that pose the risk of injury or death to patients and a recent malpractice lawsuit alleging that the effects of a ransomware attack led to a baby's death are the latest warnings of dangers posed by security issues in medical gear.

Security 184
article thumbnail

Data-driven development for autonomous driving with DXC Robotic Drive Cloud

DXC Technology

To develop, test and integrate modern, highly automated or even autonomous driving functions, new capabilities are required. One new and complex discipline is to be able to manage and to automatically process huge amounts of data. This article, based on a use case, shows how data-driven development of AI-based algorithms can be rapidly initiated and […].

Cloud 105
article thumbnail

California Privacy Protection Agency Appoints First Executive Director

Hunton Privacy

On October 4, 2021, the California Privacy Protection Agency (“CPPA”) appointed Ashkan Soltani as its first Executive Director. Soltani, a former chief technologist for the Federal Trade Commission and senior advisor to the White House, began his new role on Monday. He also is a distinguished fellow at the Georgetown Law Institute for Technology Law and Policy and the Georgetown Center on Privacy and Technology.

Privacy 105
article thumbnail

Twitch Gets Gutted: All Source Code Leaked

Threatpost

An anonymous user posted a link to a 125GB torrent to 4chan yesterday, containing all of Twitch's source code, comments going back to its inception and more.

IT 108
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Archives Month: Web Archive (WARC) File Format

The Texas Record

It’s October, which means that it is once again time to celebrate American Archives Month ! Throughout this month, the records management assistance unit will be taking a closer look into multidisciplinary issues that require input from both records managers and archivists— collaboration between these two professions is the key to solving many RIM-related obstacles.

article thumbnail

How Data Privacy Laws Vary by State

Zapproved

Consumer privacy feels more vital than ever, but very few states have laws on the books that protect consumer privacy in a relatable way. Following the 2018 passage of the California Consumer Privacy Act, other states rushed to draft their own versions of this wide-ranging consumer protection law. The singular goal of almost all these […].

Privacy 98
article thumbnail

Arizona governor announces the launch of Command Center to protect state computer systems

Security Affairs

The governor of Arizona, Doug Ducey, has announced the launch of a Cyber Command Center to address the thousands of attacks that daily target government computers. The governor of Arizona, Doug Ducey, has launched a Cyber Command Center to repel the huge amount of attacks that every day hit the computer systems of the state. The move is the response of the Arizona administration to hundreds of thousands of cyberattacks that hit the state.

article thumbnail

ESPecter Bootkit Malware Haunts Victims with Persistent Espionage

Threatpost

The rare UEFI bootkit drops a fully featured backdoor on PCs and gains the ultimate persistence by modifying the Windows Boot Manager.

106
106
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

5-Year Breach May Have Exposed Billions of Text Messages

Dark Reading

The attack affected Syniverse, a major telecom company that annually routes billions of text messages for hundreds of mobile carriers.

107
107
article thumbnail

Canopy Parental Control App Wide Open to Unpatched XSS Bugs

Threatpost

The possible cyberattacks include disabling monitoring, location-tracking of children and malicious redirects of parent-console users.

Security 101
article thumbnail

MacOS Security: What Security Teams Should Know

Dark Reading

As more macOS patches emerge and cybercriminals and nation-states take aim at the platform, experts discuss how macOS security has evolved and how businesses can protect employees.

article thumbnail

How Ransomware Uses Encryption – And Evolves

eSecurity Planet

Ransomware attacks are a huge concern these days, especially for corporate networks. Successful assaults can lead to locked up data and systems, as well as stolen and leaked data, bringing chaos to the targeted companies. Indeed, when the ransomware reaches its target, it’s practically game over. The malware encrypts files and spreads to the entire system to maximize damage, which forces companies to lock down the whole network to stop the propagation.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

EDRM Announces New Global Advisory Council 2021-2022 with Special Advisors and General Counsel

IG Guru

Check out the announcement here. The post EDRM Announces New Global Advisory Council 2021-2022 with Special Advisors and General Counsel appeared first on IG GURU.

article thumbnail

Aerospace, Telecommunications Companies Victims of Stealthy Iranian Cyber-Espionage Campaign

Dark Reading

Since at least 2018, "MalKamak" group has targeted firms in the Middle East, Russia, and other areas to steal sensitive data, security vendor says.

article thumbnail

A Devastating Twitch Hack Sends Streamers Reeling

WIRED Threat Level

The data breach apparently includes source code, gamer payouts, and more.

article thumbnail

How to Determine the Best Managed Cybersecurity Model for You

Dark Reading

Organizations need to protect against online threats in the most cost-effective manner possible. How do they determine the best managed cybersecurity model?

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Accelerate: The Thales Global Commitment to Helping Partners Drive Sales

Thales Cloud Protection & Licensing

Accelerate: The Thales Global Commitment to Helping Partners Drive Sales. divya. Thu, 10/07/2021 - 06:06. The Thales Accelerate Partner Network provides the skills and expertise needed to accelerate results and secure business with Thales technologies. Our program delivers focused training, profitable discount structures, and support. We take pride in offering partners’ best-in-class security solutions and services, while also empowering them to be successful and profitable in the selling, deliv

Sales 71
article thumbnail

A Culture of Unity Is Key to Solving the Cyber Challenge

Dark Reading

Lack of unity in vendor solutions and in security teams' culture are detrimental to a successful and productive security strategy.

article thumbnail

Accelerate: The Thales Global Commitment to Helping Partners Drive Sales

Thales Cloud Protection & Licensing

Accelerate: The Thales Global Commitment to Helping Partners Drive Sales. divya. Thu, 10/07/2021 - 06:06. The Thales Accelerate Partner Network provides the skills and expertise needed to accelerate results and secure business with Thales technologies. Our program delivers focused training, profitable discount structures, and support. We take pride in offering partners’ best-in-class security solutions and services, while also empowering them to be successful and profitable in the selling, deliv

Sales 71