Tue.Nov 02, 2021

article thumbnail

Quantum Resistant Encryption – Are You Ready?

Thales Cloud Protection & Licensing

Quantum Resistant Encryption – Are You Ready? madhav. Tue, 11/02/2021 - 09:10. . Some good news and a couple of tips for being prepared. Over the past few months, a handful of Thales CPL clients have mentioned their concern regarding the future threat of quantum computing to their data security frameworks. If you take a good hard look at the risks arising from Quantum, there is bad news and good news.

article thumbnail

California Clinic Network Cyber Incident Affects 656,000

Data Breach Today

A Nevada Cancer Center Is Also Dealing With the Aftermath of an Attack A recent cyberattack on Community Medical Centers in Northern California has potentially compromised the information of more than 656,000 individuals. Meanwhile, Las Vegas Cancer Center reportedly fell victim to a ransomware attack during Labor Day weekend.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The ‘Groove’ Ransomware Gang Was a Hoax

Krebs on Security

A number of publications in September warned about the emergence of “ Groove ,” a new ransomware group that called on competing extortion gangs to unite in attacking U.S. government interests online. It now appears that Groove was all a big hoax designed to toy with security firms and journalists. “An appeal to business brothers!” reads the Oct. 22 post from Groove calling for attacks on the United States government sector.

article thumbnail

New Cybersecurity Norms for Wireless Device Makers in EU

Data Breach Today

European Commission: Guidelines Aim to Protect Wireless Privacy, Prevent Fraud Wireless device makers in the European Union market will soon have to adhere to a new set of cybersecurity guidelines at the design and production stages of manufacturing, according to the European Commission. The guidelines target devices such as mobile phones, tablets and other products.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Trojan Source attack method allows hiding flaws in source code

Security Affairs

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by a group of Cambridge researchers that can allow threat actors to hide vulnerabilities in the source code of a software project. The technique could be exploited to inject stealth malware without impacting the semantics of the source code while changing its logic. “We present a new type

Paper 142

More Trending

article thumbnail

50% of internet-facing GitLab installations are still affected by a RCE flaw

Security Affairs

Researchers warn of a now-fixed critical remote code execution (RCE) vulnerability in GitLab ‘s web interface actively exploited in the wild. Cybersecurity researchers warn of a now-patched critical remote code execution (RCE) vulnerability, tracked as CVE-2021-22205 , in GitLab’s web interface that has been actively exploited in the wild.

Metadata 135
article thumbnail

7 Trends: How Ransomware Operations Continue to Evolve

Data Breach Today

New Players and Rebranding Remain Constant, as Does Challenge of Operating Anonymously While ransomware remains many criminals' weapon of choice for reliably shaking down victims, the ransomware-attacker landscape itself continues to evolve in numerous ways, with a constant influx of fresh players, regular rebranding, as well as the challenge of cashing in cryptocurrency while staying anonymous.

article thumbnail

Google fixes actively exploited Zero-Day Kernel flaw in Android

Security Affairs

Google’s Android November 2021 security updates address a zero-day vulnerability in the Kernel that is actively exploited in the wild. Google’s Android November 2021 security updates addressed 18 vulnerabilities in the framework and system components and 18 issues in the kernel and vendor components. One of these issues, tracked as CVE-2021-1048, is a use-after-free (UAF) vulnerability in the kernel that could be exploited for privilege escalation.

Security 127
article thumbnail

US Treasury Department Says Stablecoins Must Be Regulated

Data Breach Today

Report Calls for Congressional Action to Address Risks With Fiat-Backed Tokens A new report from the U.S. Treasury Department urges Congress to "act promptly" to issue legislation that brings additional oversight to stablecoins, or crypto tokens pegged to fiat currencies. Federal officials say regulation should match that of traditional financial institutions - as a way to mitigate investor, market and cybersecurity risks, among others.

Marketing 246
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Google triples bounty for new Linux Kernel exploitation techniques

Security Affairs

Google is going to increase the bounty for finding and exploiting privilege escalation vulnerabilities in the Linux kernel. Good news for white hat hackers, Google is going to increase the bounty for demonstrating privilege escalation vulnerabilities in the Linux kernel. The payouts for privilege escalation exploits using a known vulnerability will be up to US$31,337, while zero-day exploits will be awarded a payout of $50,337.

Cloud 121
article thumbnail

How Hackers Are Targeting Cryptocurrency

Dark Reading

Crypto exchanges that want to maintain credibility must implement some of the same "know your customer" controls used by banks and similar institutions.

117
117
article thumbnail

The Toronto Transit Commission (TTC) hit by a ransomware attack

Security Affairs

A ransomware attack hit the systems at the Toronto Transit Commission public transportation agency and disrupted its operations. The Toronto Transit Commission announced on Friday that its systems have been infected with ransomware, the attack began on Thursday night and disrupted its activities. At this time, no ransomware gang has taken responsibility for the attack.

article thumbnail

IBM Moves Into EDR Market With ReaQta Acquisition

eSecurity Planet

IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its launch of an XDR product. Extended detection and response (XDR) has emerged in recent years as a unified enterprise security platform, a way for vendors to package their offerings together into a comprehensive cybersecurity solution.

Marketing 107
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

On Cell Phone Metadata

Schneier on Security

Interesting Twitter thread on how cell phone metadata can be used to identify and track people who don’t want to be identified and tracked.

Metadata 119
article thumbnail

Apple macOS Flaw Allows Kernel-Level Compromise

Threatpost

‘Shrootless’ allows bypass of System Integrity Protection IT security measures to install a malicious rootkit that goes undetected and performs arbitrary device operations.

Security 103
article thumbnail

Institutional Investor’s Introduction to Blockchain and Digital Asset Investing

Data Matters

Article I: Digital Asset Overview and Methods to Gain Exposure to Digital Assets . Given the growth of markets for cryptocurrencies and other blockchain-based assets, often referred to as “digital assets,” we see growing interest from traditional investment managers in gaining exposure to this emerging asset class. We have seen development of many new products and service offerings to facilitate institutional investment in digital assets over the past year.

article thumbnail

Facebook is going to shut down Face Recognition system and data it collected

Security Affairs

Facebook announced to shut down its Face Recognition system and is going to delete over 1 billion people’s facial recognition profiles. Facebook announced it will stop using the Face Recognition system on its platform and will delete over 1 billion people’s facial recognition profiles. Facebook is using the face recognition system to analyze photos taken of tagged users and associated users’ profile photos to automatically recognize them in photos and videos. “In the comi

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A Tale of Two Cities: The Right of Private Action in Data Protection in Singapore and Hong Kong

Data Protection Report

The Singapore High Court and the Hong Kong District Court have both considered the right to compensation for injury to feelings in two recent cases involving misuse of personal data but arrived at different conclusions. Singapore : In Bellingham, Alex v. Reed, Michael , Mr. Bellingham obtained the email addresses of his former employers’ customers without their consent and contacted them.

article thumbnail

Simulation Game Teaches Non-Security Staff How to Handle a Cyber Crisis

Dark Reading

In this card-based game from Kaspersky, players work through a cyberattack scenario and learn how each decision they make has consequences.

Security 111
article thumbnail

New FTC Policy Statement Targets Dark Patterns

Hunton Privacy

On October 28, 2021, the Federal Trade Commission announced the issuance of a new enforcement policy statement warning companies against using dark patterns that trick consumers into subscription services. The policy statement comes in response to rising complaints about deceptive sign-up tactics like unauthorized charges or impossible-to-cancel billing.

article thumbnail

Microsoft Expands Security to AWS in Multicloud Push

Dark Reading

Microsoft will expand its cloud security tools to AWS within a suite called Defender for Cloud and launch a new Defender for Business in preview later this month.

Security 101
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

US FTC Issues Final Rule for Safeguarding Customer Information for GLBA

IG Guru

FEDERAL TRADE COMMISSION16 CFR Part 314RIN 3084-AB35 Standards for Safeguarding Customer InformationAGENCY: Federal Trade Commission.ACTION: Final Rule. SUMMARY: The Federal Trade Commission (“FTC” or “Commission”) is issuing afinal Rule (“Final Rule”) to amend the Standards for Safeguarding Customer Information(“Safeguards Rule” or “Rule”). The amended Rule contains five main modifications tothe existing Rule.

IT 90
article thumbnail

Android Patches Actively Exploited Zero-Day Kernel Bug

Threatpost

Google’s Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.

article thumbnail

Ransomware gangs target companies involved in time-sensitive financial events, FBI warns

Security Affairs

The FBI warns of ransomware attacks on businesses involved in “time-sensitive financial events” such as corporate mergers and acquisitions. The Federal Bureau of Investigation (FBI) published a new private industry notification (PIN) to warn organizations of targeted ransomware attacks aimed at companies involved in “time-sensitive financial events” such as corporate mergers and acquisitions.

article thumbnail

FBI: Ransomware Actors Use Financial Events to Extort Victims

Dark Reading

Attackers research financial information about an organization and threaten to disclose it if they don't receive ransom quickly.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ransomware Gangs Target Corporate Financial Activities

Threatpost

The FBI is warning about a fresh extortion tactic: threatening to tank share prices for publicly held companies.

article thumbnail

A staged approach to achieving clinical data intelligence

OpenText Information Management

In 1925, inventor Hugo Gernsbacher suggested a remote control device for physicians and called it ‘Teledactyl,’ effectively predicting telemedicine nearly a century ago. Since then, healthcare innovation has accelerated to the point where the industry was able to deliver viable and safe COVID-19 vaccines in less than 12 months. How can clinical data intelligence help … The post A staged approach to achieving clinical data intelligence appeared first on OpenText Blogs.

IT 73
article thumbnail

Squid Game Crypto Scammers Rips Off Investors for Millions

Threatpost

Anti-dumping code kept investors from selling SQUID while fraudsters cashed out.

Security 106