Tue.Sep 15, 2020

article thumbnail

Breach of COVID-19 Test Data Undermines Pandemic Response

Data Breach Today

'Human Error' Results in 18,000 Individuals' Test Results Being Exposed in Wales What's one of the worst things that can happen during a pandemic? The answer is anything that gives people less reason to trust in their public health system to handle the crisis. Enter a data breach that has exposed personal information for everyone who's ever tested positive for the disease in Wales.

article thumbnail

[Podcast] Managing Modern Records, Managing Modern Teams

AIIM

This week brings another great episode of AIIM On Air , where we continue to explore the challenges, opportunities, and technologies that are driving digital transformation today. I was pleased to speak with Regina Martin , Records Manager at Howard County Government from Columbia, Maryland, in this episode. I caught up with Regina at the AIIM20 conference in Dallas earlier this year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Payment Card Skimming Hits 2,000 E-Commerce Sites

Data Breach Today

Researchers: Hackers May Have Used Magento Zero-Day Exploit From Friday through Monday, malicious JavaScript skimming code was injected into nearly 2,000 e-commerce sites that were running an older version of Adobe's Magento software, possibly resulting in the theft of payment card data, according to Sanguine Security.

Security 266
article thumbnail

One Data Scientist’s Quest to Quash Misinformation

WIRED Threat Level

Sara-Jayne Terp uses the tools of cybersecurity to track false claims like they’re malware. Her goal: Stop dangerous lies from hacking our beliefs.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Hackers Divert VA Payments Intended for Healthcare Providers

Data Breach Today

Fraud Scheme Exposes Data of 46,000 Veterans A security incident in which hackers used social engineering techniques to divert Department of Veterans Affairs payments intended for healthcare providers compromised the personal information of 46,000 U.S. veterans.

Security 245

More Trending

article thumbnail

Fighting Payment Fraud: Going Beyond Protecting Card Data

Data Breach Today

Mastercard's Sujay Vasudevan on the New Payment Fraud Trends Fighting payment fraud requires protecting far more than just payment data, says Sujay Vasudevan, vice president of cyber and intelligence solutions at Mastercard, who describe key steps.

157
157
article thumbnail

Microsoft open-sourced its Project OneFuzz fuzzing framework for Azure

Security Affairs

Microsoft released the Project OneFuzz, an open-source fuzzing framework for its cloud computing service Azure. Microsoft this week announced the release of the Project OneFuzz which is an open-source fuzzing framework for its cloud computing service Azure. The project was previously used by the IT giant to find vulnerabilities in the popular service. “Today, we’re excited to release this new tool called Project OneFuzz, an extensible fuzz testing framework for Azure.

IT 113
article thumbnail

Public Health Wales accidentally publishes 18,000 coronavirus patients’ data

IT Governance

Public Health Wales has confirmed that it accidentally published the personal data of 18,105 people who tested positive for coronavirus. The information was accessible on a publicly accessible server for 20 hours on 30 August. In most cases, patients’ initials, dates of birth, geographical area and gender were exposed, which fortunately presents little risk.

article thumbnail

Windows Exploit Released For Microsoft ‘Zerologon’ Flaw

Threatpost

Security researchers and U.S. government authorities alike are urging admins to address Microsoft's critical privilege escalation flaw.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Experts warn of surge in DDoS attacks targeting education institutions

Security Affairs

Experts warn of a surge in the DDoS attacks against education institutions and the academic industry across the world. While the popularity of online learning is increasing due to the ongoing Coronavirus pandemic, threat actors are launching distributed denial-of-service (DDoS) on education institutions and the academic industry across the world. The DDoS attacks are causing severe issues to the targeted education institutions such as temporarily takedown of the network and online classes.

Education 105
article thumbnail

MFA Bypass Bugs Opened Microsoft 365 to Attack

Threatpost

Vulnerabilities ‘that have existed for years’ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio.

article thumbnail

CBP Seized OnePlus Buds as ‘Counterfeit’ AirPods. Now It's Doubling Down

WIRED Threat Level

The US government has detained thousands of wireless earbuds on suspicion of being fake Apple goods—despite crystal clear branding from an established company.

IT 106
article thumbnail

Out-of-band security update fixes Adobe Media Encoder issu

Security Affairs

Adobe has released an out-of-band security update to address three ‘Important’ security vulnerabilities in the Adobe Media Encoder. Adobe has released an out-of-band security update for Adobe Media Encoder that addresses three ‘Important’ Information Disclosure flaws. The three vulnerabilities could be exploited by an attacker to access sensitive information that is leaked in the security of the active user.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

???????????DXC????????????????????????????????????????

DXC Technology

??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????? ???????????????????????????????????????????????????????????????????????IT???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

IT 98
article thumbnail

A Texas County Clerk’s Bold Crusade to Transform How We Vote

WIRED Threat Level

How Dana DeBeauvoir set off the biggest, weirdest, and most promising revolution in election technology since the 1800s.

Security 116
article thumbnail

Privacy Analysis of Ambient Light Sensors

Schneier on Security

Interesting privacy analysis of the Ambient Light Sensor API. And a blog post. Especially note the “Lessons Learned” section.

Privacy 103
article thumbnail

IBM Spectrum Protect Plus Security Open to RCE

Threatpost

Two bugs (CVE-2020-4703 and CVE-2020-4711) in IBM's Spectrum Protect Plus data-storage protection solution could enable remote code execution.

Security 100
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

China-linked hackers target government agencies by exploiting flaws in Citrix, Pulse, and F5 systems, and MS Exchange

Security Affairs

CISA published an advisory on China-linked groups targeting government agencies by exploiting flaws in Microsoft Exchange, Citrix, Pulse, and F5 systems. CISA published a security advisory warning of a wave of attacks carried out by China-linked APT groups affiliated with China’s Ministry of State Security. Chinese state-sponsored hackers have probed US government networks looking for vulnerable networking devices that could be compromised with exploits for recently disclosed vulnerabiliti

article thumbnail

The International Playbook for Foiling Russian Interference

WIRED Threat Level

The Kremlin has meddled in so many elections that democracy’s immune system has gotten wise to its threats. Here are lessons other countries can teach us.

IT 90
article thumbnail

QR Codes Serve Up a Menu of Security Concerns

Threatpost

QR code usage is soaring in the pandemic -- but malicious versions aren't something that most people think about.

Security 106
article thumbnail

How We’ll Know the Election Wasn’t Rigged

WIRED Threat Level

Whether you’re casting a ballot in person or by mail, there’s plenty to worry about. Mass voter fraud shouldn’t be on the list.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

More Cyberattacks in the First Half of 2020 Than in All of 2019

Dark Reading

The pandemic-related shift to remote work and the growing availability of ransomware-as-a-service were two major drivers, CrowdStrike says.

article thumbnail

Data Breaches Exposes Vets, COVID-19 Patients

Threatpost

Social engineering and employee mistakes lead to breach Veteran's Administration and the National Health Service.

article thumbnail

5 Security Lessons Humans Can Learn From Their Dogs

Dark Reading

Without the right reinforcements, you could be barking at the moon.

Security 121
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m speaking at the Cybersecurity Law & Policy Scholars Virtual Conference on September 17, 2020. I’m keynoting the Canadian Internet Registration Authority’s online symposium, Canadians Connected , on Wednesday, September 23, 2020. I’m giving a webinar as part of the Online One Conference 2020 on September 29, 2020.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CISA Issues Alert for Microsoft Netlogon Vulnerability

Dark Reading

CISA has issued an alert following the discovery of publicly available exploit code for Windows elevation of privilege flaw CVE-2020-1472.

121
121
article thumbnail

How an Australian cybersecurity firm helped decipher Zhenhua Data leak

The Guardian Data Protection

Canberra company recovered vast trove of information from corrupted China files When a group of international media organisations this week revealed details of a Chinese tech company’s vast database profiling millions of people around the globe, it was in no small part due to a small Australian cybersecurity firm established only last year. The Canberra-based firm, Internet 2.0, was co-founded by the cybersecurity expert Robert Potter, who was an adviser to the then Labor MP Gai Brodtmann when s

article thumbnail

Taking Security With You in the WFH Era: What to Do Next

Dark Reading

As many organizations pivot to working from home, here are some considerations for prioritizing the new security protocols.

Security 109