Tue.Sep 22, 2020

article thumbnail

Cybercrime Review: Hackers Cash in on COVID-19

Data Breach Today

Phishing, Spam, Malware, Social Engineering and Other Recent Attack Trends Reviewing online attack trends for the first half of the year, numerous cybersecurity firms agree: COVID-19 was king. As the pandemic has reshaped how many live and work, so too has it driven attackers to attempt to exploit work-at-home challenges and virus fears.

Phishing 363
article thumbnail

Can Schools Pass Their Biggest Cybersecurity Test Yet?

Dark Reading

Understaffed, underfunded, and underequipped, IT teams in the K-12 sector face a slew of challenges amid remote and hybrid learning models. Here's where they can begin to protect their schools against cyberattacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Dark Overlord' Hacker Sentenced to 5-Year Prison Term

Data Breach Today

British Man Switches to Guilty Plea in Case Tied to Several Healthcare Hacks A U.K. resident who was a member of The Dark Overlord hacking group pleaded guilty to federal charges Monday and was sentenced to five years in prison, according to the U.S. Justice Department. The group targeted several healthcare organizations and others.

317
317
article thumbnail

179 Arrested in Massive Global Dark Web Takedown

WIRED Threat Level

Operation Disruptor is an unprecedented international law enforcement effort, stemming from last year’s seizure of a popular underground bazaar called Wall Street Market.

Marketing 140
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

179 Arrested in Darknet Market Crackdown

Data Breach Today

Authorities Seize Virtual Currency, Drugs, Firearms An international coalition of police agencies made 179 arrests and seized virtual currency, cash and drugs based on intelligence gathered from earlier takedowns of the Wall Street and Alphabay darknet marketplaces.

Marketing 307

More Trending

article thumbnail

Will US Indictments of Iranian Hackers Be a Deterrent?

Data Breach Today

Security Experts Offer an Analysis of the Impact Will recent U.S. indictments of several alleged Iranian hackers - as well as government sanctions against an APT group - have a deterrent effect? Security experts share their opinions on the impact of these actions.

article thumbnail

Facebook says it may quit Europe over ban on sharing data with US

The Guardian Data Protection

EU court in July ruled there were insufficient safeguards against snooping by US intelligence agencies Facebook has warned that it may pull out of Europe if the Irish data protection commissioner enforces a ban on sharing data with the US, after a landmark ruling by the European court of justice found in July that there were insufficient safeguards against snooping by US intelligence agencies.

IT 127
article thumbnail

Cybersecurity Leadership: Risk Exposure Awareness

Data Breach Today

CEOs and CISOs on Assessing and Mitigating the New Risk Landscape It might be new, but are we ready to call this "normal?" In this latest in a series of CEO/CISO panels, cybersecurity leaders talk frankly about the new risk surface and the role emerging technologies play in helping us keep pace with our adversaries.

Risk 284
article thumbnail

Operation DisrupTor: police arrested 179 vendors engaged in the sale of illicit good

Security Affairs

A global police sting dubbed Operation DisrupTor targeted vendors and buyers of illicit goods on the dark web, Europol announced. A coordinated operation conducted by law enforcement agencies across the world, dubbed Operation DisrupTor, targeted vendors and buyers of illicit goods on the dark web. The operation, led by the German federal criminal police, saw the participation of law agencies from Austria, Britain, Germany, the Netherlands, Sweden, and the United States.

Sales 124
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Leaked FinCEN Reports Reveal Sensitive Security Details

Data Breach Today

Suspicious Activity Reports Reveal Tools and Techniques to Adversaries, Experts Warn What will be the impact of the leak of investigatory documents from FinCEN - the U.S. Treasury Department's Financial Crimes Enforcement Network? For starters, experts warn that FinCEN reports may reveal sensitive information tied to banks and law enforcement agencies' investigatory tools and tactics.

Security 270
article thumbnail

A member The Dark Overlord group sentenced to 5 years in prison

Security Affairs

A United Kingdom national, member of ‘The Dark Overlord’ hacking group was sentenced to five years in federal prison, announced the US DoJ. The United Kingdom national Nathan Wyatt (39), a member of ‘The Dark Overlord’ hacking group, was extradited to the United States in December 2019. The man was charged by U.S. authorities on six counts of aggravated identity theft, threatening to damage a protected computer, and conspiracy.

article thumbnail

Hefty HIPAA Fine After Breach Involving 'The Dark Overlord'

Data Breach Today

Regulator: Georgia Clinic Showed 'Systemic Noncompliance' Federal regulators have announced a $1.5 million HIPAA settlement with a Georgia orthopedic clinic stemming from a 2016 breach involving The Dark Overlord hacking group. The case serves as a warning of the potentially hefty cost of failure to implement a comprehensive HIPAA compliance program.

article thumbnail

Amazon Delivery Drivers Hacking Scheduling System

Schneier on Security

Amazon drivers — all gig workers who don’t work for the company — are hanging cell phones in trees near Amazon delivery stations, fooling the system into thinking that they are closer than they actually are: The phones in trees seem to serve as master devices that dispatch routes to multiple nearby drivers in on the plot, according to drivers who have observed the process.

IT 107
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Continuously Validate Security to Maximize the Value of Your Investments

Data Breach Today

The 2020 Security Effectiveness Report shares our findings from an evaluation of 100+ enterprise production environments globally across every major vertical.

Security 246
article thumbnail

Swiss Parliament Fails to Reach Agreement on New Swiss Data Protection Act

Data Matters

In 2017, the Swiss government issued a draft bill for a new Swiss Data Protection Act (“nDPA”) with two main goals: (1) to enhance the level of protection of personal data provided in the current Swiss Data Protection Act which dates back to 1992 (largely, to align with the EU GDPR); and (2) to ensure that there is an “adequate” level of data protection to allow for the continued flow of personal data from the EEA to Switzerland.

article thumbnail

CISA Pushes Government Agencies to Patch 'Zerologon' Flaw

Data Breach Today

Federal Agencies Need to Report Compliance by Wednesday U.S. government agencies are supposed to have now patched the "Zerologon" vulnerability by now, about six weeks after Microsoft issued a patch. CISA warns that too many systems remain unpatched.

article thumbnail

Interview with the Author of the 2000 Love Bug Virus

Schneier on Security

No real surprises, but we finally have the story. The story he went on to tell is strikingly straightforward. De Guzman was poor, and internet access was expensive. He felt that getting online was almost akin to a human right (a view that was ahead of its time). Getting access required a password, so his solution was to steal the passwords from those who’d paid for them.

Passwords 105
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Unlocking the Five Steps to Proper Security Validation

Data Breach Today

Continuously Validate Security to Maximize the Value of Your Investments The 2020 Security Effectiveness Report shares our findings from an evaluation of 100+ enterprise production environments globally across every major vertical.

Security 204
article thumbnail

German investigators blame Russian DoppelPaymer gang for deadly hospital attack

Security Affairs

The investigation of German authorities on the recent attack on the Dusseldorf hospital reveals the possible involvement of Russian hackers. Last week, German authorities revealed that a cyber attack hit a major hospital in Duesseldorf, the Duesseldorf University Clinic, and a woman who needed urgent admission died after she had to be taken to another city for treatment.

article thumbnail

The latest from DXC’s Applied AI Studio: A chatbot to help remote workers de-stress

DXC Technology

Lee, an online personal counselor, helps employees who struggle with feelings of mild anxiety or loneliness while working from home. Rather than cope alone, they talk with Lee to destress. “You’re lonely?” Lee might say. “I’m sorry about that. Can you tell me more about how you’re feeling?” Those words might not seem surprising from […]. The post The latest from DXC’s Applied AI Studio: A chatbot to help remote workers de-stress appeared first on DXC Blogs.

article thumbnail

COVID-19 Health Screening Records

The Texas Record

Note: This article only applies to local governments and state agencies that are not healthcare providers. Any public health agencies, public hospitals, or health departments should follow the retention periods in Schedule HR (for local governments) or in their specific agency retention schedule. Since the start of the 2020 pandemic, many organizations have started collecting information on the people visiting their facilities: temperature checks, symptom reporting, test results, etc.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Data of 540,000 Sports Referees, League Officials Compromised

Adam Levin

The personal information of 540,000 sports referees, league officials, and school representatives has been compromised following a ransomware attack targeting a software vendor for the athletics industry. ArbiterSports, a software provider for several sports leagues including the NCAA, announced that it had averted a ransomware attack in July 2020, but despite blocking the attempt to encrypt their systems, the company discovered that a database backup had been accessed prior to the attack.

article thumbnail

Is the Coronavirus Forcing Your Business to Go Paperless?

Record Nations

Currently, the coronavirus is forcing businesses who are traditionally paper-based to suddenly transition into a paperless way of managing things. While there are many benefits to a paperless office, it can be difficult to navigate the transition. While there are many benefits to a paperless office, there are also many aspect which are similar to […].

Paper 98
article thumbnail

Attackers Target Small Manufacturing Firms

Dark Reading

The most common tactics include credential stuffing using valid accounts, various forms of deception, and vulnerabilities in third-party software, Rapid7 says in its latest quarterly threat report.

article thumbnail

Google Cloud Buckets Exposed in Rampant Misconfiguration

Threatpost

A too-large percentage of cloud databases containing highly sensitive information are publicly available, an analysis shows.

Cloud 108
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Nearly 70% of IT & Security Pros Hone Their Cyber Skills Outside of Work

Dark Reading

New research shows how security skills are lacking across multiple IT disciplines as well - including network engineers, sys admins, and cloud developers.

IT 109
article thumbnail

Google Chrome Bugs Open Browsers to Attack

Threatpost

Google's new release of Chrome 85.0.4183.121 for Windows, Mac, and Linux fixes 10 security flaws.

Security 120
article thumbnail

Vulnerability Disclosure Programs See Signups & Payouts Surge

Dark Reading

More than $44.75 million in rewards were paid to hackers over the past year, driving total payouts beyond $100 million.

107
107