Thu.Sep 30, 2021

article thumbnail

Anonymous Leaks Epik Data - Again

Data Breach Today

Part 2 of 'Operation Epik Fail' Leaks 300GB of Data, Researcher Says Hacktivist collective Anonymous has, for the second time this month, leaked data belonging to Washington-based domain name registrar and web hosting service Epik. The size of the second set: more than 300GB - double the amount in the first leak.

277
277
article thumbnail

GUEST ESSAY: A breakdown of Google’s revisions to streamline its ‘reCAPTCHA’ bot filter

The Last Watchdog

Most of us internet users are obviously familiar with CAPTCHAs: a challenge or test that is designed to filter out bots (automated programs) and only allow legitimate human users in. Related: How bots fuel ‘business logic’ hacking. The basic principle behind CAPTCHA is fairly simple: the test must be as difficult as possible (if not impossible) to solve by these bots, but at the same time it must be easy enough for human users not to hurt user experience.

IT 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Will Mitigate Brute-Force Bug in Azure AD

Data Breach Today

Microsoft Sparred with SecureWorks Over Impact But Relents Microsoft has indicated it will make changes to reduce the risk around what a security vendor says is a vulnerability that lets attackers run brute-force credential attacks against Azure Active Directory. The issue was reported to Microsoft in June by SecureWorks' Counter Threat Unit.

Risk 361
article thumbnail

How to identify data breaches when you have a hybrid workforce

IT Governance

As we emerge from the pandemic, hybrid working has proven hugely popular for individuals and organisations alike: staff enjoy increased flexibility and reduced commuting, and organisations benefit from lower overheads and greater productivity. Plus, the environmental benefits of homeworking are unmistakable. . However, hybrid working also provides greater opportunities for cyber criminals.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Neiman Marcus Says 4.6M Affected by Data Breach

Data Breach Today

Exposed Data Includes Login Credentials, Security Questions Neiman Marcus Group says it is notifying 4.6 million of its online customers who are affected by a data breach that occurred in May 2020. The data includes personally identifiable data, payment and gift cards, online account credentials and security questions.

More Trending

article thumbnail

CISA Launches Insider Threat Self-Assessment Tool

Data Breach Today

Agency Is Also Keeping Its 'Rumor Control' Website Active Ahead of Midterm Elections A new self-assessment tool aims to help public and private sector organizations assess their level of vulnerability to insider threats, according to CISA. The agency also indicated this week it will keep its "rumor control" website active ahead of the 2022 midterm elections.

IT 317
article thumbnail

Apple Pay with Visa Hacked to Make Payments via Locked iPhones

Threatpost

Researchers have demonstrated that someone could use a stolen, locked iPhone to pay for thousands of dollars of goods or services, no authentication needed.

article thumbnail

Apple Pay-Visa Vulnerability May Enable Payment Fraud

Data Breach Today

Neither Firm Has Fixed Issue, Researchers Say Researchers at the University of Birmingham and University of Surrey say they have uncovered a vulnerability in the Apple Pay-Visa setup that could allow hackers to bypass iPhone’s Apple Pay lock screen, perform contactless payments and skirt transaction limits.

288
288
article thumbnail

Popular Android apps with 142.5 million collective installs leak user data

Security Affairs

14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties. Original post @ [link]. 14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties. Nine out of 14 popular Android apps are still potentially leaking the data of more than 30.5 million users.

Access 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

VMware Discloses and Releases Fixes for 19 Bugs in Products

Data Breach Today

CISA Warns of 'Widespread Exploitation' for 1 Critical Bug Cybersecurity vendor VMware has published a security advisory detailing 19 vulnerabilities affecting its vCenter server and Cloud Foundation products and has released fixes for all of them. One of the flaws has a high CVSS of 9.8, and CISA is warning of its "widespread exploitation.

Cloud 281
article thumbnail

Attackers Use Bots to Circumvent Some Two-Factor Authentication Systems

eSecurity Planet

Underground services are cropping up that are designed to enable bad actors to intercept one-time passwords (OTPs), which are widely used in two-factor authentication programs whose purpose is to better protect customers’ online accounts. By using the services, cybercriminals can gain access to victims’ accounts to steal money. Security expert Chris Krebs wrote in a blog post this week that he discovered such a service – called OPT Agency – earlier this year, noting that the service was shut dow

article thumbnail

New Legislation Eyes Both Ransom, Incident Reporting

Data Breach Today

Bipartisan Bill Would Require 24-Hour Ransom Notice, 72-Hour Incident Report A bipartisan effort to implement cybersecurity incident reporting and the tracking of ransomware payments has been introduced by leaders of the Senate Homeland Security and Governmental Affairs Committee. While it differs from legislation introduced in July, lawmakers hope to reconcile the bills.

article thumbnail

Experts show how to make fraudulent payments using Apple Pay with VISA on locked iPhones

Security Affairs

Security researchers devised a new attack method against iPhone owners using Apple Pay and Visa payment cards. Boffins from the University of Birmingham and the University of Surrey exploited a series of vulnerabilities in an attack against iPhone owners using Apple Pay and Visa payment cards. A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Troublemaker CISO: Getting Hacked

Data Breach Today

The Rant of the Day From Ian Keller, Ericsson Rant of the day: Are we getting hacked because we now work remotely in the new normal? No, we're being hacked because we're not managing our risks and being lazy - and because the CISO is not being heard.

Risk 254
article thumbnail

SEC Fines Alternative Data Provider for Securities Fraud

Data Matters

On September 14, 2021, the U.S. Securities and Exchange Commission (SEC) settled an enforcement action against App Annie Inc., an alternative data provider for the mobile app industry, and its former CEO Bertrand Schmitt. The SEC charged App Annie and Schmitt with securities fraud, under Section 10(b) of the Securities Exchange Act of 1934 and Rule 10b-5, for engaging in deceptive practices and materially misrepresenting how App Annie derived its alternative data, thereby inducing trading firms

article thumbnail

California Extends Telehealth Privacy, Security Waivers

Data Breach Today

State's Renewal of Relaxed Regs Mirrors Handling of Federal HIPAA Waivers California is extending a waiver that was set to expire this week. Similar to action taken by federal regulators, the extended California waiver relaxes enforcement of certain privacy and security regulations related to healthcare providers that offer telehealth services.

Privacy 147
article thumbnail

More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic

Dark Reading

Analysis of threat trends from last quarter reveals attackers ramped up their use of fileless malware, and zero-day malware accounted for almost two-thirds of all detections.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

2021 Cyber Threats, Trends & Mitigation Techniques for Enterprise

Data Breach Today

276
276
article thumbnail

Spotlight: When Ransomware Comes Calling

The Security Ledger

With the attention given to the threats posed by ransomware, why do organizations still fall victim to these attacks? Max Henderson, the Manager of Incident Response at Pondurance joins us to talk about what companies get wrong in responding to ransomware and other threats. The post Spotlight: When Ransomware Comes Calling appeared first on The. Read the whole entry. » Click the icon below to listen.

article thumbnail

3Q3M Episode 6?—?“What is a Craftsman?” with John Calvin Young

Role Model Software

3Q3M Episode 6?—?“What is a Craftsman?” with John Calvin Young In the sixth episode of our video series 3 Questions in 3 Minutes (or 3Q3M) , RoleModel Software’s marketing director, Jamey Meeker, and RoleModel’s Software Craftsman John Calvin Young discuss what it means to be declared a Craftsman and how it affects our projects. Join John and Jamey as they answer three questions that will help you understand more about how RoleModel operates and how we are dedicated to high-quality craftsmanship

article thumbnail

OS 15 features powerful software updates designed for people with disabilities

Jamf

From sound actions for switch control to more inclusive Memoji, Apple has pulled out all the stops in OS15 for people with a wide range of disabilities.

105
105
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How Google Geofence Warrants Helped Catch Capitol Rioters

WIRED Threat Level

A WIRED investigation has found 45 federal criminal cases that cite Google geolocation data to place suspects inside the US Capitol during the January 6 riot.

Security 100
article thumbnail

Threat actors use recently discovered CVE-2021-26084 Atlassian Confluence

Security Affairs

Threat actors are actively exploiting the recently disclosed CVE-2021-26084 RCE vulnerability in Atlassian Confluence deployments. Trend Micro researchers have spotted crypto-mining campaigns that are actively exploiting a recently disclosed critical remote code execution vulnerability in Atlassian Confluence deployments across Windows and Linux. At the end of August, Atlassian released security patches to address the critical CVE-2021-26084 flaw that affects the Confluence enterprise collab

Mining 94
article thumbnail

Baby’s Death Alleged to Be Linked to Ransomware

Threatpost

Access to heart monitors disabled by the attack allegedly kept staff from spotting blood & oxygen deprivation that led to the baby's death.

article thumbnail

CISA releases Insider Risk Mitigation Self-Assessment Tool

Security Affairs

The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider threats and devise their own defense plans against such risks. The US Cybersecurity and Infrastructure Security Agency (CISA) has released the Insider Risk Mitigation Self-Assessment Tool , a new tool that allows organizations to assess their level of exposure to insider threats.

Risk 91
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FireEye Products & McAfee Enterprise Merge to Create $2B Entity

Dark Reading

The combined company will have 5,000 employees, more than 40,000 customers, and nearly $2 billion in revenue, officials report.

111
111
article thumbnail

Apple Pay with Visa Hacked to Make Payments via Unlocked iPhones

Threatpost

Researchers have demonstrated that someone could use a stolen, unlocked iPhone to pay for thousands of dollars of goods or services, no authentication needed.

article thumbnail

10 Recent Examples of How Insider Threats Can Cause Big Breaches and Damage

Dark Reading

Theft of intellectual property, sabotage, exposure of sensitive data and more were caused by malicious behavior and negligence at these organizations

88