Thu.Sep 30, 2021

article thumbnail

Anonymous Leaks Epik Data - Again

Data Breach Today

Part 2 of 'Operation Epik Fail' Leaks 300GB of Data, Researcher Says Hacktivist collective Anonymous has, for the second time this month, leaked data belonging to Washington-based domain name registrar and web hosting service Epik. The size of the second set: more than 300GB - double the amount in the first leak.

275
275
article thumbnail

GUEST ESSAY: A breakdown of Google’s revisions to streamline its ‘reCAPTCHA’ bot filter

The Last Watchdog

Most of us internet users are obviously familiar with CAPTCHAs: a challenge or test that is designed to filter out bots (automated programs) and only allow legitimate human users in. Related: How bots fuel ‘business logic’ hacking. The basic principle behind CAPTCHA is fairly simple: the test must be as difficult as possible (if not impossible) to solve by these bots, but at the same time it must be easy enough for human users not to hurt user experience.

IT 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Will Mitigate Brute-Force Bug in Azure AD

Data Breach Today

Microsoft Sparred with SecureWorks Over Impact But Relents Microsoft has indicated it will make changes to reduce the risk around what a security vendor says is a vulnerability that lets attackers run brute-force credential attacks against Azure Active Directory. The issue was reported to Microsoft in June by SecureWorks' Counter Threat Unit.

Risk 361
article thumbnail

How to identify data breaches when you have a hybrid workforce

IT Governance

As we emerge from the pandemic, hybrid working has proven hugely popular for individuals and organisations alike: staff enjoy increased flexibility and reduced commuting, and organisations benefit from lower overheads and greater productivity. Plus, the environmental benefits of homeworking are unmistakable. . However, hybrid working also provides greater opportunities for cyber criminals.

article thumbnail

10 Rules for Managing Apache Cassandra

It’s no surprise that Apache Cassandra has emerged as a popular choice for organizations of all sizes seeking a powerful solution to manage their data at a scale—but with great power comes great responsibility. Due to the inherent complexity of distributed databases, this white paper will uncover the 10 rules you’ll want to know when managing Apache Cassandra.

article thumbnail

Neiman Marcus Says 4.6M Affected by Data Breach

Data Breach Today

Exposed Data Includes Login Credentials, Security Questions Neiman Marcus Group says it is notifying 4.6 million of its online customers who are affected by a data breach that occurred in May 2020. The data includes personally identifiable data, payment and gift cards, online account credentials and security questions.

More Trending

article thumbnail

CISA Launches Insider Threat Self-Assessment Tool

Data Breach Today

Agency Is Also Keeping Its 'Rumor Control' Website Active Ahead of Midterm Elections A new self-assessment tool aims to help public and private sector organizations assess their level of vulnerability to insider threats, according to CISA. The agency also indicated this week it will keep its "rumor control" website active ahead of the 2022 midterm elections.

IT 315
article thumbnail

National Day for Truth & Reconciliation

OpenText Information Management

Reconciliation is not a noun. It is not an event. It’s a verb. – Roberta Jamieson Today we honor the lost children and Survivors of residential schools, their families and their communities. History must be heard. The tragic news of the unmarked graves recently found at former residential school sites is a stark reminder of … The post National Day for Truth & Reconciliation appeared first on OpenText Blogs.

IT 109
article thumbnail

Apple Pay-Visa Vulnerability May Enable Payment Fraud

Data Breach Today

Neither Firm Has Fixed Issue, Researchers Say Researchers at the University of Birmingham and University of Surrey say they have uncovered a vulnerability in the Apple Pay-Visa setup that could allow hackers to bypass iPhone’s Apple Pay lock screen, perform contactless payments and skirt transaction limits.

285
285
article thumbnail

Apple Pay with Visa Hacked to Make Payments via Locked iPhones

Threatpost

Researchers have demonstrated that someone could use a stolen, locked iPhone to pay for thousands of dollars of goods or services, no authentication needed.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI pr

article thumbnail

VMware Discloses and Releases Fixes for 19 Bugs in Products

Data Breach Today

CISA Warns of 'Widespread Exploitation' for 1 Critical Bug Cybersecurity vendor VMware has published a security advisory detailing 19 vulnerabilities affecting its vCenter server and Cloud Foundation products and has released fixes for all of them. One of the flaws has a high CVSS of 9.8, and CISA is warning of its "widespread exploitation.

Cloud 278
article thumbnail

Popular Android apps with 142.5 million collective installs leak user data

Security Affairs

14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties. Original post @ [link]. 14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties. Nine out of 14 popular Android apps are still potentially leaking the data of more than 30.5 million users.

Access 106
article thumbnail

New Legislation Eyes Both Ransom, Incident Reporting

Data Breach Today

Bipartisan Bill Would Require 24-Hour Ransom Notice, 72-Hour Incident Report A bipartisan effort to implement cybersecurity incident reporting and the tracking of ransomware payments has been introduced by leaders of the Senate Homeland Security and Governmental Affairs Committee. While it differs from legislation introduced in July, lawmakers hope to reconcile the bills.

article thumbnail

Experts show how to make fraudulent payments using Apple Pay with VISA on locked iPhones

Security Affairs

Security researchers devised a new attack method against iPhone owners using Apple Pay and Visa payment cards. Boffins from the University of Birmingham and the University of Surrey exploited a series of vulnerabilities in an attack against iPhone owners using Apple Pay and Visa payment cards. A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards.

article thumbnail

10 Rules for Managing Apache Kafka

Without proper guidance, it’s easy to miss out on Kafka’s full capabilities. While not the easiest technology to optimize, Kafka rewards those willing to explore its depths. Under the hood, it is an elegant system for stream processing, event sourcing, and data integration. Download this white paper to learn the 10 critical rules that will help you optimize your Kafka system and unlock its full potential.

article thumbnail

The Troublemaker CISO: Getting Hacked

Data Breach Today

The Rant of the Day From Ian Keller, Ericsson Rant of the day: Are we getting hacked because we now work remotely in the new normal? No, we're being hacked because we're not managing our risks and being lazy - and because the CISO is not being heard.

Risk 252
article thumbnail

SEC Fines Alternative Data Provider for Securities Fraud

Data Matters

On September 14, 2021, the U.S. Securities and Exchange Commission (SEC) settled an enforcement action against App Annie Inc., an alternative data provider for the mobile app industry, and its former CEO Bertrand Schmitt. The SEC charged App Annie and Schmitt with securities fraud, under Section 10(b) of the Securities Exchange Act of 1934 and Rule 10b-5, for engaging in deceptive practices and materially misrepresenting how App Annie derived its alternative data, thereby inducing trading firms

article thumbnail

California Extends Telehealth Privacy, Security Waivers

Data Breach Today

State's Renewal of Relaxed Regs Mirrors Handling of Federal HIPAA Waivers California is extending a waiver that was set to expire this week. Similar to action taken by federal regulators, the extended California waiver relaxes enforcement of certain privacy and security regulations related to healthcare providers that offer telehealth services.

Privacy 146
article thumbnail

More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic

Dark Reading

Analysis of threat trends from last quarter reveals attackers ramped up their use of fileless malware, and zero-day malware accounted for almost two-thirds of all detections.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

2021 Cyber Threats, Trends & Mitigation Techniques for Enterprise

Data Breach Today

274
274
article thumbnail

Spotlight: When Ransomware Comes Calling

The Security Ledger

With the attention given to the threats posed by ransomware, why do organizations still fall victim to these attacks? Max Henderson, the Manager of Incident Response at Pondurance joins us to talk about what companies get wrong in responding to ransomware and other threats. The post Spotlight: When Ransomware Comes Calling appeared first on The. Read the whole entry. » Click the icon below to listen.

article thumbnail

3Q3M Episode 6?—?“What is a Craftsman?” with John Calvin Young

Role Model Software

3Q3M Episode 6?—?“What is a Craftsman?” with John Calvin Young In the sixth episode of our video series 3 Questions in 3 Minutes (or 3Q3M) , RoleModel Software’s marketing director, Jamey Meeker, and RoleModel’s Software Craftsman John Calvin Young discuss what it means to be declared a Craftsman and how it affects our projects. Join John and Jamey as they answer three questions that will help you understand more about how RoleModel operates and how we are dedicated to high-quality craftsmanship

article thumbnail

OS 15 features powerful software updates designed for people with disabilities

Jamf

From sound actions for switch control to more inclusive Memoji, Apple has pulled out all the stops in OS15 for people with a wide range of disabilities.

105
105
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

How Google Geofence Warrants Helped Catch Capitol Rioters

WIRED Threat Level

A WIRED investigation has found 45 federal criminal cases that cite Google geolocation data to place suspects inside the US Capitol during the January 6 riot.

article thumbnail

Threat actors use recently discovered CVE-2021-26084 Atlassian Confluence

Security Affairs

Threat actors are actively exploiting the recently disclosed CVE-2021-26084 RCE vulnerability in Atlassian Confluence deployments. Trend Micro researchers have spotted crypto-mining campaigns that are actively exploiting a recently disclosed critical remote code execution vulnerability in Atlassian Confluence deployments across Windows and Linux. At the end of August, Atlassian released security patches to address the critical CVE-2021-26084 flaw that affects the Confluence enterprise collab

Mining 95
article thumbnail

Baby’s Death Alleged to Be Linked to Ransomware

Threatpost

Access to heart monitors disabled by the attack allegedly kept staff from spotting blood & oxygen deprivation that led to the baby's death.

article thumbnail

CISA releases Insider Risk Mitigation Self-Assessment Tool

Security Affairs

The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider threats and devise their own defense plans against such risks. The US Cybersecurity and Infrastructure Security Agency (CISA) has released the Insider Risk Mitigation Self-Assessment Tool , a new tool that allows organizations to assess their level of exposure to insider threats.

Risk 92
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

FireEye Products & McAfee Enterprise Merge to Create $2B Entity

Dark Reading

The combined company will have 5,000 employees, more than 40,000 customers, and nearly $2 billion in revenue, officials report.

111
111
article thumbnail

Apple Pay with Visa Hacked to Make Payments via Unlocked iPhones

Threatpost

Researchers have demonstrated that someone could use a stolen, unlocked iPhone to pay for thousands of dollars of goods or services, no authentication needed.

article thumbnail

10 Recent Examples of How Insider Threats Can Cause Big Breaches and Damage

Dark Reading

Theft of intellectual property, sabotage, exposure of sensitive data and more were caused by malicious behavior and negligence at these organizations

88