Wed.Oct 30, 2019

article thumbnail

Skimming Malware Found on American Cancer Society Webstore

Data Breach Today

Incident Shows That Healthcare Sector Faces E-Commerce Threats The recent discovery of skimming malware on the online store of the American Cancer Society illustrates that the healthcare sector is not immune from e-commerce threats.

article thumbnail

Breaches at NetworkSolutions, Register.com, and Web.com

Krebs on Security

Top domain name registrars NetworkSolutions.com , Register.com and Web.com are asking customers to reset their passwords after discovering an intrusion in August 2019 in which customer account information was accessed. A notice to customers at notice.web.com. “On October 16, 2019, Web.com determined that a third-party gained unauthorized access to a limited number of its computer systems in late August 2019, and as a result, account information may have been accessed,” Web.com said i

Passwords 132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook Sues Spyware Maker Over WhatsApp Exploit

Data Breach Today

Social Network Accuses Pegasus Malware Maker NSO Group of Violating the Law Facebook is suing NSO Group, a commercial spyware company, alleging it developed a potent exploit to spy on WhatsApp messages sent by diplomats, journalists, human rights activists and political dissidents. Facebook is seeking damages and an injunction forbidding NSO Group from accessing its infrastructure.

Access 124
article thumbnail

Network Solutions data breach – hacker accessed data of more 22 Million accounts

Security Affairs

Network Solutions, one of the world’s biggest domain registrars, disclosed a data breach that impacted 22 million accounts. Network Solutions , one of the world’s biggest domain registrars, disclosed a data breach that may have impacted 22 million accounts, no financial data was exposed. “On October 16, 2019, Network Solutions determined that a third-party gained unauthorized access to a limited number of our computer systems in late August 2019, and as a result, account information may ha

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

FCC Chair's Proposal Targets Chinese Technology Firms

Data Breach Today

Calls for Ban on Use of Commission Funds for Equipment From Huawei, ZTE FCC Chairman Ajit Pai is pushing a proposal that would ban U.S. telecommunications firms from using commission funds to buy equipment from companies deemed national security threats. The new rule would first target Chinese telecom companies Huawei and ZTE.

Security 113

More Trending

article thumbnail

Facebook Agrees to Pay UK Fine in Cambridge Analytica Case

Data Breach Today

British Authorities Found Social Media Company Violated Privacy Laws After months of appeals, Facebook has agreed to pay $643,000 to settle claims that it violated U.K. privacy laws by allowing Cambridge Analytica - a now-defunct digital marketer that focused, in part, on political campaigns - to access the personal data of 87 million of its users.

article thumbnail

Hunton London Seminar on Understanding the CCPA

Hunton Privacy

On November 19, 2019, Hunton Andrews Kurth will host an in-person breakfast briefing in the firm’s London office to explore the California Consumer Privacy Act (“CCPA”), against the backdrop of the EU General Data Protection Regulation (“GDPR”). In the seminar, we will discuss: The CCPA in the context of the GDPR, covering the similarities and differences between the frameworks.

GDPR 49
article thumbnail

Turla Teardown: Why Attribute Nation-State Attacks?

Data Breach Today

Unmasked: Russians Hijacked Iranian Attack Infrastructure and Malware Russian attack group Turla has been named and shamed for hijacking Iranian nation-state attackers' infrastructure. The aim of GCHQ and NSA's attribution is, in part, to make Turla's future cyber espionage efforts more costly and time-consuming.

113
113
article thumbnail

Cybersecurity's 'Moral Imperative'

Dark Reading

Cybersecurity professionals often talk about the economic drivers of security. But should the conversation shift to include a moral component? At least one analyst says "yes.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

How to Think Like an Attacker

Data Breach Today

It's one thing to know your attackers. It's another to emulate some of their techniques so you can improve your own enterprise defenses. Craig Harber, CTO of Fidelis Cybersecurity, is an advocate of this "think like an attacker" defensive strategy.

article thumbnail

WhatsApp Sues NSO Group

Schneier on Security

WhatsApp is suing the Israeli cyberweapons arms manufacturer NSO Group in California court: WhatsApp's lawsuit, filed in a California court on Tuesday, has demanded a permanent injunction blocking NSO from attempting to access WhatsApp computer systems and those of its parent company, Facebook. It has also asked the court to rule that NSO violated US federal law and California state law against computer fraud, breached their contracts with WhatsApp and "wrongfully trespassed" on Facebook's prope

article thumbnail

Xhelper, a new piece of Android malware that is infecting 2K+ devices each month

Security Affairs

A new piece of malware dubbed Xhelper has infected more than 45,000 Android devices in just the last six months and is continuing to spread. The campaign began months ago, a new piece of malware dubbed Xhelper has infected more than 45,000 Android devices in just six months and is continuing to spread at a fast space. Malware researchers at Symantec estimated that the Xhelper malware is infecting at least 2,400 devices on an average each month, mainly in India, U.S., and Russia.

article thumbnail

Do You Need Custom Software?

Role Model Software

Photo by Mimi Thian on Unsplash We frequently get calls from potential customers that begin something like this: I’ve been in my industry for years, and I know the landscape well. I want to do X, but I haven’t found any software that does what I want, exactly how I want to do it. Can you all help? The direct answer to the question is almost always yes, but we typically ask people to consider another question first… Do you really need custom software to achieve your goals?

IT 45
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Thousands of Xiaomi FURRYTAIL pet feeders exposed to hack

Security Affairs

A Russian security researcher accidentally discovered API and firmware issues that allowed her to take over all Xiaomi FurryTail pet feeders. The Russian security researcher Anna Prosvetova, from Saint Petersburg, has accidentally discovered API and firmware issues that allowed her to take over all Xiaomi FurryTail pet feeders. Last week, Prosvetova revealed on her private Telegram channel (@theyforcedme) to have discovered the flaw in the Xiaomi FurryTail pet feeders. “While studying the

article thumbnail

WhatsApp Spyware Attack: Uncovering NSO Group Activity

Threatpost

John Scott-Railton with Citizen Lab, who helped WhatsApp investigate the NSO Group over the alleged WhatsApp hack, said the subsequent lawsuit is a "certified big deal.".

article thumbnail

Emsisoft released a free decryption tool for Paradise ransomware

Security Affairs

Researchers at Emsisoft firm has released a new free tool to decrypt files encrypted by the Paradise ransomware. Security experts at Emsisoft have developed a tool to decrypt files encrypted by the Paradise ransomware. This ransomware family encrypts files using Salsa20 and RSA-1024 and it appends several extensions to theis filenames. “The Paradise ransomware encrypts victims using Salsa20 and RSA-1024, and appends one of several extensions such as “ paradise”, “2ksys19&

article thumbnail

As firms move applications to microservices environments, cyber risks grow

Information Management Resources

The responsibility for securing these environments is shifting as well, and this is likely exposing organizations to more security risks, according to a new report.

Risk 50
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

US Air Force finally retires 8-inch floppies from missile launch control system via ARS Technica

IG Guru

Five years ago, a CBS 60 Minutes report publicized a bit of technology trivia many in the defense community were aware of: the fact that eight-inch floppy disks were still used to store data critical to operating the Air Force's intercontinental ballistic missile command, control, and communications network. The system, once called the Strategic Air Command Digital Network (SACDIN), relied on IBM Series/1 computers installed by the Air Force at Minuteman II missile sites in the 1960s and 1970s.

article thumbnail

DocuWare Releases Version 7.2

Info Source

E-stamps, e-invoice display, streamlined configurations and integrations are among the new features that benefit DocuWare users. New Windsor NY, October 30, 2019 – DocuWare , provider of cloud solutions for document management and workflow automation, has released version 7.2 of its flagship software. “User feedback combined with results from our own rigorous R&D form the roadmap when planning DocuWare updates,” says co-president Dr.

article thumbnail

CILIP 2019 Annual General Meeting Results

CILIP

CILIP 2019 Annual General Meeting Results. The results of voting (including proxy votes) at the CILIP AGM held on 17 October 2019: The minutes of the meeting held on 11 October 2018 were agreed as an accurate record: For: 90. Against: 1. Abstentions: 25. Hayesmacintyre LLP were approved as CILIP auditors until the 2020 AGM: For: 103. Against: 0. Abstentions: 1.

40
article thumbnail

eBizDocs Fulfills Major Government Digitization Projects with Kodak Alaris Scanning Solutions

Info Source

ROCHESTER, N.Y., October 29, 2019 – Alaris, a Kodak Alaris business, and eBizDocs, an Albany, NY-based scanning service bureau, are helping government agencies address two critical challenges: preparing for the influx of document requests related to the REAL ID Act and providing better overall service to clients that receive state benefits. Starting October 1, 2020, every U.S. state and territory resident will need to present a REAL ID-compliant license, ID or other acceptable form of iden

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

City of Johannesburg, on Second Hit, Refuses to Pay Ransom

Threatpost

A Shadow Kill Hackers attack that compromised the city’s network and shut down key services was the second ransom-related attack on the city in months.

article thumbnail

As Phishing Kits Evolve, Their Lifespans Shorten

Dark Reading

Most phishing kits last less than 20 days, a sign defenders are keeping up in the race against cybercrime.

article thumbnail

U.S. Universities Get Failing Grades for DMARC Adoption

Threatpost

Of the 200 schools in the report, the University of Pittsburgh and Georgetown University received top marks, with their DMARC policy set to "reject.".

article thumbnail

Email Threats Poised to Haunt Security Pros into Next Decade

Dark Reading

Decentralized threat intel sharing, more public-private collaboration, and greater use of automated incident response are what's needed to combat phishing

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

MSPs Can Now Provide Managed Detection and Response with Cynet 360

Threatpost

MDR providers can provide a first-of-its-kind solution: Protection across the endpoints, user accounts and the network itself, in one solution.

IT 41
article thumbnail

Ransomware Attack Hits Las Cruces, New Mexico Public Schools

Dark Reading

The attack early in the morning of October 29 has taken all of the school district's systems offline.

article thumbnail

Android Malware Plaguing 45K Devices Remains a Mystery

Threatpost

The source of infection behind an increasingly precarious mobile malware is causing researchers to scratch their heads.

43