Fri.Nov 22, 2019

article thumbnail

Ransomware Attackers Leak Stolen Data

Data Breach Today

Maze Crew Reportedly Threatens to Release More of Allied Universal's Data Unless Ransom Paid Ransomware attacks have taken an unwelcome turn: The Maze gang reportedly has begun leaking a victim's files to create pressure to pay a ransom. Security experts say they're not surprised by this development, but note that given the different skills required, such tactics may not become widespread.

article thumbnail

Data Enrichment, People Data Labs and Another 622M Email Addresses

Troy Hunt

Until this month, I'd never heard of People Data Labs (PDL). I'd certainly heard of the sector they operate in - "Data Enrichment" - but I'd never heard of the company itself. I've become more familiar with this sector over recent years due to the frequency with which it's been suffering data breaches that have ultimately landed in my inbox. For example, there's Dun & Bradstreet's NetProspex which leaked 33M records in 2017 , Exactis who had 132M records breached last year and the Apollo dat

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unsecured Server Exposed Records of 1.2 Billion: Researchers

Data Breach Today

Over 4 Terabytes of Data Exposed, Including Social Media Profiles, Personal Information Some 4 terabytes of data on over 1.2 billion individuals - including LinkedIn and Facebook profiles - was exposed to the internet on an unsecured Elasticsearch server, according to an analysis by a pair of independent researchers.

288
288
article thumbnail

Data-Enriched Profiles on 1.2B People Exposed in Gigantic Leak

Threatpost

Although the data was legitimately scraped by legally operating firms, the security and privacy implications are numerous.

Privacy 131
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

NeverQuest Banking Trojan Co-Creator Sentenced to 4 Years

Data Breach Today

Stanislov Lisov of Russia Pleaded Guilty to Federal Hacking Charge Stanislov Lisov, a Russian hacker who helped create the NeverQuest banking Trojan, has been sentenced to four years in federal prison after pleading guilty to one charge.

239
239

More Trending

article thumbnail

Analysis: The Latest Ransomware Trends

Data Breach Today

This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.

article thumbnail

Russian author of NeverQuest banking malware gets 4 Years in U.S. Prison

Security Affairs

The Russian hacker who created and used Neverquest banking malware has finally been sentenced to 4 years in prison by a US District Court. Stanislav Vitaliyevich Lisov (34), the Russian hacker who created and used Neverquest banking malware has been sentenced to 4 years in prison by the United States District Court for the Southern District of New York.

Passwords 103
article thumbnail

Twitter No Longer Wants a Phone Number for 2FA

Data Breach Today

Change Means Increased Privacy and Security for Users Twitter users no longer have to supply a phone number in order to use two-step verification for authentication. The move will better protect accounts from SIM hijacking attempts and also means users don't have to sacrifice some of their privacy to enable a security feature.

article thumbnail

French Rouen hospital hit by a ransomware attack

Security Affairs

The University Hospital Center (CHU) of Rouen was hit by the malware last week, the ransomware had a severe impact on the operations during the weekend. The AFP news agency reported that a ransomware attack on a hospital in Rouen last week caused “very long delays in care.” Medical staff at the hospital were not able to use the PCs and servers that were crippled by ransomware, they returned to the “ old-fashioned method of paper and pencil.” The management of the hospital

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

2 Health Data Breaches Affect Total of 220,000

Data Breach Today

Ransomware, Phishing Attacks Expose a Wealth of Data A California-based medical supply firm and a medical center in Missouri have reported health data breaches that each affected more than 100,000 individuals. Here's a report on the details - and the lessons to be learned.

article thumbnail

T-Mobile discloses data breach affecting prepaid wireless customers

Security Affairs

Bad news for T-Mobile prepaid customer, the US-based telecom giant T-Mobile today disclosed a new data breach incident. The US branch of the telecommunications giant T -Mobile disclosed a security breach that according to the company impacted a small number of customers of its prepaid service. The cybersecurity team at T-Mobile discovered an unauthorized access to information associated with a limited number of its prepaid wireless account customers. “We want to let you know about an incid

article thumbnail

Target Seeks $74M in Data Breach Reimbursement from Insurance Company

Dark Reading

The funds would cover some of the money Target paid to reimburse financial institutions for credit card replacement after the 2013 breach.

article thumbnail

Feed your data lake with change data capture for real-time integration and analytics

IBM Big Data Hub

Haruto Sakamoto, the Chief Information Officer at a Japanese multinational imaging company, had a few challenges to contend with. His business units had a presence in 180 countries worldwide with geographically-dispersed data warehouses and business intelligence applications in various locations.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip

Threatpost

The company expanded its Android bug bounty program as one of several recent moves to ramp up mobile security.

Security 118
article thumbnail

Researchers Explore How Mental Health Is Tracked Online

Dark Reading

An analysis of popular mental health-related websites revealed a vast number of trackers, many of which are used for targeted advertising.

104
104
article thumbnail

IBM Cloud Pak for Data ready to support DataOps’ practices

IBM Big Data Hub

The number of business segments requiring data to drive contextual insights is increasing. Leaders are seeking new ways to manage the pressures of delivering high-quality data faster across their businesses. To date, many of these projects have focused solely on ingesting data into a data lake which has led to repositories of uncleansed and ungoverned data.

Cloud 88
article thumbnail

When You Know Too Much: Protecting Security Data from Security People

Dark Reading

As security tools gather growing amounts of intelligence, experts explain how companies can protect this data from rogue insiders and other threats.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A picture worth a thousand volts

IBM Big Data Hub

Learn how marine solution provider James Fisher and Sons plc and the IBM Data Science and AI Elite team surge towards a renewable tomorrow with the electrifying power of data visualization built on IBM Watson Studio.

article thumbnail

Challenging the norm to enhance employee experience

Jamf

SAP continues to create opportunities for elevated employee experiences and efficiencies. Today, the company supports this work by offering device choice.

89
article thumbnail

Lockheed Martin’s journey to Data Intelligence

Collibra

A champion of Collibra Catalog: Lockheed Martin discusses their journey to become data-driven at the Tableau User Conference. Collibra joined Lockheed Martin Aeronautics at the Tableau Conference in Las Vegas on November 13, 2019, to discuss Lockheed Martin’s journey to becoming a data-driven enterprise. This presentation highlighted the importance of Collibra Catalog in enabling Lockheed Martin to discover, understand and trust their data. .

article thumbnail

The 5-Step Methodology for Spotting Malicious Bot Activity on Your Network

Dark Reading

Bot detection over IP networks isn't easy, but it's becoming a fundamental part of network security practice.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google Anthos: enabling customer choice 

OpenText Information Management

Since it first appeared in the late 1990’s, the term “cloud computing” has continued to change, adapt, innovate and revolutionize how businesses work. From comparatively simple “off-site hosting” to load-balancing, public, private and hybrid clouds, SaaS applications and managed services, cloud is now a fully established and critical part of most organizations’ IT strategy.

Cloud 71
article thumbnail

Three Areas to Consider, to Focus Your Cyber-Plan

Threatpost

DNS, rogue employees and phishing/social engineering should be top of the list of threat areas for organizations to address.

article thumbnail

The grand “finale” of China’s Encryption Law

HL Chronicle of Data Protection

Two years on since the first draft, the final act of the legislative passage saga of the long-awaited People’s Republic of China Encryption Law ended with its passage on 26 October 2019. It will take effect on 1 January 2020. The final text of the Encryption Law clearly represents a step in the right direction in terms of putting in place a comprehensive law in the encryption field, a sensitive and highly regulated area which China closely associates with state secrecy, and which historica

article thumbnail

Critical Flaws in VNC Threaten Industrial Environments

Threatpost

Some of the bugs allow remote code-execution.

122
122
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The GOP Is Mired in Conspiracies—and It's About to Get Worse

WIRED Threat Level

Opinion: If you thought the impeachment hearings were bad, wait until attorney general William Barr's internal investigation comes to light.

IT 76
article thumbnail

ID Thieves Turn to Snail Mail as Juicy Target for Financial Crimes

Threatpost

Hackers turn to old-school mail-forwarding scams to commit modern-day ID theft and financial crimes.

article thumbnail

Black Hat Europe Q&A: Unveiling the Underground World of Anti-Cheats

Dark Reading

Security consultant Joel Noguera describes how he got involved in testing anti-cheat software security, and what to expect from his upcoming Black Hat Europe talk.