Wed.Nov 27, 2019

article thumbnail

Restaurant Chain: Malware Infected PoS Devices

Data Breach Today

Unidentified Strain Targets Customer Payment Card Data An unidentified strain of malware appears to have infected point-of-sale machines used at certain New York restaurants owned by the chain Catch. The malware exposed customer payment card data to hackers, the company says.

Sales 273
article thumbnail

Adobe revealed that the Magento Marketplace was hacked

Security Affairs

Adobe discloses security breach impacting Magento Marketplace users. Adobe discloses a security breach that affected the users of the Magento marketplace website, the incident was discovered last week. Adobe disclosed a security breach that affected the users of the Magento Marketplace portal, the security team discovered the incident on November 21.

CMS 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New US Federal Privacy Bill Gets Proposed

Data Breach Today

Legislation Designed on the Same Lines as CCPA U.S. Sen. Maria Cantwell has proposed a federal privacy legislation called the Consumer Online Privacy Rights Act, which could expand the rights of people when it comes to how personal data is collected, shared and used.

Privacy 227
article thumbnail

Top 3 Black Friday 2019 scams to avoid

IT Governance

Black Friday has fast become a staple of our high street and online shopping experience, even though it has its roots in US traditions. But the day isn’t all fun and bargains. Besides the traumatic experience for some retail employees and those injured in shop-floor brawls, Black Friday is also a time in which many of us are caught out by scams, with cyber criminals taking advantage of customers desperate for a bargain.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Joker's Stash Advertises More Stolen Payment Card Data

Data Breach Today

Carder Forum Listing Appears Tied to Breaches at Four Restaurant Chains The notorious Joker's Stash carder marketplace has a fresh listing for payment card data that appears to have been stolen from four different U.S. restaurant chains, security experts warn.

Security 216

More Trending

article thumbnail

Watchdog Finds DOE Falling Short on Cybersecurity

Data Breach Today

Audit Finds Vulnerabilities in Energy Department's Unclassified Systems An audit from the U.S. Energy Department's Inspector General finds that the agency is prone to making the same cybersecurity mistakes year-after-year. This includes exposing critical infrastructure, including nuclear facilities, to outside hacking and attacks.

article thumbnail

Federal Data Privacy Bill Takes Aim at Tech Giants

Threatpost

The COPRA legislation would provide GDPR-like data protections, and create a new FTC enforcement bureau.

article thumbnail

Medical Device Cybersecurity: A Team Approach

Data Breach Today

All healthcare industry stakeholders must take critical steps to address the cybersecurity of connected medical devices, says Jennifer Covich Bordenick, CEO of of the eHealth Initiative and Foundation, an advocacy group that has issued a new report on the subject.

article thumbnail

DHS Mandates Federal Agencies to Run Vulnerability Disclosure Policy

Schneier on Security

The DHS is requiring all federal agencies to develop a vulnerability disclosure policy. The goal is that people who discover vulnerabilities in government systems have a mechanism for reporting them to someone who might actually do something about it. The devil is in the details, of course, but this is a welcome development. The DHS is seeking public feedback.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A Cause You Care About Needs Your Cybersecurity Help

Dark Reading

By donating their security expertise, infosec professionals are supporting non-profits, advocacy groups, and communities in-need.

article thumbnail

Think Twice Before Giving Gifts With a Microphone or Camera

WIRED Threat Level

Black Friday is going to be overrun with cheap, internet-connected gifts. Just make sure you know exactly what you’re buying.

article thumbnail

Hong Kong Regulator Imposes New Conditions to Regulate Outsourcing Arrangements for Cloud Storage

Data Matters

The Securities and Futures Commission of Hong Kong (SFC) issued new guidance to regulate the use of external electronic data storage providers (EDSPs 1 ) by licensed firms that intend to keep (or have previously kept) records or documents required to be maintained pursuant to the statutory recordkeeping rules and anti-money-laundering regime (Regulatory Records) in an online environment.

Cloud 68
article thumbnail

7 Ways to Hang Up on Voice Fraud

Dark Reading

Criminals are coming at us from all direction, including our phones. Don't answer that next call without reading this tips first.

86
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The 2020 state of cybersecurity: 2 things enterprises need to brace for

Information Management Resources

As someone who’s worked in cyber security throughout my entire career, there are two things I believe we’ll see make headlines next year that every enterprise should be aware of and prepare for.

article thumbnail

Law enforcement agencies arrested 79 people involved in fraudulent online purchases of flight tickets

Security Affairs

Law enforcement agencies arrested 79 people worldwide as part of the Global Airline Action Days operation to fight fraudulent online purchases of flight tickets. An international operation of law enforcement to fight fraudulent online purchases of flight tickets resulted in the arrest of 79 people as part of the Global Airline Action Days (GAAD). Crooks used compromised credit card data to buy flight tickets. “Between 18 – 22 November 2019, 60 countries, 56 airlines and 12 online travel ag

article thumbnail

Employee input seen as key to success with digital transformation

Information Management Resources

Decision makers highlight the ability to interact and collaborate across departments as the most valuable capability to help organizations successfully execute internal digital initiatives.

article thumbnail

Dexphot Malware Hijacked 80K+ Devices to Mine Cryptocurrency

Threatpost

A cryptomining malware has infected at least 80k devices and uses various tactics to evade detection.

Mining 90
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Google Details Its Responses to Cyber Attacks, Disinformation

Dark Reading

Government groups continue to attack user credentials and distribute disinformation according to a new blog post from Google's Threat Analysis Group.

IT 78
article thumbnail

IoT Smartwatch Exposes Kids’ Personal, GPS Data

Threatpost

Yet another connected smartwatch for children has been discovered exposing personal and location data of kids - opening the door for various insidious threats.

IoT 69
article thumbnail

Russia Update: Law Increasing Fines for Violation of Data Protection Laws Comes Into Force

HL Chronicle of Data Protection

Update: On 3 December 2019 the law imposing multi-million Ruble (RUB) fines for infringing Russian data localization and information security laws has come into force. We have retained below our earlier update about the law for informational purposes and to provide context. Since the law has already come into force, new fines may be imposed on companies based on results of the Russian DPA’s (Roskomnadzor) inspections in 2020.

Risk 59
article thumbnail

SQL Injection Errors No Longer the Top Software Security Issue

Dark Reading

In newly updated Common Weakness Enumeration (CWE), SQL injection now ranks sixth.

Security 124
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How AI is slowly changing data governance

Information Management Resources

The search for better data governance — including data mobility, data accuracy, compliance, cybersecurity and privacy — has led to the application of AI in new processes and a suite of new data handling tools.

article thumbnail

How to Get Prepared for Privacy Legislation

Dark Reading

All the various pieces of legislation, both in the US and worldwide, can feel overwhelming. But getting privacy basics right is a solid foundation.

Privacy 69
article thumbnail

Russia Update: State Duma Adopts Bill Increasing Fines for Violation of Data Protection Laws

HL Chronicle of Data Protection

On 21 November 2019 a bill imposing multi-million Ruble (RUB) fines for infringing Russian data localization and information security laws passed the last hearing at the State Duma. This likely means that the bill will become the law soon, once it passes the higher chamber of Russia’s Parliament and is singed by the Russian President. The process may take about two weeks.

article thumbnail

New Free Emulator Challenges Apple's Control of iOS

Dark Reading

An open-source tool gives researchers and jailbreakers a free option for researching vulnerabilities in the operating system - and gives Apple a new headache.

82
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

SDKs Misused to Scrape Twitter, Facebook Account Info

Threatpost

Malicious mobile apps could be created to scrape and share profile information, email addresses and more.

Privacy 63
article thumbnail

Analysis of Jira Bug Stresses Impact of SSRF in Public Cloud

Dark Reading

More than 3,100 Jira instances are still vulnerable to a server-side request forgery vulnerability patched in August.

Cloud 64
article thumbnail

NSO Group President Defends Controversial Tactics

Threatpost

Firm defends controversial business offerings, claims it should be considered a force of good.

IT 65