Fri.Mar 27, 2020

article thumbnail

Insurer Chubb Investigating 'Security Incident'

Data Breach Today

Maze Gang Claims Insurer Is a Victim, Emsisoft Reports Switzerland-based global insurance firm Chubb acknowledges that it's investigating a "security incident." Meanwhile, the Maze ransomware gang is claiming Chubb is its latest victim, according to researchers at the security firm Emsisoft.

Insurance 314
article thumbnail

Ryuk Ransomware operators continue to target hospitals during COVID19 outbreak

Security Affairs

Operators behind the Ryuk Ransomware continue to target hospitals even as these organizations are involved in the fight against the Coronavirus pandemic. The threat actors behind the infamous Ryuk Ransomware continue to target hospitals, even as they are involved in containing the Coronavirus outbreak. The decision of the operators is not aligned with principal ransomware gangs that have announced they will no longer target health and medical organizations during the Coronavirus (COVID-19) pande

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hijacked Routers Steering Users to Malicious COVID-19 Sites

Data Breach Today

Researchers: Cybercriminals Use DNS Hijacking to Spread New Type of Infostealer Cybercriminals are waging brute-force attacks that enable them to change DNS settings on home and small business routers to redirect victims to fake COVID-19-themed websites that push infostealer malware, according to the security firm Bitdefender.

Security 306
article thumbnail

A Twitch Streamer Is Exposing Coronavirus Scams Live

WIRED Threat Level

Kitboga has built a following by trolling telemarketers. Covid-19 opportunists have given him a whole new crop of targets.

Security 145
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Coalition Formed to Address COVID-19 Crisis

Data Breach Today

Observers Warn That Privacy, Security Must Be Adequately Addressed More than two dozen healthcare organizations and technology firms have formed a coalition to help address the COVID-19 crisis by using secure information sharing and data analysis. But observers warn the group must devote enough attention to privacy and security issues.

Privacy 240

More Trending

article thumbnail

Analysis: Russia's COVID-19 Disinformation Campaign

Data Breach Today

The latest edition of the ISMG Security Report analyzes how and why Russia is spreading disinformation about the COVID-19 pandemic. Plus: the latest CCPA regulation updates; a CISO's tips on securely managing a remote workforce.

Security 230
article thumbnail

0patch releases free unofficial patches for Windows 0days exploited in the wild

Security Affairs

ACROS Security’s 0patch service released unofficial patches for two Windows flaws actively exploited by attackers in the wild. ACROS Security’s 0patch service released unofficial patches for two Windows vulnerabilities actively exploited by attackers in the wild, both issues have yet to be fixed by Microsoft. A few days ago, Microsoft warned of hackers actively exploiting two zero-day remote code execution vulnerabilities in Windows Adobe Type Manager Library.

Libraries 110
article thumbnail

COVID-19: The Digital Exposure Crisis

Data Breach Today

Cybersecurity Specialist John Walker on Lack of Preparedness, Bad Cyber Practices in UK The COVID-19 pandemic has exposed more than policy and social gaps, says U.K.-based cybersecurity expert John Walker. It's also manifested in digital exposures born out of lack of preparedness and bad practices. Walker offers insights on improving the cyber response.

article thumbnail

Watchdog approves use of UK phone data if it helps fight coronavirus

The Guardian Data Protection

Information Commissioner’s Office says it would approve practice as containing strategy Coronavirus – latest updates See all our coronavirus coverage The UK’s privacy watchdog has said the government can use personal data from people’s mobile phones to track and monitor behaviour if it helps fight the spread of coronavirus. It emerged last week that the government was in talks with UK mobile phone companies to potentially use anonymous location and usage data to create movement maps, with a 12-

IT 101
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Russia's Cybercrime Rule Reminder: Never Hack Russians

Data Breach Today

BuyBest Bust: Russia Charges 25 Individuals With Trafficking in Stolen Bank Card Data Russian authorities typically turn a blind eye to cybercrime committed by citizens, provided they target foreigners. But as the recent "BuyBest" arrests of 25 individuals demonstrate, authorities do not tolerate criminals that target Russians, and especially not anyone who targets Russian banks.

215
215
article thumbnail

Tips for choosing data management solutions: Consider roadmaps, partners, and talent

IBM Big Data Hub

IDC’s report, “ Choosing the Right Database Technology in the Age of Digital Transformation ” highlights the expanse of data management options as well as how that can cause confusion. Having clarity when looking to build new data applications or modernize workloads already in existence is essential.

article thumbnail

New financially motivated attacks in Western Europe traced to Russian-speaking threat actors

Security Affairs

Researchers at Group-IB observed new financially motivated attacks in Western Europe traced to Russian-speaking threat actors. Group-IB , a Singapore-based cybersecurity company that specializes in preventing cyberattacks , has detected successful attacks in Western Europe carried out in late January 2020 traced to Russian-speaking threat actors. At least two companies operating in pharmaceutical and manufacturing sectors have been affected.

article thumbnail

Weekly Update 184

Troy Hunt

This has been an absolutely flat-out week between running almost 3 hours of our free Cyber-Broken talk with Scott Helme, doing an hour of code with Ari each day (and helping get up to speed with remote schooling) then running our Hack Yourself First workshop on Aussie time zones the last couple of days. But, especially given the current circumstances, I'm pretty happy with the result ??

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Current Operating Status

National Archives Records Express

During the current public health national emergency, the Office of the Chief Records Officer for the U.S. Government remains ‘virtually’ open. All staff are 100% teleworking and our office is available to respond to questions or concerns. If you are unsure who to contact, our website contains a list of various email addresses. While we are virtually open for business, we are suspending in-person visits for appraisal, for oversight, and for other agency meetings.

article thumbnail

Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely

Dark Reading

The attack takes control of poorly secured network devices, redirecting Web addresses to a COVID-themed landing page that attempts to fool victims into downloading malware.

Security 116
article thumbnail

Google Bans Infowars Android App Over Coronavirus Claims

WIRED Threat Level

Apple kicked Alex Jones out of the App Store in 2018. The Google Play Store has finally followed suit.

Security 101
article thumbnail

The Wild, Wild West(world) of Cybersecurity

Dark Reading

Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Apple Unpatched VPN Bypass Bug Impacts iOS 13, Warn Researchers

Threatpost

The vulnerability can be exploited to reveal limited traffic data including a device’s IP address.

article thumbnail

COVID-19 – European and U.S. Privacy and Employment Law Issues

Data Matters

A discussion on the latest European and U.S. privacy and employment law issues with COVID-19 and strategies to deal with this situation in a holistic and coordinated manner. In particular, we consider the latest guidance from Data Protection Authorities, how to develop a privacy protocol that deals with the GDPR and U.S. privacy issues and UK and U.S. employment law issues and latest developments related to COVID-19.

Privacy 68
article thumbnail

Story of Gus Weiss

Schneier on Security

This is a long and fascinating article about Gus Weiss, who masterminded a long campaign to feed technical disinformation to the Soviet Union, which may or may not have caused a massive pipeline explosion somewhere in Siberia in the 1980s, if in fact there even was a massive pipeline explosion somewhere in Siberia in the 1980s. Lots of information about the origins of US export controls laws and sabotage operations.

97
article thumbnail

Hunton Privacy Lawyers Contribute to the Guide to Cyber Investigations

Hunton Privacy

In GIR’s recently published Guide to Cyber Investigations , Hunton Andrews Kurth partner Aaron Simpson and associate Adam Solomon are featured as contributing authors to the chapter on Complying with Breach Notification Obligations in a Global Setting: A Legal Perspective. In this chapter, Simpson and Solomon provide an overview of global notification obligations, and offer tactical recommendations regarding approaches businesses and organizations should consider in managing the fast-changing le

Privacy 68
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

A missing authorization check in WordPre WPvivid plugin that can lead to the exposure of the database and all files

Security Affairs

Researchers warn of a security flaw recently addressed in the WPvivid Backup Plugin that could be exploited to obtain all files of a WordPress website. WebARX experts warn of a missing authorization check recently addressed in the WPvivid Backup Plugin that could be exploited to obtain all files of a WordPress website. “There is a missing authorization check in the WPvivid plugin that can lead to the exposure of the database and all files of the WordPress site.” reads the post publi

article thumbnail

IG Pro Speaks from Italy About COVID-19

IG Guru

Dear friends from all over the world, I’m an ARMA and I-SIGMA active member and at the same time I am the GM of OMTRA Srl, the oldest Information Governance company in Italy. I live and work in Milan, Italy, now “on the front line against COVID 19.” Something is happening that I never expected in […]. The post IG Pro Speaks from Italy About COVID-19 appeared first on IG GURU.

article thumbnail

COUNTDOWN TO IBM THINK WITH IBM CHAMPION ANDY STEEDS

Rocket Software

This year, a record-breaking number of Rocket employees were named as 2020 IBM Champions—13 to be exact. To celebrate our ongoing partnership with IBM, and our dedication to innovation, legacy technologies and legendary results, we want to highlight them. . Over the next weeks, we will count down to IBM THINK with each of the 2020 Champions, and celebrate what we love about our partnership with IBM!

article thumbnail

COVID-19 Resources for Bank and Credit Union Leaders

Rippleshot

During times of uncertainty, fraudsters find new avenues to exploit. This is especially true during the COVID-19 pandemic. To help combat the scams that are often born out of these times of crisis — CUNA, AACUL and ABA — the organizations that serve financial institutions have created their own resource pages to keep bank and credit union leaders informed.

52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Malicious USB Drive Hides Behind Gift Card Lure

Dark Reading

Victims are being enticed to insert an unknown USB drive into their computers.

82
article thumbnail

RIM implications of teleworking

The Schedule

Over the past weeks, more and more businesses, government agencies, educational facilities, and cultural heritage organizations have shuttered their physical locations — either in a proactive attempt to prevent community spread of the coronavirus or in response to local shelter in place/stay at home orders — and have stood up teleworking and online options.

article thumbnail

Virgin Media Could Pay GB pound 4.5B for Leak Affecting 900,000 Customers

Dark Reading

A misconfigured database holding personal data was left available online between April 2019 and February 2020.