Fri.Mar 27, 2020

article thumbnail

Insurer Chubb Investigating 'Security Incident'

Data Breach Today

Maze Gang Claims Insurer Is a Victim, Emsisoft Reports Switzerland-based global insurance firm Chubb acknowledges that it's investigating a "security incident." Meanwhile, the Maze ransomware gang is claiming Chubb is its latest victim, according to researchers at the security firm Emsisoft.

Insurance 316
article thumbnail

Ryuk Ransomware operators continue to target hospitals during COVID19 outbreak

Security Affairs

Operators behind the Ryuk Ransomware continue to target hospitals even as these organizations are involved in the fight against the Coronavirus pandemic. The threat actors behind the infamous Ryuk Ransomware continue to target hospitals, even as they are involved in containing the Coronavirus outbreak. The decision of the operators is not aligned with principal ransomware gangs that have announced they will no longer target health and medical organizations during the Coronavirus (COVID-19) pande

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hijacked Routers Steering Users to Malicious COVID-19 Sites

Data Breach Today

Researchers: Cybercriminals Use DNS Hijacking to Spread New Type of Infostealer Cybercriminals are waging brute-force attacks that enable them to change DNS settings on home and small business routers to redirect victims to fake COVID-19-themed websites that push infostealer malware, according to the security firm Bitdefender.

Security 309
article thumbnail

A Twitch Streamer Is Exposing Coronavirus Scams Live

WIRED Threat Level

Kitboga has built a following by trolling telemarketers. Covid-19 opportunists have given him a whole new crop of targets.

Security 145
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Coalition Formed to Address COVID-19 Crisis

Data Breach Today

Observers Warn That Privacy, Security Must Be Adequately Addressed More than two dozen healthcare organizations and technology firms have formed a coalition to help address the COVID-19 crisis by using secure information sharing and data analysis. But observers warn the group must devote enough attention to privacy and security issues.

Privacy 243

More Trending

article thumbnail

Analysis: Russia's COVID-19 Disinformation Campaign

Data Breach Today

The latest edition of the ISMG Security Report analyzes how and why Russia is spreading disinformation about the COVID-19 pandemic. Plus: the latest CCPA regulation updates; a CISO's tips on securely managing a remote workforce.

Security 233
article thumbnail

0patch releases free unofficial patches for Windows 0days exploited in the wild

Security Affairs

ACROS Security’s 0patch service released unofficial patches for two Windows flaws actively exploited by attackers in the wild. ACROS Security’s 0patch service released unofficial patches for two Windows vulnerabilities actively exploited by attackers in the wild, both issues have yet to be fixed by Microsoft. A few days ago, Microsoft warned of hackers actively exploiting two zero-day remote code execution vulnerabilities in Windows Adobe Type Manager Library.

Libraries 110
article thumbnail

COVID-19: The Digital Exposure Crisis

Data Breach Today

Cybersecurity Specialist John Walker on Lack of Preparedness, Bad Cyber Practices in UK The COVID-19 pandemic has exposed more than policy and social gaps, says U.K.-based cybersecurity expert John Walker. It's also manifested in digital exposures born out of lack of preparedness and bad practices. Walker offers insights on improving the cyber response.

article thumbnail

Watchdog approves use of UK phone data if it helps fight coronavirus

The Guardian Data Protection

Information Commissioner’s Office says it would approve practice as containing strategy Coronavirus – latest updates See all our coronavirus coverage The UK’s privacy watchdog has said the government can use personal data from people’s mobile phones to track and monitor behaviour if it helps fight the spread of coronavirus. It emerged last week that the government was in talks with UK mobile phone companies to potentially use anonymous location and usage data to create movement maps, with a 12-

IT 101
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Russia's Cybercrime Rule Reminder: Never Hack Russians

Data Breach Today

BuyBest Bust: Russia Charges 25 Individuals With Trafficking in Stolen Bank Card Data Russian authorities typically turn a blind eye to cybercrime committed by citizens, provided they target foreigners. But as the recent "BuyBest" arrests of 25 individuals demonstrate, authorities do not tolerate criminals that target Russians, and especially not anyone who targets Russian banks.

217
217
article thumbnail

New financially motivated attacks in Western Europe traced to Russian-speaking threat actors

Security Affairs

Researchers at Group-IB observed new financially motivated attacks in Western Europe traced to Russian-speaking threat actors. Group-IB , a Singapore-based cybersecurity company that specializes in preventing cyberattacks , has detected successful attacks in Western Europe carried out in late January 2020 traced to Russian-speaking threat actors. At least two companies operating in pharmaceutical and manufacturing sectors have been affected.

article thumbnail

Tips for choosing data management solutions: Consider roadmaps, partners, and talent

IBM Big Data Hub

IDC’s report, “ Choosing the Right Database Technology in the Age of Digital Transformation ” highlights the expanse of data management options as well as how that can cause confusion. Having clarity when looking to build new data applications or modernize workloads already in existence is essential.

article thumbnail

Weekly Update 184

Troy Hunt

This has been an absolutely flat-out week between running almost 3 hours of our free Cyber-Broken talk with Scott Helme, doing an hour of code with Ari each day (and helping get up to speed with remote schooling) then running our Hack Yourself First workshop on Aussie time zones the last couple of days. But, especially given the current circumstances, I'm pretty happy with the result ??

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Current Operating Status

National Archives Records Express

During the current public health national emergency, the Office of the Chief Records Officer for the U.S. Government remains ‘virtually’ open. All staff are 100% teleworking and our office is available to respond to questions or concerns. If you are unsure who to contact, our website contains a list of various email addresses. While we are virtually open for business, we are suspending in-person visits for appraisal, for oversight, and for other agency meetings.

article thumbnail

Purported Brute-Force Attack Aims at Linksys Routers as More People Work Remotely

Dark Reading

The attack takes control of poorly secured network devices, redirecting Web addresses to a COVID-themed landing page that attempts to fool victims into downloading malware.

Security 116
article thumbnail

Story of Gus Weiss

Schneier on Security

This is a long and fascinating article about Gus Weiss, who masterminded a long campaign to feed technical disinformation to the Soviet Union, which may or may not have caused a massive pipeline explosion somewhere in Siberia in the 1980s, if in fact there even was a massive pipeline explosion somewhere in Siberia in the 1980s. Lots of information about the origins of US export controls laws and sabotage operations.

104
104
article thumbnail

The Wild, Wild West(world) of Cybersecurity

Dark Reading

Though set in the future, HBO's "Westworld" works as an allegory for the present moment in cybersecurity.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Google Bans Infowars Android App Over Coronavirus Claims

WIRED Threat Level

Apple kicked Alex Jones out of the App Store in 2018. The Google Play Store has finally followed suit.

Security 100
article thumbnail

Apple Unpatched VPN Bypass Bug Impacts iOS 13, Warn Researchers

Threatpost

The vulnerability can be exploited to reveal limited traffic data including a device’s IP address.

article thumbnail

COVID-19 – European and U.S. Privacy and Employment Law Issues

Data Matters

A discussion on the latest European and U.S. privacy and employment law issues with COVID-19 and strategies to deal with this situation in a holistic and coordinated manner. In particular, we consider the latest guidance from Data Protection Authorities, how to develop a privacy protocol that deals with the GDPR and U.S. privacy issues and UK and U.S. employment law issues and latest developments related to COVID-19.

Privacy 68
article thumbnail

Hunton Privacy Lawyers Contribute to the Guide to Cyber Investigations

Hunton Privacy

In GIR’s recently published Guide to Cyber Investigations , Hunton Andrews Kurth partner Aaron Simpson and associate Adam Solomon are featured as contributing authors to the chapter on Complying with Breach Notification Obligations in a Global Setting: A Legal Perspective. In this chapter, Simpson and Solomon provide an overview of global notification obligations, and offer tactical recommendations regarding approaches businesses and organizations should consider in managing the fast-changing le

Privacy 68
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

A missing authorization check in WordPre WPvivid plugin that can lead to the exposure of the database and all files

Security Affairs

Researchers warn of a security flaw recently addressed in the WPvivid Backup Plugin that could be exploited to obtain all files of a WordPress website. WebARX experts warn of a missing authorization check recently addressed in the WPvivid Backup Plugin that could be exploited to obtain all files of a WordPress website. “There is a missing authorization check in the WPvivid plugin that can lead to the exposure of the database and all files of the WordPress site.” reads the post publi

article thumbnail

COUNTDOWN TO IBM THINK WITH IBM CHAMPION ANDY STEEDS

Rocket Software

This year, a record-breaking number of Rocket employees were named as 2020 IBM Champions—13 to be exact. To celebrate our ongoing partnership with IBM, and our dedication to innovation, legacy technologies and legendary results, we want to highlight them. . Over the next weeks, we will count down to IBM THINK with each of the 2020 Champions, and celebrate what we love about our partnership with IBM!

article thumbnail

IG Pro Speaks from Italy About COVID-19

IG Guru

Dear friends from all over the world, I’m an ARMA and I-SIGMA active member and at the same time I am the GM of OMTRA Srl, the oldest Information Governance company in Italy. I live and work in Milan, Italy, now “on the front line against COVID 19.” Something is happening that I never expected in […]. The post IG Pro Speaks from Italy About COVID-19 appeared first on IG GURU.

article thumbnail

COVID-19 Resources for Bank and Credit Union Leaders

Rippleshot

During times of uncertainty, fraudsters find new avenues to exploit. This is especially true during the COVID-19 pandemic. To help combat the scams that are often born out of these times of crisis — CUNA, AACUL and ABA — the organizations that serve financial institutions have created their own resource pages to keep bank and credit union leaders informed.

52
article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Malicious USB Drive Hides Behind Gift Card Lure

Dark Reading

Victims are being enticed to insert an unknown USB drive into their computers.

82
article thumbnail

The power of a Jamf User Group

Jamf

Once this admin attended his first Jamf User Group, there was no turning back. See why.

66
article thumbnail

Virgin Media Could Pay GB pound 4.5B for Leak Affecting 900,000 Customers

Dark Reading

A misconfigured database holding personal data was left available online between April 2019 and February 2020.