Fri.Apr 10, 2020

article thumbnail

Travelex Paid $2.3 Million to Ransomware Gang: Report

Data Breach Today

Attack Crippled Currency Exchange's Services for Weeks Travelex, a London-based foreign currency exchange that does business in 26 countries, including the U.S., paid a ransomware gang $2.3 million to regain access to its data following an attack, the Wall Street Journal reports. The incident crippled the company's customer services for weeks.

article thumbnail

New IRS Site Could Make it Easy for Thieves to Intercept Some Stimulus Payments

Krebs on Security

The U.S. federal government is now in the process of sending Economic Impact Payments by direct deposit to millions of Americans. Most who are eligible for payments can expect to have funds direct-deposited into the same bank accounts listed on previous years’ tax filings sometime next week. Today, the Internal Revenue Service (IRS) stood up a site to collect bank account information from the many Americans who don’t usually file a tax return.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zoom Still Addressing Security, Privacy Concerns

Data Breach Today

Governments, Organizations Rethink Use of Teleconference Platform As governments and organizations around the globe rethink their use of the Zoom teleconference platform as a result of ongoing privacy and security concerns, the company is making more system changes and has formed a CISO advisory board.

Privacy 274
article thumbnail

CVE-2020-3952 flaw could allow attackers to hack VMware vCenter Server

Security Affairs

VMware has addressed a critical information disclosure vulnerability related to the Directory Service that can be exploited to compromise vCenter Server. VMware has addressed a critical information disclosure flaw, tracked as CVE-2020-3952, that could be exploited by attackers to compromise vCenter Server or other services that use the Directory Service ( vmdir ) for authentication.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Analysis: Remote Workplace Security Challenges

Data Breach Today

The latest edition of the ISMG Security Report discusses the cybersecurity challenges posed by the work-at-home shift. Also featured: Tips from NIST on developing remote worker security policies, plus a discussion of the nascent threat of AI meeting assistants.

More Trending

article thumbnail

China Builds COVID-19 Recovery on Blockchain

Data Breach Today

Gartner's Avivah Litan on Benefits, Concerns and New Issues to Consider Gartner analyst Avivah Litan says China is attempting to leverage blockchain technology in the country's COVID-19 recovery. What are the benefits and concerns of this approach, and how should it shape the future use of blockchain?

article thumbnail

Sophos Sandboxie is now available as an open-source tool

Security Affairs

Sophos announced the public release of the source code of the sandbox-based isolation program Sandboxie. Sophos is going to release the Windows sandbox-based isolation program Sandboxie in open source. “Sandboxie has long been a favorite sandbox-based isolation tool since its original release over fifteen years ago. Now this technology will live on in the hands of its dedicated users.” Sophos Director of Product Marketing Seth Geftic said. “We are thrilled to give the code to

Marketing 144
article thumbnail

Safeguarding PHI During Covid-19 Crisis: Emerging Challenges

Data Breach Today

As some cities and states recruit retired healthcare professionals, new medical school graduates and clinicians from other regions to assist in their COVID-19 responses, it's critical to ensure these workers understand the importance of protecting patient information, says privacy attorney Iliana Peters.

Privacy 147
article thumbnail

How Apple and Google Are Enabling Covid-19 Bluetooth Contact-Tracing

WIRED Threat Level

The tech giants have teamed up to use a Bluetooth-based framework to keep track of the spread of infections without compromising location privacy.

Privacy 140
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Apple, Google Team on Coronavirus Tracking – Sparking Privacy Fears

Threatpost

Apple and Google announced that decentralized Bluetooth technology will soon be rolled out for coronavirus contact tracing. The privacy implications are worrisome for some.

Privacy 124
article thumbnail

When All Behavior is Abnormal, How Do We Detect Anomalies?

Dark Reading

Identifying normal behavior baselines is essential to behavior-based authentication. However, with COVID-19 upending all aspects of life, is it possible to build baselines and measure normal patterns when nothing at all seems normal?

article thumbnail

Teams Usage Reports – Ensure Your Employees are Leveraging Teams

Daymark

It’s a crazy time out there. Businesses have been mandated by state governments to enable employees to work from home. Literally overnight, there have been massive shifts to connect people remotely. Suddenly even your grandparents know what Zoom is! Microsoft Teams is playing an integral part in facilitating remote communication and collaboration. Most companies with Office 365 subscriptions already have licenses for this product, but just now are really rushed to enable Teams for the massive in

article thumbnail

8 Phishing Lures Preying on Pandemic Panic

Dark Reading

Phishing campaigns and scams are skyrocketing to take advantage of people concerned about COVID-19 impacts. Here are some key examples in action.

Phishing 129
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Weekly Update 186

Troy Hunt

Somehow this week's update ended up being 55 minutes, largely because of playing with a bunch of the new network gear and unboxing a pretty snazzy looking rack from 4Cabling. I get through with that then sit by the pool for the rest of this week's update. (And yes, I shaved!) Incidentally, there's some audio clipping occurring after I sit by the pool.

Passwords 106
article thumbnail

8 Phishing Lures Preying on Pandemic Panic

Dark Reading

Phishing campaigns and scams are skyrocketing to take advantage of people concerned about COVID-19 impacts. Here are some key examples in action.

Phishing 127
article thumbnail

Webinar on Business Continuity and COVID-19 from a GDPR Perspective

Hunton Privacy

Join us on April 20, 2020, for an in-depth webinar on Business Continuity and COVID-19 from a GDPR Perspective. Our featured speakers, Hunton Brussels lawyers David Dumont and Anna Pateraki , will discuss key considerations with respect to ensuring business continuity and management of your GDPR compliance program amidst the COVID-19 pandemic. They will highlight key data protection issues that arise in connection with COVID-19, including: Priorities for crisis management from a data protection

GDPR 102
article thumbnail

DoppelPaymer crew leaked internal confidential documents belonging to aerospace companies

Security Affairs

DoppelPaymer hackers leaked online internal confidential documents belonging to some of the largest aerospace companies in the world. The gang behind the DoppelPaymer ransomware has stolen internal confidential documents belonging to some of the largest aerospace companies in the world from the industrial contractor Visser Precision. Visser Precision is a parts maker for many companies in several industries, including aerospace, automotive, industrial and manufacturing.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

COVID-19: Temporary Work-From-Home Models and PCI DSS Compliance

Hunton Privacy

As of early April, hundreds of millions of workers around the world have been affected by “stay-at-home” or “station-in-place” orders issued by governments in response to the COVID-19 pandemic. To cope, transaction processors are shifting work out of their high-security delivery centers and into the spare bedrooms and home offices of their personnel.

article thumbnail

IBM Garage fuels Mueller Inc's AI journey with design thinking

IBM Big Data Hub

In today’s environment, seasoned companies who continue to weather the tests of time suddenly demand greater attention. How do they retain their grit and withstand adversity, whether from the COVID-19 pandemic or digital disruption? How much do values play out in their approach to customers, their ability to embrace new technology, or adopt a new method?

100
100
article thumbnail

Tails OS version 4.5 supports the Secure Boot

Security Affairs

The popular privacy-focused Tails OS has released version 4.5 this, for the first time it supports the security feature named UEFI Secure Boot. Tails, the popular privacy-focused OS, now supports the UEFI Secure Boot, this means that it could boot on systems where the UEFI Secure Boot is enabled. Tails is a live operating system that users can start on almost any computer from a USB stick or a DVD, it aims at preserving privacy and anonymity of the users.

Security 107
article thumbnail

Compromised Zoom Credentials Swapped in Underground Forums

Threatpost

Thousands of compromised Zoom credentials were discovered in underground forums as cybercriminals look to tap into the burgeoning remote workforce.

Privacy 109
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

New Certification Coming Soon: Certified Data Privacy Solutions Engineer via ISACA

IG Guru

It appears ISACA is getting into the privacy certification world. Check out their press release here. The post New Certification Coming Soon: Certified Data Privacy Solutions Engineer via ISACA appeared first on IG GURU.

article thumbnail

SFO Websites Hacked: Airport Discloses Data Breach

Threatpost

San Francisco International Airport notified users of two low-traffic websites of a data breach that occurred in March.

article thumbnail

Criminals Selling Videoconferencing Credentials on Dark Web

Dark Reading

Two security firms find thousands of usernames and passwords for Zoom accounts for sale and warn that the shift to remote work is changing attackers' targets.

Sales 140
article thumbnail

Critical VMware Bug Opens Up Corporate Treasure to Hackers

Threatpost

The bug -- rated 10 in severity -- potentially affects large numbers of corporate VMs and hosts.

Cloud 125
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Kubernetes Security

Schneier on Security

Attack matrix for Kubernetes, using the MITRE ATT&CK framework. A good first step towards understand the security of this suddenly popular and very complex container orchestration system.

Security 124
article thumbnail

Travelex Pays $2.3M in Bitcoin to Hackers Who Hijacked Network in January

Threatpost

The payout stems from a system-wide attack that knocked global networks offline on New Year’s Eve and reflects a shift in thinking about ransom payouts.

article thumbnail

CCPA Marches On: California Attorney General Proposes Further Revisions to CCPA Regulations, Industry Pleads for Enforcement Delay Amid COVID-19 Crisis

Data Matters

While the world seems to have ground to a halt in so many ways, time still marches on, and along with it, the California Consumer Privacy Act (“CCPA”) enforcement date (July 1, 2020) inches ever closer. On March 11, 2020, the California Attorney General (“AG”) released the third turn of proposed California Consumer Privacy Act (“CCPA”) regulations.

Privacy 68