Wed.May 27, 2020

article thumbnail

Modern Bank Heists 3.0: 'A Hostage Situation'

Data Breach Today

Tom Kellermann of VMware Carbon Black on Defending Against Surge in Online Attacks Ransomware, wire transfer fraud, destructive attacks: In recent months, the financial sector has seen these and other online attacks surge by 238% as criminals continue to exploit the pandemic, warns Tom Kellermann of VMware Carbon Black, who shares findings from his firm's third "Modern Bank Heists" report.

article thumbnail

Security 101: SQL Injection

Dark Reading

A carefully crafted attack can convince a database to reveal all its secrets. Understanding the basics of what the attack looks like and how to protect against it can go a long way toward limiting the threat.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Another Alleged FIN7 Cybercrime Gang Member Arrested

Data Breach Today

Faces 13 Charges, Including Computer Hacking The FBI has arrested another alleged member of the FIN7 cybercrime gang, which has been stealing millions of payment cards and other financial data since at least September 2015. It's the fourth arrest of those tied to the group.

IT 234
article thumbnail

Fuckunicorn ransomware targets Italy in COVID-19 lures

Security Affairs

A new piece of ransomware dubbed FuckUnicorn it targeting Italy by tricking victims into downloading a fake COVID-19 contact tracing app. A new ransomware dubbed FuckUnicorn has been targeting computers in Italy by tricking victims into downloading a fake contact tracing app, named Immuni, that promises to provide real-time updates for the COVID-19 outbreak.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Russian Hackers Revamp Malware, Target Governments: Report

Data Breach Today

Turla Group Targeted Agencies in Eastern Europe, ESET Researchers Say Turla, a sophisticated hacking group with suspected ties to the Russian government, recently used a revamped version of its malware to target government entities in Eastern Europe, according to new research from the security firm ESET.

More Trending

article thumbnail

Videoconferencing: Think Twice Before Hitting 'Record'

Data Breach Today

After Rushed Adoption, Kroll's Alan Brill Says Security and Privacy Must Catch Up As a result of the COVID-19 pandemic, work-from-home employees have rushed to adopt videoconferencing tools. But Kroll's Alan Brill warns that sound security and privacy practices - backed by legal, risk management and HR teams - too often lag. Here are his top concerns and tips on how to address them.

Privacy 191
article thumbnail

Researchers dismantled ShuangQiang gang?s botnet that infected thousands of PCs

Security Affairs

A joint operations conducted by experts from Chinese firms Qihoo 360 Netlab and Baidu dismantle the ShuangQiang ‘s botnet infecting over hundreds of thousands of systems. A joint operation conducted by Chinese security firm Qihoo 360 Netlab and tech giant Baidu disrupted a botnet operated by a group tracked as ShuangQiang (aka Double Gun ) that infected over hundreds of thousands of systems.

article thumbnail

HHS's COVID-19 Response, Recovery Efforts to Be Scrutinized

Data Breach Today

OIG Spells Out Plans for Monitoring Security, Privacy Efforts A federal watchdog agency has established key goals and objectives - including protecting the security of IT infrastructure as well as combating fraud - that drive its oversight of the Department of Health and Human Services' COVID-19 response and recovery activities.

Privacy 173
article thumbnail

?[F]Unicorn? Ransomware Impersonates Legit COVID-19 Contact-Tracing App

Threatpost

The new malware family was seen pretending to be an official Italian app, called Immuni.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Websites Conducting Port Scans

Schneier on Security

Security researcher Charlie Belmer is reporting that commercial websites such as eBay are conducting port scans of their visitors. Looking at the list of ports they are scanning, they are looking for VNC services being run on the host, which is the same thing that was reported for bank sites. I marked out the ports and what they are known for (with a few blanks for ones I am unfamiliar with): 5900: VNC. 5901: VNC port 2. 5902: VNC port 3. 5903: VNC port 4. 5279: 3389: Windows remote desktop / RD

Libraries 116
article thumbnail

Hackers Sell Data from 26 Million LiveJournal Users on Dark Web

Threatpost

Passwords and other credentials have been listed on Have I Been Pwned as attack rumors circulate.

Passwords 117
article thumbnail

6 Steps Consumers Should Take Following a Hack

Dark Reading

Without the luxury of an IT security team to help them after a breach or credit card compromise, consumers will want to keep these tips in mind.

article thumbnail

State-Based Contact-Tracing Apps Could Be a Mess

WIRED Threat Level

With no nationwide Covid-19 notification software in sight, security and interoperability issues loom large.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Wunderman Thompson uses data and AI to create relevant experiences for brands

IBM Big Data Hub

Merging creativity, data and technology. Using data to shape new messaging or find new prospects is core to our business, but we wanted to do more, and do it better. In markets continually roiled by disruption and innovation, we needed to help our clients move beyond transactional relationships toward cultivating deeper, longer engagements, using data to forge authentic interactions between brands and customers.

article thumbnail

Google Chrome Is Getting a Bunch of New Privacy Features

WIRED Threat Level

The next version of the browser will be more secure than ever. Here’s what you need to know.

Privacy 97
article thumbnail

FTC Approves Settlement with Canadian Lockmaker Over Deceptive Security Claims

Hunton Privacy

We previously posted about the Tapplock, Inc. (“Tapplock”) settlement with the Federal Trade Commission (“FTC”) over allegations that the company violated Section 5 of the FTC Act by falsely claiming that its “smart locks” were secure. Earlier this month, the FTC voted 5-0 to approve the settlement. Tapplock sells fingerprint-enabled, internet-connected padlocks that interact with a companion mobile app, allowing users to lock and unlock their padlocks when they are within Bluetooth range.

article thumbnail

Real estate app leaking thousands of user records and sensitive private messages

Security Affairs

Real estate app leaking thousands of user records and sensitive private messages. The CyberNews research team uncovered an unsecured Amazon Simple Storage Service bucket of confidential user chat logs belonging to Real estate app Tellus, a US-based software company. Tellus is a software company based in Palo Alto, California, backed by “well-known investors” that aims to “reimagine Real Estate for the modern era.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Frequently Asked Questions (FAQs) About Records Management During the COVID-19 Pandemic

IG Guru

Check out the article here. The post Frequently Asked Questions (FAQs) About Records Management During the COVID-19 Pandemic appeared first on IG GURU.

article thumbnail

Grandoreiro Malware implements new features in Q2 2020

Security Affairs

The updated Grandoreiro Malware equipped with latenbot-C2 features in Q2 2020 now extended to Portuguese banks. Grandoreiro is a Latin American banking trojan targeting Brazil, Mexico, Spain, Peru, and has now extended to Portugal. Cybercriminals attempt to compromise computers to generate revenue by exfiltrating information from victims’ devices, typically banking-related information.

article thumbnail

Microsoft Shares PonyFinal Threat Data, Warns of Delivery Tactics

Dark Reading

PonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.

article thumbnail

Five reasons to master your product data

IBM Big Data Hub

Accurate product details and descriptions shape buyer and user behavior. These details – product size, weights, descriptions, reviews, certifications, etc – make the products findable to address shopper needs and allow for comparison. The need extends across industries, including both traditional products one could buy in a store, and less tangible products and services, such as credit cards, loans or cell phone plans that one could find in the financial services or communications industries.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cloud Security Architect Proves Hardest Infosec Role to Fill

Dark Reading

Nearly 70% of businesses struggle to recruit, hire, and retain cybersecurity talent, and many link security incidents to lack of skills.

Cloud 78
article thumbnail

Be Legendary: Sutter Health

Rocket Software

We work hard every day at Rocket to live up to our core values of empathy, humanity, trust, and love. When we see those values reflected in other companies from industries as diverse as financial services, healthcare, government, retail, and manufacturing, we want to celebrate them! Whether it’s through their work with nonprofits, an offering of local support, or an easing of contracts for their customers, we’re here to recognize the extraordinary ways in which companies are helping their commun

article thumbnail

GDPR Enforcement Loosens Amid Pandemic

Dark Reading

The European Union has given some organizations more breathing room to remedy violations, yet no one should think regulators are planning to abandon the privacy legislation in the face of COVID-19.

GDPR 67
article thumbnail

Brazil Update: Congress Sends Bill Delaying LGPD Sanctions but not Effective Date to President

HL Chronicle of Data Protection

As previously reported, Brazilian lawmakers have been debating a delay to the LGPD, which was scheduled to come into effect August 15, 2020, in response to COVID-19. The Brazilian Senate first passed Bill 1,179/2020 , and Brazil’s President later enacted Provisional Measure 959 (PM 959). On May 19, 2020, the Brazilian Congress sent to the President’s desk an amended Bill 1,179/2020 (Final Bill) that would maintain the LGPD’s August 15, 2020 effective date but would delay administrative sanctions

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Standing Privilege: The Attacker's Advantage

Dark Reading

The credential is a commodity and will continue to be breached. As a result, focus and spending must shift toward the access that the credentials provide.

Access 93
article thumbnail

The Benefits of Cloud Storage For Working From Home

Record Nations

At a point in time where the COVID-19 pandemic has forced a large number of employers to begin shifting towards having employees in work-from-home positions, many traditionally paper-based and in-person businesses are now needing to find and implement a new system for employees to work remotely. Luckily however, there are tools like cloud storage which […].

Cloud 58
article thumbnail

What the World's Elite Protectors Teach Us about Cybersecurity

Dark Reading

How to protect anyone and anything, from the perspective of a career Secret Service agent and former special operations marine.