Wed.May 27, 2020

article thumbnail

Modern Bank Heists 3.0: 'A Hostage Situation'

Data Breach Today

Tom Kellermann of VMware Carbon Black on Defending Against Surge in Online Attacks Ransomware, wire transfer fraud, destructive attacks: In recent months, the financial sector has seen these and other online attacks surge by 238% as criminals continue to exploit the pandemic, warns Tom Kellermann of VMware Carbon Black, who shares findings from his firm's third "Modern Bank Heists" report.

article thumbnail

Fuckunicorn ransomware targets Italy in COVID-19 lures

Security Affairs

A new piece of ransomware dubbed FuckUnicorn it targeting Italy by tricking victims into downloading a fake COVID-19 contact tracing app. A new ransomware dubbed FuckUnicorn has been targeting computers in Italy by tricking victims into downloading a fake contact tracing app, named Immuni, that promises to provide real-time updates for the COVID-19 outbreak.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Another Alleged FIN7 Cybercrime Gang Member Arrested

Data Breach Today

Faces 13 Charges, Including Computer Hacking The FBI has arrested another alleged member of the FIN7 cybercrime gang, which has been stealing millions of payment cards and other financial data since at least September 2015. It's the fourth arrest of those tied to the group.

IT 225
article thumbnail

Security 101: SQL Injection

Dark Reading

A carefully crafted attack can convince a database to reveal all its secrets. Understanding the basics of what the attack looks like and how to protect against it can go a long way toward limiting the threat.

Security 111
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Russian Hackers Revamp Malware, Target Governments: Report

Data Breach Today

Turla Group Targeted Agencies in Eastern Europe, ESET Researchers Say Turla, a sophisticated hacking group with suspected ties to the Russian government, recently used a revamped version of its malware to target government entities in Eastern Europe, according to new research from the security firm ESET.

More Trending

article thumbnail

Videoconferencing: Think Twice Before Hitting 'Record'

Data Breach Today

After Rushed Adoption, Kroll's Alan Brill Says Security and Privacy Must Catch Up As a result of the COVID-19 pandemic, work-from-home employees have rushed to adopt videoconferencing tools. But Kroll's Alan Brill warns that sound security and privacy practices - backed by legal, risk management and HR teams - too often lag. Here are his top concerns and tips on how to address them.

Privacy 182
article thumbnail

Researchers dismantled ShuangQiang gang?s botnet that infected thousands of PCs

Security Affairs

A joint operations conducted by experts from Chinese firms Qihoo 360 Netlab and Baidu dismantle the ShuangQiang ‘s botnet infecting over hundreds of thousands of systems. A joint operation conducted by Chinese security firm Qihoo 360 Netlab and tech giant Baidu disrupted a botnet operated by a group tracked as ShuangQiang (aka Double Gun ) that infected over hundreds of thousands of systems.

Analytics 100
article thumbnail

HHS's COVID-19 Response, Recovery Efforts to Be Scrutinized

Data Breach Today

OIG Spells Out Plans for Monitoring Security, Privacy Efforts A federal watchdog agency has established key goals and objectives - including protecting the security of IT infrastructure as well as combating fraud - that drive its oversight of the Department of Health and Human Services' COVID-19 response and recovery activities.

Privacy 173
article thumbnail

?[F]Unicorn? Ransomware Impersonates Legit COVID-19 Contact-Tracing App

Threatpost

The new malware family was seen pretending to be an official Italian app, called Immuni.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

Websites Conducting Port Scans

Schneier on Security

Security researcher Charlie Belmer is reporting that commercial websites such as eBay are conducting port scans of their visitors. Looking at the list of ports they are scanning, they are looking for VNC services being run on the host, which is the same thing that was reported for bank sites. I marked out the ports and what they are known for (with a few blanks for ones I am unfamiliar with): 5900: VNC. 5901: VNC port 2. 5902: VNC port 3. 5903: VNC port 4. 5279: 3389: Windows remote desktop / RD

Libraries 120
article thumbnail

Hackers Sell Data from 26 Million LiveJournal Users on Dark Web

Threatpost

Passwords and other credentials have been listed on Have I Been Pwned as attack rumors circulate.

Passwords 117
article thumbnail

6 Steps Consumers Should Take Following a Hack

Dark Reading

Without the luxury of an IT security team to help them after a breach or credit card compromise, consumers will want to keep these tips in mind.

article thumbnail

State-Based Contact-Tracing Apps Could Be a Mess

WIRED Threat Level

With no nationwide Covid-19 notification software in sight, security and interoperability issues loom large.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Real estate app leaking thousands of user records and sensitive private messages

Security Affairs

Real estate app leaking thousands of user records and sensitive private messages. The CyberNews research team uncovered an unsecured Amazon Simple Storage Service bucket of confidential user chat logs belonging to Real estate app Tellus, a US-based software company. Tellus is a software company based in Palo Alto, California, backed by “well-known investors” that aims to “reimagine Real Estate for the modern era.

article thumbnail

Wunderman Thompson uses data and AI to create relevant experiences for brands

IBM Big Data Hub

Merging creativity, data and technology. Using data to shape new messaging or find new prospects is core to our business, but we wanted to do more, and do it better. In markets continually roiled by disruption and innovation, we needed to help our clients move beyond transactional relationships toward cultivating deeper, longer engagements, using data to forge authentic interactions between brands and customers.

article thumbnail

Google Chrome Is Getting a Bunch of New Privacy Features

WIRED Threat Level

The next version of the browser will be more secure than ever. Here’s what you need to know.

Privacy 98
article thumbnail

Grandoreiro Malware implements new features in Q2 2020

Security Affairs

The updated Grandoreiro Malware equipped with latenbot-C2 features in Q2 2020 now extended to Portuguese banks. Grandoreiro is a Latin American banking trojan targeting Brazil, Mexico, Spain, Peru, and has now extended to Portugal. Cybercriminals attempt to compromise computers to generate revenue by exfiltrating information from victims’ devices, typically banking-related information.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

FTC Approves Settlement with Canadian Lockmaker Over Deceptive Security Claims

Hunton Privacy

We previously posted about the Tapplock, Inc. (“Tapplock”) settlement with the Federal Trade Commission (“FTC”) over allegations that the company violated Section 5 of the FTC Act by falsely claiming that its “smart locks” were secure. Earlier this month, the FTC voted 5-0 to approve the settlement. Tapplock sells fingerprint-enabled, internet-connected padlocks that interact with a companion mobile app, allowing users to lock and unlock their padlocks when they are within Bluetooth range.

article thumbnail

Frequently Asked Questions (FAQs) About Records Management During the COVID-19 Pandemic

IG Guru

Check out the article here. The post Frequently Asked Questions (FAQs) About Records Management During the COVID-19 Pandemic appeared first on IG GURU.

article thumbnail

Microsoft Shares PonyFinal Threat Data, Warns of Delivery Tactics

Dark Reading

PonyFinal is deployed in human-operated ransomware attacks, in which adversaries tailor their techniques based on knowledge of a target system.

article thumbnail

Five reasons to master your product data

IBM Big Data Hub

Accurate product details and descriptions shape buyer and user behavior. These details – product size, weights, descriptions, reviews, certifications, etc – make the products findable to address shopper needs and allow for comparison. The need extends across industries, including both traditional products one could buy in a store, and less tangible products and services, such as credit cards, loans or cell phone plans that one could find in the financial services or communications industries.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Cloud Security Architect Proves Hardest Infosec Role to Fill

Dark Reading

Nearly 70% of businesses struggle to recruit, hire, and retain cybersecurity talent, and many link security incidents to lack of skills.

Cloud 78
article thumbnail

Be Legendary: Sutter Health

Rocket Software

We work hard every day at Rocket to live up to our core values of empathy, humanity, trust, and love. When we see those values reflected in other companies from industries as diverse as financial services, healthcare, government, retail, and manufacturing, we want to celebrate them! Whether it’s through their work with nonprofits, an offering of local support, or an easing of contracts for their customers, we’re here to recognize the extraordinary ways in which companies are helping their commun

article thumbnail

GDPR Enforcement Loosens Amid Pandemic

Dark Reading

The European Union has given some organizations more breathing room to remedy violations, yet no one should think regulators are planning to abandon the privacy legislation in the face of COVID-19.

GDPR 67
article thumbnail

Brazil Update: Congress Sends Bill Delaying LGPD Sanctions but not Effective Date to President

HL Chronicle of Data Protection

As previously reported, Brazilian lawmakers have been debating a delay to the LGPD, which was scheduled to come into effect August 15, 2020, in response to COVID-19. The Brazilian Senate first passed Bill 1,179/2020 , and Brazil’s President later enacted Provisional Measure 959 (PM 959). On May 19, 2020, the Brazilian Congress sent to the President’s desk an amended Bill 1,179/2020 (Final Bill) that would maintain the LGPD’s August 15, 2020 effective date but would delay administrative sanctions

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

Standing Privilege: The Attacker's Advantage

Dark Reading

The credential is a commodity and will continue to be breached. As a result, focus and spending must shift toward the access that the credentials provide.

Access 93
article thumbnail

The Benefits of Cloud Storage For Working From Home

Record Nations

At a point in time where the COVID-19 pandemic has forced a large number of employers to begin shifting towards having employees in work-from-home positions, many traditionally paper-based and in-person businesses are now needing to find and implement a new system for employees to work remotely. Luckily however, there are tools like cloud storage which […].

Cloud 58
article thumbnail

What the World's Elite Protectors Teach Us about Cybersecurity

Dark Reading

How to protect anyone and anything, from the perspective of a career Secret Service agent and former special operations marine.