Wed.Jun 10, 2020

article thumbnail

Honda Confirms Hack Attack Disrupted Global Production

Data Breach Today

Ransomware Is the Likely Culprit, Security Experts Say Japanese auto giant Honda has confirmed that it sustained a hack attack earlier this week that has affected production operations at several of its global facilities, including plants in the U.S., Japan, Turkey and Italy. Security researchers suspect ransomware is the likely culprit.

article thumbnail

Matt Hancock clueless about confidentiality breach at his own GP surgery

The Guardian Data Protection

Health secretary heard saying he ‘should have known’ about video consultation breach The health secretary was caught on a live microphone admitting he was unaware of a data breach involving confidential patient information at his own GP practice until asked about it at a virtual conference. Babylon Health, a telemedicine company that enables people to have GP consultations over video chat, admitted to the breach on Tuesday night.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kingminer Botnet Targeting SQL Servers for Cryptomining

Data Breach Today

Sophos: Botnet Uses Brute-Force Attacks Targeting Vulnerable Databases The operators behind the Kingminer botnet have recently started targeting vulnerable Microsoft SQL Server databases using brute-force methods in order to mine cryptocurrency, according to research from Sophos. In addition, the botnet operators have attempted to exploit the EternalBlue vulnerability.

Mining 263
article thumbnail

Snake Ransomware Delivers Double-Strike on Honda, Energy Co.

Threatpost

The ICS/SCADA-focused malware is likely behind a duo of attacks this week, on Honda and a South American energy company, researchers said.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Financial and Economic Crime Targeted by New Europol Center

Data Breach Today

'Going After Criminal Money Requires Specific Expertise,' EU Minister Says Europe is targeting financial and economic crime, including fraud and money laundering, via the new European Financial and Economic Crime Center, hosted by the EU's law enforcement intelligence agency Europol. Officials say the launch of such a center during the COVID-19 pandemic is no accident.

242
242

More Trending

article thumbnail

Telehealth App Breach Spotlights Privacy, Security Risks

Data Breach Today

Glitch Briefly Allowed Potential Access to Patient Consultation Recordings A software error that briefly allowed individuals to access other patients' telehealth appointment recordings serves as a reminder of the potential security and privacy risks involving telemedicine applications, especially as the use of the technology soars during the COVID-19 pandemic.

Risk 230
article thumbnail

Japanese car-maker giant Honda hit by a ransomware attack

Security Affairs

Japanese carmaker Honda announced it has been hit by a cyberattack that disrupted its business in several countries. The Japanese carmaker Honda announced that threat actors have compromised the Honda network disrupting its business in several countries. Source informed about the security incident believe Honda’s systems have been infected with SNAKE Ransomware.

article thumbnail

The State of Payments Fraud in a Pandemic

Data Breach Today

Payment fraud continues to evolve during the COVID-19 pandemic, exploiting changing habits and behaviors of consumers. Melissa Gaddis of TransUnion, who has been tracking these changes, says one of the surprising changes concerns millennials: They're now fraudsters' top target.

208
208
article thumbnail

Slovak police found wiretapping devices connected to the Govnet government network

Security Affairs

Slovak police seized wiretapping devices connected to Govnet government network and arrested four individuals, including the head of a government agency. Slovak National Criminal Agency (NAKA) seized wiretapping devices connected to the Govnet network and arrested four individuals, including the head of a government agency, who was responsible for managing the government network.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UpNp Vulnerability Could Affect Billions of IoT Devices

Data Breach Today

CalllStranger Flaw Found in Windows 10, Other Connected Devices Carnegie Mellon University Software Engineering Institute's CERT notification center has posted a warning of a flaw in the Universal Plug and Play protocol that could potentially affect billions of internet-connected devices. If exploited, this flaw could lead to DDoS attacks and theft of data.

IoT 202
article thumbnail

Asset Management Mess? How to Get Organized

Dark Reading

Hardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure it.

Security 102
article thumbnail

Can Mobile Voting Be Secure?

Data Breach Today

Perceived wisdom is that mobile voting will be open to significant opportunities for interception, manipulation and nation-state interference. Nimit Sawney, CEO of Voatz, describes the architecture of a secure mobile voting system.

Security 194
article thumbnail

Helping Remote Workers Overcome Remote Attacks

Threatpost

Because remote workers' devices are all connected to a home network, they don’t even need to be attacked directly. Instead, attackers have multiple avenues of attack that can be exploited.

IoT 96
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Sharpen your competitive edge using COBOL and mainframe systems

Micro Focus

Brian Crane, Solution Director at Micro Focus, looks at the issues affecting IT leaders today and offers some rare insights into smart ways to transform IT. Interesting Times Up until now, 2020 has proved to be quite a pivotal year. The current COVID-19 pandemic has triggered many changes in business behaviour right across the globe. View Article.

IT 91
article thumbnail

Thanos Ransomware First to Weaponize RIPlace Tactic

Threatpost

Thanos is the first ransomware family to feature the weaponized RIPlace tactic, enabling it to bypass ransomware protections.

article thumbnail

A high-severity flaw affects VMware Workstation, Fusion and vSphere products.

Security Affairs

VMware has addressed a high-severity information disclosure vulnerability affecting its Workstation, Fusion and vSphere virtualization products. VMware has addressed a high-severity information disclosure vulnerability, tracked as CVE-2020-3960 , that affects its Workstation, Fusion and vSphere virtualization products. The CVE-2020-3960 flaw was discovered by Cfir Cohen, a researcher from Google’s cloud security team.

Cloud 90
article thumbnail

Encryption Utility Firm Accused of Bundling Malware Functions in Product

Threatpost

The increasingly prevalent GuLoader malware has been traced back to a far-reaching encryption service that attempts to pass as above-board.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Agilely adapting financial management practices to drive business continuity and growth

CGI

Agilely adapting financial management practices to drive business continuity and growth. With the COVID-19 pandemic, many organizations face drastic revenue losses resulting in budget cuts and restructuring. In addition to this immediate impact, other short- and long-term economic challenges are pressuring organizations to become agile and adapt their financial decision-making and modeling to not only weather the pandemic, but also drive sustainable competitive advantage in spite of it.

article thumbnail

Nintendo admitted that hackers have breached 300,000 accounts

Security Affairs

Japanese gaming giant Nintendo has confirmed that hackers have breached 300,000 accounts since early April, financial data were not exposed. The Japanese video game giant Nintendo has admitted that threat actors have breached 300,000 accounts since early April. The hackers have gained access to personal information, including birthday and email address, but financial data were not impacted.

article thumbnail

Amazon Won’t Let Police Use Its Facial-Recognition Tech for One Year

WIRED Threat Level

Amid nationwide protests over police brutality, the company is stopping law enforcement from using its most controversial product.

IT 100
article thumbnail

Critical Intel Flaws Fixed in Active Management Technology

Threatpost

Two critical flaws in Intel AMT, which could enable privilege escalation, were patched along with 20 other bugs in its June security update.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Availability Attacks against Neural Networks

Schneier on Security

New research on using specially crafted inputs to slow down machine-learning neural network systems: Sponge Examples: Energy-Latency Attacks on Neural Networks shows how to find adversarial examples that cause a DNN to burn more energy, take more time, or both. They affect a wide range of DNN applications, from image recognition to natural language processing (NLP).

Paper 107
article thumbnail

Fake COVID-19 Contact-Tracing Apps Infect Android Phones

Dark Reading

Researchers find 12 Android applications disguised as official COVID-19 contact tracing apps installing malware onto devices.

90
article thumbnail

Georgia’s Failure Shows How Not to Run an Election in the Pandemic

WIRED Threat Level

Limiting in-person polling sites makes it both harder to vote and more dangerous.

IT 99
article thumbnail

Efficient Security Testing Requires Automation, but Humans Are Needed Too

Dark Reading

An annual survey of penetration testers finds that although machines can quickly find many classes of vulnerabilities, human analysts are still necessary to gauge the severity of discovered issues.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Building a resilient supply chain

OpenText Information Management

The massive disruption caused by the coronavirus outbreak has highlighted significant challenges in global supply chains. As highlighted in Fortune magazine: “The coronavirus pandemic has caused delays and other frustrations in businesses’ global supply chains…Companies caught flat-footed should learn their lesson from this crisis and begin making fundamental changes now to prepare their supply chains … The post Building a resilient supply chain appeared first on OpenText Blogs.

IoT 64
article thumbnail

The Telehealth Attack Surface

Dark Reading

Amid the surge in digital healthcare stemming from the coronavirus pandemic, security is taking a backseat to usability.

Security 109
article thumbnail

Micro Focus ? Rocking the Net Promoter?. STILL.

Micro Focus

Latest Net Promoter® Score Results Today, I’m going to take a look at the latest Micro Focus Net Promoter® Score (NPS) Competitive Benchmark Results. (a) NPS Results We run our competitive benchmark program quarterly using rolling data. In the latest dataset, which I highlight is double-blind and contains a very large sample size of over 15,000. View Article.

59