Wed.Jun 24, 2020

article thumbnail

Getting the Most From Information Security Investments

Data Breach Today

How to Avoid Addressing Problems 'Too Far Downstream' Greg van der Gaast, head of information security at the University of Salford in the United Kingdom, has strong opinions on why some security investments aren't reaping maximum benefits. "We are addressing problems too far downstream," he says.

article thumbnail

Frost & Sullivan databases available for sale on a hacker forum

Security Affairs

U.S. business consulting firm Frost & Sullivan suffered a data breach, a threat actor is offering for sale its databases on a hacker forum. U.S. firm Frost & Sullivan suffered a data breach, data from an unsecured backup that were exposed on the Internet was sold by a threat actor on a hacker forum. Frost & Sullivan is a business consulting firm involved in market research and analysis, growth strategy consulting, and corporate training across multiple industries.

Sales 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Evil Corp's 'WastedLocker' Campaign Demands Big Ransoms

Data Breach Today

Researchers: Cybercrime Group, Formerly Known for Dridex, Is Not Exfiltrating Data The Evil Corp cybercrime group, originally known for the Dridex banking Trojan, is now using new ransomware called WastedLocker, demanding ransom payments of $500,000 to $1 million, according to security researchers at NCC Group's Fox-IT.

article thumbnail

New XORDDoS, Kaiji DDoS botnet variants target Docker servers

Security Affairs

Operators behind XORDDoS and Kaiji DDoS botnets recently started targeting Docker servers exposed online, Trend Micro warns. Trend Micro researchers reported that operators behind XORDDoS and Kaiji DDoS botnets recently started targeting Docker servers exposed online. XORDDoS, also known as XOR.DDoS , first appeared in the threat landscape in 2014 it is a Linux Botnet that was employed in attacks against gaming and education websites with massive DDoS attacks that reached 150 gigabytes per secon

IoT 121
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Sodinokibi Ransomware Gang Targets POS Software

Data Breach Today

Symantec: Attackers Use Weaponized Cobalt Strike to Spread Malware The Sodinokibi ransomware gang is targeting point-of-sale payment device software after infecting networks with its crypto-locking malware, according to Symantec.

More Trending

article thumbnail

$90 Million Seized in Fraud Case Tied to BTC-e Exchange

Data Breach Today

Russian Alexander Vinnik Charged in Connection With Fraud Scheme Police have confiscated $90 million from a company allegedly owned by Alexander Vinnik, who is accused of money laundering and defrauding individuals through BTC-e, a cryptocurrency exchange he controlled.

274
274
article thumbnail

Necessity drives innovation in public sector

OpenText Information Management

As COVID-19 has swept the globe, it has sent many public sector organizations into crisis mode. The response from government agencies and departments has been impressive as they moved to handle these circumstances with a speed that few would have thought possible. For public sector technology, the COVID-19 crisis can be seen as a large beta … The post Necessity drives innovation in public sector appeared first on OpenText Blogs.

article thumbnail

Using AI for Improved Threat Detection

Data Breach Today

Enterprises need to move away from manual threat detection methods to leverage artificial intelligence, which can help boost defenses, says Dr. Jassim Haji, president of Artificial Intelligence Society, Bahrain Chapter.

article thumbnail

Brazil Fake News Bill May Undercut Brazil’s Data Protection Gains – Bill to Be Voted on Tomorrow

Hunton Privacy

On May 13, 2020, Senator Alessandro Vieira presented Bill n. 2630/2020 (“Bill”) to the Brazilian Senate, which the Senate is calling the “Fake News Law.” Officially, this Bill establishes the Brazilian law of “freedom, responsibility and transparency on the internet.” It was introduced in the context of the alleged use of fake news by political parties and other public sector stakeholders in Brazil.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Gangs Go (Lady) Gaga for Data Breaches

Data Breach Today

Extortionists Exfiltrating Data Before Crypto-Locking Systems Many ransomware gangs hell-bent on seeing a criminal payday have now added data-exfiltration to their shakedown arsenal. Gangs' extortion play: Pay us, or we'll dump stolen data. One massive takeaway is that increasingly, ransomware outbreaks also are data breaches, thus triggering breach-notification rules.

article thumbnail

COVID-19 Risks of Flying

Schneier on Security

I fly a lot. Over the past five years, my average speed has been 32 miles an hour. That all changed mid-March. It's been 105 days since I've been on an airplane -- longer than any other time in my adult life -- and I have no future flights scheduled. This is all a prelude to saying that I have been paying a lot of attention to the COVID-related risks of flying.

Risk 143
article thumbnail

Nurses Allege Hospital Falsified COVID-19 Testing

Data Breach Today

Meanwhile, Hospital Alleges Workers Violated Patient Privacy Policies A lawsuit filed against a small Georgia hospital by four of its nurses who allege the facility "schemed to manufacture false negative COVID-19 test results" for several patients who previously tested positive is shining a light on delicate issues involving whistleblowers and the privacy of patient records.

article thumbnail

Max Jaiswal on managing data for the world’s largest life insurer

IBM Big Data Hub

Max Jaiswal is the enterprise data team lead at AIA Australia , a pan-Asian life insurance company with presence in 18 markets across the Asia-Pacific region. The 100-year-old firm is the largest life insurer in the world, and the largest company on the Hong Kong stock exchange , with assets of USD $230 billion. The company’s brand promise is simple: to help people live healthier, longer, better lives.

Insurance 102
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Advantage CISO: Why Cybersecurity Should Shine in 2021

Data Breach Today

Expel CISO Bruce Potter on How to Influence Strategy and Budget It's a good time to be a CISO. You have the board's attention, and now you can use your position to ensure appropriate resources to tackle key challenges such as identity & access, cloud application security and third-party risk. Expel CISO Bruce Potter discusses how best to influence these decisions.

article thumbnail

CryptoCore hacker group stole over $200M from cryptocurrency exchanges

Security Affairs

The CryptoCore hacker group that is believed to be operating out of Eastern Europe has stolen around $200 million from online cryptocurrency exchanges. Experts from ClearSky states that a hacker group tracked as CryptoCore, which is believed to be operating out of Eastern Europe, has stolen around $200 million from cryptocurrency exchanges. The CryptoCore group, aks Crypto-gang, “Dangerous Password”, and “Leery Turtle” has been active since 2018. “CryptoCore is a group that targets almost

Phishing 106
article thumbnail

Google says it will no longer save a complete record of every search

The Guardian Data Protection

The firm will now delete its saved records of a new user’s activity after 18 months Google will no longer save a complete record of every search made by new users, the company says, as it launches a push to promote its privacy credentials against concerted competition from arch-rival Apple. The company will now automatically delete its saved records of a new user’s activity on the web and in its apps after 18 months, chief executive Sundar Pichai announced on Wednesday.

IT 101
article thumbnail

REvil ransomware gang scans healthcare victim’s network for PoS systems

Security Affairs

Symantec researchers observed REvil ransomware operators scanning one of their victim’s network for Point of Sale (PoS) servers. Symantec researchers observed REvil ransomware operators scanning one of their victim’s network for Point of Sale (PoS) servers. Researchers from Symantec’s Threat Intelligence team reported that the REvil ransomware operators have been observed while scanning one of their victim’s network for Point of Sale (PoS) servers.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Self-Propagating Lucifer Malware Targets Windows Systems

Threatpost

A new devilish malware is targeting Windows systems with cryptojacking and DDoS capabilities.

Security 139
article thumbnail

Sanctions for the Loss of Ephemeral Messaging

ARMA International

ARMA is pleased to provide access to an article originally published on BloombergIndustry.com. Just how “ephemeral” are so-called ephemeral messages? In this article , former United States magistrate judge Ronald J. Hedges and Gail Gottehrer explore issues surrounding the potential for spoliation sanctions under Fed. R. Civ. P. 37 (e) for loss of ephemeral messages and lay the foundation for why eDiscovery and information governance best practices need to be extended to address this popular meth

article thumbnail

California Privacy Rights Act to Appear on November 2020 Ballot

HL Chronicle of Data Protection

It’s official. The California Privacy Rights Act (CPRA) has received enough valid signatures to appear on the November 2020 ballot. And if polling from late last year remains accurate, California voters are likely to approve it. If voters approve the initiative, the CPRA would significantly expand the CCPA, establish the California Privacy Protection Agency, remove the CCPA’s cure period, and impose a number of GDPR-styled obligations on businesses, among other requirements.

Privacy 98
article thumbnail

7 Considerations for a Smooth Video Conference

IG Guru

by Andrew Ysasi, MS June 24, 2020 Many of us have transitioned to working from home due to COVID-19, and some of us may not return to an office setting for quite some time. As we get used to teleconference calls, check out the considerations below to ensure the experience is smooth, impactful, and memorable! […]. The post 7 Considerations for a Smooth Video Conference appeared first on IG GURU.

Risk 98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Von der Leyen said Chinese cyberattacks on EU hospitals cannot be tolerated

Security Affairs

European Commission President Ursula von der Leyen called out China for launching cyberattacks EU hospitals and health care institutions during the COVID-19 pandemic. European Commission President Ursula von der Leyen publicly linked to China a series of cyber attacks against EU hospitals and health care institutions during the COVID-1 9 pandemic. von der Leyen added that this conduct cannot be tolerated, she also added that China carried out disinformation to distort the public sentiment aroun

Security 105
article thumbnail

Businesses face privacy minefield over contact-tracing rules, say campaigners

The Guardian Data Protection

Concerns after bars and restaurants in England instructed to record customers’ details Coronavirus – latest updates See all our coronavirus coverage Bars, restaurants, hairdressers and churches face a minefield, privacy campaigners have warned, after the government instructed them to record people’s contact details in case they need to assist with test-and-trace efforts.

Privacy 97
article thumbnail

Emerging Ransomware Targets Photos, Videos on Android Devices

Threatpost

The CryCryptor malware strain is a brand-new family of threats, leveraging COVID-19 to spread.

article thumbnail

Rethinking Enterprise Access, Post-COVID-19

Dark Reading

New approaches will allow businesses to reduce risk while meeting the needs of users, employees, and third parties. Here are three issues to consider when reimagining enterprise application access.

Access 95
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

VMware addresses critical flaws in Workstation and Fusion

Security Affairs

VMware addressed 10 vulnerabilities affecting its ESXi, Workstation and Fusion products, including critical and high-severity code issues on the hypervisor. VMware has addressed 10 vulnerabilities affecting ESXi, Workstation and Fusion products, including critical and high-severity issues that can be exploited by attackers to execute arbitrary code on the hypervisor.

Access 91
article thumbnail

Cryptocurrency Pump and Dump Scams

Schneier on Security

Really interesting research: " An examination of the cryptocurrency pump and dump ecosystem ": Abstract : The surge of interest in cryptocurrencies has been accompanied by a proliferation of fraud. This paper examines pump and dump schemes. The recent explosion of nearly 2,000 cryptocurrencies in an unregulated environment has expanded the scope for abuse.

Paper 121
article thumbnail

Data and AI Virtual Forum recap: adopting AI is all about organizational change

IBM Big Data Hub

Follow @IBMAnalytics. During IBM’s first Data and AI Virtual Forum a Forrester-led panel of AI leaders, who happen to be women, discussed how their organizations have achieved business critical AI outcomes in the face of a known skill gap.

84