Fri.Aug 07, 2020

article thumbnail

Global Cybercrime Surging During Pandemic

Data Breach Today

Interpol: Fraudsters Shifting Focus to Governments, Health Infrastructure, Corporations Cybercriminals have shifted their focus from individuals and smaller businesses to target governments, critical health infrastructure and major corporations to maximize their profits and disruption during the COVID-19 pandemic, a new Interpol report warns.

article thumbnail

Have I Been Pwned Set to Go Open-Source

Threatpost

Fully opening the door to allow people to contribute to – and notably, tinker with – the code for the data-breach information service will be an entirely next-level effort, according to founder Troy Hunt.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers: IoT Botnets Could Influence Energy Prices

Data Breach Today

Paper Describes How Connected Devices Could Be Used to Manipulate Markets High-wattage IoT devices and appliances, such as connected refrigerators, air conditioners and heaters, could be turned into massive botnets by malicious actors and used to influence energy prices, according to an academic study released at Black Hat 2020.

IoT 264
article thumbnail

Qualcomm Bugs Open 40 Percent of Android Handsets to Attack

Threatpost

Researchers identified serious flaws in Qualcomm’s Snapdragon SoC and the Hexagon architecture that impacts nearly half of Android handsets.

Security 125
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Intel Investigating Possible Leak of Internal Data

Data Breach Today

Company Says Individual With Access 'Downloaded and Shared This Data' Chip giant Intel is investigating what led to the posting of 20 GB of internal company data - including what appears to be confidential corporate information - to the MEGA cloud storage and file sharing platform.

Cloud 263

More Trending

article thumbnail

Exploring the Forgotten Roots of 'Cyber'

Data Breach Today

Cyber Always Points to the Future, But It Has a Past One day, you may drive your Tesla Cybertruck on Cyber Monday to your cybersecurity job, backed by a cyber insurance policy as you safeguard cyberspace against the threat of cyberwar. Or cyber whatever, since we've obviously entered the era of "maximum cyber." But what does cyber even mean?

Insurance 248
article thumbnail

IoT Security During COVID-19: What We've Learned & Where We're Going

Dark Reading

Vigilance and ongoing training combined with an integrated security framework are key aspects of a successful strategy in the fight against the latest crop of pandemic opportunists.

IoT 107
article thumbnail

Using Machine Learning to Fight Money Laundering

Data Breach Today

Insights on Using New Technologies to Crack Down on Fraud Machine learning can play a significant role in mitigating money laundering risks, says Andy Gandhi, managing director, data risk and compliance at the consultancy Alvarez and Marsal.

article thumbnail

Google Threat Analysis Group took down ten influence operations in Q2 2020

Security Affairs

Google published its second Threat Analysis Group (TAG) report which reveals the company has taken down ten coordinated operations in Q2 2020. Google has published its second Threat Analysis Group (TAG) report , a bulletin that includes coordinated influence operation campaigns tracked in Q2 of 2020. Google revealed to have taken down ten coordinated operations in Q2 2020 (between April and June 2020), the campaigns were traced back to China, Russia, Iran, and Tunisia.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Capital One Fined $80 Million Over 2019 Breach

Data Breach Today

Report Finds Bank Failed to Properly Assess Risk of Moving Data to the Cloud A federal banking regulator has fined Capital One $80 million, citing numerous security shortfalls before the 2019 data breach that exposed the financial and personal information of over 100 million individuals in the U.S. and Canada.

article thumbnail

Hackers Dump 20GB of Intel’s Confidential Data Online

Threatpost

Chipmaker investigates a leak of intellectual property from its partner and customer resource center.

IT 125
article thumbnail

Election Security: A Harsh Assessment

Data Breach Today

Security Researcher, CISA Director Raise Serious Concerns A security researcher says voting equipment in the U.S. is still riddled with security flaws that opportunistic foreign adversaries could use to pose a threat to the November election. Meanwhile, the director of CISA calls Russian ransomware attacks one of the biggest threats to the election.

Security 205
article thumbnail

Did Maze ransomware operators steal 10 GB of data from Canon?

Security Affairs

An internal memo confirms that the prolonged outage suffered by Canon last week was caused by a ransomware infection, Maze operators took credit for it. According to an internal memo obtained by ZDNet , the recent outage of Canon was caused by a ransomware attack, while Maze ransomware operators are taking the credit for the incident. The memo also reveals that the company has hired an external security firm to investigate the incident.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Analysis: Hijacking of Twitter Hacker's Virtual Hearing

Data Breach Today

The latest edition of the ISMG Security Report analyzes the hijacking of a virtual court hearing in the Twitter hacking case. Also featured: Why network segmentation is more important than ever; update on Windows print spooler vulnerability.

Security 195
article thumbnail

A solution for balancing customer payment burdens with business cash flow

CGI

A solution for balancing customer payment burdens with business cash flow. This CGI blog post discusses how request-to-pay solutions balance customer payments burdens with business cash flow. kathy.jacquay@…. Fri, 08/07/2020 - 08:41.

90
article thumbnail

'Zero Trust': A Strategy for Success

Data Breach Today

Panel Provides Tips on Creating a Frictionless Experience for Remote Workers An effective "zero trust" strategy requires creating a frictionless experience for the remote workforce, according to a panel of security experts, who describe the essential elements.

Security 165
article thumbnail

Black Hat 2020: Influence Campaigns Are a Cybersecurity Problem

Threatpost

An inside look at how nation-states use social media to influence, confuse and divide -- and why cybersecurity researchers should be involved.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Windows 7 End of Life Presents Hacking Risk, FBI Warns

Adam Levin

The FBI warned in a private industry notification published August 3 that companies and organizations still using Windows 7 are at risk. Microsoft’s end of life (EOL) announcement for version 7 of its flagship Windows operating system means most customers still using it would no longer receive security updates or technical support. According to the FBI notification, continued use of the platform “creates the risk of criminal exploitation.”.

Risk 88
article thumbnail

Organizations, Jamf Nation answer the call for help during COVID-19

Jamf

Hear some of the inspiring stories that happen when individuals and companies come together for the betterment of others.

103
103
article thumbnail

Thailand: Personal Data Protection Act (PDPA) Amendments on the way: What does this mean for your company?

DLA Piper Privacy Matters

Thailand’s Personal Data Protection Act (“ PDPA “) is in the process of being updated, and full implementation and compliance is expected by 1 June 2021. This comes by way of the Notification of the Ministry of Digital Economy and Society Re: Personal Data Security Standards B.E. 2563 (2020) (“ Notification “) which was recently released by the Thai Ministry of Digital Economy for Society and is effective from 18 July 2020.

article thumbnail

Attackers Horn in on MFA Bypass Options for Account Takeovers

Threatpost

Legacy applications don't support modern authentication -- and cybercriminals know this.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

BEC Campaigns Target Financial Execs via Office 365

Dark Reading

A series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada.

90
article thumbnail

Weekly Update 203

Troy Hunt

What. A. Week. I've been absolutely non-stop publishing data breaches to HIBP whilst simultaneously putting in place the framework to start advising NordVPN on their cybers and open sourcing the HIBP code base at the same time (and a bunch of other more boring stuff that didn't make the cut). That's all explained in this week's update so I won't drill further into it here, there's obviously a couple of big announcements so if you have any questions, drop them in the comments below and I'll eithe

article thumbnail

Researcher Finds New Office Macro Attacks for MacOS

Dark Reading

Building successful macro attacks means getting past several layers of security, but a Black Hat speaker found a way through.

article thumbnail

Augmenting AWS Security Controls

Threatpost

Appropriate use of native security controls in AWS and other CSPs is fundamental to managing cloud risk and avoiding costly breaches.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

COVID-19 opens ‘Pandora’s box’ of Florida businesses’ privacy concerns via CSR and Florida Trends

IG Guru

Dr. Ross Federgreen, CEO of CSR, discusses privacy concerns during the COVID-19 pandemic here. The post COVID-19 opens ‘Pandora’s box’ of Florida businesses’ privacy concerns via CSR and Florida Trends appeared first on IG GURU.

Privacy 70
article thumbnail

Intel investigates security breach after the leak of 20GB of internal documents

Security Affairs

Intel is investigating reports of an alleged hack that resulted in the theft and leak of 20GB of data coming from the chip giant. Intel is investigating reports that an alleged hacker has leaked 20GB of exfiltrated from its systems. The stolen data includes source code and developer documents and tools, some documents are labeled as “confidential” or “restricted secret.” The hackers shared the documents on the file-sharing site MEGA.

article thumbnail

ARMA eliminates CEO position, will reevaluate business model per message to members

IG Guru

In an email today from ARMA President Jason Sterns, ARMA International will reevaluate their business model and as a result of that decision, they have eliminated the position of CEO. More to come regarding this news. The post ARMA eliminates CEO position, will reevaluate business model per message to members appeared first on IG GURU.