Thu.May 27, 2021

article thumbnail

Health Data Breach Tally's 2021 Surge Continues

Data Breach Today

Ransomware Attacks Continue to Plague the Sector Another big wave of large breaches stemming from hacking incidents, including ransomware attacks, has flooded the federal tally of major health data breaches in recent weeks.

article thumbnail

UK police forces suffered more than 2,000 data breaches in 2020

IT Governance

UK police forces experienced 2,386 data breaches in 2020, according to data gathered by VPNoverview. The information was made available following a Freedom of Information request, which 31 of the UK’s 45 police forces responded to, and includes several concerning details. For example, the report revealed that police stations suffered 299 data breaches on average between January 2016 and April 2021.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DHS Unveils New Cybersecurity Requirements for Pipelines

Data Breach Today

Security Directive Issued Following Colonial Pipeline Ransomware Attack The Department of Homeland Security has issued a cybersecurity directive that requires the operators of oil and gas pipelines to report ransomware attacks and other security incidents to the government and take other security steps.

article thumbnail

M1RACLES, the unpatchable bug that impacts new Apple M1 chips

Security Affairs

A security expert has discovered a vulnerability in Apple M1 chips, dubbed M1RACLES, that cannot be fixed. Software engineer Hector Martin from Asahi Linux has discovered a vulnerability in the new Apple M1 chips, tracked as CVE-2021-30747, that was named M1RACLES. The expert pointed out that the issue can only be fixed with a redesign of the circuits, but the good news is that the severity of the vulnerability is very low and doesn’t pose a major security risk because there are other side

Access 128
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Belgium Investigating Attack on Interior Ministry Network

Data Breach Today

Federal Public Service Interior Investigating Possible Cyberespionage Campaign Belgium's interior ministry, Federal Public Service Interior, is investigating an attack against its network that appears to have the hallmarks of a cyberespionage campaign.

IT 301

More Trending

article thumbnail

Avoiding 'Alert Fatigue'

Data Breach Today

Former NSA CISO Chris Kubic on Making Alerts Meaningful The key to reducing "alert fatigue" is to make sure alerts are repeatedly validated before they're distributed, says Chris Kubic, CISO at Fidelis Cybersecurity, who formerly served as CISO at the U.S. National Security Agency.

article thumbnail

What is Cyber Security Awareness and Why is it Important?

IT Governance

For all the talk of criminal hacking, ransomware infections and the technologies to prevent them, the key to protecting your organisation is cyber security awareness training. Indeed, according to Ponemon Institute’s Cost of a Data Breach Report 2020 , 23% of data breaches were caused by human error.

article thumbnail

Eyes Wide Open: Visibility in Digital Risk Protection

Data Breach Today

PlanSource CISO TJ Hart and CybelAngel's Todd Carroll and on Practical Uses Customer data, PII, web apps – your strategic assets are digital, and they require a new degree of digital risk protection. In this exclusive panel, CISOs Todd Carroll of CybelAngel and TJ Hart of PlanSource discuss the needs, scope and practical use cases.

Risk 227
article thumbnail

APT hacked a US municipal government via an unpatched Fortinet VPN

Security Affairs

The FBI revealed that foreign hackers compromised the network of a local US municipal government by exploiting flaws in an unpatched Fortinet VPN. The Federal Bureau of Investigation (FBI) reported that an APT group had breached the network of a local US municipal government by exploiting vulnerabilities in an unpatched Fortinet VPN. “The FBI is continuing to warn about Advanced Persistent Threat (APT) actors exploiting Fortinet vulnerabilities.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Canada Post: Breach Affects 1 Million

Data Breach Today

Ransomware Attack on Vendor Exposed Data Canada Post, the nation's primary postal operator, reports that personal information on almost 1 million of its customers was compromised when one of its vendors suffered a ransomware attack last year.

article thumbnail

NASA identified 1,785 cyber incidents in 2020

Security Affairs

NASA identified more than 6,000 cyber-related incidents in the last four years, according to a report published by its Office of Inspector General. The U.S. National Aeronautics and Space Administration (NASA) has identified more than 6,000 cyber-related incidents in the last four years, according to a report published by NASA’s Office of Inspector General.

article thumbnail

Fujitsu SaaS Hack Sends Govt. of Japan Scrambling

Threatpost

Tech giant disables ProjectWEB cloud-based collaboration platform after threat actors gained access and nabbed files belonging to several state entities.

Cloud 127
article thumbnail

The Story of the 2011 RSA Hack

Schneier on Security

Really good long article about the Chinese hacking of RSA, Inc. They were able to get copies of the seed values to the SecurID authentication token, a harbinger of supply-chain attacks to come.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Hackers compromised Japanese government offices via Fujitsu ‘s ProjectWEB tool

Security Affairs

Threat actors have compromised offices of multiple Japanese agencies via Fujitsu ‘s ProjectWEB information sharing tool. Threat actors have breached the offices of multiple Japanese agencies after they have gained access to projects that uses the Fujitsu ‘s ProjectWEB information sharing tool. ProjectWEB is a software-as-a-service (SaaS) platform for enterprise collaboration and file-sharing that was provided by Fujitsu.

article thumbnail

Biden’s Cybersecurity Executive Order Puts Emphasis on the Wrong Issues

Threatpost

David Wolpoff, CTO at Randori, argues that the call for rapid cloud transition Is a dangerous proposition: "Mistakes will be made, creating opportunities for our adversaries.

article thumbnail

Jamf Single Login: Empower frontline workers on shared iOS and iPadOS devices

Jamf

Over the last three years, Jamf Setup and Jamf Reset have become synonymous with improved end-user experience. Today, the next iteration is here with the Single Login workflow.

98
article thumbnail

Taking the tedium out of taking inventory

RFID Global Solution, Inc.

Organizations need to track and take inventory of their physical assets, or in IoT terminology, their ‘Things’. Inventories are generally performed at scheduled intervals or when an item needs to be located, an ad hoc inventory gets underway. If an asset is scarce, shared across departments, or high in value, the more important it becomes … Taking the tedium out of taking inventory Read More ».

IoT 97
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A Never-Before-Seen Wiper Malware Is Hitting Israeli Targets

WIRED Threat Level

The malicious code, which masquerades as ransomware, appears to come from a hacking group with ties to Iran.

article thumbnail

DHS announces security measures for critical pipeline industry

Security Affairs

The US Department of Homeland Security (DHS) has announced new cybersecurity requirements for critical pipeline owners and operators. The Colonial pipeline incident continues to have a serious impact on the critical infrastructure sector. The US Department of Homeland Security (DHS) has announced new cybersecurity requirements for owners and operators of critical pipelines.

article thumbnail

WhatsApp’s Fight With India Could Have Global Repercussions

WIRED Threat Level

The country’s “traceability” requirement would undermine the privacy of the encrypted messaging app’s users far beyond its borders.

article thumbnail

FCA Letter to E-Money Institutions: Why All UK Payment Service Providers Should Review Their Marketing Practices Now

Data Matters

On May 18, 2021, the UK Financial Conduct Authority (FCA) published a “Dear CEO” letter (the Letter) asking e-money institutions to ensure that their customers understand how their money is protected. The FCA has expressed concern that e-money institutions do not adequately disclose the differences in protections between e-money and bank accounts and that customers are not aware of the differences in protections between e-money services and traditional banking services, in particular that the

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

ExtraHop Explains How Advanced Threats Dominate Threat Landscape

Dark Reading

SPONSORED: WATCH NOW -- How do SOC professionals build a strategy when they lack basic information about how such threats operate? Advanced threats by their very nature create plenty of uncertainty, according to Matt Cauthorn, VP of cloud security for ExtraHop.

Cloud 78
article thumbnail

Targeted AnyDesk Ads on Google Served Up Weaponized App

Threatpost

Malicious ad campaign was able to rank higher in searches than legitimate AnyDesk ads.

Security 100
article thumbnail

Prevention Is the Only Cure: The Dangers of Legacy Systems

Dark Reading

Prolonged exposure to poorly managed legacy IT devices proves time and time again the familiar adage: What can go wrong will go wrong.

IT 86
article thumbnail

OpenText wins three Telly Awards

OpenText Information Management

We are thrilled to announce that our exceptionally talented, creative and resourceful Video team at OpenText™ has won three awards in the 42 Annual Telly Awards for video excellence in branded content: silver in Branded Content – Use of Stock Footage, silver in Branded Content – Social Impact, and bronze in Branded Content – Remote … The post OpenText wins three Telly Awards appeared first on OpenText Blogs.

62
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

How Menlo Uses Isolation to Secure Mobile Devices in the Cloud

Dark Reading

SPONSORED: WATCH NOW -- Mobile devices like smartphones and tablets have emerged as popular targets for bad actors looking to break into to cloud-based networks, according to Poornima DeBolle, chief product officer for Menlo Security.

Cloud 70
article thumbnail

Employee Spotlight:  Nick Bogart – Synergis Road Warrior

Synergis Software

Nick Bogart, (no relation to Humphrey), is our featured employee in this month’s spotlight! Nick joined Synergis as an application consultant in our Synergis Software group and has been with us for 7 years, making significant contributions to the service and support of our valued customers. In his role as an Application Consultant, or AC, Nick is one of our most requested technical resources, responsible for the implementation of our Engineering Document Management software, Synergis Adept.

article thumbnail

BazaLoader Attackers Create Fake Movie Streaming Site to Trick Victims

Dark Reading

The BazaLoader infection chain includes a live call center and "customer service" from criminals, researchers report.

83