Fri.Aug 27, 2021

article thumbnail

T-Mobile CEO Apologizes for Mega-Breach, Offers Update

Data Breach Today

Hacker Claiming Responsibility for Attack Calls Company's Security 'Awful' T-Mobile CEO Mike Sievert on Friday issued an official mea culpa for the data breach that exposed information on 54 million of the company's customers and prospects. On Thursday, a hacker who claimed responsibility for the attack called the company's cybersecurity "awful," the Wall Street Journal reports.

article thumbnail

UK ICO Approves the First UK GDPR Certification Scheme Criteria

Hunton Privacy

On August 19, 2021, the UK Information Commissioner’s Office (“ICO”) approved the criteria for three certification schemes, as required under Article 42(5) of the UK General Data Protection Regulation (“UK GDPR”). Certification schemes are one method for organizations to demonstrate compliance with the UK GDPR. The ICO has approved criteria for the following schemes: ADISA ICT Asset Recovery Certification 8.0 : This certification standard was developed for data processors or sub-processors provi

GDPR 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Agencies Increasing Use of Facial Recognition Tech

Data Breach Today

GAO Finds Increasing Use for Security and Access; Privacy Concerns Remain At least 10 U.S. government agencies are planning to increase the use of facial recognition technologies by 2023, according to a GAO report. The growing utilization comes as facial recognition technology raises privacy concerns.

Privacy 332
article thumbnail

3 Tests to Ensure Zero Trust Network Security

eSecurity Planet

The COVID pandemic has highlighted the challenges of ensuring security across an expanding enterprise network forced to support more and more remote workers , an ever-increasing diversity of devices, and frequent mobility. Praveen Jain, founder and CEO of cloud networking startup WiteSand, spoke with eSecurity Planet about the challenges of maximizing security in today’s environment, the value of a zero trust model – and three key questions to address to make sure you’re on the right

Security 130
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Exam-Cheating Scandal: CREST Finds NCC Group Broke Rules

Data Breach Today

Pen-Testing Accreditation Body Says NCC Group Will Revamp Policies and Monitoring Accreditation organization CREST has concluded an investigation into whether NCC Group employees cheated on its penetration-testing exams, finding that the cybersecurity business's training materials violated its rules. It says NCC Group has agreed to overhaul its processes and demonstrate compliance.

More Trending

article thumbnail

ISMG Editors’ Panel: Crypto Exchange Hacks

Data Breach Today

Also: Cyber Implications of Kabul Withdrawal; Risks Posed by Boards In the latest weekly update, four editors at Information Security Media Group discuss timely cybersecurity issues, including cryptocurrency exchange hacks and the cyber implications of the U.S. withdrawal from Kabul.

article thumbnail

Details of the Recent T-Mobile Breach

Schneier on Security

Seems that 47 million customers were affected. Surprising no one, T-Mobile had awful security. I’ve lost count of how many times T-Mobile has been hacked.

Security 132
article thumbnail

Azure Database Service Flaw Could Affect Thousands of Firms

Data Breach Today

Microsoft Mitigates Flaw That Researchers Say Was 'Trivial' to Exploit A vulnerability in Microsoft Azure's database service Cosmos DB has potentially put at risk thousands of Azure customers, including many Fortune 500 companies, according to the security firm Wiz. Microsoft has mitigated the flaw.

Risk 274
article thumbnail

"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns

Elie

In this UX research we identify the key cybersecurity challenges faced by political campaigns as they face increasing threats from well-funded, sophisticated attackers, especially nation-states.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Data Breach Culprits: Phishing and Ransomware Dominate

Data Breach Today

Meanwhile, Breaches Involving Military Secrets and CCTV Footage Beset UK Government Phishing, ransomware and unauthorized access remain the leading causes of personal data breaches as well as violations of data protection rules, Britain's privacy watchdog reports. The U.K. government has also been caught out by breaches and leaks involving military secrets and CCTV footage from a government building.

article thumbnail

ChaosDB, a Critical Cosmos DB flaw affected thousands of Microsoft Azure Customers

Security Affairs

Microsoft has fixed a critical flaw in Cosmos DB that allowed any Azure user to remotely take over other users’ databases without any authorization. Researchers from Cloud security company Wiz disclosed technical details of a now-fixed Azure Cosmos database vulnerability, dubbed ChaosDB , that could have been potentially exploited by attackers to gain full admin access to other customers’ database instances without any authorization.

Cloud 118
article thumbnail

Microsoft Issues Security Advisory on ProxyShell Flaws

Data Breach Today

Alert Urges Organizations to Patch as Vulnerabilities Are Exploited Four months after Microsoft released the first security update for flaws in several versions of its on-premises Exchange Server software, the company has issued its first official guidance on the three actively exploited ProxyShell vulnerabilities.

Security 157
article thumbnail

Victims of Ragnarok ransomware can decrypt their files for free

Security Affairs

Ragnarok ransomware operators are ceasing their operations and released the master key that can allow their victims to decrypt files for free. The Ragnarok ransomware group has been active since at least January 2020 and hit dozens of organizations worldwide. The news was reported by Bleeping Computer that also noticed that ransomware operators have replaced all the victims on their leak site, leaving only the instruction on how to decrypt files along with a link to an archive containing the mas

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

New Mexico Attorney General Files COPPA Suit Against Game Developer

Hunton Privacy

On August 25, 2021, New Mexico Attorney General (“AG”) Hector Balderas sued Rovio Entertainment (“Rovio” or the “Company”), the developer of the popular Angry Birds mobile app games, alleging that the Company violated the federal Children’s Online Privacy Protection Act (“COPPA”) by knowingly collecting data from players under age 13 and sharing it with advertisers.

article thumbnail

Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor

Threatpost

The cybercriminal group, active since late 2019, has closed its doors and released the key to unlocking victims’ files on its dark web portal.

article thumbnail

B. Braun Infusomat pumps could be hacked to alter medication doses

Security Affairs

Researchers disclosed five vulnerabilities in B. Braun ‘s Infusomat Space Large Volume Pump and SpaceStation that could be remotely hacked. Cybersecurity researchers from McAfee disclosed five vulnerabilities in B. Braun’s Infusomat Space Large Volume Pump and SpaceStation that could be exploited by threat actors to alter medication doses.

article thumbnail

The UK Government unveils its post-Brexit plans to shake up data protection laws

Data Protection Report

On 26 August 2021, in a move that puts it on a potential collision course with the EU, the UK Government made a number of announcements relating to the future of the UK’s data protection regime, with the stated intention of “seizing the opportunity” by “developing a world leading data policy that will deliver a Brexit dividend for individuals and businesses across the UK”.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Explosion in Geofence Warrants Threatens Privacy Nationwide

WIRED Threat Level

New figures from Google show a tenfold increase in the requests from law enforcement, which target anyone who happened to be in a given location at a specified time.

Privacy 105
article thumbnail

Winning the Cyber-Defense Race: Understand the Finish Line

Threatpost

Kerry Matre, Mandiant senior director, clears up misconceptions about the value to business for enterprise cyber-defense. Hint: It's not achieving visibility.

IT 107
article thumbnail

An RCE in Annke video surveillance product allows hacking the device

Security Affairs

Researchers from Nozomi Networks discovered a critical vulnerability that can be exploited to hack a video surveillance product made by Annke. Researchers at industrial and IoT cybersecurity firm Nozomi Networks have discovered a critical flaw affecting a video surveillance product made by Annke, a popular manufacturer of surveillance systems and solutions.

article thumbnail

ARMA InfoCon 2021 transitions to a fully virtual format due to COVID concerns

IG Guru

A message from their event coordinator was sent out yesterday. “Due to the concern over the safety of the ARMA Community, we regret to inform you that we decided to transition InfoCon 2021 to a fully virtual format. This transition applies to all InfoCon meetings and events that were scheduled in Houston. We will provide future notification […].

98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The FBI issued a flash alert for Hive ransomware operations

Security Affairs

The Federal Bureau of Investigation (FBI) published a flash alert related to the operations of the Hive ransomware gang. The Federal Bureau of Investigation (FBI) has released a flaw alert on the Hive ransomware attacks that includes technical details and indicators of compromise associated with the operations of the gang. Recently the group hit the Memorial Health System that was forced to suspend some of its operations.

article thumbnail

Parallels Offers ‘Inconvenient’ Fix for High-Severity Bug

Threatpost

Firm offers guidance on how to mitigate a five-months-old privilege escalation bug impacting Parallels Desktop 16 for Mac and all previous versions.

Cloud 106
article thumbnail

Emoji eDiscovery – coming to a case near you shortly via the eDisclosure Information Project

IG Guru

Check out the article here. The post Emoji eDiscovery – coming to a case near you shortly via the eDisclosure Information Project appeared first on IG GURU.

article thumbnail

FIN8 Targets US Bank With New ‘Sardonic’ Backdoor

Threatpost

The latest refinement of the APT's BadHatch backdoor can leverage new malware on the fly without redeployment, making it potent and nimble.

IT 106
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why wouldn't someone think of democracy as a target? Security practices & challenges of people involved with U.S. political campaigns"

Elie

In this UX research we identify the key cybersecurity challenges faced by political campaigns as they face increasing threats from well-funded, sophisticated attackers, especially nation-states.

article thumbnail

Top Strategies That Define the Success of a Modern Vulnerability Management Program

Threatpost

Modern vulnerability management programs require a strategy that defines what success means for your organization’s cybersecurity goals. By incorporating a few simple cyber hygiene routines to your daily security routine, you’ll set up your IT teams to be better equipped to steer off cyberattacks.

article thumbnail

6 Tips to Set up a Successful Virtual Data Room

OneHub

What is a virtual data room? A virtual data room is an extremely secure digital space for storing and sharing high-value business files. Data rooms work much like a traditional Onehub Workspace but with even stronger security protocols and more advanced features such as document watermarking, stealth users, automatic indexing, and NDAs. These features make data rooms the perfect solution for transactions that require top-level confidentiality.