Fri.Oct 15, 2021

article thumbnail

Missouri Refers Coordinated Bug Disclosure to Prosecutors

Data Breach Today

Gov. Michael L. Parson Alleges Newspaper Reporter Improperly Accessed Data A newspaper reporter in Missouri who responsibly reported the exposure of Social Security numbers on a state government website has been accused of malicious hacking by the state's governor. The governor alleged the publication of the vulnerability after it was fixed was part of a "political vendetta.

article thumbnail

Security Risks of Client-Side Scanning

Schneier on Security

Even before Apple made its announcement , law enforcement shifted their battle for backdoors to client-side scanning. The idea is that they wouldn’t touch the cryptography, but instead eavesdrop on communications and systems before encryption or after decryption. It’s not a cryptographic backdoor, but it’s still a backdoor — and brings with it all the insecurities of a backdoor.

Risk 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Agencies to Water Facilities: You May Be Next Target

Data Breach Today

FBI, CISA, EPA & NSA Advisory Says Threats to Critical Infrastructure Rising U.S. federal agencies issued a joint advisory around potential cyber threats to the nation's water facilities. They cite "ongoing malicious cyber activity - by both known and unknown actors - targeting the IT and OT technology networks, systems and devices" of U.S. water and wastewater systems.

IT 299
article thumbnail

Accenture discloses data breach after LockBit ransomware attack

Security Affairs

IT and consulting giant Accenture confirmed a data breach after the ransomware attack conducted by LockBit operators in August 2021. Global IT consultancy giant Accenture discloses a data breach after the LockBit ransomware attack that hit the company in August 2021. News about the attack was included in the company’s financial report for the fourth quarter and full fiscal year, which ended on August 31, 2021. “In the past, we have experienced, and in the future, we may again experie

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

BlackByte: Free Decryptor Released for Ransomware Strain

Data Breach Today

But Name-and-Shame Attackers Likely Retooling After Spotting Encryption Problems A free decryptor for BlackByte ransomware has been released by security researchers at Trustwave who cracked the crypto-locking malware's encryption. But they say that unfortunately, the underlying encryption problem is likely in the process of already being fixed by the malware's developer.

More Trending

article thumbnail

ISMG Editors' Panel: Are Our Systems Too Complex to Secure?

Data Breach Today

Discussion Also Addresses the Ransom-Paying Dilemma Faced by Cyber Extortion Victims In this update, four editors discuss key cybersecurity issues, including addressing the complexity of security, the rising number of victims targeted by double extortion ransomware and the Information Commissioner's Office's recent consultation on creating an international data transfer agreement.

Security 278
article thumbnail

New Jersey Acting Attorney General Announces Data Breach Settlement with Fertility Clinic

Hunton Privacy

On October 12, 2021, New Jersey Acting Attorney General Andrew J. Bruck and the Division of Consumer Affairs announced a settlement with Diamond Institute for Infertility and Menopause, LLC, over a data breach that compromised the personal information of 14,663 patients, including 11,071 New Jersey residents. The Division of Consumer Affairs alleged that the fertility clinic violated the New Jersey Consumer Fraud Act and the federal Health Insurance Portability and Accountability Act’s (“HIPAA”)

article thumbnail

Teenage Cybercrime: Giving Young Hackers A Second Chance

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of attempts made by European law enforcement to encourage young cybercriminals to channel their skills in more ethical ways. Also featured: Fraud detection and response; Inspiring behavioural change.

Security 256
article thumbnail

How to Mitigate Corporate Risk and Respond to Crises

Data Matters

Recent events have given the term “corporate crisis” a whole new meaning. From cyberattacks and pandemic disruptions to political divisions and tweets that go viral, companies are being challenged in ways they never have before. How should they respond in a fast-moving crisis? How can they identify risks and mitigate them? And who should execute their strategy?

Risk 88
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Three more ransomware attacks hit Water and Wastewater systems in 2021

Security Affairs

A joint cybersecurity advisory published by US agencies revealed that three ransomware attacks on wastewater systems this year. A joint cybersecurity advisory published today by the FBI, NSA, CISA, and the EPA revealed three more attacks launched by Ransomware gangs against US water and wastewater treatment facilities (WWS) this year. This is the first time that these attacks are publicly disclosed, they took place in March, July, and August respectively.

article thumbnail

TrickBot Gang Enters Cybercrime Elite with Fresh Affiliates

Threatpost

The group – which also created BazarLoader and the Conti ransomware – has juiced its distribution tactics to threaten enterprises more than ever.

article thumbnail

How Attackers Hack Humans

Dark Reading

Inside their motivations, how they go about it -- and what businesses can do about it, according to Counterintelligence Institute founder Peter Warmka.

IT 107
article thumbnail

Boffins devise a new side-channel attack affecting all AMD CPUs

Security Affairs

A group of researchers from the Graz University of Technology and CISPA Helmholtz Center for Information Security devised a new side-channel attack that affects AMD CPUs. Researchers Moritz Lipp and Daniel Gruss of the Graz University of Technology and Michael Schwarz of the CISPA Helmholtz Center for Information Security devised a new side-channel attack that affects AMD CPUs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Missouri Threatens to Sue a Reporter Over a Security Flaw

WIRED Threat Level

The governor warned that he would take legal action against a journalist who identified a vulnerability that exposed teachers' Social Security numbers.

Security 100
article thumbnail

Weekly Update 265

Troy Hunt

I had a bunch of false starts with this one. I don't know if it was just OBS or something else, but we got there after several failed attempts and me resorting to reading Gov Parson's nutty tweets until it all started working. "Nutty" is a bit of a theme this week not just with the Gov, but particularly Thingiverse's extraordinarily poor handling of their data breach.

article thumbnail

How AI Can Stop Zero-Day Ransomware

Dark Reading

Ransomware attacks are unpredictable. AI is better at figuring out what looks malicious and abnormal than humans will ever be.

article thumbnail

WhatsApp to bring in encryption for backup chats after privacy fears

The Guardian Data Protection

Users can set encryption key for chats on Google Drive or iCloud to prevent authorities demanding access from provider WhatsApp is allowing users to encrypt their backed-up chats, making them unreadable without access to a password or 64-digit encryption key. Facebook, the messaging app’s owner, said from Thursday some users would be able to fully encrypt messages stored on Google Drive or Apple’s iCloud.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Back to school with Jamf and Google Chrome

Jamf

Chrome’s mobile browser empowers the student experience on iPad that’s more manageable than ever.

98
article thumbnail

China's Hackers Crack Devices at Tianfu Cup for $1.5M in Prizes

Dark Reading

China's premier hackers will target web browsers, operating systems, mobile devices, and even a car at Tianfu Cup.

99
article thumbnail

Missouri Vows to Prosecute ‘Hacker’ Who Informed State About Data Leak

Threatpost

Missouri Gov. Mike Parson launched a criminal investigation of a reporter who flagged a state website that exposed 100K+ Social-Security numbers for teachers and other state employees.

article thumbnail

From Help Desk to Head of SOC: Building a Cybersecurity Career on Empathy and Candor

Dark Reading

Why a passion for helping people is key to delivering effective cybersecurity solutions.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

iOS vulnerability with public exploit: upgrade now

Jamf

Find out more about Apple's recently released iOS 15.0.2 to fix a vulnerability, which allows an application to execute arbitrary code with kernel privileges. Just the fact that we’re talking about kernel privileges on mobile devices should make it clear that this is not an issue to take lightly.

IT 52
article thumbnail

Cisco Duo Trusted Access Report: More Than 50% of Companies Plan Passwordless Move

Dark Reading

Multifactor authentications soar as enterprises move away from passwords to secure hybrid workers.

Access 81
article thumbnail

The future of digital transformation is now

CILIP

The future of digital transformation is now. Join CILIP?s Embrace it, Design It, Build it: Information Professionals at the heart of Digital Transformation event (3+4 November) to find how your service can benefit from new technologies and ensure digital services meet the needs of you users now and into the future. Rob Green looks at what?s on offer and why it matters.

article thumbnail

Evolution Equity Partners Close $400M for Cybersecurity Investments

Dark Reading

The firm expands capital base, team, and platform addressing a rapidly growing cybersecurity investment opportunity.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Why Is It Particularly Interesting to Talk About Open Banking in Peru?

HID Global

Why Is It Particularly Interesting to Talk About Open Banking in Peru? jarenas. Fri, 10/15/2021 - 10:03.

IT 52
article thumbnail

Ready to Claim Your Spot in the Global Marketplace? Check out DocuWare 7.5

Docuware

In his book Smarter, Faster, Better , writer Charles Duhigg explores the science of productivity. The title perfectly describes DocuWare’s approach to choosing new capabilities to incorporate into each new version of our solution. DocuWare 7.5 is no exception.

29
article thumbnail

Ransomware Attack on Israeli Medical Center Raises Alarm

Data Breach Today

Government Authorities Issue Advisories Following Hospital Attack Government authorities in Israel are warning healthcare sector entities in the country of potential cyberattacks after a ransomware attack this week on Hillel Yaffe Medical Center in the city of Hadera. The hospital said it is "using alternative systems" to care for its patients.