Fri.Jul 01, 2022

article thumbnail

OT Security: Has the Industry Made Progress?

Data Breach Today

OT security has been at the center of the security conversation ever since the Colonial Pipeline attacks. Scott Flower, the founder of Pareto Cyber and a former global intelligence officer at FS-ISAC, discusses the challenges in OT security and where the industry needs to go.

Security 258
article thumbnail

GUEST ESSAY: The post-pandemic challenges of securely managing employee endpoints

The Last Watchdog

The pandemic-driven remote working brought about unforeseen challenges that the pre-pandemic corporate world would have never imagined. From transitioning to a work-from-home as a ‘perk’ to a ‘necessity’, the organizations had to realign their operations and do it fast, to keep the ships afloat. Related: Deploying human sensors. Now that the dust seems to have settled on the novelty of remote working, there’s no doubt that remote working- whether organizations like it or not is here to say

Security 217
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US DOJ Targets Baller Ape Rug Pull and Other Crypto Fraud

Data Breach Today

Justice Vows to Clear Up Cryptocurrency Fraud and Market Manipulation The U.S. Department of Justice is touting a string of indictments against accused cryptocurrency and NFT fraudsters, including against a Vietnamese man who is allegedly behind the Baller Ape rug pull, the largest such NFT fraud to date. Rug pulls are the largest form of cryptocurrency-based crime.

Marketing 255
article thumbnail

NYDFS Imposes Fine of $5 Million on Carnival for Cybersecurity Breaches

Hunton Privacy

On June 24, 2022, the New York State Department of Financial Services (“NYDFS” or the “Department”) announced it had entered into a $5 million settlement with Carnival Corp. (“Carnival”), the world’s largest cruise-ship operator, for violations of the Cybersecurity Regulation (23 NYCRR Part 500) in connection with four cybersecurity events between 2019 and 2021, including two ransomware events. .

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Malware Disrupts Multiple US State Unemployment Websites

Data Breach Today

Personal Data Is Safe, Says Attacked Third-Party Vendor Geographic Solutions Inc. Unemployment benefits websites across the United States are offline after a malware attack was detected at third-party vendor Geographic Solutions Inc. The vendor, which serves dozens of state labor departments, says no personally identifiable information has been affected by the attack.

More Trending

article thumbnail

Okta to Spend $1M Helping Nonprofits Improve Their Security

Data Breach Today

Grants Will Link Nonprofits with Key Talent to Configure and Manage Security Tools Identity titan Okta has awarded $1.02 million in grants to groups focused on linking nonprofits with the talent needed to configure and manage security technology. Nonprofits have limited access to infrastructure and human capital to address their cybersecurity needs, and Okta hopes to change that.

Security 245
article thumbnail

[New FBI and CISA Alert] This ransomware strain uses RDP flaws to hack into your network

KnowBe4

As of May 2022, MedusaLocker has been observed predominantly exploiting vulnerable Remote Desktop Protocol (RDP) configurations to access victims' networks, according to a new joint Cybersecurity Advisory (CSA) from the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and other law enforcement agencies.

article thumbnail

ISMG Editors: Russia's War Has Changed the Cyber Landscape

Data Breach Today

Also: The Impact of Cyber Firm Layoffs; Criminals Offer Bug Bounty Program Four ISMG editors discuss important issues, including how Russia's cyber and kinetic wars in Ukraine have changed the cybersecurity landscape, what recent layoffs at cybersecurity firms mean for the industry and how cybercriminals are taking a page out of the white hat hacker playbook

article thumbnail

CHINA: Draft SCCs Released – Time to Focus on Overseas Data Transfers

DLA Piper Privacy Matters

Authors: Carolyn Bigg , Venus Cheung , Fangfang Song. The China draft SCCs have been published, but may not provide the easy approach to cross border transfers of Mainland China personal data we have hoped to. Requirements to file the SCCs or PIIA for each transfer with the regulator, to undertake mini transfer impact assessments upon changes to a recipient country’s data laws, and regulator powers to suspend cross border data transfers as a sanction for non-compliance with the PIPL, mean that t

GDPR 97
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Mounting Threats to Sensitive Data After Roe v. Wade

Data Breach Today

Location data, browser history, IP addresses, and appointment scheduling are among the sensitive data putting individuals' privacy at risk in the wake of the decision to overturn Roe v. Wade, says Alexandra Reeve Givens of the Center for Democracy and Technology.

Privacy 238
article thumbnail

SessionManager Backdoor employed in attacks on Microsoft IIS servers worldwide

Security Affairs

Researchers warn of a new ‘SessionManager’ Backdoor that was employed in attacks targeting Microsoft IIS Servers since March 2021. Researchers from Kaspersky Lab have discovered a new ‘SessionManager’ Backdoor that was employed in attacks targeting Microsoft IIS Servers since March 2021. “In early 2022, we investigated one such IIS backdoor: SessionManager.

article thumbnail

Indian Stock Exchanges Have 6 Hours to Report Cyber Incident

Data Breach Today

SEBI Says Incidents in Protected Systems Must Also Be Reported to NCIIPC India's stock brokers and depository participants must now report all cyberattacks and breaches to the Securities and Exchange Board of India within six hours of detection under a mandate implementing what is likely the world's tightest breach reporting timeline requirement.

Security 236
article thumbnail

Criminals Use Deepfake Videos to Interview for Remote Work

Dark Reading

The latest evolution in social engineering could put fraudsters in a position to commit insider threats.

120
120
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

A ransomware attack forced publishing giant Macmillan to shuts down its systems

Security Affairs

A cyber attack forced the American publishing giant Macmillan to shut down its IT systems. The publishing giant Macmillan has been hit by a cyberattack that forced the company to shut down its IT infrastructure to prevent the threat from spreading within its network. The company spokesman Erin Coffey told different media outlets that attackers have encrypted certain files on the Macmillan network.

article thumbnail

OpenSea NFT Marketplace Faces Insider Hack

Dark Reading

OpenSea warns users that they are likely to be targeted in phishing attacks after a vendor employee accessed and downloaded its email list.

article thumbnail

Is Your New Car a Threat to National Security?

WIRED Threat Level

Putting sensor-packed Chinese cars on Western roads could be a privacy issue. Just ask Tesla.

Privacy 117
article thumbnail

Microsoft Going Big on Identity with the Launch of Entra

Dark Reading

With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Microsoft has a new response.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

A long-running cryptomining campaign conducted by 8220 hackers now targets Linux servers

Security Affairs

Microsoft spotted a cloud threat actor tracked as 8220 that is now targeting Linux servers in a long-running cryptomining campaign. Microsoft Security Intelligence experts are warning of a long-running campaign conducted by a cloud threat actor group, tracked as 8220, that is now targeting Linux servers to install crypto miners. “We observed notable updates to the long-running malware campaign targeting Linux systems by a group known as the 8220 gang.” reads one of the tweets publish

Cloud 82
article thumbnail

DragonForce Malaysia Releases LPE Exploit, Threatens Ransomware

Dark Reading

The hacktivist group is ramping up its activities and ready to assault governments and businesses with escalating capabilities.

article thumbnail

Analyzing the Swiss E-Voting System

Schneier on Security

Andrew Appel has a long analysis of the Swiss online voting system. It’s a really good analysis of both the system and the official analyses.

IT 78
article thumbnail

ICYMI: A Microsoft Warning, Follina, Atlassian, and More

Dark Reading

Dark Reading's digest of the other don't-miss stories of the week, including YouTube account takeovers and a sad commentary on cyber-pro hopelessness.

84
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Google will delete location history data for abortion clinic visits

The Guardian Data Protection

The company said that sensitive places including fertility centers, clinics and addiction treatment facilities will be erased Alphabet will delete location data showing when users visit an abortion clinic, the online search company said on Friday, after concern that a digital trail could inform law enforcement if an individual terminates a pregnancy illegally.

Privacy 75
article thumbnail

Time Constraints Hamper Security Awareness Programs

Dark Reading

Even as more attacks target humans, lack of dedicated staff, relevant skills, and time are making it harder to develop a security-aware and engaged workforce, SANS says.

article thumbnail

The ICRM adds two new awards in 2022

IG Guru

The ICRM has many active and accomplished volunteers that work selflessly to give back to the RIM profession. The passion and dedication that our volunteers put into their work is clear; their talent deserves to be widely recognized and rewarded. It is with great pleasure that we announce two additional awards: ICRM Member of the […]. The post The ICRM adds two new awards in 2022 appeared first on IG GURU.

IT 81
article thumbnail

Cybersecurity Tips for Remote Workers

Adapture

Remote work is the new normal for companies across the world. This new world of working has a number of benefits for both employees and companies—employees get to work from wherever they please, and companies save on real estate and overhead costs. Employees are enjoying the flexibility remote work gives them, and companies are embracing remote work in order to compete for top talent.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

When It Comes to SBOMs, Do You Know the Ingredients in Your Ingredients?

Dark Reading

Transitive dependencies can complicate the process of developing software bills of materials.

IT 71
article thumbnail

Consider These 5 Things Before Choosing AI Over Personnel

Adapture

Artificial Intelligence is making its way into more and more facets of running a successful organization. Even roles that once seemed impossible for a robot to take on, like creative services, are beginning to use AI for everyday tasks. If you’ve been thinking about choosing AI over personnel when filling your next role, consider these points before making the jump.

article thumbnail

Erwin® Data Modeler 12.1 by Quest®: Introducing Mart on Cloud — a pure SaaS solution

erwin

Highlights in this blog: erwin Mart on Cloud 12.1. Account-based licensing. Continued DBMS support, including NoSQL. On the heels of its erwin® Data Modeler 12.1 general availability release on June 7, less than one month later, Quest Software® announces a new offering: erwin Mart on Cloud 12.1. Register to attend our What’s New webinar , hosted by product manager Vani Mishra.

Cloud 52