Thu.Oct 06, 2022

article thumbnail

Cybercriminal Faces Prison Time Over Romance Scams and Business Email Compromise Attacks

KnowBe4

A man from Atlanta, Georgia has been convicted of running romance scams and business email compromise attacks that netted him over $9.5 million, the US Justice Department has announced.

103
103
article thumbnail

Health Entity Agrees to Pay $7.9 Million to Improve Security

Data Breach Today

But Payments to 540,000 Class Members in Breach Settlement Capped at $800,000 A Baltimore, Maryland-based healthcare organization has agreed to spend nearly $8 million improving and maintaining its data security as "injunctive relief" to settle a class action lawsuit involving two data breaches that affected a total of about 540,000 individuals.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Are You Doing for Cyber Security Awareness Month?

IT Governance

This October is Cyber Security Awareness Month, an event designed to educate people about information security and the steps they can take to stay safe online. Now in its nineteenth year, the campaign provides tools and resources to help people learn more about the cyber security industry and the ways they can get involved. This year’s event focuses on phishing and ransomware – two of the biggest threats that organisations currently face.

article thumbnail

Lloyd's of London Detects Suspicious Network Activity

Data Breach Today

UK Insurance Marketplace Gauging Best Options for Reconnecting Systems Put Offline Lloyd's of London is probing a possible cybersecurity incident that led it to yank some systems offline. Details are scarce at the moment, including whether the incident is malicious or involves ransomware and who may have instigated the incident.

Insurance 246
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

European Commission Publishes Proposal for Cyber Resilience Act

Hunton Privacy

Background. On September 15, 2022, the European Commission presented its proposal for a Regulation on horizontal cybersecurity requirements for products with digital elements (the “Cyber Resilience Act”). According to the European Commission , the Cyber Resilience Act will be the first EU-wide legislation introducing “cybersecurity requirements for products with digital elements, throughout their whole lifecycle.”.

More Trending

article thumbnail

ICO Publishes Draft New Guidance on PETs

Data Matters

On 7 September 2022, the Information Commissioner’s Office (“ ICO ”) published draft guidance (“ Guidance ”) on privacy-enhancing technologies (“ PETs ”). It is hoped that the Guidance will help organizations have the confidence to utilize PETs to develop innovative applications without compromising on privacy concerns, or trust. The Guidance is divided into two sections: (i) how can PETs help with data protection compliance; and (ii) what are PETs.

GDPR 88
article thumbnail

Arctic Wolf Gets $401M From Owl Rock to Pursue Acquisitions

Data Breach Today

CEO Nick Schneider Plans to Focus on M&A Deals Around Cloud, SIEM, Endpoint and XDR Security operations stalwart Arctic Wolf has taken on more than $400 million in debt to pursue acquisitions in the cloud, SIEM, endpoint and XDR markets. The money will fuel an upcoming launch in the Asia-Pacific region and expansion in markets such as South Africa, Benelux and the Nordics.

Marketing 130
article thumbnail

“Egypt Leaks” – Hacktivists are Leaking Financial Data

Security Affairs

Researchers at cybersecurity firm Resecurity spotted a new group of hacktivists targeting financial institutions in Egypt, Resecurity, a California-based cybersecurity company protecting Fortune 500 corporations globally, has noticed a new group of hacktivists targeting financial institutions in Egypt. The bad actors go under the campaign “EG Leaks” (also known as “Egypt Leaks”), they started leaking large volumes of compromised payment data belonging to the customers of major Egyptian banks on

article thumbnail

KnowBe4 Celebrates Winning a Tech Cares Award From TrustRadius 2022

KnowBe4

For the third consecutive year, we received a Tech Cares Award from TrustRadius! This third annual award celebrates companies that have gone above and beyond to provide strong Corporate Social Responsibility (CSR).

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Watch out, a bug in Linux Kernel 5.19.12 can damage displays on Intel laptops

Security Affairs

A bug in Linux Kernel 5.19.12 that was released at the end of September 2022 can potentially damage the displays of Intel laptops. Linux users reported the displays of their Intel laptops rapidly blinking, flickering, and showing white flashes after upgrading to Linux kernel version 5.19.12. Linux expert Ville Syrjäl pointed out that the anomalous issue may damage displays. “After looking at some logs we do end up with potentially bogus panel power sequencing delays, which may harm the LCD

article thumbnail

A Coordinated Swatting Spree Is Targeting US Schools

WIRED Threat Level

Sixteen states collectively suffered more than 90 false reports of school shooters during three weeks in September—and many appear to be connected.

article thumbnail

Cisco fixed two high-severity bugs in Communications, Networking Products

Security Affairs

Cisco fixed high-severity flaws in some of its networking and communications products, including Enterprise NFV, Expressway and TelePresence. Cisco announced it has addressed high-severity vulnerabilities affecting some of its networking and communications products, including Enterprise NFV, Expressway and TelePresence. “Multiple vulnerabilities in the API and in the web-based management interface of Cisco Expressway Series Software and Cisco TelePresence Video Communication Server (VCS) S

article thumbnail

Russia-Linked Cybercrime Group Hawks Combo of Malicious Services With LilithBot

Dark Reading

The malware-as-a-service group Eternity is selling a one-stop shop for various malware modules it's been distributing individually via a subscription model on Telegram.

IT 89
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

LilithBot Malware, a new MaaS offered by the Eternity Group

Security Affairs

Researchers linked the threat actor behind the Eternity malware-as-a-service (MaaS) to a new malware strain called LilithBot. Zscaler researchers linked a recently discovered sample of a new malware called LilithBot to the Eternity group (aka EternityTeam; Eternity Project). The Eternity group operates a homonymous malware-as-a-service (MaaS), it is linked to the Russian “Jester Group,” which is active since at least January 2022.

article thumbnail

Russian Hackers Shut Down US State Government Websites

Dark Reading

Russian-speaking cyberattackers boast they are behind disruption of Colorado, Kentucky, and Mississippi government websites.

article thumbnail

City of Tucson Data Breach impacted 123,500 individuals

Security Affairs

The City of Tucson, Arizona disclosed a data breach, the incident was discovered in May 2022 and impacted 123,500 individuals. The security breach was discovered at the end of May 2022 and concluded the investigation in September. According to the notification letter sample provided to the Maine Attorney General’s Office, over 123,500 were impacted have been impacted by the incident. “On August 4, 2022, the City learned that certain files may have been copied and taken from the City’s ne

article thumbnail

macOS Archive Utility Bug Lets Malicious Apps Bypass Security Checks

Dark Reading

Exploit allows unsigned and unnotarized macOS applications to bypass Gatekeeper and other security, without notifying the user.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

19-Year-Old man arrested for misusing leaked record from Optus Breach

Security Affairs

The Australian Federal Police (AFP) arrested a 19-year-old teen from Sydney for attempting to use data from the Optus data breach in SMS scams. The Australian Federal Police (AFP) has arrested a 19-year-old teen from Sydney for allegedly attempting to use data leaked after the Optus data breach in a fraudulent scheme aimed at extorting victims via SMS scams.

article thumbnail

7 IoT Devices That Make Security Pros Cringe

Dark Reading

A look at everything from truly dumb smart devices to cool-looking IoT tech with huge cybersecurity and privacy implications.

IoT 89
article thumbnail

Former Uber Security Chief Found Guilty in Criminal Trial for Failure to Disclose Breach to FTC

Hunton Privacy

On October 5, 2022, former Uber security chief Joe Sullivan was found guilty by a jury in U.S. federal court for his alleged failure to disclose a breach of Uber customer and driver data to the FTC in the midst of an ongoing FTC investigation into the company. Sullivan was charged with one count of obstructing an FTC investigation and one count of misprision, the act of concealing a felony from authorities.

article thumbnail

Hackers Have It Out for Microsoft Email Defenses

Dark Reading

Cybercriminals are focusing more and more on crafting special email attacks that evade Microsoft Defender and Office security.

IT 84
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Apple property list parsing with EnScript

OpenText Information Management

The third blog in the series following on from Using the Generic SQLite Database Parser EnScript in forensic examination of a mobile device, will focus on Apple Property List (plist). Plists are used to store user and system related information and are usually found in either a binary or XML format, some will have relevance … The post Apple property list parsing with EnScript appeared first on OpenText Blogs.

article thumbnail

Sharing Knowledge at 44CON

Dark Reading

The infosec conference named after the UK's calling code returned this year with a focus on building a healthy community.

80
article thumbnail

ICO Publishes Draft New Guidance on PETs

Data Matters

On 7 September 2022, the Information Commissioner’s Office (“ ICO ”) published draft guidance (“ Guidance ”) on privacy-enhancing technologies (“ PETs ”). It is hoped that the Guidance will help organizations have the confidence to utilize PETs to develop innovative applications without compromising on privacy concerns, or trust. The Guidance is divided into two sections: (i) how can PETs help with data protection compliance; and (ii) what are PETs.

Privacy 78
article thumbnail

The first step to frictionless payments is a frictionless SWIFT experience 

OpenText Information Management

From Brexit to the Ukrainian war, the course of cross-border payments never seems to run smooth. Yet, these transactions are the lifeblood of international trade and economic growth worldwide. SWIFT has taken major steps in recent years towards its goal of fast and frictionless transactions. While SWIFT is reducing the complexity of international transactions, selecting … The post The first step to frictionless payments is a frictionless SWIFT experience appeared first on OpenText Blogs.

IT 62
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

New SonicWall Survey Data Reveals 91% of Organizations Fear Ransomware Attacks in 2022

Dark Reading

Amid an economic downturn, cybersecurity staffing shortages, and endless cyberattacks, financially motivated attacks are the top concern among IT professionals.

article thumbnail

Parental engagement in 1:1 iPad deployments is crucial to student success

Jamf

The Jamf Parent app empowers parents and gives them a window into their children’s learning activities in both educational and healthcare settings. Find out how in this JNUC 2022 session.

article thumbnail

School Is in Session: 5 Lessons for Future Cybersecurity Pros

Dark Reading

Opportunities in the field continue to grow — and show no signs of slowing down.