Fri.Oct 07, 2022

article thumbnail

Cancer Testing Lab Reports 2nd Major Breach Within 6 Months

Data Breach Today

CSI Laboratories Says Recent Phishing Incident Affected 245,000 Patients A Georgia-based cancer testing laboratory has reported to federal regulators a phishing breach affecting the sensitive information of nearly 245,000 individuals. It is the lab's second hacking breach affecting hundreds of thousands of individuals reported over the last six months.

Phishing 292
article thumbnail

Report: Big U.S. Banks Are Stiffing Account Takeover Victims

Krebs on Security

When U.S. consumers have their online bank accounts hijacked and plundered by hackers, U.S. financial institutions are legally obligated to reverse any unauthorized transactions as long as the victim reports the fraud in a timely manner. But new data released this week suggests that for some of the nation’s largest banks, reimbursing account takeover victims has become more the exception than the rule.

Passwords 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Log4Shell Among Chinese Hackers' Fave Vulns, Say Feds

Data Breach Today

CISA, FBI and NSA List 20 Common Vulnerabilities Used by Beijing Count Log4Shell among Chinese hackers' favorite vulnerabilities, federal agencies say in a compilation of top exploits used by Beijing for state-sponsored cyber theft and espionage. Chinese state-sponsored hacking remains "one of the largest and most dynamic threats," warn the FBI, NSA and CISA.

245
245
article thumbnail

The Fight to Cut Off the Crypto Fueling Russia's Ukraine Invasion

WIRED Threat Level

Blockchain investigators have uncovered at least $4 million—and counting—in cryptocurrency fundraising has reached Russia's violent militia groups.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Binance Restores Cross-Chain Bridge After $569M Attack

Data Breach Today

Firm Upgrades Vulnerable Smart Contract, Shares Plans to Boost Security Crypto exchange Binance restored operations on its BSC Token Hub smart contract early Friday, hours after a $568.6 million hack. It upgraded the vulnerable contract in a new version and shared plans for potential measures to address this incident and increase security measures.

Security 237

More Trending

article thumbnail

Hacker Exploits Bug to Steal Millions from Binance Bridge

Data Breach Today

Crypto Exchange Pauses BSC Smart Contract, Looks to Upgrade Node Crypto exchange Binance paused its smart contract platform Binance Smart Chain after a hacker exploited an internal verification vulnerability to steal cryptocurrency from its cross-chain bridge. Binance has acknowledged a theft of at least $100 million; PeckShield says hackers stole $586 million.

IT 227
article thumbnail

President Biden Issues Executive Order on New EU-U.S. Data Transfer Pact

Hunton Privacy

On October 7, 2022, President Biden signed Executive Order on Enhancing Safeguards for United States Signals Intelligence Activities , which provides a new framework for legal data transfers between the European Union and the United States. The legal basis for transatlantic data transfers has been uncertain since 2020, when the European Court of Justice (“ECJ”) declared the previous framework, the EU-U.S.

Privacy 116
article thumbnail

ISMG Editors: The Plot to Leak US Health Records to Russia

Data Breach Today

Also: Sentencing of the Capital One Hacker and the Exit of Lacework’s Co-CEO In the latest weekly update, ISMG editors examine the story of a Maryland couple facing charges for giving military medical records to Russia, the sentencing of a former Seattle tech worker for her massive Capital One hack, and why David Hatfield resigned as co-CEO of cloud security vendor Lacework.

Military 157
article thumbnail

Cybersecurity Will Account for Nearly One-Quarter of AI Software Market Through 2025

Dark Reading

A boom in artificial intelligence-powered detection and remediation tools pushes security spending to the top of the AI market, according to Forrester.

Marketing 123
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Ransomware Files, Episode 12: Unproven Data Recovery

Data Breach Today

What if you were hired for an office job but ended up negotiating with cybercriminals? There aren’t many rules around ransomware, but this is a story about one rule that was definitely broken. By the end, the path to the truth led to a place on the other side of the world where no one wanted to be.

article thumbnail

Uber Guilty Verdict Raises Security Stakes for CSOs

eSecurity Planet

In a case that ups the stakes for CSOs dealing with data breaches, former Uber chief security officer Joe Sullivan was found guilty by a federal jury earlier this week of obstructing justice and of misprision (concealing) of a felony in connection with his coverup of a 2016 breach. United States Attorney Stephanie M. Hinds said in a statement that technology companies that collect and store vast amounts of user data must protect that data and alert customers and authorities if it’s stolen.

Security 104
article thumbnail

How Adversaries Are Bypassing Weak MFA

Data Breach Today

The latest edition of the ISMG Security Report discusses how adversaries have a new favorite tactic to circumvent MFA, why vendor Akamai is an appealing target for private equity, and what the industry can do differently to attract more females to leadership roles.

Security 130
article thumbnail

The FTC’s COPPA Conundrum: Ambiguities in the Rule and a Death of Authoritative Guidance Leave the Agency Vulnerable to Legal Challenges

Data Matters

This article was originally published by the ABA’s ANTITRUST magazine in its Summer 2022 issue. The Children’s Online Privacy Protection Act (COPPA) and the Federal Trade Commission’s COPPA-enforcing rule have increasing relevance for all businesses that interact directly with consumers online—including companies that do not regard themselves as marketing directly to children.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

President Biden to Sign Order for Trans-Atlantic Data Flows

Data Breach Today

EO Puts Restraints on Electronic Communications Gathering by Intelligence Agencies U.S. President Joe Biden will mount the third attempt to normalize commercial trans-Atlantic data flows by signing an executive order implementing privacy safeguards on American intelligence gathering. The order follows nearly two years of negotiations between Brussels and Washington.

article thumbnail

VMware fixed a high-severity bug in vCenter Server

Security Affairs

VMware this week addressed a severe vulnerability in vCenter Server that could lead to arbitrary code execution. VMware on Thursday released security patches to address a code execution vulnerability, tracked as CVE-2022-31680 (CVSS score of 7.2), in vCenter Server. The security issue is an unsafe deserialization vulnerability that resides in the platform services controller (PSC).

Cloud 99
article thumbnail

Weekly Update 316

Troy Hunt

Geez it's nice to be home 😊 It's nice to live in a home that makes you feel that way when returning from a place as beautiful as Bali 😊 This week's video is dominated by the whole discussion around this tweet: I love that part of the Microsoft Security Score for Identity in Azure improves your score if you *don't* enforce password rotation, what a sign of the times!

article thumbnail

Fortinet urges customers to immediately fix a critical authentication bypass flaw in FortiGate and FortiProxy

Security Affairs

Fortinet addressed a critical authentication bypass vulnerability that impacted FortiGate firewalls and FortiProxy web proxies. Fortinet addressed a critical authentication bypass flaw, tracked as CVE-2022-40684, that impacted FortiGate firewalls and FortiProxy web proxies. An attacker can exploit the vulnerability to log into vulnerable devices. “An authentication bypass using an alternate path or channel [CWE-88] in FortiOS and FortiProxy may allow an unauthenticated attacker to perform

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

How Contactless Tech Is Transforming Passenger Experience

HID Global

Contactless technology is changing the way we travel, and as a result improving the passenger experience. What can we expect as digital adoption continues?

98
article thumbnail

Hacker stole $566 million worth of Binance Coins from Binance Bridge

Security Affairs

Threat actors have stolen 2 million Binance Coins (BNB), worth $566 million, from the popular Binance Bridge. Hackers have reportedly stolen $566 million worth of Binance Coins (BNB) from the Binance Bridge. It seems that threat actors were able to exploit an issue with the bridge, the attack took place at 2:30 PM EST today. The attackers were able to transfer the funds to their wallet through two transactions [ 1 , 2 ], each of 1,000,000 BNB.

article thumbnail

State Bar of Georgia Notifies Members and Employees of Cybersecurity Incident

Dark Reading

Current and former employees and members are being offered complimentary credit monitoring and identity protection services as some personal information may have been accessed.

article thumbnail

Industry Voices: Arin Lopez on Diversity and Inclusion

HID Global

Director of Diversity and Inclusion Arin Lopez talks about the importance of a diverse, equitable and inclusive workplace.

98
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Meta Flags Malicious Android, iOS Apps Affecting 1M Facebook Users

Dark Reading

Some 400 mobile apps have posed as legitimate software on Google Play and the Apple App Store over the past year, and were designed to steal Facebook user credentials.

81
article thumbnail

Meta Says It Has Busted More Than 400 Login-Stealing Apps This Year

WIRED Threat Level

The company plans to alert 1 million Facebook users that their account credentials may have been compromised by malicious software.

IT 88
article thumbnail

We Can Save Security Teams From Crushing Workloads. Will We?

Dark Reading

Today, the processing of mountain-high stacks of alarms is considered "security." That system is failing customers and the cybersecurity workforce.

article thumbnail

The FTC’s COPPA Conundrum: Ambiguities in the Rule and a Death of Authoritative Guidance Leave the Agency Vulnerable to Legal Challenges

Data Matters

This article was originally published by the ABA's ANTITRUST magazine in its Summer 2022 issue. The Children’s Online Privacy Protection Act (COPPA) and the Federal Trade Commission’s COPPA-enforcing rule have increasing relevance for all businesses that interact directly with consumers online—including companies that do not regard themselves as marketing directly to children.

Privacy 78
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Uber Data Breach Conviction Shows Security Execs What Not to Do

WIRED Threat Level

Former Uber security chief Joe Sullivan’s conviction is a rare criminal consequence for an executive’s handling of a hack.

article thumbnail

U.S. Department of Justice Announces U.S. – UK CLOUD Act Agreement

Hunton Privacy

On October 3, 2022, the U.S. Department of Justice (“DOJ”) announced that the agreement between the U.S. Government and the UK Government on Access to Electronic Data for the Purpose of Countering Serious Crime (the “CLOUD Act Agreement”) entered into force, effective the same day. The CLOUD Act Agreement, which is authorized by the U.S. Clarifying Lawful Overseas Use of Data (“CLOUD”) Act, is the first of its kind and will allow each country’s investigators to gain access to data held by servic

Cloud 58
article thumbnail

Credential Harvesting Is Retail Industry's Top Threat

Dark Reading

Why bother with new tactics and exploits when the old tricks are still effective?

Retail 81