Thu.Oct 13, 2022

article thumbnail

Cyber Threats Are Evolving

Data Breach Today

By working together, we can contribute to a safer world. Cyber threats are evolving. By working together, we can contribute to a safer world.

130
130
article thumbnail

Uber Data Breach Results in Corporate Cooperation and Executive Conviction

Data Matters

On October 5, 2022, a federal jury in the Northern District of California convicted former Uber Chief Security Officer Joseph Sullivan of obstructing a federal proceeding and misprision of a felony for his role in deceiving management and the federal government to cover up a 2016 data breach that exposed personally identifiable information (“PII”) of approximately 57 million users, including approximately 600,000 drivers’ license numbers, of the ride-hailing service.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Red Sift Acquires Attack Surface Management Vendor Hardenize

Data Breach Today

Hardenize to Help Red Sift Customers Assess Security of Domains and Certificates A phishing and fraud prevention vendor has bought a startup founded by Qualys' longtime engineering leader to help organizations more effectively discover and monitor assets. Red Sift says its purchase of Hardenize will help customers assess the security of their digital asset inventory.

Phishing 195
article thumbnail

Feature-Rich 'Alchimist' Cyberattack Framework Targets Windows, Mac, Linux Environments

Dark Reading

The comprehensive, multiplatform framework comes loaded with weapons, and it is likely another effort by a China-based threat group to develop an alternative to Cobalt Strike and Sliver.

IT 128
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Growing Zelle Fraud Problem and Who Should Pay for It

Data Breach Today

The latest ISMG Security Report examines whether banks should be held liable for the rapidly increasing Zelle fraud problem, explores the latest M&A activity among IAM vendors, and discusses the implications of the new legal framework for personal data transfers between the U.S. and Europe.

More Trending

article thumbnail

Yotam Segev on What Distinguishes Cyera from Traditional DLP

Data Breach Today

CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.

Security 130
article thumbnail

Cloudflare blocked a 2.5 Tbps DDoS attack aimed at the Minecraft server

Security Affairs

Cloudflare mitigated a record distributed denial-of-service (DDoS) attack against Wynncraft, one of the largest Minecraft servers. Cloudflare announced it has mitigated a record distributed denial-of-service (DDoS) attack against Wynncraft, one of the largest Minecraft servers. The Cloudflare DDoS threat report 2022 Q3 states that multi-terabit massive DDoS attacks have become increasingly frequent.

IT 122
article thumbnail

Biden Administration Ramps Up Cybersecurity Requirements

Data Breach Today

White House Shows Increased Interest in Standards for Critical Infrastructure, IoT The Biden administration will put more critical infrastructure sectors, such as water, under mandates to ensure minimal cybersecurity standards. The White House is also ramping up interest in consumer cybersecurity by initiating a labeling program for the internet of things.

article thumbnail

YoWhatsApp, unofficial WhatsApp Android app spreads the Triada Trojan

Security Affairs

Kaspersky researchers warn of a recently discovered malicious version of a popular WhatsApp messenger mod dubbed YoWhatsApp. Kaspersky researchers discovered an unofficial WhatsApp Android application named ‘YoWhatsApp’ that steals access keys for users’ accounts. Mod apps are advertised as unofficial versions of legitimate apps that have features that the official one does not supports.

Access 106
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CommonSpirit's Ransomware Incident Taking Toll on Patients

Data Breach Today

Also: Why Some Facilities Are Affected While Others Are Not The toll that cyber incidents can have on healthcare entities and their patients was especially felt this week by the parents of a 3-year-old child who received an accidental megadose of medicine - a mistake attributed to IT systems being offline at an Iowa medical center.

article thumbnail

IT Governance Podcast Episode 10: Data protection reform, Easylife fine, Uber conviction and work

IT Governance

This week, we discuss yet more planned changes to UK data protection law, a £1.35 million GDPR fine for “predatory marketing”, the conviction of Uber’s former chief security officer, and a new book about how to establish an enjoyable career. Now available on Spotify , Amazon Music , Apple Podcasts and SoundCloud. The post IT Governance Podcast Episode 10: Data protection reform, Easylife fine, Uber conviction and work appeared first on IT Governance UK Blog.

article thumbnail

RansomExx Leaks 52 GB of Barcelona Health Centers' Data

Data Breach Today

Consorci Sanitari Integral Says It Is Fully Recovered From Ransomware Attack A ransomware gang published 22 gigabytes of data it says it stole from Consorci Sanitari Integral, a Barcelona health organization of 3,000 physicians and staff. CSI acknowledge a "compromise in data confidentiality" but says its systems are fully recovered thanks to cloud backups.

article thumbnail

Cyberattackers Spoof Google Translate in Unique Phishing Tactic

Dark Reading

The campaign uses a combination of tactics and a common JavaScript obfuscation technique to fool both end users and email security scanners to steal credentials.

Phishing 110
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Small Business Grants as Phishbait

KnowBe4

INKY has published a report on the use of small business grants as phishing lures. Scammers are impersonating the US Small Business Administration (SBA) to distribute phony grant applications hosted on Google Forms.

article thumbnail

What the Uber Breach Verdict Means for CISOs in the US

Dark Reading

Can already beleaguered CISOs now add possible legal charges to their smorgasbord of job considerations? Disclose a breach to comply and face dismissal, or cover it up and face personal punishment.

IT 90
article thumbnail

Scams, Scams, Everywhere!

KnowBe4

Scammers have been around as long as history has been recorded. Think about the famous ‘Trojan Horse’ for example. A perfect scam that allowed attackers to get behind the city walls. The same is still happening, although the technology has evolved from wooden horses to digital ones. Even with the change in technology, deception, especially that which uses emotions to deceive, has not.

article thumbnail

The $1 Billion Alex Jones Effect

WIRED Threat Level

The Infowars host now knows the cost of “free speech”—but does the landmark judgment signal a crackdown on disinformation?

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

The discovery of Alchimist C2 tool, revealed a new attack framework to target Windows, macOS, and Linux systems

Security Affairs

Experts discovered a new attack framework, including a C2 tool dubbed Alchimist, used in attacks against Windows, macOS, and Linux systems. Researchers from Cisco Talos discovered a new, previously undocumented attack framework that included a C2 dubbed Alchimist. The framework is likely being used in attacks aimed at Windows, macOS, and Linux systems.

article thumbnail

The Playbook for Human-Operated Ransomware

Dark Reading

Ransomware attacks are on the rise, but organizations also have access to advanced tools and technologies they can use to fight back.

article thumbnail

Uber Data Breach Results in Corporate Cooperation and Executive Conviction

Data Matters

On October 5, 2022, a federal jury in the Northern District of California convicted former Uber Chief Security Officer Joseph Sullivan of obstructing a federal proceeding and misprision of a felony for his role in deceiving management and the federal government to cover up a 2016 data breach that exposed personally identifiable information (“PII”) of approximately 57 million users, including approximately 600,000 drivers’ license numbers, of the ride-hailing service.

article thumbnail

What You Need for a Strong Security Posture

Dark Reading

From the basics to advanced techniques, here's what you should know.

Security 108
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Celsius Exchange Data Dump Is a Gift to Crypto Sleuths—and Thieves

WIRED Threat Level

By releasing half a million users’ transactions in a bankruptcy court filing, the company has opened a vast breach in its users’ financial privacy.

Privacy 69
article thumbnail

Juice Technology Receives ISO Certification for Charging Station Cyber Security

Dark Reading

Electric Vehicle Charging Station Leader Certified in Accordance with ISO/SAE 21434 "Road Vehicles – Cybersecurity Engineering".

article thumbnail

Implementation is only the beginning

OpenText Information Management

Both technology providers and customers increasingly recognize the importance of onboarding to start the journey of adopting new technology on the right foot. But what makes for a successful onboarding experience? Donna Weber, The Customer Onboarding Expert, has written extensively on this topic. She stresses that onboarding is “much more than deploying your product”.

article thumbnail

Nudge Security Launches Platform With Humans in Mind

Dark Reading

SaaS security platform promises to track down shadow IT, map supply chain risk, and "nudge" employees to work securely.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Spoliation: What It Is, Why It’s a Risk, and What to Do about It

Zapproved

Corporate legal teams take on many responsibilities, but risk mitigation is among the most critical. One of the most important blips on the risk radar is the spoliation of evidence. Whenever your company faces the possibility of civil litigation, any company data that may potentially serve as evidence must be preserved. In the context of […].

Risk 52
article thumbnail

Novel npm Timing Attack Allows Corporate Targeting

Dark Reading

A timing attack helps cyberattackers lob malicious code-bombs at corporate targets by cloning private package names.

78
article thumbnail

Captain Chuck Yeager: Breaking the Sound Barrier

Unwritten Record

On October 14, 1947, USAF Captain Charles E. “Chuck” Yeager became the first person to fly faster than the speed of sound. Yeager flew a Bell X-1, nicknamed “Glamorous Glennis” (a tribute to his wife), over Rogers Dry Lake located at Edward’s Air Force Base (formerly named Muroc Air Force Base). The X-1 reached a speed of 700 miles per hour and an altitude of 43,000 feet.