Mon.Nov 28, 2022

article thumbnail

Cybercrime Forum Dumps Stolen Details on 5.4M Twitter Users

Data Breach Today

But Information Compiled by Other Attackers May Involve Millions of Other Accounts Information amassed on 5.4 million Twitter users by an attacker who abused one of the social network's APIs has been dumped online for free. While Twitter confirmed that breach, a researcher suggests other attackers also abused the feature to amass information for millions of other users.

251
251
article thumbnail

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

Krebs on Security

A recent scoop by Reuters revealed that mobile apps for the U.S. Army and the Centers for Disease Control and Prevention (CDC) were integrating software that sends visitor data to a Russian company called Pushwoosh , which claims to be based in the United States. But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan , malware designed to surreptitiously intercept and forward text messages from Android mob

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meta Fined by Irish Privacy Regulator for GDPR Violations

Data Breach Today

Fine Tied to Data Scrapping Incident Revealed in 2021 Facebook will pay a 265 million euro fine to the Irish data protection authority to resolve a 2021 incident when the scrapped data of 533 million users appeared online. The data contained names, phone numbers and birth dates. Facebook says it takes active measures against data scrapping.

GDPR 237
article thumbnail

Experts found a vulnerability in AWS AppSync

Security Affairs

Amazon Web Services (AWS) fixed a cross-tenant vulnerability that could have allowed attackers to gain unauthorized access to resources. Amazon Web Services (AWS) has addressed a cross-tenant confused deputy problem in its platform that could have allowed threat actors to gain unauthorized access to resources. The problem was reported to the company by researchers from Datadog on September 1, 2022, and the bug was solved on September 6.

Access 141
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Multiple Arrests in Coordinated African Cyber Operation

Data Breach Today

Law Enforcement Agencies Also Took Down 200,000 Cyber Infrastructure Crooks A 27-nation joint investigation in Africa led to the arrest of 11 cybercrooks accused of defrauding $800,000 from victims across the world. The authorities also took down nearly 200,000 elements of malware infrastructure used by the fraudsters for phishing and other scams.

Phishing 144

More Trending

article thumbnail

UK Online Safety Bill Harms Privacy & Security, Experts Say

Data Breach Today

Civil Society Groups Ask PM Sunak to Reconsider Decryption Clause in Legislation The United Kingdom is the newest front in the long-fought conflict over end-to-end encryption, as a slew of civil society groups urge the prime minister not to back legislation empowering regulators to force online intermediaries into providing decrypted messages.

Privacy 130
article thumbnail

Computer Repair Technicians Are Stealing Your Data

Schneier on Security

Laptop technicians routinely violate the privacy of the people whose computers they repair: Researchers at University of Guelph in Ontario, Canada, recovered logs from laptops after receiving overnight repairs from 12 commercial shops. The logs showed that technicians from six of the locations had accessed personal data and that two of those shops also copied data onto a personal device.

Cleanup 128
article thumbnail

Indiana Health Entity Reports Breach Involving Tracking Code

Data Breach Today

5 Million People Are Affected by This Breach and 2 Similar Incidents An Indiana healthcare network, Community Health Network, is the latest medical entity to classify its use of online tracking code as a data breach reportable to federal regulators. It said the unauthorized access/disclosure breach affected 1.5 million individuals.

article thumbnail

A flaw in some Acer laptops can be used to bypass security features

Security Affairs

ESET announced the discovery of a vulnerability impacting Acer laptops that can allow an attacker to deactivate UEFI Secure Boot. ESET researchers announced in a series of tweets the discovery of a vulnerability impacting Acer laptops, the issue can allow an attacker to deactivate UEFI Secure Boot. The experts explained that the flaw, tracked as CVE-2022-4020 , is similar to the Lenovo vulnerabilities the company disclosed earlier this month.

Security 123
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Greater Toronto School Offline Following 'Cyber Incident'

Data Breach Today

Online Learning and Student Chromebooks Disabled for Thousands of Schoolchildren Staffers reacted with incredulity after a cyber incident at a Greater Toronto school district kept systems offline and forced teachers to take attendance manually. Online learning and student Chromebooks were not working at Durham District School Board, which serves more than 74,000 students.

130
130
article thumbnail

RansomBoggs Ransomware hit several Ukrainian entities, experts attribute it to Russia

Security Affairs

Several Ukrainian organizations were hit by Russia-based RansomBoggs Ransomware in the last week, ESET reports. Researchers from ESET observed multiple attacks involving a new family of ransomware, tracked as RansomBoggs ransomware, against Ukrainian organizations. The security firm first detected the attacks on November 21 and immediately alerted the CERT US.

article thumbnail

Addressing the Shortage of Medical Device Cyber Talent

Data Breach Today

The shortage of cybersecurity professionals in the United States includes a scarcity of expertise in medical device security, says Bill Aerts, senior fellow and managing director of the University of Minnesota's recently launched Center for Medical Device Cybersecurity.

article thumbnail

File Under “Hardcore, Great Men Are All”

John Battelle's Searchblog

There’s so much to say about what’s happening at Twitter, but I’m going to start with one word: “Hardcore.” That’s what Elon said he wants from all his employees going forward – a “hardcore” mentality, a coder-first culture, a sleep-at-the-office-and-pound-Red-Bull kind of sensibility. I’m pretty familiar with this culture – an earlier, less toxic version of it pervaded the pre-Elon tech world, a culture I reported on at Wired , t

Sales 116
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The UK ICO and Ofcom to Work Together on Online Safety and Data Protection

Hunton Privacy

On November 25, 2022, the UK Information Commissioner’s Office (“ICO”) and the UK’s communications regulator, Ofcom, issued a joint statement setting out how they intend to work together to “ensure coherence between the data protection and the new online safety regimes.” The regulators noted that the statement is primarily intended for online service providers that are likely to be regulated under the online safety regime, but it also will be of interest to other stakeholders as an indication of

article thumbnail

Irish data protection commission fines Meta over 2021 data-scraping leak

Security Affairs

Irish data protection commission (DPC) fined Meta for not protecting Facebook’s users’ data from scraping. Meta has been fined €265 million ($275.5 million) by the Irish data protection commission (DPC) for the data leak suffered by Facebook in 2021 that exposed the data belonging to millions of Facebook users. The Data Protection Commission is also imposing a range of corrective measures on Meta. “The Data Protection Commission (DPC) has today announced the conclusion to an in

GDPR 95
article thumbnail

There’s No Such Thing as a Free Yeti, Only Social Engineering Tactics

KnowBe4

It’s easy to think of the typical online holiday scam as something that affects mostly individuals. Sad, maybe, and unfortunate, but not something that might seriously threaten a business, or another organization.

95
article thumbnail

Is MFA the Vegetable of Cybersecurity?

Dark Reading

Don’t fuss now — just another spoonful of multifactor authentication to keep the organization strong and the data safer.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Users Can Engage with Training Anytime with KnowBe4's Mobile Learner App

KnowBe4

We’re excited to introduce a new way for your users to engage with KnowBe4 security awareness and compliance training anytime and anywhere with the KnowBe4 Learner App. And the best part? It’s available with all training subscription levels at no additional cost !

article thumbnail

Black Basta Gang Deploys Qakbot Malware in Aggressive Cyber Campaign

Dark Reading

The ransomware group is using Qakbot to make the initial point of entry before moving laterally within an organization’s network.

article thumbnail

Meta fined €265m over data protection breach that hit more than 500m users

The Guardian Data Protection

Facebook, Instagram and WhatsApp owner has been fined nearly €1bn by EU since September 2021 Facebook’s owner has been fined €265m (£230m) by the Irish data watchdog after a breach that resulted in the details of more than 500 million users being published online. The Data Protection Commission (DPC) said Meta had infringed two articles of the EU’s data protection laws after details of Facebook users from around the world were scraped from public profiles in 2018 and 2019.

GDPR 86
article thumbnail

$275M Fine for Meta After Facebook Data Scrape

Dark Reading

Meta has been found in violation of Europe's GDPR rules requiring the social media giant to protect user data by "design and default.

GDPR 100
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

What is the NIS2 Directive and How Does It Affect You?

Thales Cloud Protection & Licensing

What is the NIS2 Directive and How Does It Affect You? divya. Tue, 11/29/2022 - 06:08. The European Union enacted the Network and Information System (NIS) regulation in July 2016 with the intention of ensuring a specific level of security for networks and information systems belonging to critical and sensitive infrastructures in EU member states. Six years later, modifications to this regulation are gaining momentum, with the Commission, the European Parliament, and the European Council reaching

IT 71
article thumbnail

How the Cloud Changed Digital Forensics Investigations

Dark Reading

The enterprise's shift to the cloud means digital forensics investigators have had to adopt new remote techniques and develop custom tools to uncover and process evidence off compromised devices.

Cloud 80
article thumbnail

How to find information faster in email

OpenText Information Management

Valuable information is buried in emails – from your clients, sensitive projects and legal matters. It is increasingly difficult to find, organize and see the full set of relevant information lawyers and other knowledge workers need to respond quickly and stay on top of their projects and cases. An ever-growing volume of email often leads … The post How to find information faster in email appeared first on OpenText Blogs.

IT 63
article thumbnail

Cyber-Threat Group Targets Critical RCE Vulnerability in 'Bleed You' Campaign

Dark Reading

More than 1,000 systems are exposed to a campaign hunting weak Windows servers and more.

114
114
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Crises, cartels and collusion: dawn raids resume with full force

OpenText Information Management

After several years pause when competition authorities around the world suspended on-the-spot inspections during the global pandemic, dawn raids have resumed with full force. In less than a year, more than 40 dawn raids have been reported by 16 different competition authorities across EMEA, the Americas and Asia alone involving companies in the automotive sector, … The post Crises, cartels and collusion: dawn raids resume with full force appeared first on OpenText Blogs.

article thumbnail

Cybersecurity Consolidation Continues, Even as Valuations Stall

Dark Reading

Financing and acquisitions are trending toward smaller deals, which means fewer high-valuation purchases and funding, but likely fewer post-merger layoffs as well.

article thumbnail

Maximize your data dividends with active metadata

IBM Big Data Hub

Metadata management performs a critical role within the modern data management stack. It helps blur data silos, and empowers data and analytics teams to better understand the context and quality of data. This, in turn, builds trust in data and the decision-making to follow. However, as data volumes continue to grow, manual approaches to metadata management are sub-optimal and can result in missed opportunities.