Mon.Feb 06, 2023

article thumbnail

UScellular Customer Data On Hacker Forum

Data Breach Today

Data Leaked from a Thrid-Party Vendor U.S. wireless telecom USCellular says a data breach at a third party vendor resulted in a leak of 52,000 named and email addresses. The company confirmed that data from the leak is available for download on a criminal data breach forum.

article thumbnail

GUEST ESSAY: The common thread between China’s spy balloons and Congress banning Tik Tok

The Last Watchdog

The decision by the House of Representatives to ban TikTok from federal devices is noteworthy, especially as the Chinese spy balloon crisis unfolds. Related: The Golden Age of cyber espionage On December 23, 2022, Congress, in a bipartisan spending bill, banned TikTok from all government devices. The White House, the Pentagon, the Department of Homeland Security, and the State Department have already banned the social media app, as have more than a dozen other states.

Access 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Notorious Finnish Hacker 'Zeekill' Busted by French Police

Data Breach Today

Aleksanteri Kivimaki Charged With Mental Health Patient Data Breach and Extortion French police arrested hacker Aleksanteri Kivimäki, 25, who's suspected of hacking and extorting a Finnish mental health service provider, leaking patient data and extorting 25,000 patients. The suspect was formerly convicted of disrupting thousands of websites when he was a teenager.

article thumbnail

OpenText comments on IBM’s meritless claim against Micro Focus

OpenText Information Management

Last week I was delighted for OpenText to complete the acquisition of Micro Focus and welcome its customers, partners and employees to OpenText. We have significantly expanded our mission in Information Management. Before completing the acquisition, but after we announced the transaction, IBM brought a lawsuit against Micro Focus alleging copyright infringement by Micro Focus … The post OpenText comments on IBM’s meritless claim against Micro Focus appeared first on OpenText Blogs.

IT 105
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

'PixPirate" Banking Trojan Targets Brazilian Pix Users

Data Breach Today

Brazil Weathers Yet Another Malicious App for Stealing Money An Android banking Trojan is targeting Brazilian adopters of an instant payment platform known as Pix, marking another foray by the South American country's criminal underground into digital larceny. Brazil has a has been a hotbed of Trojan activity perpetuated by domestic cyber criminals.

157
157

More Trending

article thumbnail

BlackBasta Blamed for Global Attacks on VMware ESXi Servers

Data Breach Today

Italy, Germany, France, US and Canada Investigating Hacks of Unpatched Servers The Italian cybersecurity agency says at least a dozen hacks against unpatched VMware ESXi servers in the country are likely tied to the BlackBasta ransomware group. Investigators say the ransomware campaign may have hit thousands of organizations worldwide since Feb. 2.

article thumbnail

Global Ransomware Attack on VMware EXSi Hypervisors Continues to Spread

Dark Reading

The fresh "ESXiArgs" malware is exploiting a 2-year-old RCE security vulnerability (tracked as CVE-2021-21974), resulting in thousands of unpatched servers falling prey to the campaign.

article thumbnail

Trusona Exec Goldman on Bringing Usability to Authentication

Data Breach Today

Trusona's Kevin Goldman on Why People Work Around Security Tools That Aren't Usable Security practitioners are putting cognitive psychology and customer experience at the forefront of new product development in a push for usability, says Trusona's Kevin Goldman. Getting user experience designers familiar with products allows them to speak meaningfully with the security team.

article thumbnail

Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers

Security Affairs

The Italian National Cybersecurity Agency (ACN) warns of an ongoing massive ransomware campaign targeting VMware ESXi servers. The Italian National Cybersecurity Agency (ACN) warns of an ongoing massive ransomware campaign targeting VMware ESXi servers worldwide, including Italian systems. The attackers are attempting to exploit the CVE-2021–21974 vulnerability.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Discussion: Mitigating Risks to Customer Account Integrity

Data Breach Today

TeleSign's Seth Gilpin on Fraud and Risk Management in Customer Account and Device Security. Digital transformation we all have experienced over the last few years, everything online is at risk of fraud – fraudsters will try to take advantage over customer digital footprint at any time and access point. Telesign's Seth Gilpin shares insights.

Risk 144
article thumbnail

Attacking Machine Learning Systems

Schneier on Security

The field of machine learning (ML) security—and corresponding adversarial ML—is rapidly advancing as researchers develop sophisticated techniques to perturb, disrupt, or steal the ML model or data. It’s a heady time; because we know so little about the security of these systems, there are many opportunities for new researchers to publish in this field.

article thumbnail

Lawsuit Alleges GoodRx Unlawfully Shared Health Data

Data Breach Today

Litigation Also Names Meta, Google, Criteo in Use of Tracking Code Tech On the heels of an enforcement action last week by the Federal Trade Commission, telehealth and discount prescription drug provider GoodRX now faces a proposed class action lawsuit also over its data sharing practices with third-parties and the use of website tracking code.

IT 144
article thumbnail

A Close Call – PayPal Scam Warning

KnowBe4

On Sunday, I received an urgent message from a friend. PayPal had sent him an email saying that a co-worker had sent him money. This was not unexpected, as he was collecting contributions towards a farewell gift for another coworker. What struck him as odd were the instructions to claim the money by logging into his account or registering a new account.

IT 84
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Crypto's Decentralized Finance Security Problem

Data Breach Today

Auditing Itself Can;t Ensure Security Holding cryptocurrencies in anything but a memory drive inside a box shielded with a Faraday cage was seemingly to tempt fate during 2022. And for that, the cryptocurrency world can in large measure finger DeFi platforms.

Security 144
article thumbnail

Crypto Drainers Are Ready to Ransack Investor Wallets

Dark Reading

Cryptocurrency drainers are the latest hot ticket being used in a string of lucrative cyberattacks aimed at virtual currency investors.

98
article thumbnail

3 Ways Micro Focus Helps Jaguar TCS Racing Advance Sustainable Electric Mobility

Micro Focus

Our world-class Vertica Analytics Platform, IDOL Unstructured Data Analytics, and Professional Services enable the team to collect and process vast amounts of data, to create more accurate predictions, make better time-critical decisions during races, help maximize efficiency, and minimize carbon footprints. The post 3 Ways Micro Focus Helps Jaguar TCS Racing Advance Sustainable Electric Mobility first appeared on Micro Focus Blog.

article thumbnail

How Cybercriminals Are Operationalizing Money Laundering and What to Do About It

Dark Reading

It's time to share threat intelligence and prioritize digital literacy and cyber hygiene to stem the rising money laundering tide.

IT 97
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Safer Internet Day 2023: Empowering Kids and Families for a Safer Internet

Thales Cloud Protection & Licensing

Safer Internet Day 2023: Empowering Kids and Families for a Safer Internet divya Tue, 02/07/2023 - 06:44 Save the date for Safer Internet Day 2023 , which will take place on Tuesday, 7 February 2023, the 20th edition of the campaign! Safer Internet Day is marked every February in over 150 countries worldwide, with the theme of “Together for a better internet.

article thumbnail

Patching & Passwords Lead the Problem Pack for Cyber-Teams

Dark Reading

Despite growing awareness, organizations remain plagued with unpatched vulnerabilities and weaknesses in credential policies.

article thumbnail

Inside Safe City, Moscow’s AI Surveillance Dystopia

WIRED Threat Level

Moscow promised residents lower crime rates through an expansive smart city project. Then Vladimir Putin invaded Ukraine.

Privacy 88
article thumbnail

Students Phished with Bogus Job Offers

KnowBe4

A phishing campaign is targeting college students with phony part-time job opportunities, according to Jeremy Fuchs at Avanan. The emails purport to come from the colleges’ job placement department, stating, “Paying for college isn’t easy; your financial aid only covers some of the costs. Whether you want to cover more tuition, or you’d like to have some pocket-money for each week, a job will afford you that financial leeway.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CPPA Approves Proposed Final CPRA Regulations for Submission to OAL

Hunton Privacy

On February 3, 2023, the California Privacy Protection Agency (“CPPA”) Board unanimously approved for submission to California’s Office of Administrative Law (“OAL”) proposed final California Privacy Rights Act (“CPRA”) regulations released on January 31, 2023 which update the draft CPRA regulations released on November 3, 2022. The proposed final CPRA regulations are still in draft form and contain non-substantive updates to the November 3, 2022 regulations.

Privacy 61
article thumbnail

Keeping KillNet at Bay: Use the IP Address Blocklist

Dark Reading

Security teams can use a blocklist containing tens of thousands of proxy IP addresses used by the pro-Russian hacktivist group to defend their organizations from DDoS attacks.

article thumbnail

Customer first: New U.K. consumer duty for the financial services industry

OpenText Information Management

Have you ever been presented with stack of financial documents plastered with sticky notes and felt confused about where to sign and overwhelmed by the wording? This often happens to consumers when, for example, reviewing details about a new car lease or opening a new investment account. To start, the length of a car lease … The post Customer first: New U.K. consumer duty for the financial services industry appeared first on OpenText Blogs.

article thumbnail

Cybercrime Shows No Signs of Slowing Down

Dark Reading

Look for recent trends in attacks, strategies, and vulnerabilities to continue gaining steam throughout 2023.

76
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Illinois Supreme Court Rules on BIPA Class Action Lawsuit

Hunton Privacy

On February 2, 2023, the Illinois Supreme Court reversed in part and remanded a judgment of the lower appellate court in a class action lawsuit alleging violation of the Illinois Biometric Information Privacy Act (“BIPA”). In Jorome Tims v. Black Horse Carriers, Inc. , Jorome Tims sued his former employer, Black Horse, and alleged that it violated (1) Section 15(a) of BIPA by failing to institute, maintain and adhere to a publicly available biometric information retention and destruction policy;

Privacy 55
article thumbnail

SolarWinds Security Event Manager – SIEM Product Overview and Insight

eSecurity Planet

SolarWinds lacks the full security suite presence of some competitors, but is well-integrated across a variety of bonus IT operation capabilities such as threat intelligence platform capabilities, privileged access management, USB security, and botnet detection. These additional capabilities make the SolarWinds SEM a good fit for SMEs who may lack their own internal security teams — and particularly those looking for integrated IT management capabilities too.

article thumbnail

Google, Microsoft Set to Announce Major AI Integrations In Search This Week. We’ve Been Here Before.

John Battelle's Searchblog

Thirteen years ago this Fall, I found myself backstage at the Web2 Summit , a conference I ran for nearly ten years with Tim O’Reilly. Sergey Brin, co-founder of Google, had just wandered in, asking if it’d be cool if he joined me onstage for an impromptu conversation. Facebook’s Sheryl Sandberg, Google’s Marissa Mayers, AOL’s Tim Armstrong, Twitter’s Ev Williams and Microsoft’s Yusuf Medhi had already come and gone, and it seemed Sergey wanted to put a