Mon.Aug 03, 2020

article thumbnail

Breaches Tied to Pharmacy Looting: Security Lessons

Data Breach Today

Walgreens and CVS Are Among the Chains Affected As more reports emerge regarding data breaches at pharmacy chains as a result of earlier break-ins and looting incidents during civil unrest, security experts are calling attention to important security issues, including the need to check physical security measures as well as encrypt mobile devices.

Security 208
article thumbnail

List of data breaches and cyber attacks in July 2020 ­– 77 million records breached

IT Governance

After mammoth amounts of personal data were leaked in May and June, we’ve seen a reversion to the mean this month. By our count, 77,775,496 records were leaked in 86 incidents. This includes the Twitter hack on 130 people, including Bill Gates, Barack Obama and Elon Musk, as well as the less flashy but equally concerning attack on dozens of universities and charities across the UK, US and Canada.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fraud Detection: Lessons From Novartis Case

Data Breach Today

Compliance Expert Thomas Fox on the Role Data Analytics Can Play Incidents of fraud at pharmaceutical giant Novartis that resulted in over $1 billion in fines worldwide might have been avoided if the company's compliance team used data analytics to detect patterns, says Thomas Fox, a compliance evangelist and author.

article thumbnail

Why Data Ethics Is a Growing CISO Priority

Dark Reading

With data collection growing, and increased concern about how it is handled, a synergy between security and data teams will be essential.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Insights on Revamping Recovery Strategies

Data Breach Today

Experts at Dell Technologies and Unisys Discuss Current Threats and Best Security Practices In a joint video interview, David Finley at Dell Technologies and Andrew Peters at Unisys offer insights on enterprise strategies for disaster recovery and cyber recovery in light of emerging threats.

Security 189

More Trending

article thumbnail

FastPOS Malware Creator Pleads Guilty

Data Breach Today

Prosecutors Say He Provided Help to Cybercriminals Via Infraud Site A member of the infamous Infraud Organization who was the creator of a malware strain called FastPOS has pleaded guilty to a federal conspiracy charge. Valerian Chiochiu assisted other cybercriminals through the Infraud site before authorities shuttered it in 2018, prosecutors say.

IT 176
article thumbnail

Belarussian authorities arrested GandCrab ransomware distributor

Security Affairs

Last week, the Minister of Internal Affairs of Belarus announced the arrest of a 31-year-old man that is accused of distributing the infamous GandCrab ransomware. Last week, the Minister of Internal Affairs of Belarus announced the arrest of a man on charges of distributing the infamous GandCrab ransomware. The arrest is the result of an investigation conducted with help from law enforcement from the UK and Romania.

article thumbnail

Secret Service Agent Offers Cybercrime-Fighting Insights

Data Breach Today

Christopher Leone, assistant special agent in charge, United States Secret Service, offers advice to organizations on forging relationships with law enforcement as part of their cybersecurity incident preparedness plans.

article thumbnail

Reading the 2020 Cost of a Data Breach Report

Security Affairs

2020 Cost of a Data Breach Report: the global total cost of a data breach averaged $3.86 million in 2020, down about 1.5% from the 2019 study. Every year, I write about the annual report published by the Ponemon Institute on the cost of a data breach, it is a very interesting study that explores the economic impact of a “data breach.”. This year the researchers analyzed 524 breaches that occurred between August 2019 and April 2020, in organizations of all sizes, across 17 geographies and 17 indu

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Netgear Won’t Patch 45 Router Models Vulnerable to Serious Flaw

Threatpost

Almost two months after a high-severity flaw was disclosed - and seven months after it was first reported - Netgear has yet to issue fixes for 45 of its router models.

IT 111
article thumbnail

Ghostwriter disinformation campaign aimed at discrediting NATO

Security Affairs

Researchers uncovered a disinformation campaign aimed at discrediting NATO via fake news content distributed through compromised news websites. Security experts from FireEye have uncovered a disinformation campaign aimed at discrediting NATO by spreading fake news content on compromised news websites. “The operations have primarily targeted audiences in Lithuania, Latvia, and Poland with anti-North Atlantic Treaty Organization (NATO) narratives, often leveraging website compromises or spoo

Military 116
article thumbnail

Garmin Pays Up to Evil Corp After Ransomware Attack — Reports

Threatpost

The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said.

article thumbnail

Havenly discloses data breach, 1.3M accounts available online

Security Affairs

Havenly, a Denver-Based company, that realized an interior designer marketplace has disclosed a data breach that impacted 1.3 million users. The US-based interior design web site Havenly has disclosed a data breach after the known threat actor ShinyHunters has leaked for free the databases of multiple companies on a hacker forum. Last week, BleepingComputer reported that ShinyHunterswas offering on a hacker forum the databases stolen from eighteen companies, over 386 million user records avail

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FAQ: My Record Is Nowhere to Be Found on a Schedule—Now What?

The Texas Record

The local government schedules or your state agency’s retention schedule should list all of the types of records your local government or state agency creates or receives since the disposition of a record cannot be carried out if it is not included on a retention schedule. Even so, a time may come when you will have a record that just does not fit into any of the record series in the above-mentioned retention schedules, and you might even double-check yourself to see if that record could s

article thumbnail

How utilities can leverage robotic process automation to enhance business processes and customer experiences

CGI

How utilities can leverage robotic process automation to enhance business processes and customer experiences. The ability to see the precise minute my hot pizza will arrive, get real-time breaking news, and receive same-day groceries have set the bar for instant information expectancy. This has been amplified further during the stay-at-home requirements resulting from the pandemic. dharini.s@cgi.com.

article thumbnail

File Sharing for Startups: 3 Solutions to Common Hurdles

OneHub

Startups are what the American dream is made up of. Perhaps that’s why there were nearly 31 million small businesses in the U.S. in 2019. While the typical small size of a startup allows it to be more versatile and agile than its oversized competitors, they often face unique challenges as well. Between never-ending to-do lists, funding fumbles, and navigating industry technology, startups can crumble before their foundation is even poured.

article thumbnail

Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020

Dark Reading

Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Meetup Critical Flaws Allow ‘Group’ Takeover, Payment Theft

Threatpost

Researchers disclosed critical flaws in the popular Meetup service at Black Hat USA 2020 this week, which could allow takeover of Meetup "Groups.".

Security 104
article thumbnail

How Should I Securely Destroy/Discard My Devices?

Dark Reading

While it is possible to do data destruction in-house, doing it correctly and at scale can be tedious.

Security 116
article thumbnail

Google Updates Ad Policies to Counter Influence Campaigns, Extortion

Threatpost

Starting Sept. 1, Google will crack down on misinformation, a lack of transparency and the ability to amplify or circulate politically influential content.

article thumbnail

NIST study finds that masks defeat most facial recognition algorithms via VentureBeat

IG Guru

Check out the article here. The post NIST study finds that masks defeat most facial recognition algorithms via VentureBeat appeared first on IG GURU.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Black Hat USA 2020: Critical Meetup.com Flaws Reveal Common AppSec Holes

Threatpost

With Black Hat USA 2020 kicking off this week, Erez Yalon with Checkmarx talks about newly disclosed, critical vulnerabilities in Meetup.com - and why they are the "holy grail" for attackers.

article thumbnail

BlackBerry Phone Cracked

Schneier on Security

Australia is reporting that a BlackBerry device has been cracked after five years: An encrypted BlackBerry device that was cracked five years after it was first seized by police is poised to be the key piece of evidence in one of the state's longest-running drug importation investigations. In April, new technology "capabilities" allowed authorities to probe the encrypted device.

article thumbnail

A Patriotic Solution to the Cybersecurity Skills Shortage

Dark Reading

Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer.

article thumbnail

A lesson from Wonder Woman and the Power of Collaboration

Micro Focus

We are a quarter of the way into our INSPIRE 20 podcast journey, and I’m pleased to bring you podcast number five with Sheridan Ash of PwC. Sheridan has an impressive and varied resume – she left school at 16, a decision she made after being bullied as a result of undiagnosed dyslexia. She then. View Article.

74
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Travel Management Firm CWT Pays $4.5M to Ransomware Attackers

Dark Reading

Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data.

article thumbnail

art at the university: the early days

Archives Blogs

This week’s #BeConnected Explore Our Campus looks at the first years of art at the University of Stirling. An exhibition of Francis Davison’ s collages in the MacRobert Gallery in 1971. The tradition of collecting art at the University of Stirling goes back to its founding in 1967. It was decided from the start that one per cent of the capital cost of new buildings should be made available for works of art, to improve the internal and external environment.

Sales 26
article thumbnail

FBI Warns on New E-Commerce Fraud

Dark Reading

A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic.

87