Mon.Dec 28, 2020

article thumbnail

UK Police Arrest 21 WeLeakInfo Users In Cyber Crackdown

Data Breach Today

NCA: Now-Defunct Website Sold Access to 12 Billion Personal Records Police in the U.K. have arrested 21 people who were customers of the now-defunct WeLeakInfo website that provided cybercriminals with access to over 12 billion personal records culled from 10,000 data breaches, according to Britain's National Crime Agency. Other investigations are still underway.

article thumbnail

EU-UK Trade Deal: What It Means For Post-Brexit Data Flows

Hunton Privacy

On December 24, 2020, the European Union and the United Kingdom reached an agreement in principle on the historic EU-UK Trade and Cooperation Agreement (the “Trade Agreement”). For data protection purposes, there is a further transition period of up to six months to enable the European Commission to complete its adequacy assessment of the UK’s data protection laws.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Citrix Warns Its ADC Products Are Being Used in DDoS Attacks

Data Breach Today

Company Notes: Permanent Fix Won't Be Ready Until January Citrix is warning its customers that attackers are taking advantage of the company's ADC products to conduct and amplify DDoS attacks, according to a notification published by the firm. A permanent fix to address this security issue won't be available until January.

IT 276
article thumbnail

Nefilim ransomware operators leak data stolen from Whirlpool

Security Affairs

The American multinational manufacturer and marketer of home appliances Whirlpool was hit by the Nefilim ransomware gang. The American multinational manufacturer and marketer of home appliances Whirlpool suffered a ransomware attack, Nefilim ransomware operators claim to have stolen data from the company and threaten to release the full dump if the company will not pay the ransom.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

SolarWinds Aftermath: 'This Hit the Security Community Hard'

Data Breach Today

RiskIQ CEO Lou Manousos on Lessons We Need to Learn From This Attack As CEO of RiskIQ, Lou Manousos has a unique view into the Internet Attack Surface Intelligence, Vulnerability & Analytics space. And he doesn't understate the significance of the SolarWinds breach, which he says hit both the nation and the cybersecurity community "hard.

Analytics 264

More Trending

article thumbnail

COVID-19: Evolving Regulatory Issues

Data Breach Today

The COVID-19 pandemic has spotlighted an array of evolving patient privacy issues that legislators and regulators will need to address in the year ahead, say government policy experts Mari Savickis and Cassie Leonard of the College of Healthcare Information Management Executives.

Privacy 173
article thumbnail

Ransomware in 2020: A Banner Year for Extortion

Threatpost

From attacks on the UVM Health Network that delayed chemotherapy appointments, to ones on public schools that delayed students going back to the classroom, ransomware gangs disrupted organizations to inordinate levels in 2020.

article thumbnail

Threat actor is selling a dump allegedly including 2,5M customers of service provider Ho Mobile

Security Affairs

Threat intelligence analyst discovered a threat actor that is selling a database of the Italian mobile service provider Ho mobile. Threat intelligence analyst @Bank_Security first spotted on a popular hacking forum a threat actor that is selling a database allegedly containing the database of the Italian mobile service provider Ho mobile. Ho mobile is an Italian mobile telephone service offered by Vodafone Enabler Italia, an Italian virtual mobile telephone operator.

Phishing 120
article thumbnail

How Your Digital Trails Wind Up in the Police’s Hands

WIRED Threat Level

Phone calls. Web searches. Location tracks. Smart speaker requests. They’ve become crucial tools for law enforcement, while users often are unaware.

Security 124
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

E-commerce app 21 Buttons exposes millions of users’ data

Security Affairs

Researchers discovered that the popular e-commerce app 21 Buttons was exposing private data for 100s of influencers across Europe. Researchers from cybersecurity firm vpnMentor discovered that the e-commerce app 21 Buttons was exposing private data for 100s of influencers across Europe. 21 Buttons allows users to shares photos of their outfits with links to the brands they’re wearing, then their followers can purchase their favorite clothes directly from the relevant brands using the app.

article thumbnail

Homomorphic Encryption: The 'Golden Age' of Cryptography

Dark Reading

The ability to perform complex calculations on encrypted data promises a new level of privacy and data security for companies in the public and private sectors. So when can they get started?

article thumbnail

Hackers Amp Up COVID-19 IP Theft Attacks

Threatpost

In-depth report looks at how COVID-19 research has become as a juicy new target for organized cybercrime.

article thumbnail

Remote Desktop Bugs: Patches That Took Priority in a Pandemic Year

Dark Reading

Remote Desktop flaws were a patching priority this year as Microsoft distributed fixes and businesses scrambled to protect remote employees.

140
140
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Cloud Bucket Vulnerability Management in 2021

eSecurity Planet

The movement to the cloud means access to data anywhere, enhanced data recovery, flexibility for collaboration, and less of a burden on IT staff. But, while cloud providers boast that their storage services — or “buckets” — offer added application security , they have also consistently proven vulnerable. A bucket is a virtual storage unit provided and partly maintained by a cloud services provider.

Cloud 84
article thumbnail

10 Benefits of Running Cybersecurity Exercises

Dark Reading

There may be no better way to ascertain your organization's strengths and weaknesses than by running regular security drills.

article thumbnail

Multi-platform card skimmer targets Shopify, BigCommerce, Zencart, and Woocommerce stores

Security Affairs

Experts warn of a multi-platform credit card skimmer that can target online stores running on Shopify, BigCommerce, Zencart, and Woocommerce. Security experts have discovered a multi-platform credit card skimmer that can allow threat actors to harvest payment info on compromised stores powered by Shopify, BigCommerce, Zencart, and Woocommerce. Researchers from security firm Sansec discovered that the new software skimmer is able to interact with the checkout process on shops running on top of mu

Risk 75
article thumbnail

Defending the COVID-19 Vaccine Supply Chain

Dark Reading

We must treat this supply chain like a piece of our nation's critical infrastructure, just like the electrical grid or air traffic control system.

123
123
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Digital Preservation Software Company Offers Free Digital Archives Starter Solution

IG Guru

From Preservica We are excited to introduce Preservica Starter, a new set of FREE and low-cost digital preservation solutions, that make it easy to create a trusted digital repository for your special collections, institutional records and more. And the great news is you can start preserving today with our FREE 5GB Starter edition (which is free forever, not a trial and no credit cards […].

article thumbnail

Update: Neopets Is Still A Thing And Its Exposing Sensitive Data

The Security Ledger

Neopets, the virtual pets website has exposed a wide range of sensitive data online including information that might be used to identify site users, security researchers report. The post Update: Neopets Is Still A Thing And Its Exposing Sensitive Data appeared first on The Security Ledger. Related Stories Amid Security Concerns: to Zoom or not to Zoom?

IT 52
article thumbnail

Vaccines

Adam Shostack

You may have noticed that my end of the year posts are all science focused. Today, a set of resources on the COVID vaccines. First, the FDA has authorized two vaccines for emergency use. The review memoranda ( Pfizer , Moderna ) are all sorts of fascinating. As the kids say, TL;DR: both vaccines are safe and no meaningful side effects were seen in testing approximately 44,000 and 30,400 test subjects.

article thumbnail

Neopets Is Still A Thing And Its Exposing Sensitive Data

The Security Ledger

Neopets, the virtual pets website has exposed a wide range of sensitive data online including information that might be used to identify site users, security researchers report. The post Neopets Is Still A Thing And Its Exposing Sensitive Data appeared first on The Security Ledger. Related Stories Amid Security Concerns: to Zoom or not to Zoom? Episode 168: Application Security Debt is growing and Securing Web Apps in the Age of IoT Episode 197: The Russia Hack Is A 5 Alarm Fire | Also: Sho

IT 52
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Lessons Amid the Chaos: What We’ve Learned Looking Back on 2020

Hanzo Learning Center

Well, this year didn’t turn out the way anyone planned.

67
article thumbnail

Regulatory Update: NAIC Fall 2020 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2020 National Meeting (Fall Meeting) December 3-9, 2020. As a result of the continuing COVID-19 pandemic, the NAIC once again met in a virtual format. This Sidley Update summarizes the highlights from this meeting in addition to interim meetings that were held during November in lieu of taking place during the Fall Meeting. 1.

article thumbnail

Celebrating our top Data Citizens of 2020

Collibra

data citizen: A data citizen is any person who relies on access to trusted data to perform job responsibilities, make business decisions and ultimately drives business transformation. . Each month, we put a spotlight on a data citizen (or two) who exemplifies excellence and expertise in the data community. As we close out the year, we took a look back at who we celebrated in 2020, and their valuable tech tips, insights and learnings that they’ve shared with us – and we wanted to simply say

article thumbnail

Russia’s SolarWinds Attack

Schneier on Security

Recent news articles have all been talking about the massive Russian cyberattack against the United States, but that’s wrong on two accounts. It wasn’t a cyberattack in international relations terms, it was espionage. And the victim wasn’t just the US, it was the entire world. But it was massive, and it is dangerous. Espionage is internationally allowed in peacetime.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

MY TAKE: How Russia is leveraging insecure mobile apps to radicalize disaffected males

The Last Watchdog

How did we get to this level of disinformation? How did we, the citizens of the United States of America, become so intensely divided? It’s tempting to place the lion’s share of the blame on feckless political leaders and facile news media outlets. However, that’s just the surface manifestation of what’s going on. Related: Let’s not call it ‘fake news’ an y more.

Security 223