Tue.Jan 05, 2021

article thumbnail

Indian Payment Platform JustPay Breached

Data Breach Today

Security Researcher Says Leaked Data Offered for Sale on Darknet JustPay, an Indian online payment platform, acknowledged Monday that it sustained a major breach of customer data in August. The announcement came a day after an independent security researcher reported that data on millions of JustPay customers had been offered for sale on a darknet forum.

Sales 313
article thumbnail

US banking regulators propose a rule for 36-hour notice of breach

Data Protection Report

On December 18, 2020, the US Department of the Treasury (Office of the Comptroller of the Currency), Federal Reserve and Federal Deposit Insurance Corporation (FDIC) jointly announced a 53-page proposed rule that would require banks to notify their regulators within 36 hours of a “computer-security incident” that rises to the level of a “notification incident.

Insurance 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Shareholder Sues SolarWinds

Data Breach Today

Suit Alleges Company Filed Inaccurate SEC Documents A SolarWinds shareholder has filed a lawsuit claiming the company included misleading statements regarding its cybersecurity in its filings with the U.S. Securities and Exchange Commission.

article thumbnail

Digital Transformation: The Song Remains the Same

AIIM

Leading brands don’t change their brand story. They perfect by telling it over and over again. What’s AIIM’s story? We believe that information is an asset. Information provides value to organizations. We want to change the perception of what managing it looks like. Ultimately, it’s about moving records and information management from a perceived cost of doing business, to a key competitive differentiator and driver of your digital transformation.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Compliance Lessons From 2020 Fraud Cases

Data Breach Today

Panel of Experts Discusses How Technology Can Mitigate Large-Scale Global Fraud What compliance lessons can be learned from major fraud cases in 2020, including the Goldman Sachs bribery case, the Wirecard mass corruption case and the Novartis bribery case? A panel of experts offers in-depth analysis.

More Trending

article thumbnail

Severe SolarWinds Hacking: 250 Organizations Affected?

Data Breach Today

Investigators Reportedly Finding Many More Victims Suffered Serious Intrusions As investigators probe the SolarWinds hack, they're finding that the supply chain campaign appears to have deeply compromised more than the 50 organizations originally suspected. Instead, The New York Times reports that 250 victims may have been seriously breached.

261
261
article thumbnail

Data from August Breach of Amazon Partner Juspay Dumped Online

Threatpost

Researcher discovered info of 35 million credit-card users from an attack on the Indian startup, which handles payments for numerous online marketplaces.

Privacy 125
article thumbnail

Researchers Disclose Details of FIN7 Hacking Group's Malware

Data Breach Today

Report Dissects JSSLoader Remote Access Trojan Researchers at Morphisec Labs have published fresh details about a malware variant called JSSLoader that the FIN7 hacking group has used for several years.

Access 222
article thumbnail

Healthcare organizations faced a 45% increase in attacks since November

Security Affairs

According to a new report published by Check Point, organizations in the healthcare industry have faced a 45% increase in attacks since November. Check Point researchers reported a surge in the number of attacks against organizations in the healthcare industry , +45% since November. This is more than double the overall increase observed by the experts in the other sectors on a global scale during the same period.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Citrix Updates ADC Products to Help Block DDoS Attacks

Data Breach Today

Company Says Enhancement Will Block Attackers From Abusing DTLS Citrix is urging customers to implement a newly provided enhancement to its ADC and Gateway devices that is designed to block attackers from abusing the Datagram Transport Layer Security, or DTLS, protocol to amplify distributed denial-of-service attacks.

Security 199
article thumbnail

Cyberattacks on Healthcare Spike 45% Since November

Threatpost

The relentless rise in COVID-19 cases is battering already frayed healthcare systems — and ransomware criminals are using the opportunity to strike.

article thumbnail

OnDemand | 2021 Pharmaceutical Threat Outlook

Data Breach Today

Thwarting Mobile Phishing

article thumbnail

Continuous Access Evaluation: Near Real Time Policy and Security Enforcement

Daymark

Secure access to email and other business productivity tools continues to be a top priority for IT administrators. Microsoft services, such as Azure Active Directory and Office 365, use OpenID Connect for authentication and OAuth 2.0 for authorization. Here’s how that process works: When Outlook connects to Exchange Online, the API requests are authorized using OAuth 2.0 Access Tokens.

Access 98
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

ElectroRAT Drains Cryptocurrency Wallet Funds of Thousands

Threatpost

At least 6,500 cryptocurrency users have been infected by new, 'extremely intrusive' malware that's spread via trojanized macOS, Windows and Linux apps.

107
107
article thumbnail

Over 500,000 credentials for tens of gaming firm available in the Dark Web

Security Affairs

The gaming industry under attack, Over 500,000 credentials for the top two dozen leading gaming firms, including Ubisoft, leaked on online. The gaming industry is a privileged target for threat actors, threat actors leaked online over 500,000 stolen credentials belonging to top 25 gaming firms. The alarm was raised by the threat intelligence firm Kela that reported the availability for sale of the credentials in multiple hacking forums and criminal marketplace. “KELA found nearly 1 million

Sales 107
article thumbnail

Major Gaming Companies Hit with Ransomware Linked to APT27

Threatpost

Researchers say a recent attack targeting videogaming developers has 'strong links' to the infamous APT27 threat group.

article thumbnail

China's APT Groups May Be Looking to Cash In

Dark Reading

Two campaigns have resulted in encrypted drives and ransom notes, suggesting that some China-linked nation-state advanced persistent threat groups have added financial gain as a motive, researchers say.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Telegram Triangulation Pinpoints Users’ Exact Locations

Threatpost

The "People Nearby" feature in the secure messaging app can be abused to unmask a user's precise location, a researcher said.

Security 113
article thumbnail

How to bypass the Google Audio reCAPTCHA with a new version of unCaptcha2 attack

Security Affairs

A German security researcher demonstrated how to break, once again, the Google Audio reCAPTCHA with Google’s own Speech to Text API. Back in 2017, researchers from the University of Maryland demonstrated an attack method, dubbed unCaptcha , against Google’s audio-based reCAPTCHA v2. The system receives the audio challenge, downloads it, and submits it to Speech To Text.

Security 101
article thumbnail

Google Warns of Critical Android Remote Code Execution Bug

Threatpost

Google's Android security update addressed 43 bugs overall affecting Android handsets, including Samsung phones.

Security 115
article thumbnail

SolarWinds Hit With Class-Action Lawsuit Following Orion Breach

Dark Reading

SolarWinds shareholders accuse the company of lying about its security practices ahead of the disclosure of a massive security incident.

Security 108
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

RCE ‘Bug’ Found and Disputed in Popular PHP Scripting Framework

Threatpost

Impacted are PHP-based websites running a vulnerable version of the web-app creation tool Zend Framework and some Laminas Project releases.

article thumbnail

Dark Web Forum Activity Surged 44% in Early COVID Months

Dark Reading

Researchers analyzed the activity of five popular English- and Russian-speaking Dark Web forums and discovered exponential membership growth.

138
138
article thumbnail

New Policy Template for Local Governments

The Texas Record

WHEREUNTO, the policy models of yore have duly met the minimum retention period for administrative value. HEREBY, the Records Management Assistance unit has produced an updated policy template for local governments to use! For most of the last decade TSLAC offered 4 different policy models for any local government to use to satisfy the compliance filing requirements in the Local Government Records Act.

article thumbnail

What You Need to Know About California's New Privacy Rules

Dark Reading

Proposition 24 will change Californians' rights and business's responsibilities regarding consumer data protection.

Privacy 145
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

CPRA Series: The Importance of Data Retention Schedules and Records Management Policies via the National Law Review

IG Guru

Check out the article here. Photo by Wesley Tingey on Unsplash. The post CPRA Series: The Importance of Data Retention Schedules and Records Management Policies via the National Law Review appeared first on IG GURU.

article thumbnail

E-book—Apple’s M1 Chip: a new possible

Jamf

The M1, Apple's new ARM-based chip, is not only the darling of tech reviewers. It's the start of a whole new era. Jamf has written an e-book to help you learn more.

IT 66
article thumbnail

FBI, CISA, NSA & ODNI Cite Russia in Joint Statement on 'Serious' SolarWinds Attacks

Dark Reading

The attacks appear to be an "intelligence-gathering" mission, the agencies said.

105
105