Fri.Oct 25, 2019

article thumbnail

Johannesburg Struggles to Recover From Ransomware Attack

Data Breach Today

It's the Second Attack to Target South African City This Year Johannesburg has been hit with a ransomware attack that is crippling municipal services. City Power, an electric utility owned by the city that was hit by a similar attack in July - also was affected by the latest attack.

article thumbnail

Women in Privacy

Data Matters

Women in Privacy or WIP invites you to join our networking event featuring a roundtable discussion of the latest data protection and privacy hot topics followed by a drinks reception. The Women in Privacy networking group is for data protection and privacy professionals and aims to provide a platform for high-level discussion of data protection and privacy law developments, to facilitate and strengthen networking among women privacy professionals, and to mentor and promote the advancement of wom

Privacy 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Here's Why 'Raccoon' Infostealer Is Popular With Criminals

Data Breach Today

Cheap and Simple 'Malware as a Service' Sold in Cybercriminal Underground The "Raccoon" infostealer, first spotted in the wild earlier this year, is rapidly gaining in popularity on underground forums due to its low cost and ability to steal a wide range of data, including credit card numbers and cryptocurrency wallets, according to a new analysis from Cybereason.

IT 145
article thumbnail

77% of UK workers don’t receive cyber skills training

IT Governance

Cyber security training is one of the most effective ways of improving your organisation’s defences against security incidents. It gives staff the wherewithal to avoid costly mistakes and establishes a strong cyber security culture in the office. Yet, according to a report by Centrify , 77% of UK workers say they’ve never received any form of cyber skills training.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

42 Phony Google Play Apps Delivered Adware: Report

Data Breach Today

Fake Apps Downloaded More Than 8 Million Times, ESET Researchers Say Some 42 apps that were available in the Google Play store had been delivering adware to Android devices for about a year, according to the security firm ESET. In the 12-month period starting in July 2018, these apps were downloaded about 8 million times to Android devices around the world, the researchers say.

Security 124

More Trending

article thumbnail

Using Standards to Bolster Medical Device Cybersecurity

Data Breach Today

The use of new standards can help strengthen cybersecurity risk management of medical devices at the Department of Veterans Affairs as well as other healthcare organizations, says Anura Fernando of UL, which recently completed a study with the VA examining gaps in medical device cybersecurity approaches.

article thumbnail

Want to simplify replication for offsite archiving and disaster recovery?

Quest Software

Find out to replicate on-premises backups from QoreStor to Azure cloud-based storage in just moments in our tech brief.( read more ).

article thumbnail

Analysis: Russian Hackers Hijack Iranian Hacking Tools

Data Breach Today

The latest edition of the ISMG Security Report analyzes how the Russian hacking group Turla has been coopting Iranian hacking tools. Plus: Avast's CCleaner hit by second attack; sizing up draft regulations for the California Consumer Protection Act.

Security 113
article thumbnail

DDoS Attack on Amazon Web Services caused intermittently outage

Security Affairs

This week Amazon Web Services (AWS) suffered a major distributed denial-of-service (DDoS) attack that made it unavailable for some customers. This week, threat actors launched a massive DDoS attack against Amazon Web Services (AWS) causing the inability of some customers to access their AWS S3 buckets. Users were intermittently unable to access online services relying on the Amazon infrastructure that was under attack.

Access 53
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Ransomware, Mobile Malware Attacks to Surge in 2020

Threatpost

Targeted ransomware, mobile malware and other attacks will surge, while companies will adopt AI, better cloud security and cyber insurance to help defend and protect against them.

article thumbnail

Google addresses High-Severity sandbox escape issues in Chrome

Security Affairs

Google has patched three serious flaws in Chrome that can be exploited to escape the sandbox of the popular web browser. Google has addressed three serious vulnerabilities affecting its Chrome browser that can be exploited to escape the built-in sandbox. The tech giant released Chrome 77 update in September that addressed two use-after-free vulnerabilities that could lead to sandbox escape.

article thumbnail

How 18 Malware Apps Snuck Into Apple's App Store

WIRED Threat Level

Sing it loud: The App Store's not perfect. Especially when it's up against click fraud code this clever.

IT 61
article thumbnail

Ransomware attack hit the City of Johannesburg municipality

Security Affairs

A new ransomware attack made the headlines, this time the victim is the City of Johannesburg municipality. A ransomware attack infected systems at the City of Johannesburg municipality shutting down the website, the e-services platform, and the billing system (SAP ISU and CRM). “The City of Johannesburg reported a breach of its network on Thursday night and shut down its website and all e-services , hours after receiving a bitcoin ransom note from a group called the Shadow Kill Hackers.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

TikTok, Under Scrutiny, Distances Itself From China

WIRED Threat Level

Three senators have called for an investigation into the social media app, which is owned by the Chinese tech giant ByteDance.

article thumbnail

Spear-phishing attacks target United Nations and NGOs

Security Affairs

Experts have uncovered an ongoing phishing campaign targeting the United Nations and NGOs, including UNICEF and UN World Food. Security firm Lookout uncovered an ongoing spear-phishing campaign aimed at NGOs, including human rights organizations such as the Red Cross, UNICEF, the UN World Food and the UN Development programs. The analysis of the server infrastructure behind the campaign shows that the attackers have to be active at least since March 2019.

article thumbnail

Weekly Update 162

Troy Hunt

Ah, impending summer on the Gold Coast! It's that time of year when you can just start to sense those warm beach days and it's absolutely my favourite time of year here. Which means. it's time to head off to other events again. Fortunately it's all domestic this time as I head south to Sydney and Melbourne and maintaining my "no fly unless I absolutely have to" stance, it's long, open road drives, copious podcasts and lots of thinking time.

article thumbnail

Microsoft Office Bug Remains Top Malware Delivery Vector

Dark Reading

CVE-2017-11882 has been attackers' favorite malware delivery mechanism throughout the second and third quarters of 2019.

53
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

EU-U.S. Privacy Shield Passes Its Third Annual Review

HL Chronicle of Data Protection

Following the joint press statement from Commissioner V?ra Jourová and Secretary of Commerce Wilbur Ross of 13 September, on 23 October 2019 the European Commission published its report on the third annual review of the functioning of the EU-U.S. Privacy Shield. In a nutshell, the report of the third review found that the U.S. continues to provide an adequate level of protection for personal data transferred under the Privacy Shield from the EU to participating companies in the U.S.

Privacy 40
article thumbnail

Online Beauty Store Hit by Magecart Attack

Dark Reading

An e-skimmer placed on the Procter & Gamble-owned First Aid Beauty site to steal payment card data went undetected for five months.

49
article thumbnail

Business Models for the Internet of Things (IoT)

Information Matters

Building Business Models for the Internet of Things (IoT): a Literature Review Abstract This paper presents a comprehensive literature review of research relating to IoT business models. The results highlight research that has developed theory relating to IoT business model development and identifies some common threads linking the research. The findings represent an analysis of […].

IoT 40
article thumbnail

IRS Followed Bitcoin Transactions and Stops Child Exploitation Site via Forbes

IG Guru

This article discusses how the IRS in the USA along with agencies in the UK and South Korea. A notable quote from the article, “By analyzing the blockchain and de-anonymizing bitcoin transactions, the agency was able to identify hundreds of predators around the world – even though those users thought that they could remain anonymous.” […].

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Breach Notification Law Adds Biometrics, Passport Data

Rippleshot

California has set a new precedent for breach notification laws that is continuing to gain ground nationwide. A bill was signed into law by Gov. Gavin Newsom that adds passports and biometric data ad part of the PII covered by California’s data breach notification law. California now joins15 additional states that require notification if a resident’s fingerprint or other biometric information is breached.

article thumbnail

Second Ransomware Attack Strikes Johannesburg

Dark Reading

Attackers who broke into the city's network demand four Bitcoins in ransom or threaten to share stolen personal and financial data.

article thumbnail

Is AWS Liable in Capital One Breach?

Threatpost

Senators penned a letter to the FTC urging it to investigate whether Amazon is to blame for the massive Capital One data breach disclosed earlier this year.

article thumbnail

4 Security Lessons Federal IT Pros Can Teach the Private Sector

Dark Reading

With a little research and basic planning, small companies can make big strides against the cybersecurity threats they face. Here's how.

IT 43
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

U.N., UNICEF, Red Cross Under Ongoing Mobile Attack

Threatpost

A smart mobile-first phishing effort uses valid certificates to sign fake Office 365 pages, and logs keystrokes in real time.

article thumbnail

Why Keybase Doesn't Offer Two Factor Authentication

WIRED Threat Level

Keybase exists to keep things safe online. And it doesn't use 2FA to do it.

article thumbnail

News Wrap: Hotel Robot Hacks, FTC Stalkerware Crackdown

Threatpost

From hacking hotel room robots to crackdowns on stalkerware apps, Threatpost editors break down this week's top news stories.