Fri.Jun 18, 2021

article thumbnail

NSA Offers Tips on Securing Unified Communication Channels

Data Breach Today

Guidance Spells Out Best Risk Mitigation Practices The U.S. National Security Agency has released new guidance to help federal agencies as well as business enterprises protect their unified communications channels and voice/video over IP calls from cyberthreats.

article thumbnail

First American Financial Pays Farcical $500K Fine

Krebs on Security

In May 2019, KrebsOnSecurity broke the news that the website of mortgage settlement giant First American Financial Corp. [ NYSE:FAF ] was leaking more than 800 million documents — many containing sensitive financial data — related to real estate transactions dating back 16 years. This week, the U.S. Securities and Exchange Commission settled its investigation into the matter after the Fortune 500 company agreed to pay a paltry penalty of less than $500,000.

Insurance 263
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Roundup: Avaddon Exits; Clop Suspects Arrested

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the Avaddon ransomware gang's retirement and the crackdown on the Clop ransomware gang in Ukraine. Also featured: Bitcoin as ally in the ransomware battle; strengthening U.S. cybersecurity defenses.

article thumbnail

How AI is Advancing Cybersecurity

eSecurity Planet

There’s a never ending cycle between the measures cybersecurity providers introduce to prevent or remediate cyber threats and the tactics cyber criminals use to get around these security measures. As soon as a security company develops a way to mitigate the latest threat, attackers develop a new threat to take its place. Artificial intelligence has emerged as a critical tool cybersecurity companies leverage to stay ahead of the curve.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Analysis: The Cyber Impact of Biden/Putin Summit Meeting

Data Breach Today

Experts Discuss Impact of 'Transformational Moment' After U.S. President Joe Biden and Russian President Vladimir Putin discussed cybersecurity issues at their Wednesday summit meeting in Geneva, security experts and analysts began sizing up what the next steps might be following what some are calling a "transformational moment.

More Trending

article thumbnail

Russian Convicted of Aiding Kelihos Botnet Operator

Data Breach Today

Prosecutors: Crypting Provider Helped Infect 50,000 Computers A Russian national has been convicted of aiding a botnet scheme that infected victims' devices with malicious Kelihos malware and ransomware, according to the U.S. Justice Department.

article thumbnail

11 Security Certifications to Seek Out This Summer

Dark Reading

The more you know, the more you grow. The Edge takes a fresh look at leading security certifications that can help advance your career.

Security 137
article thumbnail

Pay Attention to the Fine Print on 'War Exclusions' in Cyber Policies

Data Breach Today

When seeking cyber insurance or other types of insurance policies that provide organizations coverage for certain data security incidents, it's critical to carefully consider the "war exclusions" contained in those policies, says insurance attorney Peter Halprin.

Insurance 261
article thumbnail

Carnival Cruise Cyber-Torpedoed by Cyberattack

Threatpost

This is the fourth time in a bit over a year that Carnival’s admitted to breaches, with two of them being ransomware attacks.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

India Moves Toward Limiting What Telecom Tech Can Be Used

Data Breach Today

As 'Trusted Telecom Portal' Launched, Chinese Vendors May Be Excluded From Market In a key move toward ensuring telecom companies only use technologies from trustworthy sources, the government of India has launched a Trusted Telecom Portal designed to evaluate and approve technologies and suppliers.

Marketing 261
article thumbnail

US supermarket chain Wegmans discloses data breach

Security Affairs

The supermarket chain Wegmans US Wegmans discloses a data breach, customers information was exposed on the Internet due to a misconfiguration issue. Wegmans Food Markets disclosed a data breach, the supermarket chain notified customers that some of their information was exposed as a result of the accidental availability online of two of its databases due to a configuration issue.

article thumbnail

Senators Draft a Federal Breach Notification Bill

Data Breach Today

Bipartisan Legislation Would Require Notifying CISA Within 24 Hours of a Breach Discovery A bipartisan group of senators is circulating a draft of a federal breach notification bill that would require federal agencies, federal contractors and businesses that have oversight over critical infrastructure to report significant cyberthreats to CISA within 24 hours of discovery.

257
257
article thumbnail

Akamai outage was caused by an issue with its Prolexic DDoS protection service

Security Affairs

A n outage suffered by CDN, cybersecurity and cloud services provider Akamai was caused by an issue with its Prolexic DDoS attack protection service. CDN, cybersecurity and cloud services provider Akamai revealed that the recent outage suffered by the company was caused by a problem with its Prolexic DDoS attack protection service. The Prolexic Routed DDoS protection is a fully managed DDoS scrubbing service.

IT 103
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Law Enforcement's Cybercrime Honeypot Maneuvers Paying Off

Data Breach Today

Closing EncroChat and Sky, Plus Careful Word-of-Mouth Management, Drove Anom Uptake The global law enforcement "Anom" honeypot operation racked up impressive statistics for the number of criminals tricked into using the encrypted communications service. Psychology was at play: Officials say users flocked to the service after they disrupted rivals EncroChat and Sky Global.

Honeypots 227
article thumbnail

Expert found multiple flaws in Cisco Small Business 220 series

Security Affairs

A researcher discovered multiple vulnerabilities in smart switches of Cisco’s Small Business 220 series, including some issues rated as high severity. Security researcher Jasper Lievisse Adriaanse has discovered multiple vulnerabilities Cisco’s Small Business 220 series smart switches. The vulnerabilities impact devices running firmware versions prior 1.2.0.6 and which have the web-based management interface enabled.

article thumbnail

Peak DDoS Traffic Up 100%, Researchers Report

Data Breach Today

Nokia Deepfield: Number of Attacks Surged 50% Over 15 Months The daily peak of DDoS attack traffic increased 100% from January 2020 to May 2021, reaching 3 Tbps, with most of the high-bandwidth, high-intensity attacks originating from fewer than 50 hosting companies, Nokia Deepfield reports.

208
208
article thumbnail

‘Oddball’ Malware Blocks Access to Pirated Software

Threatpost

Rather than steal credentials or hold data for ransom, a recent campaign observed by Sophos prevents people from visiting sites that offer illegal downloads.

Access 105
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

2nd Breach Hits Carnival's Cruise Lines

Data Breach Today

Customer and Employee Data Again Exposed For the second time in less than a year, Carnival has informed customers and employees of a data breach after an unauthorized intruder gained access to a portion of its IT network and infrastructure in March.

article thumbnail

Cruise operator Carnival discloses a security breach

Security Affairs

Carnival Corp. said that the data breach it has suffered in March might have impacted its customers and employees. Carnival Corp. this week confirmed that the data breach that took place in March might have exposed personal information about customers and employees of Carnival Cruise Line, Holland America Line, and Princess Cruises. Carnival Corporation & plc is a British-American cruise operator, currently the world’s largest travel leisure company, with a combined fleet of over 100 vessels

article thumbnail

Senate Approves Chris Inglis as National Cyber Director

Data Breach Today

Meanwhile, Jen Easterly's Nomination to Serve as CISA Director Is on Hold The U.S. Senate has unanimously approved Chris Inglis as national cyber director. He assumes the role as the country is still reeling from a series of ransomware attacks and the SolarWinds supply chain attack. Meanwhile, confirmation of a new CISA director is on hold.

article thumbnail

Faux ‘DarkSide’ Gang Takes Aim at Global Energy, Food Sectors

Threatpost

A DarkSide doppelganger mounts a fraud campaign aimed at extorting nearly $4 million from each target.

Security 108
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

ISMG Editors’ Panel: NATO's Cybersecurity Policy and More

Data Breach Today

Also Featured: Analysis of Regulatory Landscape; Comments From Rep. Jim Langevin In the latest weekly update, a panel of Information Security Media Group editors discusses key topics, including NATO's new cyber defense policy, the outlook for congressional regulatory action to address the ransomware threat, and cybersecurity comments by U.S. Rep. Jim Langevin.

article thumbnail

What’s Making Your Company a Ransomware Sitting Duck

Threatpost

What's the low-hanging fruit for ransomware attackers? What steps could help to fend them off, and what’s stopping organizations from implementing those steps?

article thumbnail

European Commission Publishes Details of its Forthcoming Data Act

Data Matters

The European Commission has formally launched its legislative initiative aimed at increasing access to and further use of data, so that more public and private actors can benefit from technologies such as Big Data and machine learning. The Commission has published its inception impact assessment on the forthcoming Data Act, on which interested stakeholders can submit comments until 25 June 2021.

IT 74
article thumbnail

A New Tool Wants to Save Open Source from Supply Chain Hacks

WIRED Threat Level

Sigstore will make code signing free and easy for software developers, providing an important first line of defense.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Insider Versus Outsider: Navigating Top Data Loss Threats

Threatpost

Troy Gill, manager of security research at Zix, discusses the most common ways sensitive data is scooped up by nefarious sorts.

article thumbnail

How to handle chat data in eDiscovery and investigations

OpenText Information Management

Water-cooler talk and quick chats in the office disappeared with the pandemic. But online chat—already a prevalent form of communication prior to the pandemic—took off as the preferred way for remote employees to communicate. In the past year, over 600 billion chat messages were sent globally among businesses alone. Microsoft™ Teams™ usage increased by more … The post How to handle chat data in eDiscovery and investigations appeared first on OpenText Blogs.

article thumbnail

Accidental Insider Leaks Prove Major Source of Risk

Dark Reading

Research reports highlight growing concerns around insider negligence that leads to data breaches.

Risk 85