Fri.Oct 28, 2022

article thumbnail

Cyber Events Disrupt Polish, Slovakian Parliament IT Systems

Data Breach Today

Poland Senate Alleges Russian Connection to DDoS Attack Parliament IT systems in two East European capitals were disrupted Thursday. The Poland Senate said a distributed denial-of-service attack partially originated from inside Russia. In Slovakia, a Parliament speaker postponed voting after telling lawmakers that vote-counting systems were not working.

IT 242
article thumbnail

Cybercriminals Use Fake Public PoCs to Spread Malware and Steal Data

eSecurity Planet

GitHub proofs of concept (PoCs) for known vulnerabilities could themselves contain malware as often as 10% of the time, security researchers have found. Researchers at the Leiden Institute of Advanced Computer Science have alerted security professionals about risks associated with GitHub and other platforms like pastebin that host public PoCs of exploits for known vulnerabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Medlab Pathology Breach Affects 223,000 Australians

Data Breach Today

Medical Records and Credit Card Details of Patients Compromised One of Australia's largest private testing laboratories announced a data breach affecting 223,000 Australians. Ransomware-as-a-service group Quantum took credit for the incident, posting an 86-gigabyte file in June. "There is no evidence of misuse of any of the information," says Medlab Pathology.

article thumbnail

Heartbleed 2.0? OpenSSL Warns of Second-Ever Critical Security Flaw

eSecurity Planet

The OpenSSL project this week announced plans to release version 3.0.7 on November 1 to patch a critical security flaw affecting versions 3.0 and later. Co-founder Mark J. Cox noted it’s only the second critical patch “since we started rating flaws back in 2014.” OpenSSL identifies critical issues as those affecting common configurations and likely to be exploitable, with examples including “significant disclosure of the contents of server memory (potentially revealing us

Security 119
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Fallout From Medibank Hack Grows

Data Breach Today

About 4M Australians Affected by Extortion Demand Made Against the Health Insurer Fallout from the hack of Australian health insurer Medibank continues to worsen as the company twice this week acknowledged a wider set of affected individuals. Hackers had access to the personal data of 4 million individuals and significant amounts of health claims data.

Insurance 239

More Trending

article thumbnail

Medlab Pathology Breach Impacts 223,000 Australians

Data Breach Today

Medical Records and Credit Card Details of Patients Compromised One of Australia's largest private testing laboratories announced a data breach affecting 223,000 Australians. Ransomware as a service group Quantum took credit for the incident, posting an 86 gigabyte file in June. "There is no evidence of misuse of any of the information," says Medlab Pathology.

article thumbnail

Apple backports fixes for CVE-2022-42827 zero-day to older iPhones, iPads

Security Affairs

Apple released updates to backport the recently released security patches for CVE-2022-42827 zero-day to older iPhones and iPads. Apple has released new security updates to backport security patches released this week to address actively exploited CVE-2022-42827 in older iPhones and iPads, addressing an actively exploited zero-day bug. Early this week, Apple addressed the ninth zero-day vulnerability exploited in attacks in the wild since the start of the year.

Security 111
article thumbnail

Microsoft, IBM, Splunk Dominate SIEM Gartner Magic Quadrant

Data Breach Today

Microsoft Enters Leaders Quadrant While LogRhythm, Rapid7 Fall in Latest Rankings A surging Microsoft has leapfrogged to the top of the SIEM Gartner Magic Quadrant, catapulting past security operations stalwarts IBM, Splunk, Securonix and Exabeam. Microsoft has climbed from being named a visionary by Gartner last year to crushing the SIEM market in execution ability this year.

Marketing 214
article thumbnail

Over Two-Thirds of Organizations Have No Ransomware-Specific Incident Response Playbook

KnowBe4

A newly released report on ransomware preparedness shows organizations are improving their security stance in comparison to last year, but overall still aren’t doing enough.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Final Twilio Smishing Victim Count Reaches 209

Data Breach Today

Same 0ktapus Hackers Likely Also Responsible for Earlier Breach Customer engagement platform Twilio says the number of customers affected by a phishing campaign that coaxed employees of the San Francisco company into permitting attackers to bypass multifactor authentication protections will stand at a final tally of 209.

Phishing 147
article thumbnail

Google fixes a new actively exploited Chrome zero-day, it is the seventh one this year

Security Affairs

Google Thursday released an emergency patch for Chrome 107 to address the actively exploited zero-day vulnerability CVE-2022-3723. Google released an emergency update for the Chrome 107 to address an actively exploited zero-day vulnerability tracked as CVE-2022-3723. The CVE-2022-3723 flaw is a type confusion issue that resides in the Chrome V8 Javascript engine.

IT 105
article thumbnail

Will Twitter Sink or Swim Under Elon Musk's Direction?

Data Breach Today

Billionaire Faces Cybersecurity, Disinformation, Legal and Other Challenges Elon Musk lugged a sink into Twitter headquarters to announce his takeover of the social network. But it will take more than a porcelain prop for the richest person in the world to successfully surmount the cybersecurity, legal, disinformation, regulatory and other challenges facing Twitter.

article thumbnail

Critical Vulnerability in Open SSL

Schneier on Security

There are no details yet, but it’s really important that you patch Open SSL 3.x when the new version comes out on Tuesday. How bad is “Critical”? According to OpenSSL, an issue of critical severity affects common configurations and is also likely exploitable. It’s likely to be abused to disclose server memory contents, and potentially reveal user details, and could be easily exploited remotely to compromise server private keys or execute code execute remotely.

IT 103
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CommonSpirit IT Systems Still Offline One Month Post-Attack

Data Breach Today

Some Facilities Still Without Access to EHRs, E-Prescribing, Patient Portals Nearly one month after a ransomware attack on the nation's fourth-largest hospital network, CommonSpirit Health is still struggling to bring online the various IT systems - including electronic medical records, prescriptions and patient appointment scheduling - affected at many of its facilities.

IT 130
article thumbnail

Developments to Improve the Cybersecurity of Federal Government Agencies, Critical Infrastructure

Data Matters

Recently, several developments have been proposed or announced to help identify and mitigate cyber risk for United States critical infrastructure operators and software in an effort to further bolster the cybersecurity posture of the federal government. The post Developments to Improve the Cybersecurity of Federal Government Agencies, Critical Infrastructure appeared first on Data Matters Privacy Blog.

article thumbnail

CISA Releases Performance Goals for Critical Infrastructure

Data Breach Today

Measures Are Not Mandatory and Not Comprehensive, Federal Officials Stress The Department of Homeland Security released a set of cybersecurity practices for critical infrastructure containing basic measures such as requiring multifactor authentication and disabling AutoRun. The word "voluntary" was in heavy rotation during the Thursday rollout.

article thumbnail

Ransomware Attacks Via RDP Drop Significantly as Phishing Continues to Dominate

KnowBe4

Since 2018, remote desktop compromise (RDP) and phishing have battled for dominance as the primary initial attack vector in ransomware attacks. The latest data shows that RDP is no longer the contender is once was.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

If Musk Starts Firing Twitter's Security Team, Run

WIRED Threat Level

What's next for the social network is anyone's guess—but here's what to watch as you wade through the privacy and security morass.

Security 100
article thumbnail

The Number of Vulnerabilities Associated with Ransomware Grows 426% Over Three Years

KnowBe4

With only 57 vulnerabilities tied to ransomware back in 2019, the most recent data from security vendor Ivanti shows that number predicted to be over 300 by the end of 2022.

article thumbnail

Why NDR is the latest 3-letter word in cybersecurity

OpenText Information Management

Network Detection and Response (NDR) is one of the latest acronyms to join the alphabet soup of information security and risk management tools. As we close out Cybersecurity Awareness Month, it’s a great time to cover what NDR is and why it should matter to you. What is network detection and response? At the simplest … The post Why NDR is the latest 3-letter word in cybersecurity appeared first on OpenText Blogs.

article thumbnail

Your KnowBe4 Fresh Content Updates from October 2022

KnowBe4

Check out the 29 new pieces of training content added in September, alongside the always fresh content update highlights and new features.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

OpenText MxDR Platform: By the numbers

OpenText Information Management

There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one. Data protection and threat remediation are like that, too. The numbers tell the tale, and OpenTextTM MxDR has some impressive ones: Detection rate: 99% Utilizing our cloud-based SOC—supported by machine learning and MITRE ATT&CK analytics—OpenText’s MxDR provides comprehensive 24x7x365 … The post OpenText MxDR Platform: By the numbers appeared first on OpenText Blogs.

article thumbnail

NYC DCWP Proposes Rules to Implement New Law Governing Automated Employment Decision Tools

Hunton Privacy

On October 24, 2022, the New York City Department of Consumer and Worker Protection (“DCWP”) proposed rules to implement its new law regarding automated employment decision tools (“AEDTs”). The new law, NYC’s Local Law 144 (“LL 144”), will take effect on January 1, 2023 and will prohibit an employer or employment agency from using AEDTs for an employment decision (i.e., screening a candidate for employment, or an employee for promotion, within NYC) unless: within one year prior to using the AEDT

article thumbnail

The must-have checklist for maximizing the value of your data catalog and governance investments with Collibra

Collibra

Just in time for the holidays, we’re giving away an informative checklist that’ll help new Collibra customers from pre-installation all the way through implementation and adoption. . Get the Enterprise Launch Checklist. Many implement, much fewer achieve adoption. The reality is that most enterprises want a data intelligence solution. Many implement one. .

article thumbnail

FTC Announces Agenda for PrivacyCon 2022

Hunton Privacy

On October 25, 2022, the Federal Trade Commission announced the agenda for its annual PrivacyCon to be held on November 1, 2022. The event will cover consumer surveillance, automated decision-making systems, children’s privacy, listening devices, augmented and virtual reality, interfaces and dark patterns, and AdTech. The event will feature opening remarks by FTC Chair Lina M.

Privacy 55
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Jamf in the News: Recapping the highlights

Jamf

Read all about it – check out recent Jamf in the news highlights, including features on enterprise security, Apple growth and innovation and much more!

article thumbnail

Getting Ready to Migrate to Db2 13 for z/OS from Db2 12

Robert's Db2

It could be said that preparation for migration of a Db2 12 for z/OS system to Db2 13 comes down to one thing: activate Db2 12 function level 510. That's a pretty simple-looking migration plan, but there's more to it than meets the eye - as I'll explain in this blog entry. First, let's consider function level 510 itself. Unique among Db2 12 function levels, 510 provides no new functionality in the traditional sense - there's nothing new there that a DBA or a developer would use, or that could ma

IT 62
article thumbnail

Preservica launches our new generation Active #DigitalPreservation archiving & discovery software

IG Guru

Check out the post here.