Tue.Mar 02, 2021

article thumbnail

Cryptocurrency Firm Tether Refuses to Pay Ransom to Hackers

Data Breach Today

Hackers Threatened to Leak Sensitive Data The cryptocurrency company Tether has refused to pay a ransom of 500 bitcoins ($24 million) after hackers threatened to leak sensitive data if the company failed to pay.

340
340
article thumbnail

Payroll/HR Giant PrismHR Hit by Ransomware?

Krebs on Security

PrismHR , a company that sells technology used by other firms to help more than 80,000 small businesses manage payroll, benefits, and human resources, has suffered what appears to be an ongoing ransomware attack that is disrupting many of its services. Hopkinton, Mass.-based PrismHR handles everything from payroll processing and human resources to health insurance and tax forms for hundreds of “professional employer organizations” (PEOs) that serve more than two million employees.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Attack's Economic Impact: $67 Million

Data Breach Today

Universal Health Services' Financial Statement Spells Out the Effects In an eye-opening look at the cost burden of a ransomware attack, Universal Health Services reports that an incident last September had a $67 million economic impact - citing, for example, the need to divert patients to competing facilities for urgent care. But insurance may cover much of the cost.

article thumbnail

Microsoft: Chinese Cyberspies Used 4 Exchange Server Flaws to Plunder Emails

Krebs on Security

Microsoft Corp. today released software updates to plug four security holes that attackers have been using to plunder email communications at companies that use its Exchange Server products. The company says all four flaws are being actively exploited as part of a complex attack chain deployed by a previously unidentified Chinese cyber espionage group.

Education 287
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

India Fights Against Malware Targeting Power Supply

Data Breach Today

Recorded Future Says China-Sponsored Groups Involved State-sponsored groups in China appear to be targeting India’s power supply by dropping malware into systems, according to online digital threat analysis company Recorded Future. The Indian government says it has taken steps to mitigate the risks.

Risk 246

More Trending

article thumbnail

Report Sizes Up How AI Poses a Security Threat

Data Breach Today

Commission Makes Recommendations on Developing Technologies, Countering Threats The U.S. is in danger of falling behind China and Russia in developing artificial intelligence technologies and countering cybersecurity threats that could develop as AI use becomes more widespread, according to a newly released report from the National Security Commission on Artificial Intelligence.

article thumbnail

Mysterious Macintosh Malware

Schneier on Security

This is weird : Once an hour, infected Macs check a control server to see if there are any new commands the malware should run or binaries to execute. So far, however, researchers have yet to observe delivery of any payload on any of the infected 30,000 machines, leaving the malware’s ultimate goal unknown. The lack of a final payload suggests that the malware may spring into action once an unknown condition is met.

article thumbnail

Hackers Use Search Engine Optimization to Deliver Malware

Data Breach Today

GootLoader Campaign Spreads Ransomware, Trojans A new malware loader dubbed "GootLoader" is using search engine optimization techniques to spread ransomware, Trojans and other malware, the security firm Sophos reports.

article thumbnail

Virginia Becomes the Second U.S. State to Enact Major Privacy Legislation

Hunton Privacy

On March 2, 2021, Virginia’s Governor, Ralph Northam, signed the Consumer Data Protection Act into law without any further amendments. In addition to California, Virginia is now the second state to enact major privacy legislation of general applicability in the U.S. Read our previous blog post for an overview of the law and its requirements, which will take effect on January 1, 2023.

Privacy 129
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Distributor of Asian food JFC International hit by Ransomware

Security Affairs

JFC International, a major wholesaler and distributor of Asian food products in the United States, was hit by ransomware. JFC International, a major distributor and wholesaler of Asian food products, announced it has recently suffered a ransomware attack. The ransomware attack only impacted JFC International’s Europe Group, the malware caused the disruption of some of its IT systems. “JFC International (Europe) was recently subject to a ransomware attack that briefly disrupted its IT syste

article thumbnail

Protecting your most valuable content

OpenText Information Management

It’s never been easier to share your information and collaborate — and likewise, it has never been riskier, costlier, and more embarrassing to experience a data leak. These two competing realities create a real dilemma for IT: How do you maintain productivity and foster collaboration among a widely dispersed workforce while keeping control of your … The post Protecting your most valuable content appeared first on OpenText Blogs.

IT 117
article thumbnail

French multinational dairy Lactalis hit by a cyber attack

Security Affairs

French multinational dairy products corporation Lactalis discloses cyberattack, but claimed that had no evidence of a data breach. France-based dairy giant Lactalis announced that it was hit by a cyber attack, but claimed that it had found no evidence of a data breach. Lactalis employs more than 80,000 people worldwide, at more than 230 production sites in 43 different countries.

article thumbnail

Microsoft's Dream of Decentralized IDs Enters the Real World

WIRED Threat Level

The company will launch a public preview of its identification platform this spring—and has already tested it at the UK's National Health Service.

IT 120
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

Four zero-days in Microsoft Exchange actively exploited in the wild

Security Affairs

Microsoft released emergency out-of-band security updates for all supported Microsoft Exchange versions that fix four zero-day flaws. Microsoft has released emergency out-of-band security updates that address four zero-day issues (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) in all supported Microsoft Exchange versions that are actively exploited in the wild.

article thumbnail

4 Ways Health Centers Can Stop the Spread of Cyberattacks

Dark Reading

Health centers must shift the perception of cyberattacks from potential risk to real threat in order to take the first step toward a safer, healthier security posture.

Risk 144
article thumbnail

Back to the Fuzz: Fuzzing for Command Injections

ForAllSecure

Some readers may remember NCSA HTTPd , an early web server out of the University of Illinois at Urbana–Champaign (I don’t – but that's probably because I was still wearing a diaper in its heyday). However, NCSA HTTPd has inevitably affected every one of our lives since the Apache project took over the codebase and became the Apache webserver.

article thumbnail

Pwn20wnd released the unc0ver v 6.0 jailbreaking tool

Security Affairs

The popular jailbreaking tool called “unc0ver” now supports iOS 14.3 and earlier releases, and is able to unlock almost every iPhone device. Pwn20wnd, the author of the jailbreaking tool “ unc0ver ,” has updated their software to support iOS 14.3 and earlier releases. The last release of the jailbreaking tool, unc0ver v6.0.0 , now includes the exploit code for the CVE-2021-1782 vulnerability that Apple in January claimed was actively exploited by threat actors.

Access 86
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Post-Cyberattack, Universal Health Services Faces $67M in Losses

Threatpost

The Fortune-500 hospital network owner is facing steep costs in damages after a cyberattack impacted patient care and billing in September and October.

88
article thumbnail

Alleged China-linked APT41 group targets Indian critical infrastructures

Security Affairs

Recorded Future researchers uncovered a campaign conducted by Chinese APT41 group targeting critical infrastructure in India. Security researchers at Recorded Future have spotted a suspected Chinese APT actor targeting critical infrastructure operators in India. The list of targets includes power plants, electricity distribution centers, and seaports in the country.

article thumbnail

What Did I Just Read? A Conversation With the Authors of '2034'

WIRED Threat Level

Elliot Ackerman and Admiral James Stavridis discuss their inspirations, personal experiences, and what keeps them up at night.

article thumbnail

Policy Group Calls for Public-Private Cyber-Defense Program

Dark Reading

The proposed National Cyber Response Network would link federal agencies, companies, and local governments, allowing collaboration during a cyberattack.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

2020 Life Sciences predictions are now 2021 priorities

OpenText Information Management

COVID-19 continues to be a double-edged sword for Life Sciences companies, highlighting areas of improvement to maintain business agility, while showcasing the surprising speed with which organizations can move. Last year’s trends on the cusp of widespread adoption have been pushed to the forefront for 2021, aimed at building resiliency and driving continuous change and … The post 2020 Life Sciences predictions are now 2021 priorities appeared first on OpenText Blogs.

77
article thumbnail

Jailbreak Tool Works on iPhones Up to iOS 14.3

Threatpost

The UnC0ver team took advantage of an iOS flaw patched in January in its latest tool allowing developers and other enthusiasts to hack into their own devices.

IT 82
article thumbnail

Name That Edge Toon: In Hot Water

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.

91
article thumbnail

Ryuk Ransomware: Now with Worming Self-Propagation

Threatpost

The Ryuk scourge has a new trick in its arsenal: Self-replication via SMB shares and port scanning.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Microsoft Fixes Exchange Server Zero-Days Exploited in Active Attacks

Dark Reading

Microsoft fixes multiple Exchange Server vulnerabilities being weaponized in attacks from a group it believes operates out of China.

IT 123
article thumbnail

Twitch's First Transparency Report Is Here—and Long Overdue

WIRED Threat Level

The decade-old streaming platform has for the first time detailed its efforts to safeguard its user base in one place.

IT 87
article thumbnail

Microsoft Ignite Brings Security & Compliance Updates

Dark Reading

Microsoft announces support for data loss prevention in Google Chrome, co-authoring of protected files, and more at Ignite 2021.