Fri.Apr 02, 2021

article thumbnail

Ubiquiti Acknowledges Extortion Attempt

Data Breach Today

Company Called Out by Whistleblower for Attack Response Internet of things vendor Ubiquiti revealed in a security notice that an attacker had attempted to extort money from the company following a December 2020 cyber incident - a fact not mentioned in the company's earlier notice about the attack.

Security 323
article thumbnail

FBI: APTs Actively Exploiting Fortinet VPN Security Holes

Threatpost

Three security vulnerabilities in the Fortinet SSL VPN are being used to gain a foothold within networks before moving laterally and carrying out recon.

Security 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kansas Man Faces Federal Charges Over Water Treatment Hack

Data Breach Today

DOJ: Wyatt Travnichek Allegedly Accessed Cleaning and Disinfecting System A Kansas man faces federal charges for allegedly accessing the network of a local water treatment facility and tampering with the systems that control the cleaning and disinfecting procedures, according to the Justice Department. The charges follow a similar security incident at a Florida facility.

Access 265
article thumbnail

Man indicted for tampering with public water system in Kansas

Security Affairs

The United States Department of Justice (DoJ) charged a Kansas man, for accessing and tampering with a public water system. The United States Department of Justice charged Wyatt A. Travnichek (22), of Ellsworth County, Kansas, for accessing and tampering with the computer system of the Ellsworth County Rural Water District. Travnichek accessed the computer system of the Public Water System on or about March 27, 2019, without authorization. “ WYATT A.

Access 109
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Booking.Com's GDPR Fine Should Serve as 'Wake-Up Call'

Data Breach Today

Dutch Authorities Found Company Waited Over 20 Days to Issue Breach Notification The 475,000 euro fine levied against Booking.com by Dutch privacy authorities should serve as a "wake-up call" for other companies when it comes to GDPR, some experts say. The company waited more than 20 days to report the breach to officials instead of the 72-hour window required under Europe's privacy law.

GDPR 234

More Trending

article thumbnail

Synthetic Identity Fraud: How to Define and Detect

Data Breach Today

Greg Woolf of FiVerity Discusses a Federal Reserve Initiative to Better Define the Crime Synthetic identity fraud is a pervasive yet ill-defined crime – hard to define as well as to detect. Greg Woolf of FiVerity discusses a recent initiative by the Federal Reserve in Boston to better define and therefore better manage SIF.

227
227
article thumbnail

The CNIL’s key priorities for upcoming dawn-raids in 2021

DLA Piper Privacy Matters

Every year, the French supervisory authority (the “ CNIL ”) publishes its key priorities for upcoming dawn-raids. In 2021, more than 50% of the CNIL’s dawn-raids will focus on: (i) websites cybersecurity, (ii) health data protection and (ii) cookies. 1. W ebsites cybersecurity. Website security incidents are among the most common non-compliances identified by the CNIL during its dawn-raids.

article thumbnail

Agency Issues 2nd Alert for Instant Quote Website Schemes

Data Breach Today

NY Officials: Fraudsters Continue to Probe Sites for Security Weaknesses New York state officials are warning insurance and financial firms that fraudsters continue to probe for security weaknesses in websites offering instant quotes, as a way to target consumers' data. Attackers are now using credential stuffing techniques and targeting unprotected data in transition.

Insurance 221
article thumbnail

Seeing stones: pandemic reveals Palantir's troubling reach in Europe

The Guardian Data Protection

Covid has given Peter Thiel’s secretive US tech company new opportunities to operate in Europe in ways some campaigners find worrying The 24 March, 2020 will be remembered by some for the news that Prince Charles tested positive for Covid and was isolating in Scotland. In Athens it was memorable as the day the traffic went silent. Twenty-four hours into a hard lockdown, Greeks were acclimatising to a new reality in which they had to send an SMS to the government in order to leave the house.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Vendor Breach Involved PHI Exposure on GitHub

Data Breach Today

Several Healthcare Entities Issue Notices to Patients About Incident Several healthcare entities are reporting health data breaches in the wake of an incident involving a vendor's employee who uploaded files containing patient data to the public-facing, open-source software development hosting website GitHub. How can entities avoid such mishaps?

article thumbnail

Call of Duty Cheats Expose Gamers to Malware, Takeover

Threatpost

Activision is warning that cyberattackers are disguising malware -- a remote-access trojan (RAT) -- in cheat programs.

Access 121
article thumbnail

Non-Fungible Tokens: Of Course They're Attracting Scammers

Data Breach Today

Ownership of Digital Assets Selling for Large Amounts of Bitcoin? Cue Fraudster Love Anyone wanting to invent a system designed to stoke widespread abuse by fraudsters would be hard-pressed to best the non-fungible token. Because they get bought and sold using cryptocurrency, it's only a question of when scammers will turn their attention to defrauding NFT aficionados.

IT 218
article thumbnail

From PowerShell to Payload: An Analysis of Weaponized Malware

Threatpost

John Hammond, security researcher with Huntress, takes a deep-dive into a malware's technical and coding aspects.

Security 119
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The Case for Central Bank Digital Currencies

Data Breach Today

Karen Hsu of AppDome Discusses the Motivation and Concerns for CBDCs Many governments are exploring Central Bank Digital Currencies to reduce costs and expand digital inclusion. Karen Hsu of AppDome discusses the opportunities and challenges for minting digital money.

article thumbnail

Conti Ransomware gang demanded $40 million ransom to Broward County Public Schools

Security Affairs

Ransomware gang demanded a $40,000,000 ransom to the Broward County Public Schools district, Florida. It is just the last attack of a long string against the sector. Ransomware operators continue to target organizations worldwide and school districts particularly exposed to these malicious campaigns. Recently the Broward County Public Schools district announced that it was victim of a ransomware attack and crooks demanded a $40,000,000 payment.

article thumbnail

North Korean Group Targets Security Researchers - Again

Data Breach Today

Google: Attackers Leverage Social Media Accounts A North Korean government-backed threat group that was detected targeting security researchers in January is once again staging a campaign against them using advanced social engineering techniques, Google reports.

Security 200
article thumbnail

Robinhood Warns Customers of Tax-Season Phishing Scams

Threatpost

Attackers are impersonating the stock-trading broker using fake websites to steal credentials as well as sending emails with malicious tax files.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Analysis: Fat Face's Awkward Breach Notification

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of retailer Fat Face’s awkward "strictly private and confidential" data breach notification. Also featured: Discussions on the ethics of buying leaked data and the rise of central bank digital currencies.

Retail 191
article thumbnail

Myanmar’s Internet Shutdown Is an Act of ‘Vast Self-Harm’

WIRED Threat Level

On Friday the military junta shut off connectivity across the country. There’s no sign of when it will return.

Military 103
article thumbnail

Airlift Express Fixes Vulnerabilities in Its E-commerce Store

Security Affairs

PrivacySavvy experts discovered an OTP vulnerability in Airlift Express, which could lead to account hacks and exploits by cybercriminals. A team of security researchers from PrivacySavvy recently discovered an OTP vulnerability in Airlift Express, which could lead to account hacks and exploits by cybercriminals. Fortunately, the company has successfully fixed the security loopholes, but the incident shows the inadequacy of one-time passwords in protecting app users.

article thumbnail

eDiscovery: Discovering Data that Matters

Information Governance Perspectives

People are constantly trying to figure out the most effective ways to get their jobs done. If they have technical barriers in front of them, sometimes they succumb to the enticement to circumvent those with unauthorized approaches. The post eDiscovery: Discovering Data that Matters appeared first on Rafael Moscatel.

76
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Malware Hidden in Call of Duty Cheating Software

Schneier on Security

News article : Most troublingly, Activision says that the “cheat” tool has been advertised multiple times on a popular cheating forum under the title “new COD hack.” (Gamers looking to flout the rules will typically go to such forums to find new ways to do so.) While the report doesn’t mention which forum they were posted on (that certainly would’ve been helpful), it does say that these offerings have popped up a number of times.

IT 81
article thumbnail

Weekly Update 237

Troy Hunt

As soon as I started watching this video back, I remembered why I don't do daylight mode in these any more. It's just so. boring. That said, I've got a bunch of stuff in the pipeline to enhance the room design and lighting as I think there's still plenty of room for improvement, stay tuned for that one. For now though, a lot of this week's video is about the Ubiquiti situation and I'm very candid about my feelings on that one.

article thumbnail

DHS CISA requires federal agencies to assess their Microsoft Exchange servers by April 5

Security Affairs

The DHS CISA has issued a supplemental directive that requires all federal agencies to identify vulnerable Microsoft Exchange servers in their infrastructure within five days. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has issued a supplemental directive requiring all federal agencies to identify Microsoft Exchange servers in their environments impacted by ProxyLogon flaws within five days and take the necessary steps to secure them.

article thumbnail

Greater workflow automation and efficiency with Jamf, atSpoke integration

Jamf

Tanya Butani from atSpoke joined us to share how automation and improved efficiency is made possible with Jamf.

95
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Tens of thousands of QNAP SOHO NAS devices affected by unpatched RCEs

Security Affairs

Unpatched vulnerabilities in QNAP small office/home office (SOHO) network-attached storage (NAS) devices could be exploited by remote attackers to remotely execute arbitrary code. Security researchers at SAM Seamless Network discovered a couple of critical unpatched flawsin QNAP small office/home office (SOHO) network-attached storage (NAS) devices that could allow remote attackers to execute arbitrary code on vulnerable devices.

article thumbnail

CIPL Organizes Webinar on EU Approach to Regulating AI and Regulatory Experimentation

Hunton Privacy

On March 25, 2021, the Centre for Information Policy Leadership at Hunton Andrews Kurth organized an expert roundtable on the EU Approach to Regulating AI–How Can Experimentation Help Bridge Innovation and Regulation? (the “Roundtable”). The Roundtable was hosted by Drago? Tudorache , Member of Parliament and Chair of the Artificial Intelligence in the Digital Age (“ AIDA ”) Committee of the European Parliament.

article thumbnail

FBI and CISA are warning of APT actors targeting Fortinet FortiOS servers

Security Affairs

FBI and CISA published a joint alert to warn of advanced persistent threat (APT) groups targeting Fortinet FortiOS to access networks of multiple organizations. The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published a joint alert to warn of attacks carried out by APT groups targeting Fortinet FortiOS servers using multiple exploits.