Thu.May 21, 2020

article thumbnail

Bank of America: COVID-19 Loan Data May Have Leaked

Data Breach Today

Client Data May Have Been Exposed During Test of SBA Loan Platform Bank of America disclosed this week that some customers' data may have been exposed during the uploading of loan applications related to the Paycheck Protection Program - a U.S. government initiative created to provide business loans during the COVID-19 pandemic.

article thumbnail

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

The Last Watchdog

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to connect to the internet we could achieve better accountability. Related: Why Satya Nadella calls for regulation of facial recognition systems The concept itself is still very much relevant today.

Privacy 288
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple and Google Release Contact-Tracing APIs for COVID-19

Data Breach Today

Privacy-Centered Approach May Bolster Public Confidence in Contact-Tracing Apps Apple and Google have released new APIs designed to support contact-tracing apps being developed by governments to help combat the COVID-19 pandemic. Already at least three U.S. states and 22 countries have expressed interest in using the APIs to build their apps.

Privacy 321
article thumbnail

Sophos blocked attacks exploiting XG Firewall zero-day to deploy Ransomware

Security Affairs

Hackers attempted to exploit a zero-day flaw in the Sophos XG firewall to distribute ransomware to Windows machines, but the attack was blocked. Threat actors attempted to exploit a zero-day (CVE-2020-12271) in the Sophos XG firewall to spread ransomware to Windows machines, the good news is that the attack was blocked by a hotfix issued by Sophos. At the end of April, cybersecurity firm Sophos has released an emergency patch to address an SQL injection zero-day vulnerability affecting its XG Fi

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hot Offering on Darknet: Access to Corporate Networks

Data Breach Today

More Ads Offer Access for a Substantial Price: Positive Technologies The number of darknet forum ads offering full access to corporate networks jumped almost 70% during the first quarter of 2020, compared to the previous quarter, posing a significant potential risk to corporations and their now remote workforces, according to security firm Positive Technologies.

Access 302

More Trending

article thumbnail

Hacked Law Firm May Have Had Unpatched Pulse Secure VPN

Data Breach Today

REvil Gang Still Threating to Release More Data A recent ransomware attack that targeted a law firm that serves celebrities may have been facilitated by a Pulse Secure VPN server that was not properly patched and mitigated against a well-known vulnerability, some security experts say.

Security 214
article thumbnail

Security 101: Cross-Site Scripting

Dark Reading

Cross-site scripting has been around longer than most security professionals have been on the job. Why is it still such an issue when we've known about it for so long?

Security 118
article thumbnail

Remote Workforce Security - the Long Game

Data Breach Today

"Risk acceptance" was the operative term as organizations quickly deployed remote workforces in response to the global crisis. But now, as this deployment becomes a long-term option, enterprises need to take a future-focused view toward identity, cloud, and the attack surface. Forcepoint's Homayun Yaqub offers tips.

Security 165
article thumbnail

Iran-linked Chafer APT group targets governments in Kuwait and Saudi Arabia

Security Affairs

Cybersecurity researchers uncovered an Iranian cyber espionage campaign conducted by Chafer APT and aimed at critical infrastructures in Kuwait and Saudi Arabia. Cybersecurity researchers from Bitdefender published a detailed report on an Iranian cyber espionage campaign directed against critical infrastructures in Kuwait and Saudi Arabia. The cyber espionage campaigns were carried out by Iran-linked Chafer APT (also known as APT39 or Remix Kitten).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Digital twin technology: The key to airport innovation

DXC Technology

Airports face a number of challenges — aging infrastructure, fluctuating demand, sophisticated security needs and, now, an unexpected global health crisis — and legacy technologies are incapable of addressing them. In other words, we cannot expect to build tomorrow’s airport using yesterday’s solutions. We need radical innovation and that calls for new technologies.

Security 111
article thumbnail

10 recommendations to unlock human capital to respond, rebound and reinvent through the pandemic

CGI

10 recommendations to unlock human capital to respond, rebound and reinvent through the pandemic. Social distancing requirements in response to the COVID-19 pandemic created immediate and drastic changes to the way we manage our workforces. For the first time, many employees found themselves working from home full time, affecting their attachments to their organizations and interest in work, while creating new desires and expectations.

article thumbnail

Jamf Protect adds malware prevention and unified log forwarding

Jamf

We heard you and are happy to announce that Jamf Protect has added malware prevention and unified log forwarding.

122
122
article thumbnail

Meal delivery service Home Chef discloses data breach

Security Affairs

Meal delivery service Home Chef has confirmed that it recently suffered a security breach that exposed its customer information. Meal delivery service Home Chef has disclosed a data breach that exposed its customer information. Home Chef also explained that only a portion ot its customers were impacted in the security incident. In early May, Shiny Hunters hacking group started offering for sale the databases containing tens of millions from user records from over 11 companies.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Most Bluetooth Devices Vulnerable to Impersonation Attacks

Dark Reading

Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.

article thumbnail

ShinyHunters Is a Hacking Group on a Data Breach Spree

WIRED Threat Level

In the first two weeks of May, they've hit the dark web, hawking 200 million stolen records from over a dozen companies.

article thumbnail

Survey Results: Monthly Comparison on the Outlook of the COVID-19 Impact on Businesses in the IG Industry via I-Sigma

IG Guru

Last week, i-SIGMA conducted a follow-up survey to continue to track how COVID-19 is impacting businesses within the IG industry. The results are now in and you can view how the findings compare to our survey results from last month. The post Survey Results: Monthly Comparison on the Outlook of the COVID-19 Impact on Businesses in the IG Industry via I-Sigma appeared first on IG GURU.

article thumbnail

Crooks Tap Google Firebase in Fresh Phishing Tactic

Threatpost

Cybercriminals are taking advantage of the Google name and the cloud to convince victims into handing over their login details.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Telcos Become Richer Hacking Targets

Dark Reading

The shift of moving telecommunications networks toward more commercial networking equipment and systems also expanded their attack surface.

100
100
article thumbnail

Long Tail Analysis: A New Hope in the Cybercrime Battle

Threatpost

Looking for niche anomalies in an automated way with AI and machine learning is the future.

Cloud 108
article thumbnail

Facebook Messenger Adds Safety Alerts?Even in Encrypted Chats

WIRED Threat Level

By using metadata instead of content to spot suspicious behavior, the social network can keep privacy intact.

article thumbnail

Santander, one of the biggest European banks, was leaking sensitive data on their website

Security Affairs

Santander Consumer Bank, the Belgian branch of the bank, had a misconfiguration in its blog domain that was allowing its files to be indexed. Our new research recently discovered a security issue with Santander , the 5th largest bank in Europe and the 16th largest in the world. This Spanish multinational bank controls approximately $1.4 trillion in total assets globally, and has a $69.9 billion total market capitalization on the Euro Stoxx 50 stock market index.

Phishing 105
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

The Need for Compliance in a Post-COVID-19 World

Dark Reading

With the current upheaval, business leaders may lose focus and push off implementing security measures, managing risk, and keeping up with compliance requirements. That's a big mistake.

article thumbnail

Japan suspects HGV missile data leak in Mitsubishi security breach

Security Affairs

Japan continues to investigate a cyberattack that hit this year Mitsubishi Electric Corp., it suspects a possible leak of data including details of a prototype missile. Japan is still investigating a cyberattack that was disclosed by Mitsubishi Electric Corp. early this year. In January, the company disclosed a security breach that might have exposed personal and confidential corporate data, at the time, it claimed that attackers did not obtain sensitive information about defense contracts.

article thumbnail

FinCEN Issues Notice on Reporting COVID-19 Criminal and Suspicious Activities, Companion Advisory on COVID-19-Related Medical Scams

Data Matters

On May 18, 2020, the Financial Crimes Enforcement Network (FinCEN), as part of its COVID-19-related response, issued a Notice Related to the Coronavirus Disease 2019 (COVID-19) reminding financial institutions of certain Bank Secrecy Act (BSA) obligations and pertinent information regarding reporting COVID-19-related criminal and suspicious activity (the Notice).

article thumbnail

Critical Cisco Bug in Unified CCX Allows Remote Code Execution

Threatpost

Cisco has fixed a critical remote code-execution flaw in its popular customer interaction management solution.

IT 91
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Singapore’s Public Consultation on proposed changes to the Singapore Personal Data Protection Act

Data Protection Report

On 14 May 2020, the Singapore Ministry of Communications and Information ( MCI ) and the Personal Data Protection Commission of Singapore ( PDPC ) announced a public consultation (the Public Consultation ) on the draft Personal Data Protection (Amendment) Bill (the Draft Bill ) and related amendments to the Spam Control Act ( SCA ). The Public Consultation will take place from 14 May 2020 to 28 May 2020.

article thumbnail

Hackers Serve Up Stolen Credentials from Home Chef

Dark Reading

Some 8 million of the meal delivery company's customer records have been offered for sale on the Dark Web.

Sales 92
article thumbnail

Supreme Court Phish Targets Office 365 Credentials

Threatpost

Cybercriminals are hunting out victims' Office 365 credentials -- by dishing out Supreme court "summons" in a phishing attack.