Mon.Jun 22, 2020

article thumbnail

Nephilim Ransomware Gang Tied to Citrix Gateway Hacks

Data Breach Today

Campaign Targets Unpatched Software and Weak Authentication, Defenders Warn Hackers wielding Nefilim ransomware are targeting unpatched or poorly secured Citrix remote-access technology, then stealing data, unleashing crypto-locking malware and threatening to dump data to try to force payment, New Zealand's national computer emergency response team warns.

article thumbnail

Anonymous Stole and Leaked a Megatrove of Police Documents

WIRED Threat Level

The so-called BlueLeaks collection includes internal memos, financial records, and more from over 200 state, local, and federal agencies.

Security 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

French Court Upholds $57 Million Google GDPR Fine

Data Breach Today

Largest Penalty Levied So Far Under EU's Privacy Regulation France's top court has upheld a $56 million fine against Google for violating the EU's General Data Protection Regulation with its advertising personalization model that lacked adequate user consent measures. The fine is the biggest yet for a GDPR privacy policy violation.

GDPR 246
article thumbnail

Moroccan journalist targeted with network injection attacks using NSO Group ‘s spyware

Security Affairs

Researchers at Amnesty International collected evidence that a Moroccan journalist was targeted with network injection attacks using NSO Group ‘s spyware. In October 2019, security experts at Amnesty International’s Security Lab have uncovered targeted attacks against Moroccan human rights defenders Maati Monjib and Abdessadak El Bouchattaoui that employed NSO Group surveillance tools.

Security 108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

OnDemand Webinar | Healthcare CISO's Playbook: 5 Critical Items to Consider When Securing Devices

Data Breach Today

Patient Care Involves More Connected Devices Across Every Healthcare Organization Register & attend this session to learn about the new playbook needed to manage risk and maintain patient safety.

Risk 239

More Trending

article thumbnail

Smart Devices: How Long Will Security Updates Be Issued?

Data Breach Today

Survey Shows Long-Term Software Support Varies Widely If you've managed to equip your home with smart devices and appliances that work properly, you probably think you're all set. But there are no regulations around how long manufacturers must provide security updates, which could mean a smart device could become a risk.

article thumbnail

New Zealand freezes assets of Russian cyber criminal Alexander Vinnik

Security Affairs

New Zealand police had frozen NZ$140 million (US$90 million) in assets linked to a Russian cyber criminal. New Zealand police announced that they had frozen NZ$140 million (US$90 million) in assets linked to the Russian nation Alexander Vinnik. Alexander Vinnik is currently in France to face a charge of money laundering for organised crime using crypto-currency.

Security 107
article thumbnail

Telehealth After COVID-19: Privacy, Security Considerations

Data Breach Today

Congress, Others Examine Long-Term Telemedicine Issues If the lifting of telehealth restrictions during the COVID-19 pandemic becomes permanent through new legislation or changes in government policies, what would be the potential impact on patient data privacy and security?

Privacy 227
article thumbnail

Overcoming the 80/20 Rule – Finding More Time with Data Intelligence

erwin

The 80/20 rule is well known. It describes an unfortunate reality for many data stewards, who spend 80 percent of their time finding, cleaning and reorganizing huge amounts of data, and only 20 percent of their time on actual data analysis. That’s a lot wasted of time. Earlier this year, erwin released its 2020 State of Data Governance and Automation (DGA) report.

Metadata 105
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Nigerian Entrepreneur Pleads Guilty in $11 Million BEC Scam

Data Breach Today

Obinwanne Okeke Targeted UK Affiliate of Caterpillar, Prosecutors Say A Nigerian entrepreneur has pleaded guilty to charges stemming from an $11 million business email compromise scheme that targeted a U.K. affiliate of U.S. heavy equipment manufacturer Caterpillar.

article thumbnail

A new variant of the IcedID banking Trojan spreads using COVID-19 lures

Security Affairs

Experts spotted a new version of the IcedID banking trojan that uses steganography to infect victims as part of COVID-19 themed attacks. A new version of the IcedID banking trojan was employed in COVID-19 themed attacks , the new variant uses steganography to infect victims and implements anti-detection capabilities. Researchers at Juniper Threat Labs have spotted COVID-19 themed spam campaign targeting users in the United States, the new version is also able to eavesdrop on victims’ web activit

article thumbnail

Australian government bombarded by cyber attacks

IT Governance

Australia has been hit by a series of ongoing, sophisticated cyber attacks targeting “all levels of government”, Prime Minister Scott Morrison has announced. . T he govern ment, the industrial sector, political groups , schools, healthcare organisations and essential service providers and operators of other critical infrastructure have all come under attack in the past few months. .

article thumbnail

How to Wring Every Last Drop Out of Your Security Budget

Dark Reading

In the face of tighter budgets and lowered spending forecasts due to the pandemic, optimizing and improving the efficiency of security programs -- without sacrificing integrity -- has never been more important.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

MDM + ITSM = Better user support with Jamf Pro integrations

Jamf

As IT shifts to remote support operations, it is vital to think about how users request and receive the help they need. Mobile Device Management (MDM) and IT service management (ITSM) tools go hand-in-hand.

MDM 94
article thumbnail

Experience faster planning, budgeting and forecasting cycles on IBM Cloud Pak for Data

IBM Big Data Hub

We live in the age of connectivity. Everyone and everything is constantly connected; yet, in most organizations, business unit planning operates in silos. This fragmented approach is often the result of spreadsheet-driven planning processes, which impede collaboration.

Cloud 93
article thumbnail

Adobe Prompts Users to Uninstall Flash Player As EOL Date Looms

Threatpost

Adobe will prompt Flash Player users to uninstall the application before the Dec. 31, 2020 end of life date hits.

Security 115
article thumbnail

AMD is going to patch UEFI SMM callout privilege escalation flaw

Security Affairs

AMD is going to release patches for a flaw affecting the System Management Mode (SMM) of the Unified Extensible Firmware Interface (UEFI). AMD recently announced that it was preparing patches for an SMM Callout Privilege Escalation vulnerability, tracked as CVE-2020-12890 , that affects the System Management Mode (SMM) of the Unified Extensible Firmware Interface (UEFI).

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Emergency Preparedness for Local Governments

The Texas Record

It is that time of the year again: hurricane season started on June 1 and runs through November 30. Historically, the peak threat for the Texas coast is in August and September. However, hurricanes have struck the Texas coast during every month of hurricane season. Additionally, due to COVID-19, your agency may be reevaluating your emergency plan(s) concerning your records management functions.

article thumbnail

Identifying a Person Based on a Photo, LinkedIn and Etsy Profiles, and Other Internet Bread Crumbs

Schneier on Security

Interesting story of how the police can identify someone by following the evidence chain from website to website. According to filings in Blumenthal's case, FBI agents had little more to go on when they started their investigation than the news helicopter footage of the woman setting the police car ablaze as it was broadcast live May 30. It showed the woman, in flame-retardant gloves, grabbing a burning piece of a police barricade that had already been used to set one squad car on fire and tossi

IT 114
article thumbnail

The Cyentia Library Relaunches

Adam Shostack

I’m excited to see that they’re Re-introducing the Cyentia Research Library , with cool (new?) features like an RSS feed. There are over 1,000 corporate research reports with data that companies paid to collect, massage, and release in a way they felt would be helpful to the rest of the world. The Cyentia Library lets us see what people are doing in terms of research and data.

article thumbnail

AMD: Fixes For High-Severity SMM Callout Flaws Upcoming

Threatpost

AMD has fixed one high-severity vulnerability affecting its client and embedded processors; fixes for the other two will come out later in June.

IT 86
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Cloud Threats and Priorities as We Head Into the Second Half of 2020

Dark Reading

With millions working from home and relying on the cloud, security leaders are under increasing pressure to keep their enterprises breach-free.

Cloud 90
article thumbnail

Report: ‘BlueLeaks’ Exposes Sensitive Data From Police Departments

Threatpost

DDoSecrets has published data from over 200 police departments, law enforcement training and support resources and fusion centers.

article thumbnail

Long-Term Effects of COVID-19 on the Cybersecurity Industry

Dark Reading

The maelstrom of change we're going through presents a unique opportunity to become enablers. And to do that requires flexibility.

article thumbnail

Crooks leverage Google Analytics in web skimming attacks

Security Affairs

Security researchers at Kaspersky uncovered a web skimming campaign leveraging Google Analytics service to steal user data. Recently, researchers at Kaspersky identified several web skimming attacks that abused Google Analytics service to exfiltrate data stolen with an e-skimmer software. Threat actors exploit the trust in Analytics to bypass Content Security Policy (CSP) using the Analytics API.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

The value of process analysis during uncontrollable times

OpenText Information Management

It seems like 2020 is going to be known as the year that organizations will be tested on adapting to situations out of our control! But crisis often provides organizations with the opportunity to look deep into behaviors to determine what can be done to survive and come out stronger. For enterprise organizations, those “behaviors” … The post The value of process analysis during uncontrollable times appeared first on OpenText Blogs.

IT 64
article thumbnail

Pandemic Accelerates Priceline's 'Coffee Shop' Remote-Access Strategy

Dark Reading

The travel-booking giant had been slowly starting to transition away from VPN dependence. Then COVID-19 happened, and suddenly 700 third-party call-center workers were working from home.

Access 68
article thumbnail

EDPB Releases Statement on the Processing of Personal Data in the Context of Reopening Borders Following the COVID-19 Outbreak

Hunton Privacy

On June 16, 2020, the European Data Protection Board (the “EDPB”) released a statement on the processing of personal data in the context of reopening borders following the COVID-19 outbreak (the “Statement”). Following the EU Commission’s decision to lift internal border controls, countries are implementing measures to control the flow of individuals entering into and/or travelling within their territory (such as COVID-19 testing, requiring a certificate issued by a health professional and using