Thu.Aug 27, 2020

article thumbnail

Confessions of an ID Theft Kingpin, Part II

Krebs on Security

Yesterday’s piece told the tale of Hieu Minh Ngo , a hacker the U.S. Secret Service described as someone who caused more material financial harm to more Americans than any other convicted cybercriminal. Ngo was recently deported back to his home country after serving more than seven years in prison for running multiple identity theft services.

Retail 313
article thumbnail

Implications for CSOs of Charges Against Joe Sullivan

Data Breach Today

Feds Accuse Former Uber CSO of Covering Up Hacker Attack and Data Breach Federal prosecutors have charged Uber's former CSO, Joe Sullivan, with covering up a hack attack and data breach. It's apparently the first case that involves attempting to hold a security officer personally responsible for a breach - beyond simply being fired. Is this the start of a trend?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[Podcast] Opportunities in Intelligent Information Management

AIIM

There’s no doubt that the world has changed as a result of the pandemic. In our personal lives, we’ve made the necessary changes to our daily routines, added a mask to our list of things to remember when we leave the house along with our cell phones, wallet, and keys, and moved many of our social gatherings online. But, this change has impacted our lives at work too.

IT 177
article thumbnail

DDoS Attacks Shut Down New Zealand Stock Exchange

Data Breach Today

Exchange Unable to Function for Three Days The New Zealand Stock Exchange remained shuttered for a third day Thursday after a series of distributed denial-of-service attacks that swamped the exchange and rendered its homepage inaccessible.

IT 236
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

BREAKING: Brazilian Data Protection Law Will Soon Come Into Effect

Hunton Privacy

On August 26, 2020, as reported by Brazilian firm Mattos Filho, Veiga Filho, Marrey Jr. e Quiroga Advogados , the Brazilian Senate unexpectedly rejected the President’s Provisional Measure that was previously passed by the House of Representatives and aimed to postpone the applicability of the new Brazilian data protection law ( Lei Geral de Proteção de Dados Pessoais, or “LGPD”).

IT 135

More Trending

article thumbnail

Anubis, a new info-stealing malware spreads in the wild

Security Affairs

Microsoft warned of a recently uncovered piece of malware, tracked as Anubis that was designed to steal information from infected systems. This week, Microsoft warned of a recently uncovered piece of malware, tracked as Anubis, that was distributed in the wild to steal information from infected systems. Anubis is the name of an Android malware well-known in the community of malware analysts, but the family reported by Microsoft is not related to it.

Security 124
article thumbnail

Qbot Banking Trojan Now Hijacks Outlook Email Threads

Data Breach Today

Check Point Research: Message Content Used to Personalize Phishing Emails The operators behind the Qbot banking Trojan are deploying a new version of the malware that uses hijacked Outlook email threads to send personalized phishing emails, according to Check Point Research. This campaign has targeted over 100,000 victims worldwide.

Phishing 147
article thumbnail

350 million decrypted email addresses left exposed on an unsecured server

Security Affairs

Experts found an unsecured data bucket containing seven gigabytes worth of unencrypted files that include 350,000,000 strings of unique email addresses. Original post at: [link]. The CyberNews research team uncovered an unsecured data bucket owned by an unidentified party, containing seven gigabytes worth of unencrypted files that include 350,000,000 strings of unique email addresses.

Passwords 132
article thumbnail

Malicious Attachments Remain a Cybercriminal Threat Vector Favorite

Threatpost

Malicious attachments continue to be a top threat vector in the cybercriminal world, even as public awareness increases and tech companies amp up their defenses.

Phishing 128
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How CISOs Can Play a New Role in Defining the Future of Work

Dark Reading

Rather than just reacting to security issues in the COVID-19 era, CISOs are now in a position to be change agents alongside their C-suite peers.

Security 129
article thumbnail

Magecart’s Success Paves Way For Cybercriminal Credit Card ‘Sniffer’ Market

Threatpost

Magecart's successes have led to threat actors actively advertising 'sniffers' that can be injected into e-commerce websites in order to exfiltrate payment cards.

Marketing 119
article thumbnail

New Zealand stock exchange (NZX) halted 2 days by DDoS attack

Security Affairs

New Zealand’s stock exchange (NZX) confirmed it was hit by a massive distributed denial of service (DDoS) attack from abroad that knocked it offline two days. New Zealand’s stock exchange ( NZX ) has been hit by distributed denial-of-service (DDoS) attacks that took it offline for two days, trading activity was interrupted until the connectivity was restored.

Marketing 115
article thumbnail

Ex-Cisco Employee Pleads Guilty to Deleting 16K Webex Teams Accounts

Threatpost

Former Cisco employee Sudhish Kasaba Ramesh admitted to accessing Cisco’s cloud infrastructure and deleting 16,000 Webex Teams employee accounts.

Cloud 125
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Will the pandemic impact the energy transition?

CGI

Will the pandemic impact the energy transition? The COVID-19 pandemic has caused energy and fossil consumption to plummet and has driven the oil price to historic lows. Production needed to be lowered and in some cases stopped to stabilize the market amid the crisis. ravi.kumarv@cgi.com. Thu, 08/27/2020 - 03:21.

Marketing 105
article thumbnail

Cory Doctorow on The Age of Surveillance Capitalism

Schneier on Security

Cory Doctorow has writtten an extended rebuttal of The Age of Surveillance Capitalism by Shoshana Zuboff. He summarized the argument on Twitter. Shorter summary: it's not the surveillance part, it's the fact that these companies are monopolies. I think it's both. Surveillance capitalism has some unique properties that make it particularly unethical and incompatible with a free society, and Zuboff makes them clear in her book.

IT 110
article thumbnail

Microsoft fixes code execution, privilege escalation in Microsoft Azure Sphere

Security Affairs

Microsoft addressed vulnerabilities in Microsoft Azure Sphere that could lead to the execution of arbitrary code or to the elevation of privileges. Microsoft has recently addressed some vulnerabilities impacting Microsoft Azure Sphere that could be exploited by attackers to execute arbitrary code or to elevate privileges. Azure Sphere OS adds layers of protection and ongoing security updates to create a trustworthy platform for new IoT experiences.

IoT 105
article thumbnail

A Tesla Employee Thwarted an Alleged Ransomware Plot

WIRED Threat Level

Elon Musk confirmed Thursday night that a ransomware gang had approached a Gigafactory employee with alleged promises of a big payout.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DDoS Attacks Halt NZ Exchange Trading for Third Day

Dark Reading

New Zealand Exchange officials say the motive for the attacks is unclear.

140
140
article thumbnail

Facebook Hits Back At Apple’s iOS 14 Privacy Update

Threatpost

While privacy experts praised Apple’s upcoming iOS 14 updates, Facebook said the new features could cut its advertising business in half.

Privacy 105
article thumbnail

How to Vote by Mail and Make Sure It Counts

WIRED Threat Level

There's a lot going on with the USPS right now. Here's a complete state-by-state guide to how to get your ballot—and when it's due.

IT 106
article thumbnail

REvil ransomware operators breached healthcare org Valley Health Systems

Security Affairs

REvil ransomware operators claimed to have breached another healthcare organization, the victim is Valley Health Systems. During ordinary monitoring activity of data leaks, the Cyble Research Team identified a leak disclosure post published by the REvil ransomware operators claiming to have breached a healthcare organization, the Valley Health Systems. .

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How WeChat Censored the Coronavirus Pandemic

WIRED Threat Level

In China, the messaging platform blocked thousands of keywords related to the virus, a new report reveals.

Security 106
article thumbnail

Germany: Schrems II: And now? First German supervisory authority provides guidance on data transfers

DLA Piper Privacy Matters

The Commissioner for Data Protection and Freedom of Information for the German State of Baden-Württemberg ( Landesbeauftragter für Datenschutz und Informationsfreiheit Baden-Württemberg – “LfDI BW”) recently published guidance for international transfers of personal data in the post- Schrems II era. Background. The Court of Justice of the European Union (“CJEU”) not only invalidated the EU-U.S.

article thumbnail

OCR 2020 Settlements Target HIPAA Security Rule Non-Compliance

Data Matters

In almost the first three quarters of 2020, the U.S. Department of Health and Human Services, Office for Civil Rights (“OCR”) has settled three cases related to alleged violations of the Health Insurance Portability and Accountability Act (“HIPAA”), totaling $1,165,000. These settlements underscore OCR’s continued focus on enforcement of the HIPAA Security Rule.

article thumbnail

Old Malware Tool Acquires New Tricks

Dark Reading

Latest version of Qbot has acquired a new feature for collecting email threads from Outlook clients.

104
104
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Brazil – Enforceability of the LGPD

DLA Piper Privacy Matters

The Brazilian Senate, in the voting of MP 959/20 decided on 26 August 2020, to reject the article of the MP that provided for the extension of the enforceability of the Brazilian General Data Protection Law (LGPD). Based on this decision, the LGPD will be in force within 15 business days (after the approval or veto of the rest of the MP 959/20). This decision does not encompass the articles related to the National Authority – which were already in force – and the ones related to the

IT 71
article thumbnail

Firefox Launched a New Android App to Lure Users From Chrome

WIRED Threat Level

Mozilla has rewritten the app to rely on its own infrastructure rather than Google’s. But will its privacy and UI tweaks convince people to make the switch?

Privacy 77
article thumbnail

The Inside Threat from Psychological Manipulators

Dark Reading

How internal manipulators can actually degrade your organization's cyber defense, and how to defend against them.

95