Fri.Jun 11, 2021

article thumbnail

Security Firm COO Charged in Attack on Medical Center

Data Breach Today

Experts Say Odd Case Offers Forewarning to Others The chief operating officer of a network security firm serving the healthcare sector has been charged by federal prosecutors with crimes stemming from an alleged cyberattack on an Atlanta, Georgia-area medical center in 2018. Some legal experts say the unusual case offers forewarnings to others.

Security 321
article thumbnail

Nevada Updates its Existing Online Privacy Notice Statutes

Data Matters

On June 2, 2021, Nevada Governor Steve Sisolak signed SB260 , a bill that will amend the state’s existing privacy notice legislation, NRS 603A.300 to.360 (“Existing NV Privacy Law”). SB260 amends the Existing NV Privacy Law by exempting certain persons and information collected about a consumer from the law’s privacy requirements, expanding the types of entities that must facilitate consumer privacy opt-out rights, providing new and updated definitions, authorizing the opportunity to remedy a fa

Privacy 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

House Oversight Committee Probing JBS Ransomware Payment

Data Breach Today

Chairwoman Carolyn Maloney Also Wants Details About Colonial, CNA Payments The House Oversight and Reform Committee is now probing the $11 million payment that meat-producer JBS paid to a cybercriminal gang following a ransomware attack in May. Committee Chairwoman Carolyn Maloney also asked for documents related to ransom payments made by Colonial Pipeline and CNA.

article thumbnail

FBI/AFP-Run Encrypted Phone

Schneier on Security

For three years, the Federal Bureau of Investigation and the Australian Federal Police owned and operated a commercial encrypted phone app, called AN0M, that was used by organized crime around the world. Of course, the police were able to read everything — I don’t even know if this qualifies as a backdoor. This week, the world’s police organizations announced 800 arrests based on text messages sent over the app.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

How Did FBI Recover Colonial Pipeline's DarkSide Bitcoins?

Data Breach Today

Suspect's Device, Seized by Foreign Law Enforcement Agency, May Have Had Private Key Cryptocurrency has a reputation for being tough to trace - no wonder anonymity-craving criminals favor using it. In reality, cryptocurrencies don't make users anonymous. But just how did the FBI recover most of the bitcoins paid by Colonial Pipeline to the DarkSide ransomware operation?

More Trending

article thumbnail

TeamTNT Reportedly Eyes Credentials of AWS, Google Cloud

Data Breach Today

Group Uses Compromised Credentials to Attack Cloud Providers, Researchers Say Cryptojacking group TeamTNT is leveraging compromised Amazon Web Services credentials to attack its cloud environments through the platform’s API, according to researchers from Unit 42 at Palo Alto Networks.

Cloud 301
article thumbnail

REvil Hits US Nuclear Weapons Contractor: Report

Threatpost

"We hereby keep a right (sic) to forward all of the relevant documentation and data to military agencies of our choise (sic)" REvil reportedly wrote.

Military 138
article thumbnail

Fake Lazarus DDoS Gang Launches New "Attacks"

Data Breach Today

Proofpoint Reports Group Rebrands as Fancy Lazarus, Lowers Ransom Amount Traditional ransomware attacks may have taken over the news, but Proofpoint researchers say the malicious actors who presents themselves as the North Korean-backed Lazarus advanced persistent threat group have revamped their distributed denial-of-service ransom extortion strategy and rebranded.

article thumbnail

Al Jazeera detected and blocked disruptive cyberattacks

Security Affairs

Qatari government-funded international Arabic news channel Al Jazeera announced to have blocked a series of disruptive cyberattacks aimed at its news publishing platform. Qatari government-funded international Arabic news channel Al Jazeera announced to have blocked this week a series of cyberattacks that attempted to disrupt and take over some components of its news publishing platform. “Al Jazeera Media Network was subjected to a series of cyber hacking attempts to penetrate some of its

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Botnet Data Leak: 26 Million Passwords Exposed

Data Breach Today

1.5 Million Facebook Passwords Among Leaked Data; Raccoon Infostealer Suspected Some 26 million passwords were exposed in a 1.2 terabyte batch of data found by NordLocker, a security company. It's workaday botnet data, but it highlights a hostile malware landscape, particularly for people still inclined to download pirated software.

Passwords 284
article thumbnail

WWDC 2021 Takeaways

Jamf

Following a year unlike any other, Apple’s Worldwide Developer Conference (WWDC) wrapped up this week with news for enterprise IT, InfoSec leaders, and education IT professionals alike.

Education 121
article thumbnail

EA Acknowledges Breach; Says Game Source Code Stolen

Data Breach Today

Attackers Put 750 GB of Gaming and Company Data for Sale Electronic Arts has acknowledged that a threat actor has breached the gaming giant and has posted a huge swath of gaming and corporate data for sale on the publicly accessible leak site RaidForums. The ad claims to have 780 GB of data.

Sales 274
article thumbnail

CEO-Level Guide to Prevent Data Hacking Technologies & Incidents

Security Affairs

The current era, where all data is digital, the threats of fraud, breach and data sprawl are more of a reality than ever. In these times, organizations not only take a hit because of the breached data and cyber threats, but also are heavily fined under global privacy regulations. These privacy regulations are in place to encourage security operations within organizations to protect their data from malicious intent.

Privacy 109
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

DOJ Shut Down Slilpp Marketplace for Stolen Credentials

Data Breach Today

Cybercrime Market Traded Banking and Payment Credentials The U.S. Justice Department has shut down the Slilpp cybercrime marketplace, which sold stolen credentials related to bank accounts and other payment mechanisms, in a multinational operation.

Marketing 274
article thumbnail

DoJ announced to have shut down Slilpp marketplace in international operation

Security Affairs

The US Department of Justice seized the servers and domains of the popular cybercrime marketplace SlilPP. The US Department of Justice announced to have seized the infrastructure of SlilPP , a popular marketplace used by cybercriminals to buy and sell stolen login credentials. The seizure is the result of a multinational operation involving law enforcement agencies in the United States, Germany, the Netherlands, and Romania.

Retail 108
article thumbnail

Colonial Pipeline Ransomware Fallout: Congress Grills CEO

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of lawmakers' grilling of Colonial Pipeline CEO Joseph Blount over his handling of the DarkSide ransomware attack. Also featured: How the FBI helped trick criminals into using an encrypted communications service that it was able to monitor.

article thumbnail

Mysterious custom malware used to steal 1.2TB of data from million PCs

Security Affairs

Experts spotted a new mysterious malware that was used to collect a huge amount of data, including sensitive files, credentials, and cookies. Researchers from NordLocker have discovered an unsecured database containing 1.2-terabyte of stolen data. Threat actors used custom malware to steal data from 3.2 million Windows systems between 2018 and 2020.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Ransomware Gang Goes Nuclear, Hitting US Weapons Contractor

Data Breach Today

Demanding Ransom, REvil Ransomware Operation Leaks Some Data Stolen From Sol Oriens A small U.S. nuclear weapons contractor has confirmed that it suffered a ransomware attack, resulting in the theft of data. Credit for the attack has been taken by the ransomware-as-service operation known as REvil, aka Sodinokibi, which the FBI recently tied to the attack against meatpacking giant JBS.

article thumbnail

Italy announced its Cybersecurity Agency

Security Affairs

Italy announced the creation of the national cybersecurity agency, a move aimed at increase the level of cyber security of its infrastructure. The Italian government has announced the creation of a new agency focused on cybersecurity, Prime Minister Mario Draghi provided its strong commitment to the creation of the agency that is tasked to protect the country and its infrastructure from cyber threats.

article thumbnail

ISMG Editors' Panel: The FBI's Global Cryptophone Sting

Data Breach Today

Analyzing Verizon's 2021 Breach Investigations Report, Talent Management and More Criminals tricked into using an FBI-run encrypted messaging app, Verizon's 2021 Breach Investigations Report and overcoming the challenges of recruiting cybersecurity professionals are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.

article thumbnail

Hackers Steal FIFA 21 Source Code, Tools in EA Breach

Threatpost

Raft of other proprietary game data and related software and developer kits also pilfered in the unspecified attack, which the company is investigating.

107
107
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Weekly Update 247

Troy Hunt

Lots of stuff going on this week, beginning with me losing my mind try to get local control of IoT devices. I'm writing up a much more extensive blog post on this, suffice to say it's a complete mess and all of the suggestions I've had have been well-intentioned, but infeasible for various reasons. But as I say in the video, it has all been worth it and I do get a lot of enjoyment from playing with it all ??

article thumbnail

Cyberpunk 2077 Hacked Data Circulating Online

Threatpost

CD Projekt Red confirmed that employee and game-related data appears to be floating around the cyber-underground, four months after a hack on the Witcher and Cyberpunk 2077 developer.

article thumbnail

The FBI's Anom Stunt Rattles the Encryption Debate

WIRED Threat Level

The agency spent years running a secure phone network for criminals. So much for “going dark.”.

article thumbnail

Trickbot Investigation Shows Details of Massive Cybercrime Effort

Dark Reading

Nearly a score of cybercriminals allegedly worked together to create the Trickbot malware and deploy it against more than a million users, an unsealed indictment claims.

IT 116
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

A Mystery Malware Stole 26 Million Passwords From Windows PCs

WIRED Threat Level

The credentials were part of a trove containing 1.2 terabytes of sensitive data extracted between 2018 and 2020.

Passwords 100
article thumbnail

McDonald's Data Breach Exposed Business & Customer Data

Dark Reading

An investigation has revealed company data has been breached in the United States, South Korea, and Taiwan.

article thumbnail

Monumental Supply-Chain Attack on Airlines Traced to State Actor

Threatpost

Airlines are warned to scour networks for traces of the campaign, likely the work of APT41, lurking in networks.

96