Tue.May 19, 2020

article thumbnail

EasyJet Data Breach Exposes 9 Million Customers' Details

Data Breach Today

European Budget Airline Says Payment Card Data Stolen, But Only for 2,200 Customers European budget airline EasyJet says it suffered a data breach that exposed 9 million customers' personal details. While no passport details were exposed, the company's ongoing investigation has also found that attackers "accessed" a small number - just 2,208 - of customers' payment card details.

article thumbnail

Ukraine Nabs Suspect in 773M Password ?Megabreach?

Krebs on Security

In January 2019, dozens of media outlets raised the alarm about a new “megabreach” involving the release of some 773 million stolen usernames and passwords that was breathlessly labeled “the largest collection of stolen data in history.” A subsequent review by KrebsOnSecurity quickly determined the data was years old and merely a compilation of credentials pilfered from mostly public data breaches.

Passwords 334
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Treasury Warning: Beware of COVID-19 Financial Fraud

Data Breach Today

Financial Crimes Enforcement Network Advises Banks to Be on the Lookout for Scams The U.S. Treasury's Financial Crimes Enforcement Network is alerting financial institutions about surging COVID-19 themed scams and other illicit activities, ranging from medical-related fraud involving the sale of fake cures, tests and vaccines to price gouging and hoarding of supplies in shortages.

Sales 331
article thumbnail

The Best Memberships for Information Professionals

AIIM

“It’s 2020,” you might be thinking, “Who needs associations?” Associations and professional memberships can often be thought of as a relic of the past or a resume builder, but not as a valuable personal development tool. For an introvert, I’m a pretty social, member-y kinda guy. I’ve been a paid professional member of both AIIM and ARMA for nearly 20 years.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

DoJ Blasts Apple on Lack of Encryption Backdoor - Again

Data Breach Today

Law Enforcement Leaders Say Encryption Delayed Terrorist Investigation; Apple Pushes Back Although FBI technicians were able to gain access to data in two iPhones belonging to a Saudi national who killed three U.S. sailors at a military base in Pensacola, Florida, the Justice Department continues to criticize Apple's refusal to offer law enforcement a backdoor to its encrypted devices.

More Trending

article thumbnail

Spoofed Website Templates Help Spread COVID-19 Scams: Report

Data Breach Today

Fake Websites Linked to Phishing Attacks Designed to Steal Credentials, Banking Data Fraudsters are now using numerous spoofed website templates with COVID-19 themes as part of phishing attacks designed to steal login credentials and banking data, according to Proofpoint.

Phishing 251
article thumbnail

IRELAND: First GDPR fine issued in Ireland

DLA Piper Privacy Matters

Eilis McDonald & John Magee. Tusla, Ireland’s child and family agency, has become the first organisation fined under the GDPR in Ireland. The Irish Data Protection Commission filed papers in the Circuit Court on Friday to confirm the €75,000 fine against the Agency. It is reported the fine will not be challenged by Tusla. In its 2019 Annual Report, the DPC reported three separate statutory inquiries into Tusla in respect of a number of breaches which had been reported to it since May 2

GDPR 122
article thumbnail

Cybersecurity Leadership: What's Your 180-Day Plan?

Data Breach Today

CEOs, CISOs on Authentication, Access and Defending the Hybrid Workforce Business and security leaders accept that a hybrid workforce is the new norm - some staff members based in a central office and many others permanently working at home. But what new cybersecurity demands does this strategy present short-term and into 2021? Our expert panel shares insights.

article thumbnail

Easyjet hacked: 9 million customer’s data exposed along with 2,200+ credit card details

Security Affairs

British airline EasyJet announced it was the victim of a “highly sophisticated” cyber attack that exposed email addresses and travel details of around 9 million of its customers. British airline EasyJet announced that a “highly sophisticated” cyber-attack exposed email addresses and travel details of around 9 million of its customers. “Following discussions with the Information Commissioner’s Office (“ICO”), the Board of easyJet announces that it h

Access 123
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials

Threatpost

The attack discovered by Cofense can steal sensitive user data stored on the cloud as well as find other victims to target.

Phishing 136
article thumbnail

Web Giants Scrambled to Head Off a Dangerous DDoS Technique

WIRED Threat Level

Firms like Google and Cloudflare raced to prevent an amplification attack that threatened to take down large portions of the internet with just a few hundred devices.

Security 111
article thumbnail

WolfRAT Android Malware Targets WhatsApp, Facebook Messenger

Threatpost

Researchers link the malware to Wolf Research operators with "high confidence" after it was spotted in campaigns targeting Thai users.

IT 127
article thumbnail

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

Security Affairs

Experts from Palo Alto Networks discovered that the Mirai and Hoaxcalls botnets are targeting a vulnerability in legacy Symantec Web Gateways. Palo Alto Networks Unit 42 researchers observed both the Mirai and Hoaxcalls botnets using an exploit for a post-authentication Remote Code Execution vulnerability in legacy Symantec Web Gateways 5.0.2.8. “I recently came across new Hoaxcalls and Mirai botnet campaigns targeting a post-authentication Remote Code Execution vulnerability in Symantec S

IoT 109
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices

Threatpost

A host of unpatched security bugs that allow BIAS attacks affects Bluetooth chips from Apple, Intel, Qualcomm, Samsung and others.

Security 123
article thumbnail

129 million records of Russian car owners available on the dark web

Security Affairs

A hacker is offering for sale on a dark web forum a database containing 129 million records of car owners in Moscow. A hacker is attempting to sell on a dark web forum a database containing 129 million records of car owners in Moscow. As a proof of the authenticity of the data, the hacker has leaked some anonymized data containing all the car details present in the traffic police registry.

article thumbnail

The Nigerian Fraudsters Ripping Off the Unemployment System

WIRED Threat Level

Security researchers have spotted the “Scattered Canary” group scamming vital benefits programs amid the Covid-19 pandemic.

Security 124
article thumbnail

Bluetooth BIAS attack threatens billions of devices

Security Affairs

Boffins disclosed a security flaw in Bluetooth, dubbed BIAS, that could potentially be exploited by an attacker to spoof a remotely paired device. Researchers from École Polytechnique Fédérale de Lausanne (EPFL) discovered a vulnerability in Bluetooth, dubbed Bluetooth Impersonation AttackS or BIAS, that could potentially be exploited by an attacker to spoof a remotely paired device.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

New Data Protection-Friendly eCommercial Model Clinical Trial Agreements Now Available

HL Chronicle of Data Protection

Updated versions of the UK model Clinical Trial Agreement (mCTA) and the Clinical Research Organisation model Clinical Trial Agreement (CRO-mCTA) have been published. Given the increasing importance of safe but swift clinical trials in the time of coronavirus, this post outlines the main changes introduced from a data protection perspective and what they mean for contracting parties.

GDPR 90
article thumbnail

AI and Cybersecurity

Schneier on Security

Ben Buchanan has written " A National Security Research Agenda for Cybersecurity and Artificial Intelligence." It's really good -- well worth reading.

article thumbnail

Verizon Data Breach Report: DoS Skyrockets, Espionage Dips

Threatpost

Denial of Service (DoS), ransomware, and financially-motivated data breaches were the winners in this year's Verizon DBIR.

article thumbnail

Improve your ROI with open source management on IBM Cloud Pak for Data

IBM Big Data Hub

Today, it’s slightly inaccurate to say that “open source is the future.” Open source is here, and it has already won. Open source has been adopted by nearly every business discipline, allowing developers to solve their problems effectively with more flexibility and freedom. In enterprise business, open source is widely adopted, especially as products mature and vendors extend their reach.

Cloud 86
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Web Application Attacks Double from 2019: Verizon DBIR

Dark Reading

Verizon's annual data breach report shows most attackers are external, money remains their top motivator, and web applications and unsecured cloud storage are hot targets.

article thumbnail

What’s new in OpenText IoT 20.2

OpenText Information Management

Amidst an environment of increasingly global and complex supply chains, organizations must collaborate closely with customers, suppliers and partners to achieve real-time visibility across every part of the supply chain. The Internet of Things offers the potential to develop new capabilities to revolutionize supply chains. 70% of enterprises are using IoT data to improve the … The post What’s new in OpenText IoT 20.2 appeared first on OpenText Blogs.

IoT 75
article thumbnail

EasyJet Hackers Take Off with Travel Details for 9M Customers

Threatpost

The vacation-centric airline is warning victims about social-engineering attacks.

article thumbnail

OpenText fax and Epic are integrated!

OpenText Information Management

Each day, volumes of critical information are sent to and from doctors, patients, pharmacies, laboratories, healthcare providers and insurance companies. These documents are often urgent, protected from unintentional exposure and confidential. Secure, timely and reliable delivery is essential for patient-focused and cost-conscious healthcare organizations.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Australian product steel producer BlueScope hit by cyberattack

Security Affairs

The Australian flat product steel producer BlueScope Steel Limited was hit by a cyberattack that caused disruptions to some of its operations. Australian steel producer BlueScope was recently hit by a cyberattack that disrupted some of its operations. The incident was spotted on Friday at one of its businesses located in the US, but the company did not share any detail about the attack. “BlueScope today confirmed that its IT systems have been affected by a cyber incident, causing disruptio

article thumbnail

DXC and PwC –Platinum Sponsors of Micro Focus Virtual Universe

Micro Focus

Micro Focus would like to formally recognize and thank our Micro Focus Virtual Universe Platinum sponsors DXC and PwC. Both of these organizations have long standing partnerships with Micro Focus and we are delighted to feature their Platinum Partner Sessions on Thursday, May 21st from 12:00-1:00 pm CST. Better together Micro Focus and DXC Technology.

64
article thumbnail

The Windows 7 Postmortem: What?s at Stake

Threatpost

Nearly a quarter of endpoints still run Windows 7, even though support and security patches have ended.