Tue.Nov 24, 2020

article thumbnail

Instagram Leaked Minors' PII Again, But Now It's Fixed

Data Breach Today

Exposure Comes as Ireland Probes Facebook's Handling of Children's Data For at least a month, Instagram leaked the email addresses of minors, which occurred as Ireland's Data Protection Commission probed whether its parent company, Facebook, failed to protect children's personal data. Facebook has fixed the issue. But how carefully is the company protecting personal data?

IT 332
article thumbnail

Do I Need Change Management?

AIIM

Sometimes, change is natural. The caterpillar changing to a butterfly, the tadpole changing to a frog – these types of changes happen all the time in nature. Yet, change in business can feel anything but natural. And it’s not just at your place of business. According to McKinsey research, “nearly 70% of change programs fail to achieve their goals, largely due to employee resistance and lack of management support.”.

IT 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fraudsters Spoof FBI Domain

Data Breach Today

Bureau Identifies Nearly 100 Spoofed Websites Created by Cybercriminals The FBI has identified nearly 100 spoofed websites that use some incarnation of the agency's name. Fraudsters and other cybercriminals potentially could leverage the sites disinformation campaigns and credential theft.

298
298
article thumbnail

On That Dusseldorf Hospital Ransomware Attack and the Resultant Death

Schneier on Security

Wired has a detailed story about the ransomware attack on a Dusseldorf hospital, the one that resulted in an ambulance being redirected to a more distant hospital and the patient dying. The police wanted to prosecute the ransomware attackers for negligent homicide, but the details were more complicated: After a detailed investigation involving consultations with medical professionals, an autopsy, and a minute-by-minute breakdown of events, Hartmann believes that the severity of the victim’s medi

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Updated Trickbot Malware Is More Resilient

Data Breach Today

Researchers Find 2 Fresh Versions Following Takedown Efforts The gang operating Trickbot is continuing its activities despite recent takedown efforts, rolling out two updates that make the malware more difficult to kill, according to the security firm Bitdefender.

Security 290

More Trending

article thumbnail

Chinese Hacking Group Rebounds With Fresh Malware

Data Breach Today

Researchers: TA416 Ramping Up Phishing Emails Targeting Diplomatic Missions A Chinese advanced persistent threat group has recently begun ramping up its activities with a new phishing campaign leveraging updated malware that's targeting diplomatic missions around the world to collect data and monitor communications, according to Proofpoint.

Phishing 248
article thumbnail

2FA bypass in cPanel potentially exposes tens of millions of websites to hack

Security Affairs

2FA bypass discovered in web hosting software cPanel. More than 70 million sites are managed via cPanel software, according to the company. Researchers discovered a major issue in cPanel that could be exploited by attackers to bypass two-factor authentication for cPanel accounts. Security researchers from Digital Defense have discovered a major security issue in cPanel , a popular software suite that facilitates the management of a web hosting server.

article thumbnail

Alleged Fraud at Billing Firm Spotlights Insider Risks

Data Breach Today

Employee Indicted for ID Theft, Medicaid Fraud Federal prosecutors have indicted an employee of a Florida medical billing company in a case involving alleged identity theft and Medicaid fraud.

Risk 246
article thumbnail

How Ransomware Defense is Evolving With Ransomware Attacks

Dark Reading

As data exfiltration threats and bigger ransom requests become the norm, security professionals are advancing from the basic "keep good backups" advice.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

UK Telecommunications Security Bill Would Ban Huawei

Data Breach Today

Government Set to Enforce Minimum Security Standards for Telecommunications Networks The Telecommunications Security Bill introduced by the British government aims to set enforceable, minimum security standards for the nation's telecommunications providers, backed by penalties, including for any company that opted to use equipment from high-risk providers such as China's Huawei.

Security 232
article thumbnail

Microsoft fixes Kerberos Authentication issues with an out-of-band Update

Security Affairs

Microsoft released an out-of-band update for Windows to address authentication flaws related to a recently patched Kerberos vulnerability. Microsoft released an out-of-band update to address authentication issues in Windows related to a recently patched Kerberos vulnerability tracked as CVE-2020-17049. “An out-of-band optional update is now available on the Microsoft Update Catalog to address a known issue affecting Kerberos authentication.

article thumbnail

Tesla Hacked and Stolen Again Using Key Fob

Threatpost

Belgian researchers demonstrate third attack on the car manufacturer’s keyless entry system, this time to break into a Model X within minutes.

Security 118
article thumbnail

Baidu Android apps removed from Play Store because caught collecting user details

Security Affairs

Two Baidu Android apps have been removed from the Google Play Store in October after they’ve been caught collecting sensitive user details. Two apps belonging to Chinese tech giant Baidu, Baidu Maps and Baidu Search Box, have been removed from the Google Play Store at the end of October after they’ve been caught collecting sensitive user details.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Blackrota Golang Backdoor Packs Heavy Obfuscation Punch

Threatpost

Blackrota is targeting a security bug in Docker, but is nearly impossible to reverse-analyze.

Security 128
article thumbnail

Credential stuffing attack targeted 300K+ Spotify users

Security Affairs

Researchers uncovered a possible credential stuffing campaign that is targeting Spotify accounts using a database of 380 million login credentials. Security experts from vpnMentor have uncovered a possible credential stuffing operation that affected some Spotify accounts. Threat actors behind the campaign are using a database containing over 380 million records, including login credentials and other data for Spotify accounts, likely amassed from various sources.

Passwords 103
article thumbnail

Cloud Security Startup Lightspin Emerges From Stealth

Dark Reading

The startup, founded by former white-hat hackers, has secured a $4 million seed round to close security gaps in cloud environments.

Cloud 109
article thumbnail

Crooks social-engineered GoDaddy staff to take over crypto-biz domains

Security Affairs

Crooks were able to trick GoDaddy staff into handing over control of crypto-biz domain names in a classic DNS hijacking attack. Crooks were able to hijack traffic and email to various cryptocurrency-related websites as a result of a DNS hijacking attack on domains managed by GoDaddy. The threat actors were able to modify DNS settings by tricking GoDaddy employees into handing over the control of the targeted domains with social engineering attacks.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

US Treasury's OFAC Ransomware Advisory: Navigating the Gray Areas

Dark Reading

Leveraging the right response strategy, following the regulations, and understanding the ransom entity are the fundamentals in any ransomware outbreak.

article thumbnail

Fruit of the Loom is looking for an Archivist in Bowling Green, Kentucky

IG Guru

Check out the job posting here. The post Fruit of the Loom is looking for an Archivist in Bowling Green, Kentucky appeared first on IG GURU.

article thumbnail

‘Minecraft Mods’ Attack More Than 1 Million Android Devices

Threatpost

Fake Minecraft Modpacks on Google Play deliver millions of abusive ads and make normal phone use impossible.

Security 111
article thumbnail

TrickBot operators continue to update their malware to increase resilience to takedown

Security Affairs

Following the recent takedown, the TrickBot operators have implemented various improvements to make it more resilient. In October, Microsoft’s Defender team, FS-ISAC , ESET , Lumen’s Black Lotus Labs , NTT , and Broadcom’s cyber-security division Symantec joined the forces and announced a coordinated effort to take down the command and control infrastructure of the infamous TrickBot botnet.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Smart Doorbells on Amazon, eBay, Harbor Serious Security Issues

Threatpost

Matt Lewis, with NCC Group, talks to Threatpost about a slew of security and privacy issues found in smart doorbells that are being sold on Amazon and eBay.

article thumbnail

Latest Version of TrickBot Employs Clever New Obfuscation Trick

Dark Reading

The malware takes advantage of how the Windows command line interpreter works to try and slip past anti-detection tools, Huntress Labs says.

130
130
article thumbnail

Post-Breach, Peatix Data Reportedly Found on Instagram, Telegram

Threatpost

Events application Peatix this week disclosed a data breach, after user account information reportedly began circulating on Instagram and Telegram.

article thumbnail

Baidu Apps Leaked Location Data, Machine Learning Reveals

Dark Reading

Several apps available on the Google Play Store, including two made by Chinese Internet giant Baidu, leaked information about the phone's hardware and location without the user's knowledge, research finds.

113
113
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

SASE: Securing the Network Edge

eSecurity Planet

Secure access service edge (SASE) is a combination of technologies that increase security at the edge of the network. Here's what you need to know.

article thumbnail

Germany: Bonn Regional Court overrules GDPR Fining Guidelines by German Data Protection Authorities

DLA Piper Privacy Matters

Background: How to calculate GDPR fines? How to properly calculate administrative fines for non-compliance with the EU General Data Protection Regulation (‘ GDPR ’) is one of the most important questions when applying the GDPR on practical level, e.g. : What is actually meant by the reference to “undertaking” in Article 83 (4) to (6) GDPR? Is a company accountable for infringing actions or omissions by all personnel or only if the non-compliance can be linked to a management function?

GDPR 75
article thumbnail

Alexa, Disarm the Victim's Home Security System

Dark Reading

Researchers who last year hacked popular voice assistants with laser pointers take their work to the next level.

Security 104