Tue.Jun 15, 2021

article thumbnail

Volkswagen, Audi Notify 3.3 Million of Data Breach

Data Breach Today

Data Was Left Unsecured by Unidentified Marketing Services Company Volkswagen and its Audi subsidiary are notifying 3.3 million people in the U.S and Canada of a breach of personal information by a marketing services supplier. Volkswagen says 90,000 of those affected may have also had their driver's license number, loan data and other personal information exposed.

article thumbnail

How Does One Get Hired by a Top Cybercrime Gang?

Krebs on Security

The U.S. Department of Justice (DOJ) last week announced the arrest of a 55-year-old Latvian woman who’s alleged to have worked as a programmer for Trickbot , a malware-as-a-service platform responsible for infecting millions of computers and seeding many of those systems with ransomware. Just how did a self-employed web site designer and mother of two come to work for one of the world’s most rapacious cybercriminal groups and then leave such an obvious trail of clues indicating her

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Fear' Likely Drove Avaddon's Exit From Ransomware Fray

Data Breach Today

Leading Industrial Nations Call on Moscow to Crack Down on Domestic Cybercrimals Based on Russian-language cybercrime chatter, "fear" likely drove the lucrative Avaddon ransomware-as-a-service operation to announce its retirement as the U.S. exerts increasing diplomatic pressure on Moscow to disrupt such activity, experts say. But are criminals simply laying low until the heat dies down?

article thumbnail

Ikea fined €1.1m by French court for spying on staff

The Guardian Data Protection

Swedish retailer found guilty of gathering data to sift out potential trouble-makers among employees The home furnishings group Ikea has been ordered to pay €1.1m (£861,000) in fines and damages by a French court after being found guilty of spying on staff. Two former Ikea France executives were also convicted and fined over an elaborate scheme to gather information on hundreds of employees, job applicants and even customers over several years, using private detectives and police sources.

Retail 136
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Volkswagen, Audi Notify 3.3 Million People of Data Breach

Data Breach Today

Data Was Left Unsecured by Unidentified Marketing Services Company Volkswagen and its Audi subsidiary are notifying 3.3 million people in the U.S and Canada of a breach of personal information by a marketing services supplier. Volkswagen says 90,000 of those affected may have also had their driver's license, loan data and other personal information exposed.

More Trending

article thumbnail

Cybersecurity Insurance: Has It's Time Come?

Data Breach Today

As the cyberthreat landscape grows exponentially more complicated, the insurance industry is trying to keep pace. Yet, many organizations still lack cybersecurity insurance. Lynn Peachey, director of business development at Arete Incident Response, breaks down the basics of these insurance policies.

Insurance 299
article thumbnail

Malicious PDFs Flood the Web, Lead to Password-Snarfing

Threatpost

SolarMarker makers are using SEO poisoning, stuffing thousands of PDFs with tens of thousands of pages full of SEO keywords & links to redirect to the malware.

Passwords 127
article thumbnail

CISA: Defibrillator Dashboard Security Flaws Pose Risk

Data Breach Today

Agency Warns That Attackers Could Exploit Vulnerabilities, Gain Device Management Control A half-dozen security vulnerabilities recently identified in older versions of the Zoll Defibrillator Dashboard could allow an attacker to take remote control of device management, including executing arbitrary commands, as well as gain access to sensitive information and credentials, CISA warns.

Risk 290
article thumbnail

Wear your MASQ! New Device Fingerprint Spoofing Tool Available in Dark Web

Security Affairs

The MASQ tool could be used by attackers to emulate device fingerprints thus allowing them to bypass fraud protection controls. The Resecurity® HUNTER unit has identified a new tool available for sale in the Dark Web called MASQ , enabling bad actors to emulate device fingerprints thus allowing them to bypass fraud protection controls, including authentication mechanisms.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

The Best of Virtual RSA Conference 2021

Data Breach Today

A Guide to ISMG's Video Interviews With Thought Leaders With the RSA Conference virtual this year, ISMG replaced its two live on-site studios with a suite of home studios and produced a diverse group of interviews on timely topics with thought leaders who will be solving cybersecurity's most urgent problems.

article thumbnail

Cyberium malware-hosting domain employed in multiple Mirai variants campaigns

Security Affairs

A new variant of the Mirai botnet, tracked as Moobot, was spotted scanning the Internet for vulnerable Tenda routers. Researchers from AT&T Alien Lab have spotted a new variant of the Mirai botnet, tracked asu Moobot, which was scanning the Internet for the CVE-2020-10987 remote code-execution (RCE) issue in Tenda routers. The botnet was linked to a new malware hosting domain that has been serving Mirai variants for several different botnets over the past year.

IoT 120
article thumbnail

China-Connected APT41 Likely Behind Attacks on Airlines

Data Breach Today

Group-IB Analyzes Impact of Supply Chain Attack That Affected SITA, Air India, Others The China-backed advanced persistence threat group APT41 apparently was responsible for the breach of SITA, an international provider of IT services for the air transport industry worldwide, that led to customer data at Air India and other airlines being compromised, according to the security firm Group-IB.

Security 207
article thumbnail

REvil ransomware gang hit US nuclear weapons contractor Sol Oriens

Security Affairs

The REvil ransomware gang made the headlines again, the group hit the US nuclear weapons contractor Sol Oriens and stole the victim’s data. US nuclear weapons contractor Sol Oriens was hit by a cyberattack carried out by the REvil ransomware operators, which claims to have stolen data. Sol Orien provides consultant services to the National Nuclear Security Administration (NNSA), it confirmed to have suffered a cyber attack via Twitter.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Putin Raises Issue of Extradition Agreement

Data Breach Today

Russian President Says He's Open to Cybercriminal Extraditions - If They Are Mutual Russian President Vladimir Putin on Sunday indicated he would consider handing over Russian cybercriminals to the United States if the U.S. does the same for Moscow.

200
200
article thumbnail

SASE & Zero Trust: The Dream Team

Threatpost

Forcepoint’s Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust real.

Security 112
article thumbnail

The National Security Threat of Narcissism

Data Breach Today

Society has become increasingly isolated and disintegrated, leaving us vulnerable to exploitation by our adversaries. Enemies can easily take advantage of this lack of cohesion to sow seeds of misinformation and disinformation. Elisabeth Braw elaborates on the threat of narcissism.

Security 179
article thumbnail

Fujifilm restores operations after recent ransomware attack

Security Affairs

Japanese multinational conglomerate Fujifilm announced that it has restored operations following the recent ransomware attack. On June 4, the Japanese multinational conglomerate Fujifilm announced that it was hit by a ransomware attack and shut down its network in response to the incident. Around two weeks later the Japanese giant announced that it has restored operations following the attack.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Millions of Connected Cameras Open to Eavesdropping

Threatpost

A supply-chain component lays open camera feeds to remote attackers thanks to a critical security vulnerability.

Security 132
article thumbnail

Andrew Appel on New Hampshire’s Election Audit

Schneier on Security

Really interesting two part analysis of the audit conducted after the 2020 election in Windham, New Hampshire. Based on preliminary reports published by the team of experts that New Hampshire engaged to examine an election discrepancy, it appears that a buildup of dust in the read heads of optical-scan voting machines (possibly over several years of use) can cause paper-fold lines in absentee ballots to be interpreted as votes… New Hampshire (and other states) may need to maintain the accu

Paper 103
article thumbnail

Microsoft Disrupts Large-Scale, Cloud-Based BEC Campaign

Threatpost

Varied cloud infrastructure was used to phish email credentials, monitor for and forward finance-related messages and automate operations.

Cloud 113
article thumbnail

Wanted: More insurance innovation

CGI

Wanted: More insurance innovation. This CGI blog post discusses the need and opportunities for insurers to drive more innovation. dharini.s@cgi.com. Tue, 06/15/2021 - 07:04.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Insider Risks In the Work-From-Home World

Threatpost

Forcepoint’s Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk, particularly with pandemic-expanded network perimeters.

Risk 89
article thumbnail

Instagram flaw allowed to see private, archived Posts/Stories of users without following them

Security Affairs

Instagram has addressed a new flaw that allowed anyone to access private accounts viewing archived posts and stories without having to follow them. Researcher Mayur Fartade has found a vulnerability in Instagram that allowed anyone to access private accounts, viewing archived posts and stories without having to follow them. The expert reported the flaw to the Facebook’s security team on April 16, 2021, and the company addressed the issue on June 15.

article thumbnail

Jamf Pro 10.30 is here!

Jamf

Jamf Pro 10.30 brings some exciting and much-anticipated updates that deliver more modern and easy-to-use admin workflows.

104
104
article thumbnail

CJEU Issues Ruling on Jurisdictional Aspects of the GDPR’s One-Stop-Shop

Hunton Privacy

On June 15, 2021, the Court of Justice of the European Union (the “CJEU”) released its judgment in case C-645/19 of Facebook Ireland Limited, Facebook Inc., Facebook Belgium BVBA v. the Belgian Data Protection Authority (“Belgian DPA”). We previously reported on the background of the case and the Advocate General’s opinion. The CJEU mainly examined the question of whether a national supervisory authority that is not the lead supervisory authority (“lead SA”) under the EU General Data Protectio

GDPR 81
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Apple Says It's Time to Digitize Your ID, Ready or Not

WIRED Threat Level

Digital driver’s licenses have had a slow start in the US so far, but iOS 15 Wallet will give the nascent technology a serious push.

IT 95
article thumbnail

Microsoft Gets Second Shot at Banning hiQ from Scraping LinkedIn User Data

Threatpost

Decision throws out previous ruling in favor of hiQ Labs that prevented Microsoft’s business networking platform to forbid the company from harvesting public info from user profiles.

article thumbnail

This is how fast a password leaked on the web will be tested out by hackers via ZDNet

IG Guru

Check out the article here. The post This is how fast a password leaked on the web will be tested out by hackers via ZDNet appeared first on IG GURU.