Wed.Jun 05, 2019

article thumbnail

7.7 Million LabCorp Patients Added to AMCA Breach Tally

Data Breach Today

Earlier, Quest Diagnostics Reported Nearly 12 Million Affected by Same Incident How big will the American Medical Collections Agency data breach get? LabCorp has now revealed that data on 7.7 million of the patients it serves was potentially compromised in the breach. Earlier, Quest Diagnostics said nearly 12 million of its clients were affected. Two U.S. senators are demanding answers.

article thumbnail

Apple's 'Find My' Feature Uses Some Clever Cryptography

WIRED Threat Level

Apple says an elaborate rotating key scheme will soon let you track down your stolen laptop, but not let anyone track you. Not even Apple.

Security 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero Trust: Secure Access in Complex Environments

Data Breach Today

The zero trust model has been around for a decade, and the ideas around it have evolved as applications have left the enterprise perimeter, says Lisa Lorenzin of Zscaler. With mobile apps and cloud computing, enterprises are facing challenges creating secure, trusted access paths.

Access 166
article thumbnail

Expert developed a MetaSploit module for the BlueKeep flaw

Security Affairs

A security expert has developed a Metasploit module to exploit the critical BlueKeep vulnerability and get remote code execution. The security researcher Z??osum0x0 has developed a module for the popular Metasploit penetration testing framework to exploit the critical BlueKeep flaw. The vulnerability , tracked as CVE-2019-0708, impacts the Windows Remote Desktop Services (RDS) and was addressed by Microsoft with May 2019 Patch Tuesday updates.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Healthcare Breach Expands to 19.6 Million Patient Accounts

Dark Reading

LabCorp says its third-party debt-collection provider, AMCA, notified the company that information on 7.7 million patients had leaked. Expect more healthcare companies to come forward.

IT 83

More Trending

article thumbnail

Information Security Learn Path at Enterprise World

OpenText Information Management

Security has become job #1 for every organization and that’s especially true when it comes to Enterprise Information Management (EIM). The Information Security Learn Path at OpenText™ Enterprise World 2019 in Toronto provides practical tools and best practices for using OpenText products and solutions to secure data and information across the enterprise.

article thumbnail

MPs warn government to improve cyber defences against increased national threat

IT Governance

The UK is more vulnerable to cyber attacks than ever before, a Commons report has warned. MPs said that the UK’s vast network of digital infrastructure is vulnerable to cyber attacks and that the threat has been exacerbated by poor government planning. The Cabinet Office has published two five-year strategies for tackling cyber crime, but a “weak evidence base and the lack of a business case” to adopt the plans means the government may well fail to meet their objectives.

article thumbnail

Vietnam Rises as Cyberthreat

Dark Reading

The country's rapid economic growth and other factors are driving an increase in cybercrime and cyber espionage activity.

89
article thumbnail

BlueKeep ‘Mega-Worm’ Looms as Fresh PoC Shows Full System Takeover

Threatpost

A working exploit for the critical remote code-execution flaw shows how an unauthenticated attacker can achieve full run of a victim machine in about 22 seconds.

73
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Researchers Finds Thousands of iOS Apps Ignoring Security

Dark Reading

A critical data encryption tool, included by default in iOS, is being turned off in more than two-thirds of popular apps.

article thumbnail

Tens of Million patients impacted by the AMCA data breach

Security Affairs

Outsourced silos of personal info raided, at least 200,000 payment details swiped. Recovery agency for patient collections American Medical Collection Agency (AMCA) suffered a data breach that could impact many of its customers. American Medical Collection Agency (AMCA) suffered a data breach that could impact many of its customers, the company still hasn’t disclosed details.

article thumbnail

Hunton Brussels Seminar on an Update of the EU Standard Contractual Clauses for Data Transfers

Hunton Privacy

On June 12, 2019, Hunton Andrews Kurth and its Centre for Information Policy Leadership (“CIPL”) will host a roundtable discussion in the firm’s Brussels office on the update of the EU Standard Contractual Clauses for international data transfers. The seminar will feature Ms. Cristina Monti, Policy Officer in the International Data Flows and Protection Unit of the EU Commission DG Justice and Consumers.

IT 69
article thumbnail

Industry Guide to Legal: How the legal industry is changing in the age of digital transformation

OpenText Information Management

I was very excited to join OpenText™ as its global industry strategist for the legal sector due to the company’s focus and innovation on delivering a wide range of purpose-built legal solutions to many of the top global law firms, Fortune 100, and government agencies. As a recent arrival, and for my first blog, I … The post Industry Guide to Legal: How the legal industry is changing in the age of digital transformation appeared first on OpenText Blogs.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

NSA Issues Advisory for 'BlueKeep' Vulnerability

Dark Reading

The National Security Agency joins Microsoft in urging Windows admins to patch wormable bug CVE-2019-0708.

article thumbnail

Election Security Is Still Hurting at Every Level

WIRED Threat Level

With the 2020 election fast approaching, too many problems from 2016 persist.

Security 102
article thumbnail

Supply Chain Integration Learn Path at Enterprise World

OpenText Information Management

As you move towards the intelligent and connected supply chain, you have the opportunity to create closer, more valuable relationships with your trading partners. The Supply Chain Integration Learn Path at OpenText™ Enterprise World 2019 in Toronto delivers practical training, tools and best practices when deploying B2B integration to transform your supply chain operations.

B2B 66
article thumbnail

The Australian National University suffered a major, sophisticated attack

Security Affairs

The Australian National University suffered a vast hack carried out by a “sophisticated operator” who gained access to 19 years of sensitive data. The Australian National University was the victim of a vast hack carried out by a “sophisticated operator” who gained access to 19 years of sensitive data. The top Australian university is known for its intense collaboration with Australia’s government and the national security services.

Access 72
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Race against the IndyCar pros with fan app from DXC and Team Penske

DXC Technology

It’s one thing to play a race car simulation game or to watch an IndyCar Series race on television. But what if you could enter your own car in a simulation and compete against professional drivers in an actual race in real time? That’s the exciting concept behind a new fan engagement app that was […].

article thumbnail

My Hope for ARMA International

Information Governance Perspectives

My Hope for ARMA International For almost 65 years, ARMA International has provided an exceptional level of educational value, professional resources and guidance to members of the information management field and business community. Those efforts have aided organizations in recognizing the importance of RIM/IG practitioners’ unique skillsets and helped incorporate them into their IT and […].

article thumbnail

How to Get the Most Benefits from Biometrics

Dark Reading

Providing an easy-to-use, uniform authentication experience without passwords is simpler than you may think.

article thumbnail

BlackSquid malware uses multiple exploits to drop cryptocurrency miners

Security Affairs

A new piece of malware appeared in the threat landscape, dubbed BlackSquid it targets web servers with several exploits to deliver cryptocurrency miners. Security experts at Trend Micro have discovered a new Monero cryptomining miner, dubbed BlackSquid, that is targeting web servers, network drives, and removable drives. The new piece of malware leverages many exploits to compromise target systems and implements evasion techniques to avoid detection.

Mining 64
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Not forcing updates, kinda

Jamf

Read how this IT manager uses the power of 'persuasion' to get users to update their devices and apps.

IT 75
article thumbnail

0patch experts released unofficial Patch Available for Recent Windows 10 Task Scheduler Zero-Day

Security Affairs

Experts at 0patch released an unofficial patch to address a recently disclosed zero-day vulnerability in Windows 10 Task Scheduler. Security experts at 0patch released an unofficial patch to address a recently disclosed zero-day vulnerability in Windows 10 Task Scheduler. A couple of weeks ago, researcher SandboxEscaper released a working exploit for the vulnerability, Like the Windows zero-day disclosed in August, this new issue affects Microsoft Windows Task Scheduler.

Access 66
article thumbnail

440 Million Android Users Plagued By Extremely Obnoxious Pop-Ups

Threatpost

The mobile ad plugin, found in hundreds of Google Play apps, uses well-honed techniques from malware development to hide itself.

article thumbnail

What is a data catalog and why you need one?

IBM Big Data Hub

A data catalog organizes your information assets and empowers data citizens with business-ready data.

75
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Mozilla and Google Browsers Get Security, Anti-Tracking Boosts

Threatpost

Both FireFox and Chrome have received updates to better guard users against privacy and security threats, such as tracking by Facebook.

article thumbnail

No Bates, No Problem for Native Files: eDiscovery Throwback Thursdays

eDiscovery Daily

If you read my blog post on Tuesday , you saw my coverage of Craig Ball’s blog post regarding whether we’ve “lost the war” on eDiscovery. Craig particularly lamented the lack of focus on practical eDiscovery skills, especially in the eDiscovery conferences we attend, where they have moved on to “anti-discovery topics”, such as proportionality, privacy, General Data Protection Regulation (GDPR) and cybersecurity.

article thumbnail

Newly-Identified BEC Cybergang Targets U.S. Enterprise Victims

Threatpost

At Infosecurity Europe, researchers detailed a cybergang that grew from a one-man shop launching Craigslist scams to a full-on enterprise BEC group.