Mon.Sep 23, 2019

article thumbnail

Google Calendar Privacy Concerns Raised

Data Breach Today

Companies Need to Be Aware of Risks A misconfiguration in a Google Calendar function that allows Google to index calendars raises serious privacy concerns because it could lead to inadvertent, broad public exposure of calendars that contain sensitive information, including corporate details, a researcher reports.

Privacy 223
article thumbnail

North Korea-linked malware ATMDtrack infected ATMs in India

Security Affairs

Kaspersky experts spotted a new piece of ATM malware, dubbed ATMDtrack, that was developed and used by North Korea-linked hackers. Kaspersky researchers discovered a new piece of ATM malware, tracked as ATMDtrack, that was developed and used by North Korea-linked hackers. Threat actors deployed the malware on ATM systems to steal payment card details of the back customers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bulgarian Man Sentenced for Massive Phishing Scheme

Data Breach Today

Svetoslav Donchev Helped Scam Victims Out of More Than $50 Million, Authorities Say A Bulgarian man has been sentenced to nine years in prison after pleading guilty in connection with his role in running a large-scale phishing campaign that scammed victims out of $51 million.

Phishing 192
article thumbnail

JP Morgan Hacker Pleads Guilty

Dark Reading

Andrei Tyurin, a Russian national, pleaded guilty to hacking charges related to a massive cyberattack campaign targeting US financial institutions and other companies.

84
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Attack on Rural Hospital Disrupts Services

Data Breach Today

Campbell County Health in Wyoming Sending Patients to Other Hospitals Many Miles Away A ransomware attack late last week on a county hospital in rural Wyoming was still causing patient care disruptions on Monday. Some patients were sent more than 125 miles away to other area hospitals for treatment.

More Trending

article thumbnail

AI Surveillance Tech Promises Safety, But at What Cost?

Data Breach Today

Security, Privacy, Data Protection and Liability Questions Remain Unanswered Artificial intelligence technologies that provide surveillance capabilities can have upsides as well as downsides. Unfortunately, as developers and governments rush to experiment, security, privacy, data protection and liability questions remain unanswered.

article thumbnail

France Outlines Its Approach to Cyberwar

Schneier on Security

In a document published earlier this month (in French), France described the legal framework in which it will conduct cyberwar operations. Lukasz Olejnik explains what it means , and it's worth reading.

IT 80
article thumbnail

Facebook's Purge So Far: 69,000 Apps Suspended

Data Breach Today

Not All Apps Posed a Threat, Facebook Executive Claims Facebook says it has suspended tens of thousands of apps as part of its ongoing investigation into data misuse that grew out of the Cambridge Analytica scandal. The company won't disclose the affected apps, but an unsealed court filing says it has suspended 69,000.

IT 182
article thumbnail

Thinkful forces a password reset for all users after a data breach

Security Affairs

The online education platform for developers Thinkful suffered a security breach and is notifying the incident to its customers requiring them to reset their passwords. The online education platform for developers Thinkful has suffered a data breach, just a few days after it has announced it would be acquired by the education tech firm Chegg for $80 million.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Malindo Air Blames Data Leak on Third-Party Supplier

Data Breach Today

Data on Millions Passengers Posted Online, Security Researchers Say Malindo Air in Malaysia is blaming a recent data breach that exposed the personal information of millions of passengers on two former employees of a third-party supplier to the airlines. Customers of a sister company, Thai Lion Air in Thailand, were also affected, according to Reuters.

article thumbnail

California Attorney General: Draft CCPA Regulations to Be Published in October

Hunton Privacy

On September 20, 2019, Bloomberg Law reported that California Attorney General Xavier Becerra anticipates that draft regulations implementing the California Consumer Privacy Act of 2018 (“CCPA”) will be published this October. According to Bloomberg’s reporting, the Attorney General aims to issue final regulations by January 1, 2020, the CCPA’s compliance deadline.

article thumbnail

Deception Technology: Making the Case

Data Breach Today

Deception technology has emerged as a hot practice - but not one that is necessarily on every enterprise's budgeting radar. Don Gray, CTO of PacketViper, talks about the emergence of deception technology and how security leaders can make the case - and find the budget - for its usage.

Security 145
article thumbnail

How Network Logging Mitigates Legal Risk

Dark Reading

Logging that is turned on, captured, and preserved immediately after a cyber event is proof positive that personal data didn't fall into the hands of a cybercriminal.

Risk 74
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Spear Phishing Update: Email Account Takeover Risks

Data Breach Today

Barracuda is out with its latest Spear Phishing Update, and among the key findings: a rise in email account takeover and lateral phishing. Why are enterprise defenses failing to detect these strikes? What new solutions will improve defenses? Barracuda's Michael Flouton shares insights.

Phishing 136
article thumbnail

YouTube Creators Hit in Account Hijacking Campaign

Dark Reading

The victims, who post car reviews and other videos about the auto industry, were targeted in a seemingly coordinated campaign to steal account access.

Access 79
article thumbnail

How to manage records during a corporate move – part 1

TAB OnRecord

Corporate moves are the kind of thing that send a shiver down the spine of most records managers. As far as RIM challenges go, corporate moves are on the scale of "seismic" events – full of major upheavals and plenty of risks. If your organization is planning a move, the only way to ensure success is to take a proven, methodical approach. In a two-part blog post we will outline the best practices you can use to minimize risk and keep records accessible before, during and after the move.

article thumbnail

Microsoft Issues Out-of-Band Patch for Internet Explorer

Dark Reading

The security update fixes a vulnerability that could allow an attacker to remotely execute code at the same privilege as the legitimate user.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Portugues hacker faces hundreds of Charges in Football Leaks case

Security Affairs

An alleged Portuguese hacker faces 154 charges connected with the publication of internal documents in the Football Leaks case. An alleged Portuguese hacker, Rui Pinto, faces 154 charges connected with the publication of internal documents of top European clubs and soccer officials in the Football Leaks case. The attorney general’s office confirmed last week that Rui Pinto, who is in custody in Lisbon after being extradited from Hungary, is accused of numerous alleged crimes connected to the lea

article thumbnail

Microsoft Internet Explorer Zero-Day Flaw Addressed in Out-of-Band Security Update

Threatpost

Microsoft has issued a patch for an Internet Explorer remote code execution flaw that is being actively exploited in the wild.

article thumbnail

7 capabilities for a successful product information management solution

IBM Big Data Hub

In my last blog post , I explained why businesses need product information management (PIM ). I will now dive deeper into the key factors an organization must take into consideration when evaluating a PIM solution.

67
article thumbnail

200K Sign Petition Against Equifax Data Breach Settlement

Threatpost

A Change.org petition is demanding stronger accountability for Equifax in the 2017 leak that affected 150 million customers.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Court Rules in Favor of Mining LinkedIn User Data

Adam Levin

A federal appellate court ruled that mining and aggregating user data publicly posted to social media sites is allowable by law. In an opinion released earlier this month, the 9th Circuit U.S.Court of Appeals upheld an injunction against employment-centric social network LinkedIn from blocking access to hiQ, a data mining company that sells aggregated user information. .

Mining 63
article thumbnail

More U.S. Utility Firms Targeted in Evolving LookBack Spearphishing Campaign

Threatpost

A spearphishing campaign first uncovered in July is hitting more utilities firms and spreading the LookBack malware, which has capabilities to view system data and reboot machines.

article thumbnail

The good, the bad, and the ugly of becoming data driven

Information Management Resources

It seems for all the investments that organizations make in gathering and generating data, few are actually able to turn that data into actionable insights.

IT 70
article thumbnail

Google Assistant Audio Privacy Controls Updated After Outcry

Threatpost

Google is tightening its privacy controls over its Google Assistant voice assistant after a report earlier this year found that it was eavesdropping on user conversations.

Privacy 63
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

What is IIoT? – Industrial internet of things

OpenText Information Management

The industrial internet of things (IIoT)­ – sometimes called Industry 4.0 – is radically changing how businesses, especially industrial companies, operate. As companies digitally transform, a gap opens up between their physical and digital assets. Industrial IoT provides the link between the two. Virtually any physical object can be transformed into an IoT device if … The post What is IIoT?

article thumbnail

Privilege Escalation flaw found in Forcepoint VPN Client for Windows

Security Affairs

Security researcher Peleg Hadar of SafeBreach Labs discovered a privilege escalation flaw that impacts all versions of Forcepoint VPN Client for Windows except the latest release. Security expert Peleg Hadar of SafeBreach Labs discovered a privilege escalation vulnerability, tracked as CVE-2019-6145, that affects all versions of VPN Client for Windows except the latest release.

article thumbnail

Rethinking Risk Management

Dark Reading

Where most organizations fall short in risk management tools, technologies, and talent, and how they can improve.

Risk 73