Mon.Jul 15, 2019

article thumbnail

Payment Fraud: Criminals Enroll Stolen Cards on Apple Pay

Data Breach Today

Fraud Fighters Also See Spikes in ATM Malware, Card Enrollment as a Service Fraudsters continue to get new tricks up their sleeves. Criminals are increasingly using Apple Pay, setting up mobile call centers to socially engineer victims as well as tricking consumers via fake e-commerce sites that never fulfill orders, fraud-fighting experts warn.

239
239
article thumbnail

Is ‘REvil’ the New GandCrab Ransomware?

Krebs on Security

The cybercriminals behind the GandCrab ransomware-as-a-service (RaaS) offering recently announced they were closing up shop and retiring after having allegedly earned more than $2 billion in extortion payments from victims. But a growing body of evidence suggests the GandCrab team have instead quietly regrouped behind a more exclusive and advanced ransomware program known variously as “ REvil ,” “ Sodin ,” and “ Sodinokibi.” “We are getting a well-deserv

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishing Campaign Tied to Amazon Prime Day

Data Breach Today

Fraudsters Use Phishing Kit Called 16Shop, McAfee Reports In the run-up to Amazon Prime Day, some of the company's customers were being targeted by a phishing kit called 16Shop, according to McAfee researchers. The campaign is similar to an earlier attack that focused on Apple users.

Phishing 209
article thumbnail

GUEST ESSAY: 6 unexpected ways that a cyber attack can negatively impact your business

The Last Watchdog

Cyber crime can be extremely financially damaging to businesses. However, if you believe that money is the only thing that a cyber-attack costs your organization, you would be wrong. In fact, a recent academic analysis identified 57 specific individual negative factors that result from a cyber-attack against a business. Here are six ways, worth considering, that a attack can affect your organization.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

'Sea Turtle' DNS Hijackers Expand Reach

Data Breach Today

Cisco Talos Calls Group 'Unusually Brazen' The group behind the Sea Turtle espionage campaign that was exposed in April is expanding its geographic reach and claiming new victims, according to researchers with Cisco's Talos unit.

IT 181

More Trending

article thumbnail

Broadcom Reportedly Suspends Bid for Symantec

Data Breach Today

Acquisition Falls Through After Sale Price Negotiations Fail, According to News Reports Broadcom has reportedly suspended its effort to acquire Symantec after the two companies failed to agree on a price for the deal. The negotiations had been ongoing for several weeks.

Sales 174
article thumbnail

Palantir's Surveillance Service for Law Enforcement

Schneier on Security

Motherboard got its hands on Palantir's Gotham user's manual, which is used by the police to get information on people: The Palantir user guide shows that police can start with almost no information about a person of interest and instantly know extremely intimate details about their lives. The capabilities are staggering, according to the guide: If police have a name that's associated with a license plate, they can use automatic license plate reader data to find out where they've been, and when

Access 94
article thumbnail

Surprising Password Guidelines from NIST

Data Breach Today

NIST Cyber Security Framework NIST guidelines often become the foundation for best practice recommendations across the security industry and are incorporated into other standards.

Passwords 142
article thumbnail

How to make sure your cyber insurance policy pays out

IT Governance

Cyber insurance is big business these days. With the ever-present danger of data breaches and cyber attacks, organisations must be sure that they have the financial backing to respond appropriately. Damages incurred by information security incidents generally aren’t covered in commercial insurance policies, so a specific policy is necessary to help cover the costs of things like forensic investigation, incident response and notification procedures.

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A flaw could have allowed hackers to take over any Instagram account in 10 minutes

Security Affairs

Instagram has recently addressed a critical flaw that could have allowed hackers to take over any Instagram account without any user interaction. Instagram has recently addressed a critical vulnerability that could have allowed attackers to completely take over any account without user interaction. The news was first reported by TheHackerNews, the issue was reported to the Facebook-owned photo-sharing service by the Indian security expert Laxman Muthiyah.

article thumbnail

Crunch Time in California – CCPA Amendments Hotly Debated and (Some) Defeated – Employee Data Is Back, Reasonable Definition of Personal Information Is Gone (For Now), and More!

Data Matters

With less than three months to go before amendments to California’s far reaching data privacy law need to be signed into law, the CCPA landscape may be changing yet again, as several amendments debated in the state Senate Judiciary Committee on July 9th underwent significant modifications. Eight proposed CCPA amendments were on the committee’s agenda, and several were hotly debated in an hours-long session that extended late into the night.

Privacy 68
article thumbnail

Why Cities Are a Low-Hanging Fruit For Ransomware

Threatpost

In this first part of a two part series, Shawn Taylor with Forescout talks to Threatpost about lessons learned from helping Atlanta remediate and recover from its massive ransomware attack.

article thumbnail

La Porte County finally opted to pay $130,000 Ransom

Security Affairs

On July 6, a ransomware attack brought down government computer systems at La Porte County, Indiana, finally, the county decided to pay $130,000 ransom. On July 6, a ransomware attack paralyzed the computer systems at La Porte County, Indiana, according to County Commission President Dr. Vidya Kora, employees were not able to access to any government email or website.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Is Machine Learning the Future of Cloud-Native Security?

Dark Reading

The nature of containers and microservices makes them harder to protect. Machine learning might be the answer going forward.

Cloud 89
article thumbnail

Flaw in Ad Inserter WordPress plugin allows remote attackers to execute code

Security Affairs

A critical vulnerability affecting the Ad Inserter WordPress plugin could be exploited by authenticated attackers to remotely execute PHP code. Security researchers at Wordfence discovered a critical vulnerability in the Inserter WordPress plugin that could be exploited by authenticated attackers to remotely execute PHP code. Ad Inserter is an Ad management plugin that allows administrators to benefit of advanced features to insert ads at optimal positions.

article thumbnail

Join the app development competition aiming to save lives worldwide

IBM Big Data Hub

Last year, more than 100,000 developers from 156 nations built 2,500+ applications in Call for Code 2018, an IBM initiative to create meaningful change through technology. This year, it's your turn. Join Call for Code 2019 and you’ll have the opportunity to create sustainable software solutions that help people prepare and recover from natural disasters.

IT 71
article thumbnail

DoppelPaymer, a fork of BitPaymer Ransomware, appeared in the threat landscape

Security Affairs

Some of the crooks behind the Dridex Trojan have split from the gang and released a forked version of the BitPaymer ransomware dubbed DoppelPaymer. Cybercrime gang tracked as TA505 has been active since 2014 and focusing on Retail and Banking industries. The group that is known for the distribution of the Dridex Trojan and the Locky ransomware , has released other pieces of malware including the tRat backdoor and the AndroMut downloader. .

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Meet DoppelPaymer, BitPaymer's Ransomware Lookalike

Dark Reading

New ransomware variant DoppelPaymer was leveraged in campaigns against the City of Edcouch, Texas, and the Chilean Ministry of Agriculture.

article thumbnail

The npm installer for PureScript package has been compromised

Security Affairs

It has happened again, another JavaScript package in the npm registry has been compromised, it is the installer for PureScript. The installer for PureScript package in the npm registry has tampered forcing project maintainers to purge the malicious code. Last week many developers reported several problems with the installer and PureScript contributor Harry Garrood found malicious code in its npm installer.

article thumbnail

Where Businesses Waste Endpoint Security Budgets

Dark Reading

Too many systems, failure to test tools, and fear of replacement drive endpoint complexity and render products less effective.

article thumbnail

Why data subject access requests have become more common under the GDPR

IT Governance

There has been a huge increase in the number of DSARs (data subject access requests) submitted in the past year. That shouldn’t be a surprise, given that the spike correlates with the GDPR (General Data Protection Regulation) taking effect. But why exactly has the GDPR caused everyone to rush off to find out what information organisations store on them?

GDPR 63
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Flaws in Telegram & WhatsApp on Android Put Data at Risk

Dark Reading

App settings combined with Android behavior can put data integrity at risk for WhatsApp and Telegram users.

Risk 86
article thumbnail

Records Management Training for Local Governments – Registration Open!

The Texas Record

We are hosting local government classes on September 11-12, 2019. Each class is $20. Class size is limited to 24 people so register today! Classes are being held at our main location, Lorenzo de Zavala Archives and Library building, 1201 Brazos St., Austin, TX 78701. Course descriptions. Introduction to Records Management – Full Day Workshop. Learn the basic concepts of records management: legal obligations, definitions, and how to read a retention schedule.

article thumbnail

FTC Reportedly Ready to Sock Facebook with Record $5 Billion Fine

Dark Reading

The fine, for the social media giant's role in the Cambridge Analytica scandal, would be the largest ever against a tech company.

74
article thumbnail

Researcher Bypasses Instagram 2FA to Hack Any Account

Threatpost

An independent researcher earned a $30,000 bug bounty after discovering a weakness in the mobile recovery process.

Cloud 78
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Software Developers Face Secure Coding Challenges

Dark Reading

Seven in ten developers are expected to write secure code, but less than half receive feedback on security, a survey finds.

article thumbnail

Retraining employees is an investment, not a cost

DXC Technology

Amazon’s announcement in July that it will spend $700 million to retrain one-third of its U.S. workforce by 2025 should be a wake-up call to those who are doing little or nothing to prepare for the impact of automation and smart machines on how enterprises operate and how people do their jobs. And when I […].

IT 57
article thumbnail

Turla APT Returns with New Malware, Anti-Censorship Angle

Threatpost

A dropper called “Topinambour" is the first-stage implant, which in turn fetches a spy trojan built in several coding languages.

64