Sat.Oct 19, 2019 - Fri.Oct 25, 2019

article thumbnail

Protect IT—A Combination of Security Culture and Cyber Hygiene Good Practices

Thales Cloud Protection & Licensing

In the spirit of National Cyber Security Awareness Month (NCSAM), my colleague Ashvin Kamaraju wrote about how organizations can use fundamental controls to secure their information technology. Effective digital security doesn’t end at “Secure IT,” however. It’s equally important that organizations protect their IT assets against things like software vulnerabilities, unsecured Wi-Fi connections and unauthorized data exfiltration.

article thumbnail

61% of organisations reported a data breach in 2019

IT Governance

If your organisation didn’t suffer a data breach last year, consider yourself one of the lucky few. The insurance firm Hiscox found that 61% of organisations were compromised in the past 12 months. This represents a 16-percentage-point increase over the past year, demonstrating how quickly the threat of data breaches is escalating. And it’s not because organisations are getting worse at protecting their information; it’s because cyber criminals are becoming more proficient.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Software Is Infrastructure

ForAllSecure

The realization that software is becoming an essential component of our everyday lives was reflected yet again in this year’s. Black Hat. Even more solutions are being touted to deal with the ever-growing exposure of software to malicious threats. Unfortunately, a lot of the solutions focus on dealing with the symptoms of our current predicament without addressing the fundamental truth - software is built insecurely despite our best efforts.

40
article thumbnail

Phishing Schemes Continue to Plague the Healthcare Sector

Data Breach Today

Experts Offer Insights on Mitigating the Threat Recent health data breaches involving phishing schemes are reminders of the persistent threat email-related scams pose to healthcare organizations - and the urgent need to mitigate that threat.

Phishing 190
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Cachet Financial Reeling from MyPayrollHR Fraud

Krebs on Security

When New York-based cloud payroll provider MyPayrollHR unexpectedly shuttered its doors last month and disappeared with $26 million worth of customer payroll deposits , its payment processor Cachet Financial Services ended up funding the bank accounts of MyPayrollHR client company employees anyway, graciously eating a $26 million loss which it is now suing to recover.

More Trending

article thumbnail

A Brief History of Russian Hackers' Evolving False Flags

WIRED Threat Level

Most hackers know how to cover their tracks. But Russia’s elite groups are working at a whole other level.

article thumbnail

Johannesburg Struggles to Recover From Ransomware Attack

Data Breach Today

It's the Second Attack to Target South African City This Year Johannesburg has been hit with a ransomware attack that is crippling municipal services. City Power, an electric utility owned by the city that was hit by a similar attack in July - also was affected by the latest attack.

article thumbnail

Ransomware Hits B2B Payments Firm Billtrust

Krebs on Security

Business-to-business payments provider Billtrust is still recovering from a ransomware attack that began last week. The company said it is in the final stages of bringing all of its systems back online from backups. With more than 550 employees, Lawrence Township, N.J.-based Billtrust is a cloud-based service that lets customers view invoices, pay, or request bills via email or fax.

B2B 115
article thumbnail

Ransomware attacks show no signs of slowing

DXC Technology

Ransomware attacks are showing no signs of letting up. In fact, recent research shows how these attacks are flourishing. The findings are based on more than 230,000 ransomware attack submissions, between April 1 and September 30, 2019, to antivirus firm Emsisoft and ransomware information site ID Ransomware. ID Ransomware is a site that enables anyone […].

article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Women in Privacy

Data Matters

Women in Privacy or WIP invites you to join our networking event featuring a roundtable discussion of the latest data protection and privacy hot topics followed by a drinks reception. The Women in Privacy networking group is for data protection and privacy professionals and aims to provide a platform for high-level discussion of data protection and privacy law developments, to facilitate and strengthen networking among women privacy professionals, and to mentor and promote the advancement of wom

Privacy 60
article thumbnail

Russian Hackers Coopted Iranian APT Group's Infrastructure

Data Breach Today

UK and US Intelligence Agencies Report That Turla Group Seized OilRig APT Assets Turla, an advanced persistent threat group with apparent ties to Russia, seized attack infrastructure and tools used by OilRig, an Iranian APT group, U.K. and U.S. intelligence agencies have jointly reported. They say Turla used the coopted infrastructure to conduct its own reconnaissance and attacks.

IT 162
article thumbnail

UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackers

Security Affairs

A joint UK and US investigation has revealed that the Russian cyber espionage group Turla carried out cyber attacks masqueraded as Iranian hackers. According to the Financial Times, a joint UK and US investigation revealed that Russia-linked cyberespionage group Turla conducted several cyber attacks in more than 35 countries masqueraded as Iranian hackers.

article thumbnail

How to document PCI DSS-compliant policies and procedures – with template example

IT Governance

Technology can only do so much to protect an organisation from data breaches. That’s why Requirement 12 of the PCI DSS (Payment Card Industry Data Security Standard) instructs organisations to implement policies and procedures to help staff manage risks. Employees introduce many risks into businesses that technology simply can’t prevent. Misconfigured databases, email attachments sent to the wrong person and records that are improperly disposed are common examples the ways staff compromise infor

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CCPA In-Depth Series: Draft Attorney General Regulations on Verification, Children’s Privacy and Non-Discrimination

Data Matters

This post is the third in a three part series taking a deep dive into the five key articles of the Attorney General’s CCPA draft regulations: Article 2 on Notice to Consumers; Article 3 on Business Practices for Handling Consumer Requests; Article 4 on Verification of Requests; Article 5 on Special Rules Regarding Minors; and Article 6 on Non-Discrimination.

Privacy 60
article thumbnail

Clinton Email Probe Cites 38 for Violations

Data Breach Today

State Dept. Report: No 'Persuasive Evidence' of Deliberate Mishandling of Classified Info The State Department's years-long review of former Secretary Hillary Clinton's use of a private email server found that although 38 current or former department officials violated government security policies, there was no "persuasive evidence of systemic, deliberate mishandling of classified information.

article thumbnail

Jamf Nation is an Apple community, not just a Jamf community

Jamf

From an email list to nearly 100,000 members, see why Jamf Nation has become a one-stop-shop for those charged with managing Apple devices.

72
article thumbnail

Watch out for scams as Brexit confusion intensifies

IT Governance

The confusion around Brexit has not cleared up despite the increased urgency and ongoing discussion about what will happen and when. Scammers and attackers are using attention-grabbing headlines about Brexit to try to trick users into handing over personal data or downloading malware. Brexit is clearly a pressing issue for many organisations, but we urge you to exercise caution whenever you receive communications out of the blue relating to the UK’s departure from the EU.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

CCPA In-Depth Series: Draft Attorney General Regulations on Consumer Notice

Data Matters

This post is the first in a three part series taking a deep dive into the five key articles of the Attorney General’s CCPA draft regulations: Article 2 on Notice to Consumers; Article 3 on Business Practices for Handling Consumer Requests; Article 4 on Verification of Requests; Article 5 on Special Rules Regarding Minors; and Article 6 on Non-Discrimination.

Privacy 60
article thumbnail

Here's Why 'Raccoon' Infostealer Is Popular With Criminals

Data Breach Today

Cheap and Simple 'Malware as a Service' Sold in Cybercriminal Underground The "Raccoon" infostealer, first spotted in the wild earlier this year, is rapidly gaining in popularity on underground forums due to its low cost and ability to steal a wide range of data, including credit card numbers and cryptocurrency wallets, according to a new analysis from Cybereason.

IT 145
article thumbnail

Jamf Nation is an Apple community, not just a Jamf community

Jamf

From an email list to nearly 100,000 members, see why Jamf Nation has become a one-stop-shop for those charged with managing Apple devices.

72
article thumbnail

A critical Linux Wi-Fi bug could be exploited to fully compromise systems

Security Affairs

A researcher discovered a critical Linux vulnerability, tracked as CVE-2019-17666 , that could be exploited to fully compromise vulnerable machines. Nico Waisman, principal security engineer at Github, discovered a critical Linux flaw, tracked as CVE-2019-17666 , that could be exploited by attackers to fully compromise vulnerable machines. Found this bug on Monday.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Former Virginia Gov. Terry McAuliffe Joins Hunton as Global Strategy Advisor for Cybersecurity at the Centre for Information Policy Leadership

Hunton Privacy

Hunton Andrews Kurth LLP announced today that former Virginia Gov. Terry McAuliffe has joined the firm as global strategy advisor at the Centre for Information Policy Leadership (“CIPL”), the firm’s global privacy and cybersecurity think tank. McAuliffe will provide strategic counsel to CIPL, the firm, and clients with a particular focus on cybersecurity and privacy issues given his work and recognition in those fields during his governorship.

article thumbnail

Three Charged in $11 Million BEC Scam

Data Breach Today

Police Say Cybercriminal Gang Targeted 12 Companies Spanish authorities say they've arrested three individuals on charges of running a large-scale business email compromise scheme that targeted a dozen companies around the world to steal about $11 million.

140
140
article thumbnail

Retail has a multi-cloud problem…with sensitive data

Thales Cloud Protection & Licensing

Digital transformation (DX) is fundamentally impacting all aspects of the economy across every industry, and nowhere is this truer than in retail. DX technologies such as cloud, mobile payments, IoT, Big Data and others have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also in how they communicate with, serve, and support them.

Retail 54
article thumbnail

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal

Security Affairs

The news is quite curious, the US military will no longer use 8-inch floppy disks in an antiquated computer (SACCS) to manage nuclear weapons arsenal. It’s official, the US strategic command has announced that it has replaced the 8-inch floppy disks in an ancient computer to receive nuclear launch orders from the President with a “highly-secure solid state digital storage solution.” The use of the 8-inch floppy disks was revealed back in 2014 by the CBS “60 Minutes” TV show. &#

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

77% of UK workers don’t receive cyber skills training

IT Governance

Cyber security training is one of the most effective ways of improving your organisation’s defences against security incidents. It gives staff the wherewithal to avoid costly mistakes and establishes a strong cyber security culture in the office. Yet, according to a report by Centrify , 77% of UK workers say they’ve never received any form of cyber skills training.

article thumbnail

Florida Health System Slapped With $2.1 Million HIPAA Penalty

Data Breach Today

Regulators Say Case Involved Series of Violations Federal regulators have smacked Jackson Health System with a $2.1 million civil monetary penalty for a series of HIPAA violations. The case is one of only a handful in which the nation's HIPAA enforcement agency imposed such a penalty, rather than reach a settlement. What can others learn from this case?

140
140
article thumbnail

FTC Enforcement Action Against Deceptive Online Reviews

Hunton Privacy

On October 21, 2019, the Federal Trade Commission took action against two companies alleged to have engaged in the business of false online reviews and social media influence. In the first case , the FTC entered into a consent decree with cosmetics marketer Sunday Riley, LLC, and the company’s owner, who sell products at Sephora stores and online at Sephora.com.