Fri.Dec 22, 2023

article thumbnail

Millions of Patients Affected in Double-Extortion Attack

Data Breach Today

Hackers Crippled Systems, Stole Patient Data From ESO Solutions Hackers carried out a double-extortion ransomware attack on medical software company ESO Solutions, exposing personal details and healthcare information of 2.7 million U.S. patients and encrypting some of the company's systems. Double-extortion attacks also exfiltrate data.

article thumbnail

Akira ransomware gang claims the theft of sensitive data from Nissan Australia

Security Affairs

The Akira ransomware group announced it had breached the network of Nissan Australia, the Australian branch of the car maker giant. The Akira ransomware gang claimed to have breached Nissan Australia and to have stolen around 100GB of files from the carmaker giant. The company refused to pay the ransom and the ransomware gang threatened to leak the alleged stolen documents, including project data, clients’ and partners’ info, and NDAs. “We’ve obtained 100 GB of data of N

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stolen Booking.com Credentials Fuel Social Engineering Scams

Data Breach Today

Attackers Masquerade as Hotels to Steal Clients' Payment Card Data, Experts Warn Scammers are stealing hotels' log-in credentials for online travel site Booking.com and targeting their customers, experts warn. In many cases, attackers use Booking's own messaging system to contact customers and request their payment card data, they say.

289
289
article thumbnail

The Third-Party Threat for Financial Organisations

IT Governance

DORA’s supply chain security requirements IT Governance’s research for November 2023 found that 48% of the month’s incidents originated from the supply chain (i.e. were third-party attacks). For Europe , this number rises to 61%. Admittedly, it only takes a comparatively small number of supply chain attacks to skew the number of incidents. It’s in their nature for one attack to compromise potentially hundreds or even thousands of organisations.

Risk 114
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

Teen Uber Hacker Sent to Indefinite Hospital Detention

Data Breach Today

Arion Kurtaj Was a Member of Lapsus$ Group That Also Hacked Nvidia and Revolut British prosecutors have sentenced a teenager behind high-profile hacks while he was part of the now-inactive Lapsus$ hacking group. Arion Kurtaj, from Oxford, will remain in medical care after doctors declared he was unfit to stand for trial owing to severe autism.

289
289

More Trending

article thumbnail

Report Warns of 'Catastrophic' Medical Device Security Risks

Data Breach Today

Majority of Connected Medical Devices Contain Critical Vulnerabilities, FBI Says A new GAO report says federal agencies fail to provide health are providers and patients with enough resources and information to address critical vulnerabilities in a majority of medical devices in the U.S. that can result in "potential catastrophic impact to hospital operations and patient care.

Risk 282
article thumbnail

Treasury Management: The true cost of manual processes and outdated data

OpenText Information Management

Remaining at the forefront of the ever-evolving innovation curve is imperative for ensuring the financial vitality of any organization. Despite this urgency, numerous treasury management departments rely on outdated data and manual processes, oblivious to the extensive ramifications of such practices. In a previous blog, I looked at the cost and resource savings companies can … The post Treasury Management: The true cost of manual processes and outdated data appeared first on OpenText Blog

111
111
article thumbnail

Iranian Hackers Peach Sandstorm Are Delivering New Backdoor

Data Breach Today

FalseFont Backdoor Enables Attackers to Remotely Connect to a Compromised System Microsoft said Iranian state hackers are using a newly developed backdoor to target organizations in the American defense industrial base. The Iranian state threat actor that Microsoft tracks as Peach Sandstorm employed a custom backdoor named FalseFont.

278
278
article thumbnail

Member of Lapsus$ gang sentenced to an indefinite hospital order

Security Affairs

A member of the Lapsus$ cyber extortion group, Arion Kurtaj, has been sentenced to an indefinite hospital order. The UK Southwark Crown Court has sentenced Arion Kurtaj , a prominent member of the international cyber extortion gang Lapsus$ , to an indefinite hospital order. Over the years, the Lapsus$ gang compromised many high-profile companies such as NVIDIA , Samsung , Ubisoft , Mercado Libre, Vodafone , Microsoft , Okta , and Globant.

Access 103
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

SC Mag: "Attacks on critical infrastructure are harbingers of war: Are we prepared?"

KnowBe4

I just found a great post by Morgan Wright, chief security advisor of SentinelOne. Here is a quick summary and a link to the full article is at the bottom. The recent attacks on water authorities like Aliquippa and St. Johns River have cast a spotlight on the vulnerability of critical infrastructure.

article thumbnail

Congress Sure Made a Lot of Noise About Kids’ Privacy in 2023—and Not Much Else

WIRED Threat Level

Members of the US Congress touted improvements to children’s privacy protections as an urgent priority. So why didn’t they do anything about it?

Privacy 84
article thumbnail

FTC Issues Notice of Proposed Rulemaking to Update COPPA Rule

Hunton Privacy

On December 20, 2023, the FTC issued a Notice of Proposed Rulemaking (“Notice”), which would bring long-anticipated changes to the children’s online data privacy regime at the federal level in the U.S. The Notice sets forth several important proposals aimed at strengthening the Children’s Online Privacy Protection Act Rule (“COPPA Rule”). The COPPA Rule has not been updated since 2012.

Privacy 72
article thumbnail

Facebook Marketplace Is Being Ruined by Zelle Scammers

WIRED Threat Level

I tried to sell a futon on Facebook Marketplace and nearly all I got were scammers.

Security 106
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Eat Sleep Drink Dream – Flipping Work and Life For A Year

John Battelle's Searchblog

I will not forsake you. But I might not call as often as I used to. I don’t often write about personal things here, but the two most-read posts of this past year were Mastering The Rudiments , about my journey with learning the drums, and Unretirement , a personal reflection on my career. I wrote both of those back in May – a shoulder month between seasons.

IT 52
article thumbnail

Ben Rothke’s Review of A Hacker’s Mind

Schneier on Security

Ben Rothke chose A Hacker’s Mind as “the best information security book of 2023.

article thumbnail

ICRM Reminders

IG Guru

CMP Guidance The post ICRM Reminders first appeared on IG GURU.

article thumbnail

Friday Squid Blogging: Squid Parts into Fertilizer

Schneier on Security

It’s squid parts from college dissections , so it’s not a volume operation. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here.

article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.