Sat.Aug 08, 2020 - Fri.Aug 14, 2020

article thumbnail

Medical Debt Collection Firm R1 RCM Hit in Ransomware Attack

Krebs on Security

R1 RCM Inc. [ NASDAQ:RCM ], one of the nation’s largest medical debt collection companies, has been hit in a ransomware attack. Formerly known as Accretive Health Inc. , Chicago-based R1 RCM brought in revenues of $1.18 billion in 2019. The company has more than 19,000 employees and contracts with at least 750 healthcare organizations nationwide.

article thumbnail

Maze ransomware gang leaked Canon USA’s stolen files

Security Affairs

Maze ransomware operators have leaked online the unencrypted files allegedly stolen from Canon during a recent ransomware attack. According to an internal memo obtained by ZDNet last week, the recent outage suffered by Canon was caused by a ransomware attack, at the same time Maze ransomware operators were taking the credit for the incident. The memo also reveals that the company has hired an external security firm to investigate the incident.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Reportedly Hits Ventilator Maker

Data Breach Today

Incident Reflects Threats Facing Those Involved in COVID-19 Response A manufacturer of transit communication systems that pivoted to build ventilators during the COVID-19 pandemic is reportedly the latest victim of the DoppelPaymer ransomware gang.

article thumbnail

Flaws Could Have Exposed Cryptocurrency Exchanges to Hackers

WIRED Threat Level

Researchers found troubling bugs in open-source libraries used by financial institutions.

Libraries 320
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Microsoft Patch Tuesday, August 2020 Edition

Krebs on Security

Microsoft today released updates to plug at least 120 security holes in its Windows operating systems and supported software, including two newly discovered vulnerabilities that are actively being exploited. Yes, good people of the Windows world, it’s time once again to backup and patch up! At least 17 of the bugs squashed in August’s patch batch address vulnerabilities Microsoft rates as “critical,” meaning they can be exploited by miscreants or malware to gain complete,

More Trending

article thumbnail

SANS Institute Sees Its Breach as Teachable Moment

Data Breach Today

Cyberecurity Training Center Wants Others to Learn From Phishing Attack The SANS Institute, which is known for its cybersecurity training courses, is now planning to turn its own data breach into a teachable moment for its membership.

IT 362
article thumbnail

How Facebook and Other Sites Manipulate Your Privacy Choices

WIRED Threat Level

Social media platforms repeatedly use so-called dark patterns to nudge you toward giving away more of your data.

Privacy 316
article thumbnail

Why & Where You Should You Plant Your Flag

Krebs on Security

Several stories here have highlighted the importance of creating accounts online tied to your various identity, financial and communications services before identity thieves do it for you. This post examines some of the key places where everyone should plant their virtual flags. As KrebsOnSecurity observed back in 2018 , many people — particularly older folks — proudly declare they avoid using the Web to manage various accounts tied to their personal and financial data — including ev

Passwords 357
article thumbnail

Threat Report Portugal: Q2 2020

Security Affairs

The Threat Report Portugal: Q2 2020 compiles data collected on the malicious campaigns that occurred from April to Jun, Q2, of 2020. The Portuguese Abuse Open Feed 0xSI_f33d is an open sharing database with the ability to collect indicators from multiple sources, developed and maintained by Segurança-Informática. This feed is based on automatic searches and also has a strong contribution from the community.

Phishing 363
article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Avaddon Ransomware Joins Data-Leaking Club

Data Breach Today

Operators Create a Dedicated Leak Site, Continue Recruiting Affiliates Yet another ransomware-wielding gang has threatened to steal and leak the data of any victims who refuse to pay a ransom: The operators of Avaddon ransomware have created a dedicated data-leak site that already lists a construction firm victim, and the gang continues to recruit new affiliates.

article thumbnail

The NSA's Tips to Keep Your Phone From Tracking You

WIRED Threat Level

Plus: A Canon ransomware hack, a nasty Twitter bug, and more of the week's top security news.

article thumbnail

Business Processes and Change - Reasons, Drivers, and Considerations

AIIM

Times change. And that's one of the biggest reasons there's now a resurgence in business process management. Globally, firms are reaching a point where they don't feel they can eke out any more efficiencies from their current processes. At the same time, they understand that new entrants are coming into the marketplace with dramatically different business models.

Insurance 232
article thumbnail

TeamViewer flaw can allow hackers to steal System password

Security Affairs

A severe vulnerability impacting TeamViewer for Windows, tracked as CVE 2020-13699, could be exploited by remote attackers to steal the system password. TeamViewer has recently addressed a high-risk vulnerability ( CVE 2020-13699 ), that could be exploited by remote attackers to steal system password and potentially compromise it. TeamViewer is a popular software application for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers.

Passwords 363
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Alert: Russian Hackers Deploying Linux Malware

Data Breach Today

Alert From NSA and FBI Warns of Drovorub Malware Used by 'Fancy Bear' Group An alert from U.S. National Security Agency and the FBI warns of a recently discovered Russian-deployed malware variant called Drovorub that's designed to target Linux systems, creating a backdoor into targeted networks to exfiltrate data.

Security 351
article thumbnail

Over a Billion Android Devices Are at Risk of Data Theft

WIRED Threat Level

Qualcomm has released a fix for the flaws in its Snapdragon chip, which attackers might exploit to monitor location or render the phone unresponsive.

Risk 289
article thumbnail

[Podcast] Titans of Technology Innovation

AIIM

All around us, technology is changing everything. Many can remember having to go to their local video store to rent a movie. Now, with the click of a button from the comfort of your own living room, you can access an endless amount of streaming movies. Even the simpler things in life, like flipping on a light switch, are being replaced by technology.

article thumbnail

Homoglyph attacks used in phishing campaign and Magecart attacks

Security Affairs

Researchers detailed a new evasive phishing technique that leverages modified favicons to inject e-skimmers and steal payment card data covertly. Researchers from cybersecurity firm Malwarebytes have analyzed a new evasive phishing technique used by attackers in the wild in Magecart attacks. The hackers targeted visitors of several sites using typo-squatted domain names, and modified favicons to inject software skimmers used to steal payment card information.

Phishing 364
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

NIST Issues Final Guidance on 'Zero Trust' Architecture

Data Breach Today

Guidelines Describe Deployment Scenarios The National Institute of Standards and Technology has released the final version of its "zero trust" architecture guidelines that provide a road map for using the architecture in security programs.

Security 344
article thumbnail

A British AI Tool to Predict Violent Crime Is Too Flawed to Use

WIRED Threat Level

A government-funded system known as Most Serious Violence was built to predict first offenses but turned out to be wildly inaccurate.

article thumbnail

Government paid Vote Leave AI firm to analyse UK citizens’ tweets

The Guardian Data Protection

Faculty, linked to senior Tories, hired to collect tweets as part of coronavirus-related contract Privacy campaigners have expressed alarm after the government revealed it had hired an artificial intelligence firm to collect and analyse the tweets of UK citizens as part of a coronavirus-related contract. Faculty, which was hired by Dominic Cummings to work for the Vote Leave campaign and counts two current and former Conservative ministers among its shareholders, was paid £400,000 by the Ministr

article thumbnail

Flaws in ‘Find My Mobile’ exposed Samsung phones to hack

Security Affairs

A researcher found multiple flaws in Samsung’s Find My Mobile that could have been chained to perform various malicious activities on Samsung Galaxy Phones. The security researcher Pedro Umbelino from Portugal-based cybersecurity services provider Char49 discovered multiple vulnerabilities in Samsung’s Find My Mobile that could have been chained to perform various malicious activities on Samsung Galaxy Phones. “There are several vulnerabilities in the Find My Mobile package that can ultima

Access 363
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

Barclays Faces Employee Spying Probe

Data Breach Today

Privacy Watchdog in UK Investigates Bank's Use of Employee Monitoring Tools Banking giant Barclays is being probed by the U.K.'s privacy watchdog over its use of employee-monitoring tools, after the bank in February reportedly shifted from anonymized tracking to giving managers the ability to view data for individual employees.

Privacy 344
article thumbnail

Belarus Has Shut Down the Internet Amid a Controversial Election

WIRED Threat Level

Human rights organizations have blamed the Belarusian government for widespread outages.

article thumbnail

Multiple Retailers Sued Under CCPA for Sharing Data Used to Identify Fraudulent Returns

Hunton Privacy

Earlier this year, The Retail Equation, a loss prevention service provider, and Sephora were hit with a class action lawsuit in which the plaintiff claimed Sephora improperly shared consumer data with The Retail Equation without consumers’ knowledge or consent. The plaintiff claimed The Retail Equation did so to generate risk scores that allegedly were “used as a pretext to advise Sephora that attempted product returns and exchanges are fraudulent and abusive.”.

Retail 144
article thumbnail

Israel announced to have foiled an attempted cyber-attack on defence firms

Security Affairs

Israel ‘s defence ministry announced to have foiled an attempted cyber attack by a foreign threat actors group targeting the country’s defence manufacturers. The Israeli defence ministry announced on Wednesday that it had foiled a cyber attack carried out by a foreign threat actor targeting the country’s defence manufacturers. According to the officials, the attack was launched by “an international cyber group called ‘ Lazarus.’ The Lazarus APT is linked to No

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

US Seizes $2 Million in Cryptocurrency From Terrorist Groups

Data Breach Today

Justice Department Describes How Groups Raised Funds The U.S. Justice Department has seized more than $2 million worth of cryptocurrency from terrorists groups who solicited donations via social media and waged fraud campaigns.

334
334
article thumbnail

ISIS Allegedly Ran a Covid-19 PPE Scam Site

WIRED Threat Level

The Justice Department says that an agent of the terrorist organization operated FaceMaskCenter.com, in part of a series of cryptocurrency-related complaints.

Security 239
article thumbnail

Vulnerability Prioritization: Are You Getting It Right?

Dark Reading

Developers must find a way to zero in on the security vulns that present the most risk and quickly address them without slowing down the pace of development.

IT 144