article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

The ransomware group has since leaked the stolen data on its dark web leak site. The gang claimed the theft of 2 TB of data. Compromised data includes full names, contact details, ID numbers, banking information, drivers license numbers, medical records and passport details. ” states the company.

article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

“The trend that we’re seeing is that more than 30 percent of the content flowing into data lakes is from untrusted sources,” he says. “It’s It’s documents, PDFs, CSV files, Excel files, images, lots of unstructured data; we track 150 different file types. This is the dark side of digital transformation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anomali ThreatStream: Threat Intelligence Product Overview and Insight

eSecurity Planet

Anomali’s ThreatStream Platform is used by many the Fortune 100 companies and and banks. Applicable Metrics ThreatStream consumes both structured and unstructured data from hundreds of threat intelligence feeds, processing millions of Indicators of Compromise (IOCs).

article thumbnail

Financial Supervision in a Digital World

Thales Cloud Protection & Licensing

This has led to a total shift in financial products and banking-related services. But new technologies give us more power than ever to crunch data. The recent advancements in AI could reinvent the way banks and other organisations collect and process structured and unstructured data.

Banking 71
article thumbnail

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification

Thales Cloud Protection & Licensing

Part of this process includes identifying where and how data is stored—on-premises, in third-party servers or in the cloud. While an organization might already know the location of structured data such as a primary customer database store, unstructured data (such as that found in stray files and emails) is more difficult to locate.

article thumbnail

Predictions for 2023 API Security

CyberSecurity Insiders

With their motherlode of rich customer data and transactions, banks, fintech companies, insurance companies, and other financial institutions represent a favorite attack target for hackers. In addition, the industry must develop a scalable approach to API security if it is to move forward with open banking.

CISO 118
article thumbnail

ComplyAdvantage Releases 2022 State Of Financial Crime Report

CyberSecurity Insiders

The respondents represented a range of organizations across enterprise banking, investments, crypto, insurance and FinTech. The company actively identifies tens of thousands of risk events from millions of structured and unstructured data points every single day.