Trending Articles

Mercedes-Benz Data Leak Lesson: Lock Down Code Repositories

Data Breach Today

Luckily for Car Giant, Access Control Gaff Didn't Expose Secret Data - This Time Don't forget to lock down online shared code repositories, as Mercedes-Benz parent company Daimler AG learned the hard way after a researcher was able to access nearly 9 GB of software development documentation from a misconfigured GitLab repository.

Access 261

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

Doing authentication well is vital for any company in the throes of digital transformation.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Riding the State Unemployment Fraud ‘Wave’

Krebs on Security

When a reliable method of scamming money out of people, companies or governments becomes widely known, underground forums and chat networks tend to light up with activity as more fraudsters pile on to claim their share. And that’s exactly what appears to be going on right now as multiple U.S.

3 hacking forums have been hacked and database have been leaked online

Security Affairs

Three hacking forums,, and have been hacked and their databases have been leaked online. Researchers from intelligence firm Cyble made the headlines again, this time they have discovered online the databases of three hacking forums.

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

To Live and Love in the Time of Corona

OpenText Information Management

As we approach 100 days of quarantine or shelter in place, I wanted to take an inventory of what we know, what we need to know, and how to live and love in the time of Corona.


More Trending

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

The Last Watchdog

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to connect to the internet we could achieve better accountability.

GDPR 173

Report: ATM Skimmer Gang Had Protection from Mexican Attorney General’s Office

Krebs on Security

How to Pay a Ransom

Dark Reading

Even prior to the COVID-19 pandemic, ransomware attacks were on the rise and becoming more expensive. Now your organization has fallen victim and is going to pay. Here's how to handle it

Tens of thousands Israeli websites defaced

Security Affairs

Thousands of Israeli websites have been defaced earlier today, hackers published an anti-Israeli message on their homepage and attempted to implant malicious code.

IT 114

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Microsoft Warns of COVID-19 Phishing Emails Spreading RAT

Data Breach Today

Malicious Messages Attempt to Install NetSupport Manager Tool on Devices Microsoft is warning Windows users about an ongoing "massive" COVID-19-themed phishing campaign that is attempting to install the NetSupport Manager on devices. Attackers can turn NetSupport into a remote access Trojan, or RAT

There's a Jailbreak Out for the Current Version of iOS

WIRED Threat Level

The Unc0ver tool works on all versions of iOS from 11 to 13.5, the current release. Security Security / Security News

Websites Conducting Port Scans

Schneier on Security

Security researcher Charlie Belmer is reporting that commercial websites such as eBay are conducting port scans of their visitors. Looking at the list of ports they are scanning, they are looking for VNC services being run on the host, which is the same thing that was reported for bank sites.

StrandHogg 2.0 Emerges as 'Evil Twin' to Android Threat

Dark Reading

The vulnerability, which exists in almost every version of Android, is both more dangerous and harder to detect than its predecessor

IT 100

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

The Florida Unemployment System suffered a data breach

Security Affairs

Officials revealed that the Florida Unemployment System suffered a data breach that impacted some residents who have made unemployment claims.

Mercedes-Benz Data Leak: Embarrassing But Endurable

Data Breach Today

The Mistake Could Have Been Much Worse in an Era of Connected Vehicles Last week, a curious data breach occurred: Almost 9 GB of software development documentation from Daimler AG, the parent company of Mercedes-Benz.

5 Simple Ways to Make Your Gmail Inbox Safer

WIRED Threat Level

These built-in features definitely protect your data, but they can help keep your inbox tidy too. Security Security / Privacy Security / Security Advice

Bluetooth Vulnerability: BIAS

Schneier on Security

This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of devices.

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Benefits of a Cloud-Based, Automated Cyber Range

Dark Reading

A cyber range is an irreplaceable tool that allows cybersecurity professionals to improve their response capabilities as well as their ability to identify risks

Ragnar Ransomware encrypts files from virtual machines to evade detection

Security Affairs

Ransomware encrypts from virtual machines to evade antivirus. Ragnar Locker deploys Windows XP virtual machines to encrypt victim’s files, the trick allows to evaded detection from security software.

UK Data Breach Reports Decline

Data Breach Today

As GDPR Hits Second Anniversary, Regional Reporting Variations Continue Britain's privacy watchdog reports it received 19% fewer data breach notifications in the first quarter than in the same period last year.

The DHS Prepares for Attacks Fueled by 5G Conspiracy Theories

WIRED Threat Level

The claim that 5G can spread the coronavirus has led to dozens of cell-tower burnings in Europe. Now, the US telecom industry is on alert as well. Security Security / Security News

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

A Tunnel of Opportunity


On May 5, 2020 I participated in a panel discussion (fun starts at the 1:35 mark), presented by AO Docs , about how the COVID-19 pandemic is affecting work and how technology is helping, or hurting, us adapt. The pandemic hasn’t really impacted the way I work.

IT 82

5 Tips for Fighting Credential Stuffing Attacks

Dark Reading

With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts

Silent Night Zeus botnet available for sale in underground forums

Security Affairs

Experts reported the existence of a botnet, tracked as Silent Night based on the Zeus banking Trojan that is available for sale in several underground forums.

Sales 105

New Version of ZLoader Banking Malware Resurfaces

Data Breach Today

Researchers Observe Over 100 Campaigns Since Start of 2020 Two years after it was last seen in February 2018, a new version of the ZLoader banking malware has resurfaced, with cybercriminals distributing the malware through email campaigns, according to security firm Proofpoint

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

Look Out for This Covid-19 Excel Phishing Scam

WIRED Threat Level

Plus: An iOS leak, an EasyJet breach, and more of the week's top security news. Security Security / Security News

Turla APT Revamps One of Its Go-To Spy Tools


An updated version of the ComRAT malware was discovered in attacks on governmental targets. Malware apt backdoor comrat Cyberattacks ESET espionage Malware analysis remote access Trojan Turla updated version

IT 97

Security 101: Cross-Site Scripting

Dark Reading

Cross-site scripting has been around longer than most security professionals have been on the job. Why is it still such an issue when we've known about it for so long