Trending Articles

Shangri-La Hotels Hit by Data Breach Incident

Data Breach Today

Hong Kong Privacy Office Says It Is 'Disappointed' With Breach Notification Upscale Asian hotelier Shangri-La Group has copped to a data breach incident that may affect hundreds of thousands of guests.

Glut of Fake LinkedIn Profiles Pits HR Against the Bots

Krebs on Security

A recent proliferation of phony executive profiles on LinkedIn is creating something of an identity crisis for the business networking site, and for companies that rely on it to hire and screen prospective employees.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Fake CISO Profiles on LinkedIn Target Fortune 500s

Krebs on Security

Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be.

Pentagon Bug Bounty Program Uncovers 350 Vulnerabilities

Data Breach Today

Department Paid $110,000 in Rewards for Submitted Vulnerability Reports The U.S. Department of Defense uncovered almost 350 vulnerabilities in the department's networks as part of its experimental bug bounty program launched on American Independence Day.

Modernizing Workloads with the Cloud: How to Improve Performance & Reduce Costs

In this eBook, you’ll learn how to migrate workloads to Azure and optimize performance for your serverless and containerized applications in Azure.

GUEST ESSAY: Restore Us Institute (RUI) aims to protect Americans from online harms and crimes

The Last Watchdog

How did America and Americans regress to being much less secure than before the Internet? Everyone knows the many amazing conveniences, benefits, and advances the Internet has enabled. What everyone doesn’t know is how irrational the Internet’s utopian founding premises have proven to be concerning America’s and Americans’ security over the last quarter century. The first irrational security-related premise is that U.S.

More Trending

The High Cost of Living Your Life Online

WIRED Threat Level

Constantly posting content on social media can erode your privacy—and sense of self. Security Security / Privacy

Microsoft: Two New 0-Day Flaws in Exchange Server

Krebs on Security

Microsoft Corp. is investigating reports that attackers are exploiting two previously unknown vulnerabilities in Exchange Server , a technology many organizations rely on to send and receive email. Microsoft says it is expediting work on software patches to plug the security holes.

Detecting Deepfake Audio by Modeling the Human Acoustic Tract

Schneier on Security

This is interesting research : In this paper, we develop a new mechanism for detecting audio deepfakes using techniques from the field of articulatory phonetics.

First 72 Hours of Incident Response Critical to Taming Cyberattack Chaos

Dark Reading

Responding to cyberattacks is extraordinarily stressful, but better planning, frequent practice, and the availability of mental health services can help IR professionals, a survey finds


Prioritizing Customer Experience Using SLIs & SLOs: A Case Study from The Telegraph

Service Level Indicators (SLIs) and Service Level Objectives (SLOs) are a key pillar of Site Reliability Engineering (SRE) and are the principal tool for eliminating needless alerts and focusing on what really matters to the business.

Finnish intelligence warns of Russia’s cyberespionage activities

Security Affairs

The Finnish Security Intelligence Service ( SUPO ) warns Russia will highly likely intensify its cyber activity over the winter.

Possible Chinese Hackers Exploit Microsoft Exchange 0-Days

Data Breach Today

No Patch Yet Available Although Exploitation Requires Authenticated Access Hackers, possibly Chinese, are exploiting Microsoft Exchange zero-day vulnerabilities to apparently implant backdoors and steal credentials.

Differences in App Security/Privacy Based on Country

Schneier on Security

Depending on where you are when you download your Android apps, it might collect more or less data about you. The apps we downloaded from Google Play also showed differences based on country in their security and privacy capabilities.

Microsoft Updates Mitigation for Exchange Server Zero-Days

Dark Reading

Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed


The 5 Stages of Account-Based Marketing — and How to Win Them All

Successfully complete the five stages of ABM: define, identify, engage, convert, and connect. We’ll show you how to create a unified system with your sales team to help them land more qualified opportunities and connect with prospects like never before.

RansomEXX gang claims to have hacked Ferrari and leaked online internal documents

Security Affairs

The Italian luxury sports car manufacturer Ferrari confirmed the availability of internal documents online, but said it has no evidence of cyber attack.

An agile approach to Data Science

OpenText Information Management

Most Professional Services engagements with OpenText™ follow a traditional design, built, test and deploy project methodology. OpenText software is well suited for the waterfall project model. A notable exception is OpenText™ Magellan™ and our Data Science projects.

Cyberwar: Assessing the Geopolitical Playing Field

Data Breach Today

The United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this episode of "Cybersecurity Unplugged," Tom Kellerman of Contrast Security and Richard Bird of discuss what the U.S. government and companies need to do to win this cyberwar

AI Governance: Break open the black box

IBM Big Data Hub

It is well known that Artificial Intelligence (AI) has progressed, moving past the era of experimentation. Today, AI presents an enormous opportunity to turn data into insights and actions, to amplify human capabilities, decrease risk and increase ROI by achieving break through innovations.

Understanding Cadence Workflow for Developers and Architects

Explore the basics of Cadence and understand the benefits it can provide to your organization. This whitepaper will dive into a brief history of Cadence, how workflows can be put into practice, and how you can apply Cadence to your data infrastructure.

Vice Society Publishes LA Public School Student Data, Psych Evals

Dark Reading

After a flat refusal to pay the ransom, Los Angeles Unified School District's stolen data has been dumped on the Dark Web by a ransomware gang

Microsoft confirms Exchange zero-day flaws actively exploited in the wild

Security Affairs

Microsoft confirmed that two recently disclosed zero-day flaws in Microsoft Exchange are being actively exploited in the wild.

Security Vulnerabilities in Covert CIA Websites

Schneier on Security

Back in 2018, we learned that covert system of websites that the CIA used for communications was compromised by —at least—China and Iran, and that the blunder caused a bunch of arrests, imprisonments, and executions.

Hacker Steals $29M From Transit Finance, Returns $19M

Data Breach Today

Thief Retains $2M as 'Bug Bounty,' Loses $1M to Bot Attack A hacker exploited a smart contract bug to steal about $29 million from DEX aggregator Transit Finance. Within hours of the theft, the attacker returned nearly $19 million - but not before keeping a $2 million "bug bounty" and losing $1.1

Detect and Respond to Threats Across Your Applications, Networks, and Infrastructure

Understand how to solve cloud complexity challenges with threat detection tools, analyze security threats anywhere in your stack, and deploy turnkey detection rules mapped to the MITRE ATT&CK framework with Datadog Security Monitoring.

UK Suffers Third Highest Rate of Ransomware Attacks in the World

IT Governance

UK organisations suffer the third highest rate of ransomware attacks globally, with small businesses most at risk, a report by NordLocker has found.

IT 93

Ransomware 3.0: The Next Frontier

Dark Reading

Attackers are already circling back to reselling stolen data instead of — and in addition to — extortion

Experts uncovered novel Malware persistence within VMware ESXi Hypervisors

Security Affairs

Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors.

U.S. FERC Proposes Revisions to Cybersecurity Incentives for Utilities

Data Matters

On September 22, 2022, the Federal Energy Regulatory Commission (FERC) issued a Notice of Proposed Rulemaking (NOPR) regarding Incentives for Advanced Cybersecurity Investment, requesting comment on proposed revisions to regulations implementing the Federal Power Act (FPA).

The Ultimate Guide to Executive Recruiting

Sourcing the right executive candidates and filling key managerial roles in an organization can be difficult, even in the best of times. Download this eBook to level up your discovery process, talent sourcing, and strategies for reaching your best-fit candidates.

Lacework Co-CEO David Hatfield Out 4 Months After Layoffs

Data Breach Today

Hatfield's Exit Comes Amid a Go-To-Market Exodus, With CRO Andy Byron Also Leaving David "Hat" Hatfield has exited the co-CEO role at Lacework just four months after the cloud security vendor laid off 20% of its employees.

Symantec, GTSC Warn of Active Microsoft Exploits

eSecurity Planet

Vietnamese security firm GTSC published a blog post this week warning of a new zero-day remote code execution (RCE) flaw in Microsoft Exchange Server, which it said has been actively exploited at least since early August.

LA School District Ransomware Attackers Now Threaten to Leak Stolen Data

Dark Reading

Weeks after it breached the Los Angeles Unified School District, the Vice Society ransomware group is threatening to leak the stolen data, unless they get paid