Mon.Sep 09, 2019

Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks

Threatpost

Wikipedia and World of Warcraft Classic users reported global outages over the weekend in targeted - and connected - DDoS attacks. Hacks Web Security Blizzard Entertainment cyberattack DDoS attack Denial of Service Distributed Denial of Service wikipedia ddos World of Warcraft

Secret Service Investigates Breach at U.S. Govt IT Contractor

Krebs on Security

The U.S. Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned.

IT 259

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Software Bugs: Gotta Catch 'Em All?

Data Breach Today

Beyond 'Patch or Perish' - CISOs' Risk-Based Approach to Fixing Vulnerabilities Every week seems to bring a fresh installment of "patch or perish."

Risk 233

Telegram Privacy Fails Again

Security Affairs

Security expert discovered that busing a well-known feature of deleting messages it is possible to threate the users’ privacy. This is not a security vulnerability its a privacy issue.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Wikipedia Investigates DDoS Attack

Data Breach Today

Sites in Europe, Middle East Affected Over the Weekend Online encyclopedia Wikipedia is investigating a DDoS attack that temporarily blocked access to several of its European and Middle Eastern sites over the weekend

Access 207

More Trending

Fixing IoT Leaks with Hardware Security

Data Breach Today

Brian Romansky of Owl Cyber Defense Discusses the Role of Data Diodes Data diodes provide a way to control data flows in IoT devices, says Brian Romansky of Owl Cyber Defense, who describes "unhackable" hardware

IoT 205

Many Happy RETURNS: COBOL is 60

Micro Focus

Can you believe that in September 1959, the world first heard the technical acronym ‘COBOL’? The history of COBOL over the past 60 years is fascinating, and proof of COBOL’s durability. Recorded statements of the value and ubiquity of the language have been reported widely over the years.

103
103

Apple Accuses Google of 'Stoking Fear' With iOS Bug Report

Data Breach Today

Google Says It Stands by the Research Apple is criticizing recent Google research that describes an expansive iPhone hacking campaign, accusing Google of "stoking fear" among users of its products. Google says it stands by its blog post, which focused on technical findings

IT 190

DoS attack the caused disruption at US power utility exploited a known flaw

Security Affairs

A DoS attack that caused disruptions at a power utility in the United States exploited a flaw in a firewall used in the facility. The incident took place earlier this year, threat actors exploited a known vulnerability in a firewall used by the affected facility to cause disruption.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Weaponized BlueKeep Exploit Released

Data Breach Today

Metasploit: Release Intended to Call Attention to Urgent Need to Patch Vulnerability A new weaponized proof-of-concept exploit for the BlueKeep vulnerability in Windows has been released by researchers at Rapid7 and Metasploit in an effort to help create a sense of urgency to patch the flaw

186
186

Symantec uncovered the link between China-Linked Thrip and Billbug groups

Security Affairs

The China-linked APT group Thrip is continuing to target entities in Southeast Asia even after its activity was uncovered by Symantec.

COBOL at 60: What’s next?

Micro Focus

COBOL at 60: What’s next? My previous post reflected that COBOL has turned 60. This unique programming language has endured all the changes of the last 60 years, and I predict it will survive all the innovation and change of the next 60. But how will you keep up with change? How can COBOL meet.

IT 90

Wikipedia suffered intermittent outages as a result of a malicious attack

Security Affairs

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

NotPetya

Schneier on Security

Wired has a long article on NotPetya. cyberattack cybersecurity cyberwar exploits malware russia ukraine

Cambridge Analytica: Recommendations on Data Ethics

Perficient Data & Analytics

Before going deep into Data Ethics, I would highly recommend watching the documentary The Great Hack on Netflix which summarizes Cambridge Analytica’s involvement in the largest Data Ethics issue and how it played a role in Brexit, the Trump Campaign, the Cruz Campaign, and others.

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack

Threatpost

Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices. IoT Vulnerabilities 1 million devices Cyberattacks imperial dabman iot radio telnet backdoor vulnerability Vulnerability Lab weak password

IoT 114

Red Flag Laws Are Red Herrings of Gun Control

WIRED Threat Level

Opinion: There’s little data on the effectiveness of mental health reporting laws, and we’re being distracted from measures we know will save lives. Opinion Security Security / National Security

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

How I Learned to Stop Worrying and Love Vendor Risk

Adam Levin

Insider risk, supply chain vulnerability and vendor risk all boil down to the same thing: the more people have access to your data, the more vulnerable it is to being leaked or breached.

Risk 76

Meet Perficient’s Chief Strategists: Arvind Murali

Perficient Data & Analytics

Thrilling our clients with innovation and impact – it’s not just rhetoric. This belief is instrumental for our clients’ success. In 2018, we introduced our Chief Strategists , who provide vision and leadership to help our clients remain competitive.

MDM 74

Stealth Falcon’s undocumented backdoor uses Windows BITS to exfiltrate data

Security Affairs

ESET researchers discovered a new malware associated with the Stealth Falcon APT group that abuses the Windows BITS service to stealthy exfiltrate data. Security researchers from discovered a new malware associated with the Stealth Falcon cyber espionage group that abuses the Windows BITS service to stealthy exfiltrate data. Stealth Falcon is a nation-state actor active since at least 2012, the group targeted political activists and journalists in the Middle East in past campaigns.

Apple Claims Google is Spreading FUD Over Patched iPhone Bugs

Threatpost

Apple said Google’s recent analysis of vulnerabilities found January in iOS painted a misleading picture of the scope of the attacks and the risk involved. Mobile Security apple google iOS 12.1.4 iphone Project Zero zero-day

Risk 103

Loyalty vs Experience

Perficient Data & Analytics

I spend a lot of time with clients who very much want to create a relationship with their customers, patients, etc. A lot of them use a combination of their data plus a range of 3rd party data to round it out.

Critical Exim Flaw Opens Millions of Servers to Takeover

Threatpost

A critical vulnerability found in Exim servers could enable a remote, unauthenticated attacker to execute arbitrary code with root privileges. Cloud Security Vulnerabilities active exploit Azure Exim linux flaw Microsoft Unix virtual machine vulnerable server Worm

Cloud 101

Phishers' Latest Tricks for Reeling in New Victims

Dark Reading

Phishing works because people are, by nature, trusting -- but these evolving phishing techniques make it even tougher for security managers to stay on top

PsiXBot Adds PornModule, Google DNS Service to Its Arsenal

Threatpost

Porn-recording feature will likely be used for extortion. Malware Blackmail DoH Extortion google dns over https hardcoded c2 Malware analysis new version pornmodule Proofpoint psixbot records porn

IT 97

EVERTEAM HAS BEEN CHOSEN BY GROUPE PSA TO REDESIGN ITS INFORMATION GOVERNANCE SYSTEM

Everteam

Paris, 10 September, 2019 – Everteam, a leading provider of Enterprise Content management and Information Governance software, announces that it has been selected by Groupe PSA as part of its strategic program to overhaul the information governance system.

How to overcome the top 3 AI challenges using data management

IBM Big Data Hub

Artificial intelligence and machine learning (ML) have become very popular recently due to their ability to both optimize processes and provide the deep insights that push enterprises and industries forward

Don't Get Screwed Out of Your Equifax Settlement Money

WIRED Threat Level

If you signed up for $125 payout in the Equifax settlement, you just hit another hurdle. But this isn't over. Security Security / Security Advice

5 steps to prepare your organization for the California Consumer Privacy Act

Information Management Resources

If you have experience with the General Data Protection Regulation you already know that achieving compliance is a rigorous process that requires a structured plan, diligence and time. Data privacy Data privacy rules Data security

#ModernDataMasters: Blake Morgan, Customer Experience Futurist and Author

Reltio

Kate Tickner, Reltio. What is your background and what was your route into Customer Experience Management and Evangelism? I have been focused on customer experience for more than ten years now. I started with my own podcast in 2009 called Customer Creation with Blake Landau my maiden name.