Mon.Sep 09, 2019

Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks


Wikipedia and World of Warcraft Classic users reported global outages over the weekend in targeted - and connected - DDoS attacks. Hacks Web Security Blizzard Entertainment cyberattack DDoS attack Denial of Service Distributed Denial of Service wikipedia ddos World of Warcraft

Software Bugs: Gotta Catch 'Em All?

Data Breach Today

Beyond 'Patch or Perish' - CISOs' Risk-Based Approach to Fixing Vulnerabilities Every week seems to bring a fresh installment of "patch or perish."

Risk 222

Secret Service Investigates Breach at U.S. Govt IT Contractor

Krebs on Security

The U.S. Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned.

IT 213

Wikipedia Investigates DDoS Attack

Data Breach Today

Sites in Europe, Middle East Affected Over the Weekend Online encyclopedia Wikipedia is investigating a DDoS attack that temporarily blocked access to several of its European and Middle Eastern sites over the weekend

Access 187

Contact Center Cloud Migration Done Right

Speaker: Sheila McGee-Smith, Founder and Principal Analyst, McGee-Smith Analytics

Many companies are in the midst of migrating their contact center to the cloud. Understanding how best to execute the transition of premises to cloud is part of that process. Join contact center industry analyst and No Jitter blogger Sheila McGee-Smith as she discussed tried and true best practices for avoiding the potential pitfalls of CX migration.

Telegram Privacy Fails Again

Security Affairs

Security expert discovered that busing a well-known feature of deleting messages it is possible to threate the users’ privacy. This is not a security vulnerability its a privacy issue.

More Trending

DoS attack the caused disruption at US power utility exploited a known flaw

Security Affairs

A DoS attack that caused disruptions at a power utility in the United States exploited a flaw in a firewall used in the facility. The incident took place earlier this year, threat actors exploited a known vulnerability in a firewall used by the affected facility to cause disruption.

Apple Accuses Google of 'Stoking Fear' With iOS Bug Report

Data Breach Today

Google Says It Stands by the Research Apple is criticizing recent Google research that describes an expansive iPhone hacking campaign, accusing Google of "stoking fear" among users of its products. Google says it stands by its blog post, which focused on technical findings

Blog 168

Symantec uncovered the link between China-Linked Thrip and Billbug groups

Security Affairs

The China-linked APT group Thrip is continuing to target entities in Southeast Asia even after its activity was uncovered by Symantec.

Weaponized BlueKeep Exploit Released

Data Breach Today

Metasploit: Release Intended to Call Attention to Urgent Need to Patch Vulnerability A new weaponized proof-of-concept exploit for the BlueKeep vulnerability in Windows has been released by researchers at Rapid7 and Metasploit in an effort to help create a sense of urgency to patch the flaw


Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Many Happy RETURNS: COBOL is 60

Micro Focus

Can you believe that in September 1959, the world first heard the technical acronym ‘COBOL’? The history of COBOL over the past 60 years is fascinating, and proof of COBOL’s durability. Recorded statements of the value and ubiquity of the language have been reported widely over the years.

Wikipedia suffered intermittent outages as a result of a malicious attack

Security Affairs

How Safari and iMessage Have Made iPhones Less Secure

WIRED Threat Level

Security researchers say iOS's security woes stem in part from Apple putting too much trust in its own software's code. Security Security / Security News

Telnet Backdoor Opens More Than 1M IoT Radios to Hijack


Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices. IoT Vulnerabilities 1 million devices Cyberattacks imperial dabman iot radio telnet backdoor vulnerability Vulnerability Lab weak password

IoT 113

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Cambridge Analytica: Recommendations on Data Ethics

Perficient Data & Analytics

Before going deep into Data Ethics, I would highly recommend watching the documentary The Great Hack on Netflix which summarizes Cambridge Analytica’s involvement in the largest Data Ethics issue and how it played a role in Brexit, the Trump Campaign, the Cruz Campaign, and others.

Stealth Falcon’s undocumented backdoor uses Windows BITS to exfiltrate data

Security Affairs

ESET researchers discovered a new malware associated with the Stealth Falcon APT group that abuses the Windows BITS service to stealthy exfiltrate data. Security researchers from discovered a new malware associated with the Stealth Falcon cyber espionage group that abuses the Windows BITS service to stealthy exfiltrate data. Stealth Falcon is a nation-state actor active since at least 2012, the group targeted political activists and journalists in the Middle East in past campaigns.

How I Learned to Stop Worrying and Love Vendor Risk

Adam Levin

Insider risk, supply chain vulnerability and vendor risk all boil down to the same thing: the more people have access to your data, the more vulnerable it is to being leaked or breached.

Risk 74

Meet Perficient’s Chief Strategists: Arvind Murali

Perficient Data & Analytics

Thrilling our clients with innovation and impact – it’s not just rhetoric. This belief is instrumental for our clients’ success. In 2018, we introduced our Chief Strategists , who provide vision and leadership to help our clients remain competitive.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Red Flag Laws Are Red Herrings of Gun Control

WIRED Threat Level

Opinion: There’s little data on the effectiveness of mental health reporting laws, and we’re being distracted from measures we know will save lives. Opinion Security Security / National Security

Data 69


Schneier on Security

Wired has a long article on NotPetya. cyberattack cybersecurity cyberwar exploits malware russia ukraine

Loyalty vs Experience

Perficient Data & Analytics

I spend a lot of time with clients who very much want to create a relationship with their customers, patients, etc. A lot of them use a combination of their data plus a range of 3rd party data to round it out.

#ModernDataMasters: Blake Morgan, Customer Experience Futurist and Author


Kate Tickner, Reltio. What is your background and what was your route into Customer Experience Management and Evangelism? I have been focused on customer experience for more than ten years now. I started with my own podcast in 2009 called Customer Creation with Blake Landau my maiden name.

How organizations are sharpening their skills to better understand and use AI

Information Management Resources

To successfully implement artificial intelligence technologies, companies need to take a holistic approach toward retraining their workforces

Phishers' Latest Tricks for Reeling in New Victims

Dark Reading

Phishing works because people are, by nature, trusting -- but these evolving phishing techniques make it even tougher for security managers to stay on top

5 steps to prepare your organization for the California Consumer Privacy Act

Information Management Resources

If you have experience with the General Data Protection Regulation you already know that achieving compliance is a rigorous process that requires a structured plan, diligence and time. Data privacy Data privacy rules Data security

Don't Get Screwed Out of Your Equifax Settlement Money

WIRED Threat Level

If you signed up for $125 payout in the Equifax settlement, you just hit another hurdle. But this isn't over. Security Security / Security Advice

COBOL at 60: What’s next?

Micro Focus

COBOL at 60: What’s next? My previous post reflected that COBOL has turned 60. This unique programming language has endured all the changes of the last 60 years, and I predict it will survive all the innovation and change of the next 60. But how will you keep up with change? How can COBOL meet.

More Than 99% of Cyberattacks Need Victims' Help

Dark Reading

Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information


Critical Exim Flaw Opens Millions of Servers to Takeover


A critical vulnerability found in Exim servers could enable a remote, unauthenticated attacker to execute arbitrary code with root privileges. Cloud Security Vulnerabilities active exploit Azure Exim linux flaw Microsoft Unix virtual machine vulnerable server Worm

Cloud 79

Texas Refuses to Pay $2.5M in Massive Ransomware Attack

Dark Reading

The ransomware campaign affected 22 local governments, none of which have paid the attackers' $2.5 million ransom demand

Apple Claims Google is Spreading FUD Over Patched iPhone Bugs


Apple said Google’s recent analysis of vulnerabilities found January in iOS painted a misleading picture of the scope of the attacks and the risk involved. Mobile Security apple google iOS 12.1.4 iphone Project Zero zero-day