Thu.Jul 11, 2019

MongoDB Database Exposed 188 Million Records: Researchers

Data Breach Today

Data Apparently Originated in a GitHub Repository Security researchers have found yet another unsecured database that left personal data exposed to the internet.

Data 238

FEC: Campaigns Can Use Discounted Cybersecurity Services

Krebs on Security

The U.S. Federal Election Commission (FEC) said today political campaigns can accept discounted cybersecurity services from companies without running afoul of existing campaign finance laws, provided those companies already do the same for other non-political entities.

Apple Issues Silent Update to Remove Old Zoom Software

Data Breach Today

Rare Move Made to Protect Against Future Exploitation Apple has taken an extraordinary move to protect its users from a yet-to-be-disclosed vulnerability that could compromise Macs that have the Zoom video conferencing software installed.

Video 211

New FinFisher spyware used to spy on iOS and Android users in 20 countries

Security Affairs

Malware researchers from Kaspersky have discovered new and improved versions of the infamous FinFisher spyware used to infect both Android and iOS devices. Experts at Kaspersky have discovered a new improved variant of the FinFisher spyware used to spy on both iOS and Android users in 20 countries.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Defending Against Application Breaches

Data Breach Today

The new #1 cyber threat - attacks on the applications that power your business. Applications have become primary targets for two vastly different, but equally dangerous, types of cyberattacks. Successful application breaches can lead to financial fraud, stolen IP, and business disruption


More Trending

Premera Signs $10 Million Breach Settlement With 30 States

Data Breach Today

Agreement Follows Proposed $74 Million Settlement of Class Action Lawsuit Health insurer Premera Blue Cross has signed a $10 million HIPAA settlement with the attorneys general of 30 states in the wake of a 2014 data breach that exposed personal information on more than 10.4

A new NAS Ransomware targets QNAP Devices

Security Affairs

Malware researchers at two security firms Intezer and Anomali have discovered a new piece of ransomware targeting Network Attached Storage (NAS) devices.

Report: New Ransomware Targets QNAP Storage Devices

Data Breach Today

Attackers Demand Bitcoin Ransom After Encrypting Data A new ransomware strain called eCh0raix is targeting enterprise storage devices sold by QNAP Network by exploiting vulnerabilities in the gear and bypassing weak credentials using brute-force techniques, according to the security firm Anomali

CVE-2019-1132 Windows Zero-Day exploited by Buhtrap Group in government attack

Security Affairs

The CVE-2019-1132 flaw addressed by Microsoft this month was exploited by Buhtrap threat actor to target a government organization in Eastern Europe.

Groups 102

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Cybersecurity Firm McAfee Preps for Public Market Return

Data Breach Today

The first anniversary of the GDPR: How a risk-based approach can help you achieve GDPR compliance

Thales eSecurity

Since the General Data Protection Regulation (GDPR) took effect on May 25th last year, data protection has become a very hot topic.


RiskIQ: Magecart Group Targeting Unsecured AWS S3 Buckets

Data Breach Today

Groups 154

Intel addresses high severity flaw in Processor Diagnostic Tool

Security Affairs

Intel Patch Tuesday updates for July 2019 address a serious flaw in Processor Diagnostic Tool and minor issue in the Solid State Drives (SSD) for Data Centers (DC).

Tools 94

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Legal Implications of the AMCA Data Breach

Data Breach Today

The relationship between American Medical Collection Agency and its laboratory clients affected by the company's data breach will be closely examined as breach-related lawsuits progress, says attorney Paul Hales, a HIPAA specialist, who explains why

Resetting Your GE Smart Light Bulb

Schneier on Security

If you need to reset the software in your GE smart light bulb -- firmware version 2.8 or later -- just follow these easy instructions : Start with your bulb off for at least 5 seconds.

IT 86

The recording industry has a terrible track record of preserving the past: Alan Cross via Global News

IG Guru

Organizations today rely heavily upon technology and electronically stored information—and when employees leave, there’s always a risk that they’ll take some information or data with them when they go, either inadvertently or on purpose.

How to handle a ransomware attack

IT Governance

So, your computer screen has been hijacked by criminals who are demanding money to return your systems. Now what? That’s a question more organisations are having to ask themselves nowadays, with at least 55 ransomware attacks reported in the first half of 2019.

Data Center Changes Push Cyber Risk to Network's Edge

Dark Reading

Changes in fundamental enterprise architectures coupled with shifts in human resources mean that companies are considering new risks to their infrastructure

Risk 106

Alaris E1000 Series Scanners Win Prestigious BLI Pick Award

Document Imaging Report


APT Groups Make Quadruple What They Spend on Attack Tools

Dark Reading

Some advanced persistent threat actors can spend north of $1 million on attacks, but the return on that investment can be huge

Groups 101

Social media, IoT devices behind skyrocketing demand for streaming analytics

Information Management Resources

Enterprises look to take advantage of the insights they can gain from data as it arrives from applications, social media sites, Internet of Things devices and other sources. Analytics Data management Data strategy

Business Architecture and Process Modeling for Digital Transformation


At a fundamental level, digital transformation is about further synthesizing an organization’s operations and technology, so involving business architecture and process modeling is a best practice organizations cannot ignore.

4 key elements to a successful data governance strategy

Information Management Resources

Ensuring leaders understand they are responsible for their organization’s data and managing that data is not the sole duty of IT staff can lead to a stronger data stewardship program. Data governance Data management Data strategy

Summer: A Time for Vacations & Cyberattacks?

Dark Reading

About a third of cybersecurity professionals believe that their companies see more cyberattacks during the summer, but the survey data does not convince on the reasons for the perception of a summer bump

Google Home Silently Captures Recordings of Domestic Violence and More


Google is under fire after a report found that Google Home and Google Assistant records user audio, even when no wake-up word is used. IoT Privacy amazon Amazon Alexa amazon echo Data Privacy domestic violence Eavesdropping employees listening GDPR google google home leaked porn recordings Voice Assistant

IoT 87

Persistent Threats Can Last Inside SMB Networks for Years

Dark Reading

The average dwell time for riskware can be as much as 869 days


OpenText Enterprise World 2019 – Day Two

OpenText Information Management

Muhi Majzoub gave his traditional technology-focused keynote in Toronto, emphasizing OpenText’s ongoing commitment to customer choice, partnership, and the good that technology can bring the world Day two of Enterprise World 2019 in Toronto kicked off with Muhi Majzoub, EVP, Engineering and Cloud Services at OpenText™ giving his traditional roundup of highlights from the past … The post OpenText Enterprise World 2019 – Day Two appeared first on OpenText Blogs. Enterprise World

Cloud 58

The Security of Cloud Applications

Dark Reading

Despite the great success of the cloud over the last decade, misconceptions continue to persist. Here's why the naysayers are wrong

Cloud 95

Magecart Hacker Group Hits 17,000 Domains—and Counting

WIRED Threat Level

Magecart hackers are casting the widest possible net to find vulnerable ecommerce sites—but their method could lead to even bigger problems. Security Security / Cyberattacks and Hacks

How to Catch a Phish: Where Employee Awareness Falls Short

Dark Reading

Advanced phishing techniques and poor user behaviors that exacerbate the threat of successful attacks

Automation Anywhere Named a Leader in the 2019 Gartner Magic Quadrant for RPA Software

Document Imaging Report

Inaugural Magic Quadrant for RPA Software Recognizes Automation Anywhere. SAN JOSE, Calif. July 11, 2019 – Automation Anywhere , a global leader in Robotic Process Automation Software, today announced that Gartner, Inc. has named it a Leader in Gartner’s 2019 Magic Quadrant for RPA Software. [1].