Wed.Apr 24, 2019

'ShadowHammer' Spreads Across Online Gaming Supply Chain

Data Breach Today

Several Gaming Suppliers Are the Latest Victims, Kaspersky Finds A sophisticated supply-chain attack dubbed Operation ShadowHammer is becoming more pervasive, with the group targeting online gamers, security researchers at Kaspersky Lab warn

Groups 222

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. Related: Free ‘VRMM’ tool measures third-party exposure Just take a look at Europe’s GDPR , NYDFS’s cybersecurity requirement s or even California’s newly minted Consumer Privacy Act.

Risk 169

'Five Eyes' Intelligence Members to Detail Cyber Threats

Data Breach Today

Groups 200

Zero-day vulnerability in Oracle WebLogic

Security Affairs

Security experts are warning of a dangerous zero-day remote code vulnerability that affects the Oracle WebLogic service platform. Oracle WebLogic wls9_async and wls-wsat components are affected by a deserialization remote command execution zero-day vulnerability.

Access 108

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Sizing Up Revised Model for National Health Data Exchange

Data Breach Today

Do the Minimum Privacy and Security Requirements Go Far Enough?

More Trending

Advancing Security Operations With Managed Detection and Response

Data Breach Today

Organizations face a variety of security challenges as they attempt to secure their environments from the ever-changing threat landscape.

The Russian Shadow in Eastern Europe: Gamaredon ‘s Ukrainian MOD Campaign

Security Affairs

Security researchers at Yoroi-Cybaze ZLab uncovered a new campaign carried out by the Russian state-actor dubbed Gamaredon. Introduction.

Google Sensorvault Database Draws Congressional Scrutiny

Data Breach Today

Questions Raised About Use of Android Location Data by Law Enforcement Google is facing questions from Congress about Sensorvault, its database that stores the geolocation data of millions of Android users, which has sometimes been shared with police as part of criminal investigations

Data 176

Why OpenText is your secret weapon in OEM product development

OpenText Information Management

Every organization deals with a myriad of types of information. And in all organizations, this information is ever-growing at every stage in its lifecycle – from generation to retirement.

B2B 87

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Spear Phishing - Top 3 Threats

Data Breach Today

Among the top new spear phishing threats to enterprises: Extortion. Asaf Cidon of Barracuda outlines the top three spear phishing threats and new strategies to defend against them

Mapping Data Flows: Help Us Ask the Right Questions

John Battelle's Searchblog

I’ve been quiet here on Searchblog these past few months, not because I’ve nothing to say, but because two major projects have consumed my time. The first, a media platform in development, is still operating mostly under the radar.

HSBC Whistleblower: Fraud Fight Still Has Long Way to Go

Data Breach Today

Everett Stern, the whistleblower who called attention to HSBC's international money laundering activities, which ultimately resulted in a $1.9 billion fine, says the crackdown on financial fraud still has a long way to go. He'll be the keynoter at ISMG's Fraud and Breach Summit in Chicago on May 14


Stuart City is the new victim of the Ryuk Ransomware

Security Affairs

Another city fell victim of a malware attack, systems at the city of Stuart, Fla., were infected by the Ryuk ransomware on April 13, 2018. Law enforcement is investigating a ransomware attack that hit the City of Stuart on April 13, 2018.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

The impact of digital transformation

OpenText Information Management

Digital transformation is impacting the world today at unprecedented rates. It took only four years from the launch of Netflix’ digital business model to send Blockbuster towards bankruptcy.

Vulnerability in French Government Tchap Chat App

Schneier on Security

A researcher found a vulnerability in the French government WhatsApp replacement app: Tchap. The vulnerability allows anyone to surreptitiously join any conversation. Of course the developers will fix this vulnerability.

Why a “design for operations” approach is essential for service-based IT

DXC Technology

To deliver on digital transformation and improve business performance, enterprises are adopting a “design for operations” approach to software development and delivery.

French Government App Shows Difficulties with Secure Communications

Adam Levin

A messaging app released by the French government to secure internal communications has gotten off to a troubled start. Tchap was released in beta earlier this month as a secure messaging app exclusively for government officials.

OilRig APT uses Karkoff malware along with DNSpionage in recent attacks

Security Affairs

Iran-linked OilRig cyberespionage group is using the reconnaissance malware Karkoff along with DNSpionage in recent campaigns. Iran-linked OilRig cyberespione group is using the reconnaissance malware Karkoff along with DNSpionage in recent campaigns.

Engineering Secure Systems

Thales eSecurity

Systems. The word “system” comes from the Greek ???????, a whole thing made of parts, or a composition.

14 top paying big data jobs

Information Management Resources

Software architects, data warehouse architects and data scientists lead the pack for top salaries among the professionals working on big data projects. Big data Compensation Data Scientist Software professionals Data science

Integrate Office 365 users into your SAP business process

OpenText Information Management

The SAP® SAPPHIRE NOW 2019 conference is right around the corner! We’re excited to be in Orlando from May 7-9 to talk with you about many of our EIM solutions, including the new SAP Extended ECM by OpenText™, add-on for Microsoft® Office 365™.

ECM 65

Boosting data strategies by combining cloud and infrastructure management

Information Management Resources

Cloud management platforms enable uniform and efficient service delivery, while infrastructure management tools provide the functional support of standard IT processes. Cloud computing Infrastructure Data management

10 Top Single Sign-On Solutions

eSecurity Planet

Single sign-on solutions can make access management easier for security teams, and the most sophisticated can adapt as risks change. Here are 10 of the best

Risk 91

Containers, serverless computing grow in popularity with increased cloud push

Information Management Resources

A majority of companies are putting critical business applications in the cloud, and a growing number are using technologies such as containers and serverless computing, according to a new report. Cloud computing Data management Data strategy

Cloud 63

Adware-Ridden Apps in Google Play Infect 30 Million Android Users


Google Play has removed up to 50 apps that once downloaded plagued systems with full-screen ads. Mobile Security Web Security Adware Android facebook ad google google play Infections malicious app malware

Vital partnership or unholy alliance? Decoding the software/service provider relationship

Information Management Resources

We found an alliance landscape that’s often hidden from view and rapidly shifting as software-as-a-service becomes the norm. Software development Hardware and software Data management

Data 63

One year into the Hightail and OpenText collaboration

OpenText Information Management

Founded in 2004 as YouSendIt, Hightail was originally designed to help individuals and businesses easily and securely transfer large files from one person to another.

Healthcare workers still a weak link in cyber defense plans

Information Management Resources

Hackers are increasingly focusing attention on the people working at healthcare organizations, not worrying about the technical defenses that providers, payers and others have erected. Hacking Employee engagement Cyber security Phishing Data security

Looking back and reflecting on Earth Day 2019

DXC Technology

Ever since the industrial revolution, progress and technology have come at a price. Our increasing dependence on fossil fuels and other non-renewable resources have taken a toll on the planet’s climate, flora, and fauna, and we’ve only recently begun to understand the impacts. The reality is that we are now in the largest period of […]. Corporate Responsibility Earth Day

Samsung preps $116B splurge on chips to take on Intel

Information Management Resources

Samsung Electronics Co. intends to invest 133 trillion won ($116 billion) over the next decade or so to take on Intel Corp. and Qualcomm Inc. in the business of making advanced chip processors. Hardware and software Samsung Intel


Latest Qbot Variant Evades Detection, Infects Thousands


Ever-changing Qbot trojan has been spotted in a fresh campaign with a new “context aware” delivery technique. Hacks Malware BITSAdmin cyberattack Infections Malware analysis Microsoft Visual Basic Scripting Edition Phishing PowerShell qakbot qbot VBScript ZIP archive