Wed.Apr 24, 2019

'ShadowHammer' Spreads Across Online Gaming Supply Chain

Data Breach Today

Several Gaming Suppliers Are the Latest Victims, Kaspersky Finds A sophisticated supply-chain attack dubbed Operation ShadowHammer is becoming more pervasive, with the group targeting online gamers, security researchers at Kaspersky Lab warn

Groups 217

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Accounting for third-party risks is now mandated by regulations — with teeth. Related: Free ‘VRMM’ tool measures third-party exposure Just take a look at Europe’s GDPR , NYDFS’s cybersecurity requirement s or even California’s newly minted Consumer Privacy Act.

Risk 173

'Five Eyes' Intelligence Members to Detail Cyber Threats

Data Breach Today

Groups 194

Zero-day vulnerability in Oracle WebLogic

Security Affairs

Security experts are warning of a dangerous zero-day remote code vulnerability that affects the Oracle WebLogic service platform. Oracle WebLogic wls9_async and wls-wsat components are affected by a deserialization remote command execution zero-day vulnerability.

Access 107

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Sizing Up Revised Model for National Health Data Exchange

Data Breach Today

Do the Minimum Privacy and Security Requirements Go Far Enough?

More Trending

Advancing Security Operations With Managed Detection and Response

Data Breach Today

Organizations face a variety of security challenges as they attempt to secure their environments from the ever-changing threat landscape.

The Russian Shadow in Eastern Europe: Gamaredon ‘s Ukrainian MOD Campaign

Security Affairs

Security researchers at Yoroi-Cybaze ZLab uncovered a new campaign carried out by the Russian state-actor dubbed Gamaredon. Introduction.

Google Sensorvault Database Draws Congressional Scrutiny

Data Breach Today

Questions Raised About Use of Android Location Data by Law Enforcement Google is facing questions from Congress about Sensorvault, its database that stores the geolocation data of millions of Android users, which has sometimes been shared with police as part of criminal investigations

Data 170

Why OpenText is your secret weapon in OEM product development

OpenText Information Management

Every organization deals with a myriad of types of information. And in all organizations, this information is ever-growing at every stage in its lifecycle – from generation to retirement.

B2B 84

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Spear Phishing - Top 3 Threats

Data Breach Today

Among the top new spear phishing threats to enterprises: Extortion. Asaf Cidon of Barracuda outlines the top three spear phishing threats and new strategies to defend against them

Vulnerability in French Government Tchap Chat App

Schneier on Security

A researcher found a vulnerability in the French government WhatsApp replacement app: Tchap. The vulnerability allows anyone to surreptitiously join any conversation. Of course the developers will fix this vulnerability.

HSBC Whistleblower: Fraud Fight Still Has Long Way to Go

Data Breach Today

Everett Stern, the whistleblower who called attention to HSBC's international money laundering activities, which ultimately resulted in a $1.9 billion fine, says the crackdown on financial fraud still has a long way to go. He'll be the keynoter at ISMG's Fraud and Breach Summit in Chicago on May 14


Stuart City is the new victim of the Ryuk Ransomware

Security Affairs

Another city fell victim of a malware attack, systems at the city of Stuart, Fla., were infected by the Ryuk ransomware on April 13, 2018. Law enforcement is investigating a ransomware attack that hit the City of Stuart on April 13, 2018.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Mapping Data Flows: Help Us Ask the Right Questions

John Battelle's Searchblog

I’ve been quiet here on Searchblog these past few months, not because I’ve nothing to say, but because two major projects have consumed my time. The first, a media platform in development, is still operating mostly under the radar.

The impact of digital transformation

OpenText Information Management

Digital transformation is impacting the world today at unprecedented rates. It took only four years from the launch of Netflix’ digital business model to send Blockbuster towards bankruptcy.

Engineering Secure Systems

Thales eSecurity

Systems. The word “system” comes from the Greek ???????, a whole thing made of parts, or a composition.

OilRig APT uses Karkoff malware along with DNSpionage in recent attacks

Security Affairs

Iran-linked OilRig cyberespionage group is using the reconnaissance malware Karkoff along with DNSpionage in recent campaigns. Iran-linked OilRig cyberespione group is using the reconnaissance malware Karkoff along with DNSpionage in recent campaigns.

Can Information Access and Control Co-Exist?


Today's businesses run in the cloud. Organizations are embracing a new way of working in a cloud-native environment that enables content to move effortlessly between teams, partners and customers.

Why a “design for operations” approach is essential for service-based IT

DXC Technology

To deliver on digital transformation and improve business performance, enterprises are adopting a “design for operations” approach to software development and delivery.

Integrate Office 365 users into your SAP business process

OpenText Information Management

The SAP® SAPPHIRE NOW 2019 conference is right around the corner! We’re excited to be in Orlando from May 7-9 to talk with you about many of our EIM solutions, including the new SAP Extended ECM by OpenText™, add-on for Microsoft® Office 365™.

ECM 65

French Government App Shows Difficulties with Secure Communications

Adam Levin

A messaging app released by the French government to secure internal communications has gotten off to a troubled start. Tchap was released in beta earlier this month as a secure messaging app exclusively for government officials.

10 Top Single Sign-On Solutions

eSecurity Planet

Single sign-on solutions can make access management easier for security teams, and the most sophisticated can adapt as risks change. Here are 10 of the best

Risk 87

Adware-Ridden Apps in Google Play Infect 30 Million Android Users


Google Play has removed up to 50 apps that once downloaded plagued systems with full-screen ads. Mobile Security Web Security Adware Android facebook ad google google play Infections malicious app malware

Greek DPA Issues EUR 30,000 Fine For Data Protection Violation

Hunton Privacy

On April 15, 2019, the Greek Data Protection Authority (“DPA”) fined Hellenic Petroleum S.A. EUR 20,000 for unlawful processing of personal data and EUR 10,000 for failing to adopt appropriate data security measures. Hellenic Petroleum S.A. had engaged a vendor to conduct a study on its behalf. The study was exposed online, and its results—which included sensitive data such as political opinions, trade union membership and participation in associations—was publicly accessible on the Internet.

Study 81

One year into the Hightail and OpenText collaboration

OpenText Information Management

Founded in 2004 as YouSendIt, Hightail was originally designed to help individuals and businesses easily and securely transfer large files from one person to another.

Looking back and reflecting on Earth Day 2019

DXC Technology

Ever since the industrial revolution, progress and technology have come at a price. Our increasing dependence on fossil fuels and other non-renewable resources have taken a toll on the planet’s climate, flora, and fauna, and we’ve only recently begun to understand the impacts. The reality is that we are now in the largest period of […]. Corporate Responsibility Earth Day

Latest Qbot Variant Evades Detection, Infects Thousands


Ever-changing Qbot trojan has been spotted in a fresh campaign with a new “context aware” delivery technique. Hacks Malware BITSAdmin cyberattack Infections Malware analysis Microsoft Visual Basic Scripting Edition Phishing PowerShell qakbot qbot VBScript ZIP archive

Off the Record: RIM Month Special Edition– Blockchain, Record Tampering, Internet Archive: Oh My!

The Texas Record

Tune in monthly for a curated collection of articles we found interesting on a broad range of topics; some which are directly related to records management and others which might share common themes.

Point Blank Gamers Targeted with Backdoor Malware


The malware hides in the legitimate game downloads, signed with a real certificate; connections to ShadowHammer have been found. Malware Web Security backdoor barium apt free download gamers malware online download operation shadowhammer pointblank ShadowPad video game

Video 76

Il circolo virtuoso dell’adozione del cloud

DXC Technology

È appena iniziato il 2019 e la gente continua a pensare che il cloud sia “soltanto il computer di qualcun’altro”. Scusatemi, ho perso di vista la tastiera perchè ho spalancato gli occhi troppo forte. Fortunatamente questo approccio obsoleto sta scomparendo dai dipartimenti IT, anche grazie al fatto che, secondo un recente sondaggio (pdf) della fondazione […]. Uncategorized cloud nuvola informatica PaaS sviluppatore sviluppo

Cloud 52

Facebook May Face $5 Billion FTC Fine for Data Misuse


Facebook may be fined as much as $5 million by the FTC for data issues related to the Cambridge Analytica incident. Facebook Government Privacy cambridge analytica Data Privacy Data security earnings report facebook $5 billion facebook fine FTC FTC fine

Data 75