Mon.Apr 05, 2021

Capital One Warns of More Data Leaked in 2019 Breach

Data Breach Today

Additional Social Security Numbers May Have Been Exposed Capital One is warning additional customers that their Social Security numbers may have been exposed in a massive 2019 breach. Meanwhile, a suspect in the breach is slated to go to trial in October

Ransom Gangs Emailing Victim Customers for Leverage

Krebs on Security

Some of the top ransomware gangs are deploying a new pressure tactic to push more victim organizations into paying an extortion demand: Emailing the victim’s customers and partners directly, warning that their data will be leaked to the dark web unless they can convince the victim firm to pay up.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Ariel Weintraub Takes Charge of Cybersecurity at MassMutual

Data Breach Today

New Head of Enterprise Cybersecurity Succeeds CISO Jim Routh Less than a year ago, Ariel Weintraub was dabbling in data science as head of security operations and engineering at MassMutual, working under CISO Jim Routh.

GUEST ESSAY: The missing puzzle piece in DevSecOps — seamless source code protection

The Last Watchdog

We live in a time where technology is advancing rapidly, and digital acceleration is propelling development teams to create web applications at an increasingly faster rhythm. The DevOps workflow has been accompanying the market shift and becoming more efficient every day – but despite those efforts, there was still something being overlooked: application security. Related: ‘Fileless’ attacks on the rise.

Cassandra Data Modeling Guide to Best Practices

Are you a developer, database architect, or database administrator that's new to Cassandra but have been tasked with developing a Cassandra schema design? Learn the basic rules to keep in mind when designing your schema for Cassandra.

Ubiquiti's Breach Notification: The 'No Evidence' Hedge

Data Breach Today

IT 200

More Trending

Facebook Data Exposure: Lessons to Learn

Data Breach Today

Experts Advise Organizations to Check Password Reset Policies, Take Other Steps The revelation that 533 million previously stolen Facebook account records have been made public on a darknet forum should inspire organizations to take aggressive action to further protect customer data security, some security experts say.

Wi-Fi Devices as Physical Object Sensors

Schneier on Security

The new 802.11bf standard will turn Wi-Fi devices into object sensors: In three years or so, the Wi-Fi specification is scheduled to get an upgrade that will turn wireless devices into sensors capable of gathering data about the people and objects bathed in their signals.

Healthcare Phishing Incidents Lead to Big Breaches

Data Breach Today

Patient Data Exposed in Several Email-Related Cases As healthcare sector organizations continue to fall victim to phishing incidents, the number of individuals affected by health data breaches involving compromised email accounts continues to rise

LinkedIn Phishing Ramps Up With More-Targeted Attacks

Dark Reading

Seeking to take advantage of out-of-work users, malware groups continue to use LinkedIn and business services to offer fictional jobs and deliver infections instead

Use It, Save It, Or Lose It: Spring Cleaning for Information Governance

Speaker: Speakers Michelle Kirk of Georgia Pacific, Darla White of Sanofi, & Scott McVeigh of Onna

As an organization’s most valuable asset, data should be cared for and integrated, managed, archived, and deleted as appropriate. Join Onna, Georgia Pacific, and Sanofi for this on-demand webinar as they discuss proactive, practical steps for kicking off your organization's own digital cleanup.

2,5M+ users can check whether their data were exposed in Facebook data leak

Security Affairs

You can check if your personal information is included in the Facebook data leak by querying the data breach notification service Have I Been Pwned. The news of the availability on a hacking forum of the personal information for 533,313,128 Facebook users made the headlines.

Risk 95

7 Ways to Reduce Cyber Threats From Remote Workers

Dark Reading

The pandemic's decline won't stop the work-from-home trend nor the implications for cybersecurity, so it's crucial to minimize the threats

LinkedIn Spear-Phishing Campaign Targets Job Hunters


Fake job offers lure professionals into downloading the more_eggs backdoor trojan. Malware Web Security

Interview with an Archivist: City of Dallas

The Texas Record

Bonnie and Andrew Glass interviewing John Slate – Feb. Each April, we like to celebrate Records and Information Management (RIM) Month. To kick it off this year, we are featuring an interview with John H. Slate, City Archivist for Dallas, Texas.

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

33.4% of ICS computers hit by a cyber attack in H2 2020

Security Affairs

H2 2020 – Kaspersky observed an increase in ransomware attacks on industrial control system (ICS) systems in developed countries.

15 Cybersecurity Pitfalls and Fixes for SMBs


In this roundtable, security experts focus on smaller businesses offer real-world advice for actionable ways to shore up defenses using fewer resources. Featured Hacks IoT Malware Mobile Security Threatpost Webinar Series Vulnerabilities Web Security

Name That Edge Toon: Rough Patch?

Dark Reading

Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card


Yesterday’s collection woes need not be today’s (or tomorrow’s) problem

OpenText Information Management

Collection is often considered the most technically rigorous and complex phase of eDiscovery—it involves the acquisition of potentially relevant electronically stored information (ESI) from native sources into an eDiscovery platform for investigation or review.

Risk 61

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

Data from 553 Million Facebook Accounts Leaked Online

Dark Reading

Personal information belonging to more than 533 million Facebook users was found available on a cybercrime forum


Security in the healthcare spotlight

OpenText Information Management

One of the most significant priorities facing healthcare in 2021 is the need for improved security. The rapid move to remote platforms and telehealth has increased the attack surface for cyberattacks targeting healthcare organizations.

Kaspersky Uncovers New APAC Cyberespionage Campaign

Dark Reading

A group related to Chinese-speaking threat group Cycldek is targeting government and military organizations in Vietnam

Apple Mail Zero-Click Security Vulnerability Allows Email Snooping


The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two.ZIP files attached. Vulnerabilities Web Security

Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Fintech Giant Fiserv Used Unclaimed Domain via Krebs on Security

IG Guru

Check out this article here. The post Fintech Giant Fiserv Used Unclaimed Domain via Krebs on Security appeared first on IG GURU. Compliance Cyber Security IG News Information Governance information security domain fiserv krebs on security

Spy Operations Target Vietnam with Sophisticated RAT


Researchers said the FoundCore malware represents a big step forward when it comes to evasion. Government Hacks Malware

IT 81

Thales Earns 5-Star Rating in 2021 CRN Partner Program Guide

Thales Cloud Protection & Licensing

Thales Earns 5-Star Rating in 2021 CRN Partner Program Guide. madhav. Tue, 04/06/2021 - 06:57.

533M Facebook Accounts Leaked Online: Check if You Are Exposed


An estimated 32 million, of the half-billion of Facebook account details posted online, were tied to US-based accounts. Breach Facebook Privacy Web Security

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Federal Acquisition Service Training (FAST) Monthly Conference Series – Electronic Records Management

National Archives Records Express

We will be presenting at an upcoming Federal Acquisition Service Training (FAST) Series on the Federal Electronic Records Modernization Initiative (FERMI). GSA welcomes you to attend and hear about acquiring services and solutions for Electronic Records Management on April 22nd at 1:00 p.m. EST to discover best practices, tools and techniques to get the most out of your next Electronic Records Management procurement. .

How To Defend the Extended Network Against Web Risks


Aamir Lakhani, cybersecurity researcher for Fortinet’s FortiGuard Labs, discusses criminals flocking to web server and browser attacks, and what to do about it. Hacks InfoSec Insider Vulnerabilities Web Security

Zapproved Announces Release of ZDiscovery Platform


Zapproved's industry-leading legal hold software and our powerful processing & review engine all in one platform: Introducing ZDiscovery. Zapproved News cloud-based ediscovery software ediscovery legal holds platform processing and review Zapproved Zapproved news ZDiscovery

Cloud 56