Wed.Sep 21, 2022

Digital Bank Revolut Confirms Customer Data Breach

Data Breach Today

Names, Addresses, Emails and Telephone Numbers Exposed But Money Is Safe Customers of app-based bank Revolut should be on guard for phishing attempts after a data breach exposed personal details such as names, emails and telephone numbers.

SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity

The Last Watchdog

The pace and extent of digital transformation that global enterprise organizations have undergone cannot be overstated. Related: The criticality of ‘attack surface management’ Massive global macro-economic shifts have fundamentally changed the way companies operate. Remote work already had an impact on IT strategy and the shift to cloud, including hybrid cloud , well before the onset of Covid 19.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Spell-Checking in Google Chrome, Microsoft Edge Browsers Leaks Passwords

Dark Reading

It's called "spell-jacking": Both browsers have spell-check features that send data to Microsoft and Google when users fill out forms for websites or Web services

GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’

The Last Watchdog

Cybersecurity is a top concern for individuals and businesses in the increasingly digital world. Billion-dollar corporations, small mom-and-pop shops and average consumers could fall victim to a cyberattack. Related: Utilizing humans as security sensors. Phishing is one of the most common social engineering tactics cybercriminals use to target their victims. Cybersecurity experts are discussing a new trend in the cybercrime community called phishing-as-a-service.

Modernizing Workloads with the Cloud: How to Improve Performance & Reduce Costs

In this eBook, you’ll learn how to migrate workloads to Azure and optimize performance for your serverless and containerized applications in Azure.

Threat Group TeamTNT Returns with New Cloud Attacks

eSecurity Planet

A retired threat actor has returned with new attacks aimed at the cloud, containers – and encryption keys.

Cloud 92

More Trending

U.S. gov adds more Chinese Telecom firms to the Covered List

Security Affairs

The U.S. Federal Communications Commission (FCC) has added more Chinese telecom firms to the Covered List. The U.S. Federal Communications Commission (FCC) has added Pacific Network Corp, ComNet (USA) LLC, and China Unicom (Americas) Operations Limited, to the Covered List.

Microsoft Brings Zero Trust to Hardware in Windows 11

Dark Reading

A stacked combination of hardware and software protects the next version of Windows against the latest generation of firmware threats

90

Imperva blocked a record DDoS attack with 25.3 billion requests

Security Affairs

Cybersecurity company Imperva announced to have mitigated a distributed denial-of-service (DDoS) attack with a total of over 25.3 billion requests. Cybersecurity firm Imperva mitigated a DDoS attack with over 25.3 billion requests on June 27, 2022.

Automatic Cheating Detection in Human Racing

Schneier on Security

This is a fascinating glimpse of the future of automatic cheating detection in sports: Maybe you heard about the truly insane false-start controversy in track and field?

The 5 Stages of Account-Based Marketing — and How to Win Them All

Successfully complete the five stages of ABM: define, identify, engage, convert, and connect. We’ll show you how to create a unified system with your sales team to help them land more qualified opportunities and connect with prospects like never before.

Cyber Insurers Clamp Down on Clients' Self-Attestation of Security Controls

Dark Reading

After one company suffered a breach that could have been headed off by the MFA it claimed to have, insurers are looking to confirm claimed cybersecurity measures

Russian Sandworm APT impersonates Ukrainian telcos to deliver malware

Security Affairs

Russia-linked APT group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware. Russia-linked cyberespionage group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware.

Internships are worth their ‘weight in gold’ says MARA student

IG Guru

Check out the post here. Featured IG News Records Management Sponsored MARA Melissa Prunty Kemp SJSU

Shadowy Russian Cell Phone Companies Are Cropping Up in Ukraine

WIRED Threat Level

But as Ukrainians retake ground, some of the firms are erasing their online presence. Security Security / Privacy Security / National Security

Prioritizing Customer Experience Using SLIs & SLOs: A Case Study from The Telegraph

Service Level Indicators (SLIs) and Service Level Objectives (SLOs) are a key pillar of Site Reliability Engineering (SRE) and are the principal tool for eliminating needless alerts and focusing on what really matters to the business.

FTC Defends Expansive Privacy and Data Security ANPR at Public Forum

Data Matters

The FTC continues its defense of the wide-reaching Advance Notice of Proposed Rulemaking (ANPR) on “ Commercial Surveillance and Data Security ” that the Commission, by a 3-2 vote, issued in August.

Moving beyond spreadsheets with IBM Planning Analytics

IBM Big Data Hub

My journey with IBM Planning Analytics started with an early morning phone call to tell me that a member of my team had died, suddenly and unexpectedly. Not only was his loss a personal tragedy, it was a tragedy for the whole organization.

Meru Data Podcast Features Sidley Associate Lauren Kitces

Data Matters

Sidley associate Lauren Kitces was featured on Simplify For Success, a podcast series presented by Meru Data and hosted by Priya Keshav. Lauren discussed FTC’s proposed rulemaking regarding data privacy and data security, and shared her thoughts on how to prepare for the FTC enforcement.

Opportunity for Comment: Draft Bulletin on Storing Radiographic Film Records

National Archives Records Express

We are requesting comments on a draft NARA Bulletin, “ Guidance on Storing Radiographic Film Records ”. . Please send comments or questions to rmstandards@nara.gov by October 14, 2022. This draft Bulletin provides agencies with general storage guidance for managing radiographic film as federal records, in accordance with 36 CFR Chapter XII Subchapter B, Parts 1234 and 1237. . We developed this bulletin to fill a gap in our guidance to agencies.

The Ultimate Guide to Executive Recruiting

Sourcing the right executive candidates and filling key managerial roles in an organization can be difficult, even in the best of times. Download this eBook to level up your discovery process, talent sourcing, and strategies for reaching your best-fit candidates.

Meet Our Mayhem Heroes: Raj Shah

ForAllSecure

” As part of the Mayhem Heroes program , ForAllSecure visited various university campuses in the Spring of 2022.

Parent empowerment: Opening doors for engagement in education

Jamf

The final entry in our series about empowering users with Jamf’s end-user apps for education, this blog post details how Jamf Parent gives parenting adults access to their children’s schoolwork and device use

Next Round is on the General! Recalling the Time When General “Lightning Joe” Collins Bought a Round for 600 Men

Unwritten Record

When you hear “Cartographic Records”, what is the first thing that comes to mind? Most likely, you would be inclined to think of maps – topographic maps, geopolitical maps, navigation charts, township plats, and any of a hundred other, different sorts of maps.