Fri.May 10, 2019

Chinese Men Charged With Hacking Health Insurer Anthem

Data Breach Today

Data of 78.8 Million Individuals Was Encrypted, Sent to China, US Alleges Two Chinese men have been indicted on charges related to the breach of health insurer Anthem, which saw the personal information of 78.8 million individuals stolen, as well as attacks against three other large U.S. companies

Nine Charged in Alleged SIM Swapping Ring

Krebs on Security

Feds Warn of 'Electricfish' Malware Linked to North Korea

Data Breach Today

CERT Says Hidden Cobra APT Group Developed Malware The FBI and the Department of Homeland Security have issued a joint warning about new malware called "Electricfish." Investigators suspect it was developed by the advanced persistent threat group Hidden Cobra, which has been linked to North Korea

Groups 258

Top-Tier Russian Hacking group Fxmsp claims hack of major AntiVirus Companies

Security Affairs

A Russian hacking group Fxmsp is offering for sale the access to the networks of at least three antivirus companies in the US and source code of their software.

Groups 108

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Symantec CEO Exits as Company Misses Earnings Forecast

Data Breach Today

Events 215

More Trending

DeepDotWeb Goes Dark

Data Breach Today

The latest edition of the ISMG Security Report analyzes the FBI takedown of DeepDotWeb, a dark net portal. Also featured are discussions on healthcare app security and the repercussions of poor coding security

Digitizing data to build a talented workforce

OpenText Information Management

Data – whether it is client, vendor, enterprise or consumer – has become the lifeblood of global business. And nearly a year after the General Data Protection Regulation (GDPR) came into force, the way in which organizations store, handle and use data has emerged as a priority.


Cultural Challenges and Digital Transformation

Data Breach Today

ISMG and Zscaler hosted a roundtable dinner in Morristown, New Jersey on April 11 focused on security's role in digital transformation

GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain

The Last Watchdog

The recent network breach of Wipro , a prominent outsourcing company based in India, serves as a stunning reminder that digital transformation cuts two ways. Our rising dependence on business systems that leverage cloud services and the gig economy to accomplish high-velocity innovation has led to a rise in productivity. However, the flip side is that we’ve also created fresh attack vectors at a rapid rate – exposures that are not being adequately addressed.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Heap Buffer Overflow Vulnerability found in Kaspersky Antivirus Engine

Security Affairs

Security researchers at the Imaginary team discovered a Heap Buffer Overflow Vulnerability in Kaspersky Antivirus Engine and responsibly reported it. Security experts at the Imaginary team discovered a Heap Buffer Overflow vulnerability in Kaspersky Antivirus Engine.

Data 95

Cryptanalyzing a Pair of Russian Encryption Algorithms

Schneier on Security

A pair of Russia-designed cryptographic algorithms -- the Kuznyechik block cipher and the Streebog hash function -- have the same flawed S-box that is almost certainly an intentional backdoor. It's just not the kind of mistake you make by accident, not in 2014.

How some banks are luring talent from big tech

Information Management Resources

Most financial institutions can’t compete on pay, but there are other advantages they can offer, including agile development. Automation Data science Recruiting Cyber security Keybank

DHS and FBI published a Malware Analysis Report on North Korea-linked tool ELECTRICFISH

Security Affairs

The U.S. Department of Homeland Security (DHS) and the FCI published a new joint report on ELECTRICFISH, a malware used by North Korea.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Crapo, Brown probe Facebook over financial data collection

Information Management Resources

Mike Crapo and Sherrod Brown are asking Facebook about its consumer financial data collection practices as they consider data privacy legislation. Data privacy Data security Data privacy rules Law and regulation Mike Crapo Sherrod Brown Senate Banking Committee Facebook

What is quantum computing and what could it mean for the healthcare industry?

DXC Technology

One of the longest hype curves in technology history — without products even being deployed — is that of quantum computing. After decades of research, many feel that viable and reliable quantum products may not be to market for another ten years. For those who have heard the term but are sketchy on what quantum […]. Healthcare quantum computing

8 top technology trends impacting the supply chain in 2019

Information Management Resources

Analysts will explore the top industry trends at the Gartner Supply Chain Executive Conferences, May 13-16 in Phoenix, AZ and June 17-19 in Barcelona, Spain. Artificial intelligence Analytics Internet of things RPA Blockchain

Are we so focused on input that we’ve overlooked the need to output information?


Prior to becoming involved with the content and information management industry, I spent several years in the high-volume printing industry.

Tips 87

Demystifying the Dark Web: What You Need to Know

Dark Reading

The Dark Web and Deep Web are not the same, neither is fully criminal, and more await in this guide to the Internet's mysterious corners


5 top data security and privacy technologies and leading vendors for each

Information Management Resources

Here are five top data security and privacy technologies to help organizations overcome data management challenges, as well as leading vendors within each category. Data security Cyber security Malware Cyber attacks

DOJ Says Chinese Hackers Attacked Anthem, but Not Why

WIRED Threat Level

For years, China was rumored to be behind the health insurance company's massive data breach, but now the Justice Department is noticeably silent on the hackers' motives and affiliation. Security Security / Cyberattacks and Hacks

Understanding the potential benefits and pitfalls of multi-cloud storage

Information Management Resources

The growing enterprise adoption of multi-cloud strategies represents a shift in mindset – enterprises are deciding that it is they, not the cloud providers, who need to be in control of their infrastructure. Cloud computing Cloud hosting Data strategy

Cloud 60

The WannaCry Security Legacy and What’s to Come


The WannaCry attack proved pivotal, changing the way organizations go about securing their environments. InfoSec Insider Malware Vulnerabilities Blaster Code Red Creeper Worm cryptoworm EternalBlue iCloud Microsoft OneDrive oogle Drive PC-Write Trojan Sasser Trojan WannaCry

China erodes U.S. dominance in tech with an avalanche of patents

Information Management Resources

The U.S. is losing its advantage to China and other countries when it comes to innovations related to artificial intelligence, blockchain and other key technologies. Artificial intelligence Machine learning Internet of things

Nvidia Warns Windows Gamers on GPU Driver Flaws


Nvidia has patched three vulnerabilities in its Windows GPU display driver that could enable information disclosure, denial of service and privilege escalation. Mobile Security Vulnerabilities cpu flaw Denial of Service Gaming GPU GPU display driver information disclosure flaw Lenovo Nvidia nvidia flaw patch privilege escalation flaw vulnerability

IT 83

SNP faces fines for data protection breach after election mailing error

The Guardian Data Protection

Party refers itself to ICO after voters receive campaign letters not addressed to them The Scottish National party faces being fined for a breach of data protection laws after sending out tens of thousands of European election mailings to the wrong addresses. The Information Commissioner’s Office confirmed on Friday morning that the SNP have referred itself for investigation after voters across Scotland received letters addressed to strangers or neighbours. Continue reading.

Data 83

Friday Squid Blogging: Cephalopod Appreciation Society Event

Schneier on Security

Last Wednesday was a Cephalopod Appreciation Society event in Seattle. I missed it. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

5 Reasons Why Your Data Governance Program Will Fail and Digital Transformation will Triumph


Your organization is, or was, off to a great start by understanding the importance of data and its ability to produce better insights and results than your industry competitors. So why are your Data Governance efforts falling flat?

Microsoft SharePoint Bug Exploited in the Wild

Dark Reading

A number of reports show CVE-2019-0604 is under active attack, Alien Labs researchers say


What good are notebooks? Bridging the data science skills gap with collaboration

IBM Big Data Hub

Predictive modeling and analytics have long been the domain of the data scientist and only the data scientist. But with modern tools, data science is becoming a team sport—business analysts and subject matter experts can join the analysis.

How We Collectively Can Improve Cyber Resilience

Dark Reading

Three steps you can take, based on Department of Homeland Security priorities

Do Double-Sided Documents Affect Scanning Prices?

Record Nations

There are a number of different factors that play into the cost of a scanning project, including how much prep work may be involved and deciding where and how you want the scanning project done.