Mon.Apr 22, 2019

WannaCry Stopper Pleads Guilty to Writing Banking Malware

Data Breach Today

Marcus Hutchins, aka MalwareTech, Says He Regrets Coding, Distributing 'Kronos' Marcus Hutchins, the British security researcher who helped stop the massive WannaCry ransomware outbreak in mid-2017, has pleaded guilty to developing and distributing "Kronos" banking malware when he was younger

Who’s Behind the RevCode WebMonitor RAT?

Krebs on Security

Sales 196

Regulator to Facebook: Move Fast But Stop Breaking Things

Data Breach Today

FTC Reportedly Eyes Holding Mark Zuckberberg Personally Accountable for Privacy "Move fast and break things," Facebook CEO Mark Zuckerberg once said of his company's internal motto.

NEW TECH: Circadence deploys ‘gamification’ training to shrink cybersecurity skills gap

The Last Watchdog

It’s clear that closing the cybersecurity skills gap has to happen in order to make our internet-centric world as private and secure as it ought to be. Related: The need for diversity in cybersecurity personnel One of the top innovators in the training space is Circadence ®. The Boulder, CO-based company got its start in the mid-1990s as a pioneer of massive multi-player video games.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

What Led to a $4.7 Million Breach Lawsuit Settlement?

Data Breach Today

Washington State University Case Involved Theft of a Hard Disk Drive Washington State University has agreed to pay more than $4.7 million to settle a lawsuit stemming from the theft of a portable hard disk drive from a self-storage unit.

IT 204

More Trending

jQuery JavaScript library flaw opens the doors for attacks on hundreds of millions of websites

Security Affairs

The popular jQuery JavaScript library is affected by a rare prototype pollution vulnerability that could allow attackers to modify a JavaScript object’s prototype.

EU To Build Massive Biometric Database

Adam Levin

The European Union’s parliament voted to create a biometric database of over 350 million people.

Achieving digital transformation in the insurance industry

OpenText Information Management

Research has consistently shown that senior management within the insurance sector think digital transformation is critical to their business.

Russian Twitter bot activity increased in the wake Mueller report release

Security Affairs

Experts at security firm SafeGuard reported that Russian Twitter bot activity raised up by 286 percent in the wake of the release of the Mueller Report.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Lavaman 2019 Triathlon – We did It Together!

Reltio

Mona Rakibe , Director Product Manager, Reltio. Triathlon is a great opportunity to test your endurance, if you have an extreme determination coupled with rigorous training. We had the determination, but always lacked time for training.

IT 83

A flaw in Shopify API flaw exposed revenue and traffic data of thousands of stores

Security Affairs

Researcher discovered a high-severity flaw in Shopify e-commerce platform that could have been abused to expose the traffic and revenue data for the stores. Bug bounty hunter Ayoub Fathi.

Sales 83

Mueller Makes It Clear: Trump Was Worse Than a 'Useful Idiot'

WIRED Threat Level

The Mueller report exposes the extent to which not just Russia but Donald Trump's own associates grifted the president. Security

IT 78

New AIIM Research: State of the Industry – Content Services

AIIM

Recently, AIIM released an eBook titled, State of the Industry – Content Services that examines the current state of Content Services technologies and how user perceptions about them are changing.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Campaign leverages Bit.ly, BlogSpot, and Pastebin to distribute RevengeRAT

Security Affairs

Palo Alto Networks Unit 42 researchers uncovered a malicious campaign targeting entities in North America, Europe, Asia, and the Middle East with RevengeRAT.

14 Mueller Report Takeaways You Might Have Missed

WIRED Threat Level

When you dig into the Mueller report, a lot of important details start to jump out. Security Security / National Security

OpenText Discovery Project Manager spotlight: Matthew Stavisky

OpenText Information Management

Last quarter, we kicked off the inaugural eDiscovery Project Manager (PM) spotlight, highlighting some of the incredible talent powering client success in litigation and investigation projects.

Blog 65

5 steps to more efficient autonomous car data processing

DXC Technology

Autonomous cars promise to change the face of transportation, offering many more mobility options for individual motorists and companies alike. In moving forward with this new technology, our automotive clients have a very important challenge to overcome: processing the petabytes of data that gets collected during the development and testing of autonomous driving systems. KPIs […]. Analytics Automotive automakers autonomous cars

Data 62

Satisfying customer convenience without sacrificing data security

Information Management Resources

How can we develop solutions that prioritize both without creating frustrations for the end user? These are questions we must explore in order to promote positive growth and innovation. Customer experience Data security Customer data

Wi-Fi Hotspot Finder Spills 2 Million Passwords

Threatpost

China-based app maker ignored repeated warnings by researchers that its password database - stored in plain text - was accessible to anyone online. Cloud Security Mobile Security Android app leaky data mobile app Wi-Fi hotspots WiFi Finder App

The gap within the skills gap: What does cybersecurity really need?

Information Management Resources

We need to be more specific when we talk about a 'skills gap.' I believe the genuine talent shortage is in hands-on areas, like application security and DevSecOps. Data security Cyber security Career advancement Career moves

Evil TeamViewer Attacks Under the Guise of the U.S. State Department

Threatpost

The attack is targeting financial regulators and embassy staff-- but probably isn't the work of an APT. Government Malware apt check point research cyber attack Dark Web embassy evapiks financial sector financially motivated regulators State Department TeamViewer

Trojanized TeamViewer Used in Targeted Attacks Against Multiple Embassies

Dark Reading

Motive remains unclear though financial theft appears to be one possibility, Check Point Research says

77

Millions of Medical Documents for Addiction and Recovery Patients Leaked

Threatpost

The information includes data on all rehab treatments and procedures, linked with patients' names and other info. Breach Cloud Security Privacy addiction data leak elasticsearch database exposure Extortion harassment medical treatment information misconfigured database PII recovery rehab treatment center

FBI: $2.7 billion in Losses to Cyber-Enabled Crimes in 2018

Dark Reading

Internet Crime Complaint Center (IC3) last year received an average of 900+ reports daily of Internet-enabled theft, fraud, and exploitation

76

Are you amassing your data war chest?

Information Management Resources

Beyond the data you know about, what about the data or value you don’t? This is called dark data. The idea is that you probably want to collect as much data as you can afford, for as long as you can, while avoiding or mitigating risk. Big data Data management Data strategy

Risk 76

Is Privacy Really iPhone? Researchers Weigh in on Apple’s Targeted Ad Tracking

Threatpost

A unique identifier is enabled by default on every iPhone that's shipped, allowing advertisers to follow the phone's activity across the web. Facebook Mobile Security Privacy ad tracking apple identifiers for advertisers idfa iphone iphone versus android Mozilla petition television ads trash talking

4 Tips to Protect Your Business Against Social Media Mistakes

Dark Reading

Don't let social media become the go-to platform for cybercriminals looking to steal sensitive corporate information or cause huge reputational damage

Tips 75

More Common Questions about NARA’s Federal Electronic Records Modernization Initiative (FERMI)

National Archives Records Express

In this post, we are continuing to answer some of the common questions we’ve received about FERMI. This post focuses on questions about electronic records management approaches and how FERMI supports the transition to digital government. Please feel free to ask any additional questions here as a comment or email RMPolicy@nara.gov. Here are some common questions we’ve heard: . What types of approaches to records management can we take with systems?

Tomorrow is the Day to Learn Why Discovery Isn’t Just for Litigation Anymore: eDiscovery Webcasts

eDiscovery Daily

Where is my brain?!? I’ve forgotten to mention this before now!

Who Gets Targeted Most in Cyberattack Campaigns

Dark Reading

Attackers are changing both their tactics and targets in an attempt to remain criminally successful, Proofpoint's study found

Study 74

Create an Airtight Privacy Program: Manage Privacy and Retention Together

InfoGoTo

Privacy is more of a priority than ever. With new, heavy-hitting regulations being introduced nationally and globally (such as GDPR and CCPA ), as well as news about high-profile data breaches and mishandling of private information by companies, it’s not hard to see why.