Mon.Apr 22, 2019

WannaCry Stopper Pleads Guilty to Writing Banking Malware

Data Breach Today

Marcus Hutchins, aka MalwareTech, Says He Regrets Coding, Distributing 'Kronos' Marcus Hutchins, the British security researcher who helped stop the massive WannaCry ransomware outbreak in mid-2017, has pleaded guilty to developing and distributing "Kronos" banking malware when he was younger

Who’s Behind the RevCode WebMonitor RAT?

Krebs on Security

Sales 190

Regulator to Facebook: Move Fast But Stop Breaking Things

Data Breach Today

FTC Reportedly Eyes Holding Mark Zuckberberg Personally Accountable for Privacy "Move fast and break things," Facebook CEO Mark Zuckerberg once said of his company's internal motto.

Excellent Analysis of the Boeing 737 MAX Software Problems

Schneier on Security

This is the best analysis of the software causes of the Boeing 737 MAX disasters that I have read. Technically this is safety and not security; there was no attacker.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

What Led to a $4.7 Million Breach Lawsuit Settlement?

Data Breach Today

Washington State University Case Involved Theft of a Hard Disk Drive Washington State University has agreed to pay more than $4.7 million to settle a lawsuit stemming from the theft of a portable hard disk drive from a self-storage unit.

IT 212

More Trending

EU To Build Massive Biometric Database

Adam Levin

The European Union’s parliament voted to create a biometric database of over 350 million people.

NEW TECH: Circadence deploys ‘gamification’ training to shrink cybersecurity skills gap

The Last Watchdog

It’s clear that closing the cybersecurity skills gap has to happen in order to make our internet-centric world as private and secure as it ought to be. Related: The need for diversity in cybersecurity personnel One of the top innovators in the training space is Circadence ®. The Boulder, CO-based company got its start in the mid-1990s as a pioneer of massive multi-player video games.

Achieving digital transformation in the insurance industry

OpenText Information Management

Research has consistently shown that senior management within the insurance sector think digital transformation is critical to their business.

Russian Twitter bot activity increased in the wake Mueller report release

Security Affairs

Experts at security firm SafeGuard reported that Russian Twitter bot activity raised up by 286 percent in the wake of the release of the Mueller Report.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Lavaman 2019 Triathlon – We did It Together!


Mona Rakibe , Director Product Manager, Reltio. Triathlon is a great opportunity to test your endurance, if you have an extreme determination coupled with rigorous training. We had the determination, but always lacked time for training.

IT 83

A flaw in Shopify API flaw exposed revenue and traffic data of thousands of stores

Security Affairs

Researcher discovered a high-severity flaw in Shopify e-commerce platform that could have been abused to expose the traffic and revenue data for the stores. Bug bounty hunter Ayoub Fathi.

Sales 85

Satisfying customer convenience without sacrificing data security

Information Management Resources

How can we develop solutions that prioritize both without creating frustrations for the end user? These are questions we must explore in order to promote positive growth and innovation. Customer experience Data security Customer data

Campaign leverages, BlogSpot, and Pastebin to distribute RevengeRAT

Security Affairs

Palo Alto Networks Unit 42 researchers uncovered a malicious campaign targeting entities in North America, Europe, Asia, and the Middle East with RevengeRAT.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

The gap within the skills gap: What does cybersecurity really need?

Information Management Resources

We need to be more specific when we talk about a 'skills gap.' I believe the genuine talent shortage is in hands-on areas, like application security and DevSecOps. Data security Cyber security Career advancement Career moves

Mueller Makes It Clear: Trump Was Worse Than a 'Useful Idiot'

WIRED Threat Level

The Mueller report exposes the extent to which not just Russia but Donald Trump's own associates grifted the president. Security

IT 73

Are you amassing your data war chest?

Information Management Resources

Beyond the data you know about, what about the data or value you don’t? This is called dark data. The idea is that you probably want to collect as much data as you can afford, for as long as you can, while avoiding or mitigating risk. Big data Data management Data strategy

Risk 72

14 Mueller Report Takeaways You Might Have Missed

WIRED Threat Level

When you dig into the Mueller report, a lot of important details start to jump out. Security Security / National Security

How 5G could shape the future of banking

Information Management Resources

Leaders in bank innovation have ideas for improving financial services with high-speed, highly responsive 5G networks — ideas they say could be implemented relatively quickly. Mobile banking Augmented reality Virtual reality Virtual assistants Branch network Cloud computing U.S. Bank Wells Fargo AT&T Verizon

OpenText Discovery Project Manager spotlight: Matthew Stavisky

OpenText Information Management

Last quarter, we kicked off the inaugural eDiscovery Project Manager (PM) spotlight, highlighting some of the incredible talent powering client success in litigation and investigation projects.

Blog 65

Prediction models benefit from having built-in anomalies and glitches

Information Management Resources

Predicting business blind spots within time series data is a necessary but insufficient step, due to the fact that anomaly detection over a set of live data streams may result in anomaly fatigue, Data management Data discovery Data types

Data 63

5 steps to more efficient autonomous car data processing

DXC Technology

Autonomous cars promise to change the face of transportation, offering many more mobility options for individual motorists and companies alike. In moving forward with this new technology, our automotive clients have a very important challenge to overcome: processing the petabytes of data that gets collected during the development and testing of autonomous driving systems. KPIs […]. Analytics Automotive automakers autonomous cars

Data 63

Thai intelligence agency given sweeping powers to seize data

Information Management Resources

The new law allows the National Intelligence Agency to order cooperation from 'government offices and individuals” to hand over any information that may affect the nation’s security. Data privacy Data security Data management

New AIIM Research: State of the Industry – Content Services


Recently, AIIM released an eBook titled, State of the Industry – Content Services that examines the current state of Content Services technologies and how user perceptions about them are changing.

Data of 11,639 Riverplace patients at risk from malware

Information Management Resources

Riverplace Consulting Center, Anoka, Minn., is notifying 11,639 patients and the HHS Office for Civil Rights after finding malware in its information systems. Data breaches Cyber security Malware Protected health information HIPAA regulations Office for Civil Rights

Risk 60

Millions of Medical Documents for Addiction and Recovery Patients Leaked


The information includes data on all rehab treatments and procedures, linked with patients' names and other info. Breach Cloud Security Privacy addiction data leak elasticsearch database exposure Extortion harassment medical treatment information misconfigured database PII recovery rehab treatment center

FBI: $2.7 billion in Losses to Cyber-Enabled Crimes in 2018

Dark Reading

Internet Crime Complaint Center (IC3) last year received an average of 900+ reports daily of Internet-enabled theft, fraud, and exploitation


Wi-Fi Hotspot Finder Spills 2 Million Passwords


China-based app maker ignored repeated warnings by researchers that its password database - stored in plain text - was accessible to anyone online. Cloud Security Mobile Security Android app leaky data mobile app Wi-Fi hotspots WiFi Finder App

Who Gets Targeted Most in Cyberattack Campaigns

Dark Reading

Attackers are changing both their tactics and targets in an attempt to remain criminally successful, Proofpoint's study found

Study 77

Evil TeamViewer Attacks Under the Guise of the U.S. State Department


The attack is targeting financial regulators and embassy staff-- but probably isn't the work of an APT. Government Malware apt check point research cyber attack Dark Web embassy evapiks financial sector financially motivated regulators State Department TeamViewer

Trojanized TeamViewer Used in Targeted Attacks Against Multiple Embassies

Dark Reading

Motive remains unclear though financial theft appears to be one possibility, Check Point Research says


Tomorrow is the Day to Learn Why Discovery Isn’t Just for Litigation Anymore: eDiscovery Webcasts

eDiscovery Daily

Where is my brain?!? I’ve forgotten to mention this before now!