Tue.Aug 04, 2020

FBI Warns of Surge in Fraudulent Shopping Websites

Data Breach Today

Victims Drawn to Malicious Sites Advertising Low Prices The FBI has issued an alert warning that cybercriminals are creating fraudulent websites that mimic popular e-commerce sites


UberEats data leaked on the dark web

Security Affairs

Security researchers from threat intelligence firm Cyble have discovered user records of American online food ordering and delivery platform UberEats on DarkWeb. Another day, another data breach made the headlines, this time the alleged victim is UberEATS. UberEats is an American online food ordering and delivery platform launched by Uber in 2014. During the process of darkweb and deep web monitoring, the Cyble Research Team came across a threat actor who leaked user records of UberEATS.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Alert: Chinese Malware Targeting IT Service Providers

Data Breach Today

CISA, DOD, FBI Issue Warning About Campaign Using Taidoor RAT A trio of U.S. government agencies is warning organizations about a hacking campaign using a malware strain that has previously been tied to Chinese hackers. The Taidoor RAT, which has been around for over 10 years, has recently been spotted in several campaigns against IT service providers

IT 128

6 Dangerous Defaults Attackers Love (and You Should Know)

Dark Reading

Default configurations can be massive vulnerabilities. Here are a half dozen to check on for your network


Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Alleged GandCrab Distributor Arrested in Belarus

Data Breach Today

Authorities Allege He Also Distributed Cryptocurrency Mining Malware A 31-year-old man who allegedly distributed versions of the GandCrab ransomware to target users has been arrested in Belarus for possession and distribution of malware, according to the country's Ministry of Internal Affairs

Mining 119

More Trending

Extended Enterprise: Threats, Gaps and How to Fight Them

Data Breach Today

VMWare Carbon Black's Stacia Tympanick Previews Upcoming Roundtable It's a new and permanent extended enterprise, as cybersecurity leaders budget for 2021. What are the top threats and vulnerabilities? How have enterprises hardened their endpoint defenses? Stacia Tympanick of VMWare Carbon Black previews a new virtual roundtable

New Spin on a Longtime DNS Intel Tool

Dark Reading

Domain Name Service database service Farsight Security, the brainchild of DNS expert Paul Vixie, celebrates 10 years with new modern features

US govt agencies share details of the China-linked espionage malware Taidoor

Security Affairs

China-linked hackers carried out cyber espionage campaigns targeting governments, corporations, and think tanks with TAIDOOR malware. The FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense (DoD) released information on a RAT variant, dubbed TAIDOOR, used by China-linked hackers in cyber espionage campaigns targeting governments, corporations, and think tanks.

Securing IoT as a Remote Workforce Strategy

Dark Reading

Digital transformation with Internet of Things devices offers organizations a way forward in the era of COVID-19. Optimizing this approach for the future will need to start with security

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Onna is breaking down how the concept of information governance has evolved and ways today’s businesses can develop a holistic framework to keep up with a rapidly accelerating datasphere.

Twitter Hack Tied To Employee Spearphishing

Adam Levin

With the arrest of 17-year-old hacker Graham Ivan Clark in Tampa, Florida and more than 30 charges later, we’re starting to get a better understanding of the July 15 hack that compromised 130 Twitter high-profile accounts. . As suspected by many, including us, the hack deployed a spearphishing attack on Twitter employees. .

Google & Amazon Replace Apple as Phishers' Favorite Brands

Dark Reading

Google and Amazon were the most imitated brands in the second quarter, knocking out Apple


The customer experience is now digital

OpenText Information Management

Customer experience has increasingly been focused on digital for several years, but the events of 2020 have drastically accelerated that change. In recent months, a ‘perfect storm’ of new technology, increased connectivity, new ways of working and social isolation have brought digital engagement to the forefront of customer experience. Today, digital engagement has become the … The post The customer experience is now digital appeared first on OpenText Blogs.

Retooling the SOC for a Post-COVID World

Dark Reading

Residual work-from-home policies will require changes to security policies, procedures, and technologies

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Hackers Are Building an Army of Cheap Satellite Trackers

WIRED Threat Level

NyanSat is an open source ground station that lets you listen in on low-orbit transmissions for about $100 worth of gear. Security Security / Security News

Maze Ransomware operators published data from LG and Xerox

Security Affairs

Maze ransomware operators published internal data from LG and Xerox after the company did not pay the ransom. Ransomware crews are very active during these months, Maze ransomware operators have published tens of GB of internal data allegedly stolen from IT giants LG and Xerox following failed extortion attempts. Maze ransomware operators published 50.2 GB from LG’s network and 25.8 GB from Xerox.

Hackers Could Use IoT Botnets to Manipulate Energy Markets

WIRED Threat Level

With access to just 50,000 high-wattage smart devices, attackers could make a bundle off of causing minor fluctuations. Security Security / Security News

NetWalker ransomware operators have made $25 million since March 2020

Security Affairs

NetWalker ransomware operators continue to be very active, according to McAfee the cybercrime gang has earned more than $25 million since March 2020. McAfee researchers believe that the NetWalker ransomware operators continue to be very active, the gang is believed to have earned more than $25 million since March 2020.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Decades-Old Email Flaws Could Let Attackers Mask Their Identities

WIRED Threat Level

Researchers found 18 exploits that take advantage of inconsistencies in the email plumbing most people never think about. Security Security / Security News

Cybercrime in the Age of COVID-19

Schneier on Security

The Cambridge Cybercrime Centre has a series of papers on cybercrime during the coronavirus pandemic. covid19 crime cybercrime uk

Paper 58

Apple Knocked Off Perch as Most Imitated Brand for Phishing Attacks


COVID-19 pandemic spurs spoofing preference changes, plus a surge in email-based attacks. Cloud Security Mobile Security Most Recent ThreatLists Web Security amazon apple brand phishing report Q2 Check Point coronavirus COVID-19 Facebook google Hackers most imitated Pandemic Phishing Spoofing technology sector threat actors WhatsApp

SHARE Selects Principal Solutions Advisor, Ezriel Gross, as Distinguished Speaker

Rocket Software

As one of the oldest computer user groups in the world, SHARE supports the continued development of the enterprise technology ecosystem. Over the years, Rocketeers have partnered with them to participate in events and lead speaking sessions, sharing the goal of educating users on legacy technology. SHARE members have also been critical in driving innovation in the IBM Z community, a cause that is very important to us at Rocket. .

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Twitter Could Face $250M FTC Fine Over Improper Data Use


The potential FTC fine comes after Twitter last year acknowledged that user emails and phone numbers were being used for targeted advertising. Hacks Web Security Data Privacy Federal Trade Commission FTC FTC fine improper data use privacy violation targeted advertising twitter

What Are the Penalties for FACTA Noncompliance

Record Nations

Businesses collect lots data on a daily basis. Whether it’s business, employee, or customer information, it’s important to keep this data secure. While there are many compliancy laws surrounding privacy, FACTA specifically covers customer data. The Fair and Accurate Credit Transactions Act, FACTA, was enacted in 2003 by the Federal Trade Commission (FTC). This act […]. The post What Are the Penalties for FACTA Noncompliance appeared first on Record Nations. Records Management

Best Enterprise Network Security Products

eSecurity Planet

Network security is central to IT security. Here are some of the best network security software and hardware products to protect vital data

IT 49

NetWalker Ransomware Rakes in $29M Since March


The ransomware has surged since moving to a RaaS model. Malware $29 million as a service Bitcoin earnings Extortion malware McAfee netwalker RaaS ransomware

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Change in the Middle of a COVID-19 Crisis


You still must get things done. The organization needs to make changes to adapt to a more turbulent world. However, how do you accomplish change when the organization’s change capacity is used coping with COVID-19 ? Learn why change management skills are more critical now than ever. Capacity for Change. Every person and every organization has a capacity for change. It’s the degree of change they can accept before problems occur.

NetWalker ransomware operators have made $25 million since March 2020

Security Affairs

NetWalker ransomware operators continue to be very active, according to McAfee the cybercrime gang has earned more than $25 million since March 2020. McAfee researchers believe that the NetWalker ransomware operators continue to be very active, the gang is believed to have earned more than $25 million since March 2020.

Newsletter WordPress Plugin Opens Door to Site Takeover


An XSS bug and a PHP object-injection vulnerability are present in a plugin used by hundreds of thousands of websites. Vulnerabilities Web Security Bug Cross Site Scripting newsletter PHP Object Injection plugin security vulnerability WordFence wordpress XSS