Fri.May 22, 2020

Microsoft Warns of COVID-19 Phishing Emails Spreading RAT

Data Breach Today

Malicious Messages Attempt to Install NetSupport Manager Tool on Devices Microsoft is warning Windows users about an ongoing "massive" COVID-19-themed phishing campaign that is attempting to install the NetSupport Manager on devices. Attackers can turn NetSupport into a remote access Trojan, or RAT

5 Tips for Fighting Credential Stuffing Attacks

Dark Reading

With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Framework for Managing Identity in Healthcare Introduced

Data Breach Today

H-ISAC Guidance Offers a Step-by-Step Approach In response to the growing threat of identity-centric cyberattacks in healthcare, the Health Information Sharing and Analysis Center has published a framework for managing identity for the full work lifecycle of employees, practitioners, patients and business partners.

202
202

Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

ZLab researchers spotted a new malicious espionage activity targeting Italian companies operating worldwide in the manufacturing sector. Introduction.

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Phishing Campaign Leverages Google to Harvest Credentials

Data Breach Today

Researchers: Emails Contain Google Links to Make Them Appear Credible Some fraudsters waging phishing campaigns are using fake websites hosted on Google's Firebase Storage service in an attempt to harvest credentials, according to Trustwave, which notes the phishing emails contain links to the service to make them look more credible.

More Trending

Hackers Tried to Exploit Zero-Day Flaw in Sophos Firewall

Data Breach Today

Attackers Attempted to Plant Trojan, Ransomware By Exploiting Vulnerability Hackers tried two methods of exploiting a zero-day vulnerability in Sophos' XG firewall, but Sophos says it made a temporary fix that mitigated the risks.

Experts found a Privilege escalation issue in Docker Desktop for Windows

Security Affairs

A severe privilege escalation vulnerability, tracked as CVE-2020-11492, has been addressed in the Windows Docker Desktop Service. . Cybersecurity researchers from Pen Test Partners publicly disclosed a privilege escalation vulnerability in the Windows Docker Desktop Service. .

RagnarLocker Deploys a Virtual Machine to Hide Ransomware

Data Breach Today

10 iOS Security Tips to Lock Down Your iPhone

Dark Reading

Mobile security experts share their go-to advice for protecting iPhones from hackers, thieves, and fraudsters

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Analysis: The Long-Term Implications of 'Work From Home'

Data Breach Today

The latest edition of the ISMG Security Report features Retired General Keith Alexander, former NSA director, discussing the long-term security implications of the shift to working from home.

Dark Reading Edge Cybersecurity Crossword Puzzle, May 22th

Dark Reading

Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues

Microsoft warns of “massive campaign” using COVID-19 themed emails

Security Affairs

Experts from the Microsoft Security Intelligence team provided some details on a new “massive campaign” using COVID-19 themed emails. Researchers from the Microsoft Security Intelligence team provided some details on a new massive phishing campaign using COVID-19 themed emails.

Free Webinar – Blockchain DLT: Records, Rewards and Risks via San Jose State University on May 27 Noon ET

IG Guru

The agenda for the webinar includes: Blockchain Technology Industry Use Cases RIM Challenges & Unknowns Risk and Audit Considerations Panelists: Darra Hofman – Assistant Professor – University of British Columbia Pari J.

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry

Security Affairs

The Winnti hacking group continues to target gaming industry, recently it used a new malware named PipeMon and a new method to achieve persistence. Winnti hacking group is using a new malware dubbed PipeMon and a novel method to achieve persistence in attacks aimed at video game companies.

NSO Group Impersonates Facebook Security Team to Spread Spyware — Report

Threatpost

An investigation traces an NSO Group-controlled IP address to a fake Facebook security portal. Cloud Security Facebook Hacks Vulnerabilities Web Security amazon cloud infrastructure Lawsuit NSO Group security team portal spoofed page Spyware u.s. operations WhatsApp

Former Salesforce Execs Launch Data Protection Startup

Dark Reading

Cloud-based API service stores and manages sensitive consumer data with a zero-trust, database-as-a service approach

Cloud 70

Home Chef Serves Up Data Breach for 8 Million Records

Threatpost

The meal-kit company's customer records were leaked as part of the Shiny Hunters breach. Breach Hacks Privacy 8 million compromise Customer Records data breach home chef Shiny Hunters underground forum

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Customizing Your Local Government Retention Schedule

The Texas Record

Post for state agencies coming soon. Local governments are afforded a lot of leeway when adopting TSLAC’s Local Government Schedules. It may seem daunting at first to familiarize yourself with, and meet the mandatory minimums, of 100 or even 1000 record series, but it doesn’t have to be.

How to foster a culture that values data privacy

Collibra

Data is embedded in every world-class company’s strategy. In its 2019 Annual Report , JPMorgan explicitly states that data is embedded in its strategies not only for innovating products and services, but also improving employee programs, employee privacy and community investments.

‘Coronavirus Report’ Emails Spread NetSupport RAT, Microsoft Warns

Threatpost

Attackers used malicious Excel 4.0 documents to spread the weaponized NetSupport RAT in a spear-phishing campaign. Web Security coronavirus COVID-19 Excel 4.0 Microsoft microsoft security intelligence netsupport RAT remote access tool Spear Phishing

When agencies should collaborate – and not compete

OpenText Information Management

The world of agency work is notoriously competitive. But how can agencies get past that when the client wants more than one agency to work together on a campaign?

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Chafer APT Hits Middle East Govs With Latest Cyber-Espionage Attacks

Threatpost

Government and air transportation companies in Kuwait and Saudi Arabia were targeted in a recent attack tracked back to the Chafer APT. Hacks apt chafer chafer APT cyber espionage cyberattack hack Middle East attack

The API economy: Embrace your business, not your infrastructure

OpenText Information Management

Modern businesses face constant demands from customers, suppliers and employees. Better experiences, new products, faster service and lower cost. This can place a huge strain on existing IT systems, some of which have been in place for decades.

IT 56

Productive on Power Part One: User Experience Modernization

Rocket Software

Introduction. There are companies willing to invest millions of dollars and take enormous business risk to move their legacy applications and data to new platforms.

Risk 52

OpenText Developer: One place for all your developer needs

OpenText Information Management

Application Developers are the foundation of software companies around the world. Their expertise, abilities and creativity fuel the creation of new applications and solutions that expand the boundaries of current business solutions.

56

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

IBM Z for the Next Generation: What New Graduates Need to Know

Rocket Software

“Why is IBM Z ® important?”. It’s a phrase I hear often when I talk with fellow coders who ask what kind of developing I did at Rocket Software. My answer to this question is usually, “Well, they are still widely used in almost every essential service across the world.”.”

Delivering smiles and curbside meals during COVID-19

OpenText Information Management

Smiles from students tell the story: instead of chatting with friends in cafeteria lines, children and teenagers receive sack lunches sitting in cars lined along the curb.

The keys to blockchain interoperability (and why it matters)

DXC Technology

Without the ability of different computer systems, applications, and devices to access and share information, data would be digitally siloed and networking itself would be impossible.