Fri.Oct 04, 2019

Malware Most Foul: Emotet, Trickbot, Cryptocurrency Miners

Data Breach Today

Researchers: Targeted Crime Attacks Surge, Continue to Blend With Nation-State Campaigns Banking Trojans and cryptocurrency mining malware continue to be among the most-seen types of malicious code used for nontargeted attacks.

Mining 239

MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

The Last Watchdog

It’s clear that managed security services providers (MSSPs) have a ripe opportunity to step into the gap and help small- to medium-sized businesses (SMBs) and small- to medium-sized enterprises (SMEs) meet the daunting challenge of preserving the privacy and security of sensitive data.

Risk 159

Just How Widespread Is Ransomware Epidemic?

Data Breach Today

Report: Over 600 Attacks in First 8 Months of Year More than 600 ransomware attacks pummelled local governments, schools districts and healthcare providers across the U.S. in the first three quarters of this year, according to a study by security firm Emsisoft.

Egypt regularly spies on opponents and activists with mobile apps

Security Affairs

Researchers at Check Point discovered that Egypt ‘ government has been spying citizens in a sophisticated surveillance program. Researchers at Check Point discovered that the Egyptian government has been spying on activists and opponents as part of a sophisticated surveillance program.

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

Analysis: Huawei's US Trust Problem

Data Breach Today

The latest edition of the ISMG Security Report analyzes concerns about the use of Huawei equipment by U.S. telecommunications firms. Also featured: A Huawei executive discusses 5G security, plus an update on an Australian ransomware attack

More Trending

Facebook Pressured Over Encrypted Messaging Plans

Data Breach Today

US, UK and Australia Push for Law Enforcement Access Facebook is falling under renewed pressure for its plans to make its messaging platforms fully encrypted. The U.S., and Australia are asking Facebook to ensure law enforcement can access messages

Iranian Hackers Targeted a US Presidential Candidate

WIRED Threat Level

A revelation from Microsoft offers a chilling reminder that Russia is not the only country interested in swaying the 2020 election. Security Security / Cyberattacks and Hacks

Preparing for Security in Cloud 3.0

Data Breach Today

Attorney Lisa Lifshitz on Addressing Legal, Regulatory Concerns She wrote the book on Cloud 3.0, and now attorney Lisa Lifshitz shares insights on key considerations for choosing cloud providers, as well as how to ensure compliance with emerging regulations

Cloud 185

A US Election Phishing Attack, Quitting Vaping, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / Cyberattacks and Hacks

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Nigerian Man Charged in Phishing Scam Targeting US Agencies

Data Breach Today

Enters Not Guilty Plea in Alleged $1 Million Scheme A Nigerian man charged with helping to run a $1 million phishing scheme that targeted the Government Services Administration and other agencies has been extradited to the U.S.,

Tracking by Smart TVs

Schneier on Security

Long Twitter thread about the tracking embedded in modern digital televisions. The thread references three academic papers. academicpapers internetofthings tracking

Paper 95

Canada's 2020 Privacy Outlook

Data Breach Today

Former Regulator Robin Gould-Soil on Convergence of Privacy, Security Former regulator Robin Gould-Soil has a unique perspective, with experience in both the public and private sectors. She weighs in on the convergence of privacy legislation and cybersecurity

Virus Bulletin 2019: VoIP Espionage Campaign Hits U.S. Utilities Supplier

Threatpost

An attacker whose motives are unclear compromised an Asterisk server in a highly targeted campaign. Critical Infrastructure Hacks active attack asterisk server Check Point compromise espionage gas Oil outgoing calls utilities voip platform

114
114

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

URGENT/11 Vulnerabilities: Taking Action

Data Breach Today

Healthcare organizations can take steps to start mitigating risks while awaiting vendor software patches to address URGENT/11 IPnet vulnerabilities in their medical devices, says researcher Ben Seri of security firm Armis, which identified the flaws

Risk 142

Google Warns of Android Zero-Day Bug Under Active Attack

Threatpost

Flaw impacts 18 Android models including Google’s flagship Pixel handset as well as phones made by Samsung, Huawei and Xiaomi.

Groups 114

Wearing Two Hats: CISO and DPO

Data Breach Today

What's it like to serve in the dual roles of CISO and DPO? Gregory Dumont, who has both responsibilities at SBE Global, a provider of repair and after-sales service solutions to the electronics and telecommunication sectors, explains how the roles differ

Sales 139

More Cryptanalysis of Solitaire

Schneier on Security

In 1999, I invented the Solitaire encryption algorithm , designed to manually encrypt data using a deck of cards. It was written into the plot of Neal Stephenson's novel Cryptonomicon , and I even wrote an afterward to the book describing the cipher.

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

8 Ways Businesses Unknowingly Help Hackers

Dark Reading

From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in

IT 114

Virus Bulletin 2019: Magecart Infestations Saturate the Web

Threatpost

There are dozens of known groups, hundreds of C2 servers and millions of victim websites. Malware Vulnerabilities Web Security digital card skimmers magecart Magento RiskIQ state of the threat virus bulletin 2019

Groups 113

Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage'

Dark Reading

In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need

Cybersecurity is a shared responsibility, so own it, secure it and protect It

Thales eSecurity

October is Cybersecurity Awareness Month and while IT departments around the globe don’t need a reminder to keep data safe and secure, this is an excellent opportunity to amplify critical cybersecurity efforts across the enterprise.

IT 74

Complex Environments Cause Schools to Struggle for Passing Security Grade

Dark Reading

As ransomware attacks surge against school systems, an analysis of 1,200 K-12 institutions in North America shows complex environments and conflicting security controls

Friday Squid Blogging: Hawaiian Bobtail Squid Squirts Researcher

Schneier on Security

Cute video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered. Read my blog posting guidelines here. squid

Video 64

Time to Put This 'Toon to Bed

Dark Reading

The winning captions for September's cartoon contest are nothing to yawn about

104
104

AG Barr, Officials to Facebook: Don’t Encrypt Messaging

Threatpost

Officials say they are concerned about their ability to fight crime and protect citizens, while privacy advocates remain critical of government interference. Cryptography Facebook Privacy Attorney General William Barr Consumer Privacy Encryption Instagram internet Mark Zuckerberg messaging private messaging WhatsApp

Cybercrime: AI's Growing Threat

Dark Reading

Cyberecurity incidents expected to rise by nearly 70% and cost $5 trillion annually by 2024

87

Top 10 Cybersecurity Writing Mistakes

Lenny Zeltser

Want to strengthen your writing in under an hour? Watch the video I recorded to help you avoid the top 10 writing mistakes I’ve encountered when working as a cybersecurity professional.

Video 82