Fri.Oct 04, 2019

Malware Most Foul: Emotet, Trickbot, Cryptocurrency Miners

Data Breach Today

Researchers: Targeted Crime Attacks Surge, Continue to Blend With Nation-State Campaigns Banking Trojans and cryptocurrency mining malware continue to be among the most-seen types of malicious code used for nontargeted attacks.

Mining 239

MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

The Last Watchdog

It’s clear that managed security services providers (MSSPs) have a ripe opportunity to step into the gap and help small- to medium-sized businesses (SMBs) and small- to medium-sized enterprises (SMEs) meet the daunting challenge of preserving the privacy and security of sensitive data.

Risk 165

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Just How Widespread Is Ransomware Epidemic?

Data Breach Today

8 Ways Businesses Unknowingly Help Hackers

Dark Reading

From lengthy email signatures to employees' social media posts, we look at the many ways organizations make it easier for attackers to break in

IT 107

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Analysis: Huawei's US Trust Problem

Data Breach Today

The latest edition of the ISMG Security Report analyzes concerns about the use of Huawei equipment by U.S. telecommunications firms. Also featured: A Huawei executive discusses 5G security, plus an update on an Australian ransomware attack

More Trending

Facebook Pressured Over Encrypted Messaging Plans

Data Breach Today

US, UK and Australia Push for Law Enforcement Access Facebook is falling under renewed pressure for its plans to make its messaging platforms fully encrypted. The U.S., and Australia are asking Facebook to ensure law enforcement can access messages

The sLoad Threat: Ten Months Later

Security Affairs

Since September 2018, SLoad (tracked as TH-163) is the protagonist of an increasing and persistent wave of attacks against Italian organizations. Introduction.

Preparing for Security in Cloud 3.0

Data Breach Today

Attorney Lisa Lifshitz on Addressing Legal, Regulatory Concerns She wrote the book on Cloud 3.0, and now attorney Lisa Lifshitz shares insights on key considerations for choosing cloud providers, as well as how to ensure compliance with emerging regulations

Cloud 182

Rethinking Cybersecurity Hiring: Dumping Resumes & Other 'Garbage'

Dark Reading

In a market that favors the job seeker, what are some alternatives to resume-sifting that will identify the talent you need

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Nigerian Man Charged in Phishing Scam Targeting US Agencies

Data Breach Today

Enters Not Guilty Plea in Alleged $1 Million Scheme A Nigerian man charged with helping to run a $1 million phishing scheme that targeted the Government Services Administration and other agencies has been extradited to the U.S.,

Iranian Hackers Targeted a US Presidential Candidate

WIRED Threat Level

A revelation from Microsoft offers a chilling reminder that Russia is not the only country interested in swaying the 2020 election. Security Security / Cyberattacks and Hacks

Canada's 2020 Privacy Outlook

Data Breach Today

Former Regulator Robin Gould-Soil on Convergence of Privacy, Security Former regulator Robin Gould-Soil has a unique perspective, with experience in both the public and private sectors. She weighs in on the convergence of privacy legislation and cybersecurity

Tracking by Smart TVs

Schneier on Security

Long Twitter thread about the tracking embedded in modern digital televisions. The thread references three academic papers. academicpapers internetofthings tracking

Paper 87

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

URGENT/11 Vulnerabilities: Taking Action

Data Breach Today

Healthcare organizations can take steps to start mitigating risks while awaiting vendor software patches to address URGENT/11 IPnet vulnerabilities in their medical devices, says researcher Ben Seri of security firm Armis, which identified the flaws

Risk 140

Cybercrime: AI's Growing Threat

Dark Reading

Cyberecurity incidents expected to rise by nearly 70% and cost $5 trillion annually by 2024

83

Wearing Two Hats: CISO and DPO

Data Breach Today

What's it like to serve in the dual roles of CISO and DPO? Gregory Dumont, who has both responsibilities at SBE Global, a provider of repair and after-sales service solutions to the electronics and telecommunication sectors, explains how the roles differ

Sales 136

Iran Caught Targeting US Presidential Campaign Accounts

Dark Reading

Microsoft detected the so-called Phosphorus nation-state gang attacking 241 user accounts associated with a US presidential campaign, current and former US government officials, journalists, others

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

More Cryptanalysis of Solitaire

Schneier on Security

In 1999, I invented the Solitaire encryption algorithm , designed to manually encrypt data using a deck of cards. It was written into the plot of Neal Stephenson's novel Cryptonomicon , and I even wrote an afterward to the book describing the cipher.

Complex Environments Cause Schools to Struggle for Passing Security Grade

Dark Reading

As ransomware attacks surge against school systems, an analysis of 1,200 K-12 institutions in North America shows complex environments and conflicting security controls

Virus Bulletin 2019: VoIP Espionage Campaign Hits U.S. Utilities Supplier

Threatpost

An attacker whose motives are unclear compromised an Asterisk server in a highly targeted campaign. Critical Infrastructure Hacks active attack asterisk server Check Point compromise espionage gas Oil outgoing calls utilities voip platform

101
101

Android 0-Day Seen Exploited in the Wild

Dark Reading

The local privilege escalation vulnerability affects Pixel, Samsung, Huawei, Xiaomi, and other devices

78

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Google Warns of Android Zero-Day Bug Under Active Attack

Threatpost

Flaw impacts 18 Android models including Google’s flagship Pixel handset as well as phones made by Samsung, Huawei and Xiaomi.

Time to Put This 'Toon to Bed

Dark Reading

The winning captions for September's cartoon contest are nothing to yawn about

72

A US Election Phishing Attack, Quitting Vaping, and More News

WIRED Threat Level

Catch up on the most important news from today in two minutes or less. Security Security / Cyberattacks and Hacks

FBI Investigates Mobile Voting Intrusion

Dark Reading

A group tried to access West Virginia's mobile voting app in 2018; now, the FBI is looking into what actually happened

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

John the Ripper: Pen Testing Product Overview and Analysis

eSecurity Planet

John the Ripper is a great tool for anyone checking for password vulnerability

Virus Bulletin 2019: Magecart Infestations Saturate the Web

Threatpost

There are dozens of known groups, hundreds of C2 servers and millions of victim websites. Malware Vulnerabilities Web Security digital card skimmers magecart Magento RiskIQ state of the threat virus bulletin 2019

Top 10 Cybersecurity Writing Mistakes

Lenny Zeltser

Want to strengthen your writing in under an hour? Watch the video I recorded to help you avoid the top 10 writing mistakes I’ve encountered when working as a cybersecurity professional.