Thu.Jan 09, 2020

Router Cryptojacking Campaigns Disrupted

Data Breach Today

20,000 Hacked MikroTik Routers in Southeast Asia Were Malware-Infected Nearly 16,000 malware-infected MicroTik routers in Southeast Asia have been scrubbed of Coinhive cryptojacking code, which mines for monero, thanks to an international police operation.

Mining 205

Senators Prod FCC to Act on SIM Swapping

Krebs on Security

Crooks have stolen tens of millions of dollars and other valuable commodities from thousands of consumers via “SIM swapping,” a particularly invasive form of fraud that involves tricking a target’s mobile carrier into transferring someone’s wireless service to a device they control. But the U.S.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Congressmen Call for Enhanced Financial Sector Security

Data Breach Today

Nine Federal Agencies Asked to Take Action in Light of Iranian Threats Two Democratic Congressmen have sent letters to nine federal financial regulatory agencies asking that they take action to shore up cyber defenses in the sector because of looming security threats from Iran

5 Ways Data Modeling Is Critical to Data Governance

erwin

Enterprises are trying to manage data chaos. They might have 300 applications, with 50 different databases and a different schema for each one.

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Onna is breaking down how the concept of information governance has evolved and ways today’s businesses can develop a holistic framework to keep up with a rapidly accelerating datasphere.

TikTok App Had Major Security Vulnerabilities

Data Breach Today

Now Fixed, Check Point Says Flaws Could Have Led to Account Takeover The security company Check Point has revealed several vulnerabilities in TikTok, the popular Chinese video app that has raised concerns lately from the U.S. military and lawmakers.

More Trending

MicroServices: Today’s data science gold rush

Thales eSecurity

Microservices are changing how organizations are doing business. And nowhere was this more clear than at KubeCon in San Diego last year. Microservices 1 is a powerful technology that is the kernel for modern cloud architecture, and it’s going to drive how people build, manage and deploy secure apps.

Chinese Malware Found Preinstalled on US Government-Funded Phones

Dark Reading

Researchers found unremovable malware preinstalled in the Unimax U686CL, a budget Android device sold by Assurance Wireless

Iranian Hackers Have Been ‘Password-Spraying’ the US Grid

WIRED Threat Level

A state-sponsored group called Magnallium has been probing American electric utilities for the past year. Security Security / National Security

Eliminate the Password, Eliminate the Password Problem.

The Security Ledger

Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like?

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

11 cyber security predictions for 2020

IT Governance

Almost everyone wants to know what the future has in store – particularly when it comes to cyber security. Keeping aware of the latest cyber threats and the best solutions to combat them will put organisations in a better position to prevent attacks.

IoT 82

Currency Exchange Company Travelex Hit By Ransomware Attack

Adam Levin

Currency exchange giant Travelex has effectively been taken offline by a ransomware attack. . The attack was first detected the night of December 31. Soon after, the company took its systems offline.

56.25 million US residents records collected by CheckPeople exposed on a Chinese server

Security Affairs

A database containing the personal details of 56.25 million US residents that allegedly belongs to CheckPeople.com website was exposed online. A database containing the personal details of 56.25

BELGIUM:  Belgian DPA fines for cookie non-compliance and warns other companies to act in compliance

DLA Piper Privacy Matters

By Patrick Van Eecke, Frederik Ringoot and Gilles Hachez. The Belgian Data Protection Authority issued a fine of 1% of the annual turnover of the company for not acting in compliance with the cookie rules, despite the corrective actions undertaken by the company.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Mozilla addresses CVE-2019-17026 Firefox Zero-Day exploited in targeted attacks

Security Affairs

Mozilla has released security updates for Firefox browser that address a zero-day vulnerability (CVE-2019-17026) that has been exploited in targeted attacks.

7 Free Tools for Better Visibility Into Your Network

Dark Reading

It's hard to protect what you don't know is there. These free tools can help you understand just what it is that you need to protect -- and need to protect yourself from

IT 78

3 Problems That Data and Analytics Can Help Solve in Healthcare

Perficient Data & Analytics

I’m often asked how data and analytics can help to solve key industry problems in healthcare. With that in mind, three key industry issues rise to the top of the list. Cost of Care Delivery. The cost of care delivery is at the center of the problems facing the healthcare Industry.

AWS Issues 'Urgent' Warning for Database Users to Update Certs

Dark Reading

Users of AWS Aurora, DocumentDB, and RDS databases must download and install a fresh certificate and rotate the certificate authority

78

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

TrickBot gangs developed the PowerTrick backdoor for high-value targets

Security Affairs

Researchers at SentinelLabs reported that TrickBot operators used a new PowerShell backdoor in recent attacks aimed at high-value targets.

Attackers Increase Focus on North American Electric Utilities: Report

Dark Reading

Electric utilities continue to be a target of nation-state attackers, even before the latest tensions between Iran and the United States, says a critical-infrastructure security firm

Interpol: Goldfish Alpha operation reduces cryptojacking by 78%

Security Affairs

An operation coordinated by Interpol, dubbed Goldfish Alpha, dismantled an illegal cryptocurrency network operating in Southeast Asia.

Compliance and Privacy Partners and Ethikos to Speak at the 2020 MER Conference in Chicago

Information Governance Perspectives

The 2020 MER Conference Agenda has been announced and conference registration is now available.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Experts warn of ongoing scans for Citrix servers affected by CVE-2019-19781

Security Affairs

Threat actors are probing Citrix servers in the attempt to exploit the CVE-2019-19781 remote code execution vulnerability.

Jacksonville law firm brings order to its content with cloud-based document management

OpenText Information Management

Legal professionals need to be able to easily access critical documents at a moment’s notice, but the ever-growing volumes of information makes the challenge of managing it seemingly insurmountable. The Office of General Counsel (OGC) for the City of Jacksonville, Florida was no exception.

North Korea-linked Lazarus APT continues to target cryptocurrency exchanges

Security Affairs

In the last 18 months, North Korea-linked Lazarus APT group has continued to target cryptocurrency exchanges evolving its TTPs.

Customer Experience Trends: How To Stand Out From the Crowd

Reltio

Customer experience trends might change from time to time, but the central component remains steady: The customer must be at the heart of every business decision that you make. Joseph Pine and James G.

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.