Tue.Oct 04, 2022

Shangri-La Hotels Hit by Data Breach Incident

Data Breach Today

Hong Kong Privacy Office Says It Is 'Disappointed' With Breach Notification Upscale Asian hotelier Shangri-La Group has copped to a data breach incident that may affect hundreds of thousands of guests.

First 72 Hours of Incident Response Critical to Taming Cyberattack Chaos

Dark Reading

Responding to cyberattacks is extraordinarily stressful, but better planning, frequent practice, and the availability of mental health services can help IR professionals, a survey finds


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hacker Steals $29M From Transit Finance, Returns $19M

Data Breach Today

Thief Retains $2M as 'Bug Bounty,' Loses $1M to Bot Attack A hacker exploited a smart contract bug to steal about $29 million from DEX aggregator Transit Finance. Within hours of the theft, the attacker returned nearly $19 million - but not before keeping a $2 million "bug bounty" and losing $1.1

Microsoft Updates Mitigation for Exchange Server Zero-Days

Dark Reading

Researchers had discovered that Microsoft's original mitigation steps for the so-called "ProxyNotShell" flaws was easily bypassed


6 Steps to More Streamlined Data Modeling

Are you a developer, database architect, or database administrator that's new to Cassandra, but been tasked with developing a plan for implementing the technology anyway? Worry no more. Discover a streamlined methodical approach to Apache Cassandra® data modeling.

Why Is Akamai an Appealing M&A Target for Private Equity?

Data Breach Today

Akamai's Big Bets Around Security Compensate for a Struggling Content Delivery Unit The steady barrage of acquisition reports around publicly traded digital experience vendor Akamai has intensified in recent weeks.

More Trending

US Regulators Identify Cybersecurity Risks in Crypto Trading

Data Breach Today

Need Regulator for Bitcoin Spot Market, Says Financial Stability Oversight Council A council chaired by Treasury Secretary Janet Yellen and comprised of the heads of major federal financial regulatory agencies called on Congress to more closely regulate the spot market for crypto assets.

Risk 130

Vice Society Publishes LA Public School Student Data, Psych Evals

Dark Reading

After a flat refusal to pay the ransom, Los Angeles Unified School District's stolen data has been dumped on the Dark Web by a ransomware gang

Passwords Are Unfit - So Why Do We Still Have Them?

Data Breach Today

Passwords are supported everywhere. But, says Andrew Shikiar, executive director of the FIDO Alliance, "they have been proven time and time again to simply be unfit for today's networked economy." In this episode of "Cybersecurity Unplugged," Shikiar discusses how to move beyond passwords

Ransomware 3.0: The Next Frontier

Dark Reading

Attackers are already circling back to reselling stolen data instead of — and in addition to — extortion

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

Tim Eades of vArmour on Expanding From Banking to Government

Data Breach Today

CEO Dishes on How Government Has Struggled to See Across Its Application Terrain While vArmour has enjoyed success in banking, the U.S. government is now the fastest-growing part of its business.

Growing Reliance on Cloud Brings New Security Challenges

Dark Reading

With organizations expanding their cloud operations, cloud security is imperative to protect applications and data

Cloud 97

Evolving IAM Challenges in Healthcare and Other Sectors

Data Breach Today

Rebecca Archambault, Senior Director Analyst at Gartner, Discusses Top IAM Trends The healthcare sector has long faced unique challenges involving identity and access management, but the novel coronavirus pandemic and various other key drivers are accentuating those issues, says Rebecca Archambault, senior director analyst at Gartner.

Trojanized Comm100 Live Chat app installer distributed a JavaScript backdoor

Security Affairs

A threat actor used a trojanized installer for the Comm100 Live Chat application to distribute a JavaScript backdoor.

10 Rules to More Streamlined Data Modeling

Apache Kafka is a powerful piece of software that can solve a lot of problems. Like most libraries and frameworks, you get out of it what you put into it. Learn 10 rules that will help you perfect your Kafka system to get ahead.

North Korea Trojanizing Open-Source Software

Data Breach Today

Lazarus Group Uses Social Engineering to Manipulate Victims to Download Malware North Korea is using weaponized versions of open-source utilities to spy on the technology, defense and entertainment sectors worldwide.

Former NSA Employee Faces Death Penalty for Selling Secrets

Dark Reading

Suspect allegedly thought he was swapping secrets with a foreign government for crypto — but the contact turned out to be an FBI agent

Digital Identity Bill Passes Key Senate Milestone

Data Breach Today

Jeremy Grant Explains How Bill Would Create Standards, Funding for Online IDs A Senate committee this week approved a bill that would create governmentwide standards for identity verification and provide grants to help states and local agencies upgrade ID systems and offer online digital identity services.

An agile approach to Data Science

OpenText Information Management

Most Professional Services engagements with OpenText™ follow a traditional design, built, test and deploy project methodology. OpenText software is well suited for the waterfall project model. A notable exception is OpenText™ Magellan™ and our Data Science projects.

Powering Personalization Through Customer Data

Finding the right CDP can help unlock the value of your customer data. This eBook offers guidance on choosing, deploying, and utilizing a CDP, along with a case study on how one bank put data into action to forge stronger connections with customers.

Steam Gaming Phish Showcases Browser-in-Browser Threat

Dark Reading

Attackers are using the recently emerged browser-in-the-browser phishing technique to steal accounts from Valve's popular gaming platform, but it's a warning shot to businesses

One-Fourth of Organizations Have Been Victim to a Ransomware Attack with 59% Starting with Email


New analysis highlights just how prevalent ransomware attacks are today, how material the impacts are, whether organizations get their data back, and exactly how these attacks start. Ransomware

Aussie Telco Telstra Breached, Reportedly Exposing 30,000 Employees' Data

Dark Reading

The Telstra cyber incident comes just weeks after its main rival Optus suffered a major compromise of its customer database

IT 90

NSA Employee Charged with Espionage

Schneier on Security

An ex-NSA employee has been charged with trying to sell classified data to the Russians (but instead actually talking to an undercover FBI agent). It’s a weird story, and the FBI affidavit raises more questions than it answers.

Modernizing Workloads with the Cloud: How to Improve Performance & Reduce Costs

In this eBook, you’ll learn how to migrate workloads to Azure and optimize performance for your serverless and containerized applications in Azure.

Cyber Risk Remains Top Concern for Businesses with a Distinct Lack of Unpreparedness


New insight from over 1200 businesses paints a picture of how organizations believe they are ready for an attack and are definitely focused on cyber risk, but don’t have what they need in place. Cybersecurity

Risk 90

AI Governance: Break open the black box

IBM Big Data Hub

It is well known that Artificial Intelligence (AI) has progressed, moving past the era of experimentation. Today, AI presents an enormous opportunity to turn data into insights and actions, to amplify human capabilities, decrease risk and increase ROI by achieving break through innovations.

[HEADS UP] The Old "Nigerian Prince Scam" resurfaces as "Russian Billionaire Fraud"


Scammers continue to get creative when it comes to current events - and this new scam is no exception. Cybercrime Russia

IT 88

Workforce Data Privacy in the Modern Work Era

Dark Reading

It takes culture as well as individual and corporate responsibilities to ensure workforce data privacy and compliance

The 5 Stages of Account-Based Marketing — and How to Win Them All

Successfully complete the five stages of ABM: define, identify, engage, convert, and connect. We’ll show you how to create a unified system with your sales team to help them land more qualified opportunities and connect with prospects like never before.

FCC Warns of Post-Hurricane Scams


The US Federal Communications Commission (FCC) offers advice on how to avoid falling for scams that follow in the wake of natural disasters like Hurricane Ian. Scammers target victims of disasters as well as people trying to donate to charities. Security Awareness Training Cybersecurity

Expert Insights: How to Protect Sensitive Machine-Learning Training Data Without Borking It

Dark Reading

Another element of ML security is the data used to train the machine learning system itself

Lazarus APT employed an exploit in a Dell firmware driver in recent attacks

Security Affairs

North Korea-linked Lazarus APT has been spotted deploying a Windows rootkit by taking advantage of an exploit in a Dell firmware driver. The North Korea-backed Lazarus Group has been observed deploying a Windows rootkit by relying on exploit in a Dell firmware driver dbutil_2_3.sys,