Mon.Oct 12, 2020

Microsoft, Others Dismantle Trickbot Botnet

Data Breach Today

Court Order Enables Takedown of Servers to Disrupt Malware, Protect Election Microsoft collaborated with cybersecurity companies and government agencies to take down the million-device Trickbot botnet in an effort to help protect the Nov. 3 U.S.

Microsoft Uses Trademark Law to Disrupt Trickbot Botnet

Krebs on Security

Microsoft Corp. has executed a coordinated legal sneak attack in a bid to disrupt the malware-as-a-service botnet Trickbot , a global menace that has infected millions of computers and is used to spread ransomware.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hackers Chaining Zerologon, Other Vulnerabilities

Data Breach Today

CISA Says APTs Gained Access to State and Local Election Support Systems CISA is warning that sophisticated hacking groups are chaining together vulnerabilities, such as the recent Zerologon bug and other flaws, to target state and local government networks.

Access 194

APT groups chain VPN and Windows Zerologon bugs to attack US government networks

Security Affairs

US government networks are under attack, threat actors chained VPN and Windows Zerologon flaws to gain unauthorized access to elections support systems.

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Morgan Stanley Fined $60 Million for Data Protection Mishaps

Data Breach Today

OCC: Investment Bank Didn't Properly Oversee Decommissioning of Data Center Equipment The Office of the Comptroller of the Currency has fined Morgan Stanley $60 million for the investment bank's failure to properly oversee the decommissioning of several data centers, putting customer data at risk of exposure.

Risk 191

More Trending

Senator Demands Answers on Universal Health Services Outage

Data Breach Today

Did Hospital Chain Pay a Ransom After Attack? Mark Warner, D-Va., is seeking answers about an apparent ransomware incident at Universal Health Services that knocked out access to the hospital chain's U.S. IT network for nearly two weeks

A 7-Step Cybersecurity Plan for Healthcare Organizations

Dark Reading

With National Cybersecurity Awareness Month shining a spotlight on the healthcare industry, security pros share best practices for those charged with protecting these essential organizations

Mitigating the Risks Posed by Synthetic IDs

Data Breach Today

A Fraud Manager Describes the Roles of Artificial Intelligence, Machine Learning Artificial intelligence and machine learning offer the best hope for addressing the risks posed by synthetic identities, says Justin Davis, fraud manager at Digital Federal Credit Union

How to Pinpoint Rogue IoT Devices on Your Network

Dark Reading

Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious

IoT 85

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Star Witness in Case Against Cisco: Its Own Documents

Data Breach Today

Judge Lauds Plaintiffs' Use of 'Cisco's Technical Documents in an Unaltered Form' Plaintiffs in the patent infringement case Centripetal Networks v. Cisco Networks won the day thanks to clear testimony and using Cisco's own technical documents in unaltered form.

IT 160

Security Firms & Financial Group Team Up to Take Down Trickbot

Dark Reading

Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation's C2 infrastructure

Tesla's Autopilot Tricked by Split-Second 'Phantom' Images

Data Breach Today

New Research Shows How Some Autopilots Misinterpret Images, Projections Two types of autopilot systems can be tricked into reacting after seeing split-second images, according to new research into autonomous vehicles.

Risk 141

Researchers received $288,500 for 32 out of 55 issues reported to Apple

Security Affairs

Researchers received hundreds of thousands of dollars in bug bounties for reporting 55 vulnerabilities as part of the Apple bug bounty program.

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Today’s organizations are faced with the overwhelming challenge of managing, finding, and leveraging their information. This eBook discusses a newly discovered information discipline and is filled to the brim with helpful information.

What is Supply Chain Resilience?

OpenText Information Management

Global supply chains are complex beasts. They are multi-tiered, multi-dimensional ecosystems of intimately related parts that allow lean, just-in-time manufacturing, and delivery models.

Hacking Apple for Profit

Schneier on Security

Five researchers hacked Apple Computer’s networks — not their products — and found fifty-five vulnerabilities. So far, they have received $289K.

79

Security Officers, Are Your Employers Practicing Good Habits from Home?

Dark Reading

Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain

Microsoft partnered with other security firms to takedown TrickBot botnet

Security Affairs

A joint operation conducted by FS-ISAC, ESET, Lumen’s Black Lotus Labs, NTT, Symantec, and Microsoft aimed at takedown the TrickBot botnet.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

What is End-to-End Encryption?

Dark Reading

Many services advertise E2EE, but not all of them actually offer it

Ransomware Attackers Buy Network Access in Cyberattack Shortcut

Threatpost

Network access to various industries is being offered in underground forums at as little as $300 a pop - and researchers warn that ransomware groups like Maze and NetWalker could be buying in.

Software AG Continues Efforts Against $20M Ransomware Attack

Dark Reading

The attack, which now includes extortion components, has moved into its second week

How change management, adapting and adoption became a daily task

OpenText Information Management

COVID- 19 forced change on us quickly and dynamically. It took away our freedom to roam about, visit places and people, and be socially active. It also took away jobs, closed stores, medical practices, entertainment, and hospitality venues.

IT 64

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Cybrary ads new course on Global Privacy Management

IG Guru

Check out this course if you are interested in learning more on what it takes to develop and run a privacy program. The post Cybrary ads new course on Global Privacy Management appeared first on IG GURU.

Empower your contact center supervisors with voice technology

OpenText Information Management

A big part of a contact centre supervisor’s job is making sure their team is Okay. That may sound obvious, but it’s a substantial task that includes supporting the team and the individuals to keep them motivated and productive.

Security Officers, Are Your Employees Practicing Good Habits from Home?

Dark Reading

Even if you can't see your employees in the office, they still need to be reminded that criminals are always trying to spot a weak link in the chain

How to protect remote workers against today’s threats

OpenText Information Management

The current global situation has necessitated the immediate shift to remote work. It’s estimated that 42% of the workforce now works at home, which represents a massive shift from a pre-COVD-19 workforce.

IT 59

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

CJEU Restricts Indiscriminate Access to Electronic Communications for National Security Purposes

Hunton Privacy

A little knowledge is a dangerous thing…

OpenText Information Management

In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from less. Every action we take leaves a data footprint and every product we buy asks for a review.

California Attorney General Issues Third Set of Proposed Modifications to the Already Effective CCPA Regulations

Hunton Privacy

On October 12, 2020, the California Attorney General (“AG”) issued a third set of proposed modifications to the regulations implementing the California Consumer Privacy Act of 2018 (“CCPA”).

Sales 60