Mon.May 18, 2020

Supercomputer Intrusions Trace to Cryptocurrency Miners

Data Breach Today

Likely Connected: Attacks Against Systems in US, UK, China, Germany and Beyond Cryptocurrency-mining hackers appear to be behind a recent spate of supercomputer and high-performance computing system intrusions. But it's unclear if attackers might also have had data-stealing or espionage intentions

Mining 220

This Service Helps Malware Authors Fix Flaws in their Code

Krebs on Security

Almost daily now there is news about flaws in commercial software that lead to computers getting hacked and seeded with malware.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

GAO: Chemical Plants Vulnerable to Cyberattacks

Data Breach Today

DHS Cybersecurity Guidance Not Updated in a Decade U.S. facilities that produce, use or store hazardous chemicals are vulnerable to cyberattacks, in part because cybersecurity guidelines from the Department of Homeland Security are outdated, according to a recent GAO audit

Texas Department of Transportation (TxDOT) hit by a ransomware attack

Security Affairs

A new ransomware attack hit the Texas government, the malware this time infected systems at the state’s Department of Transportation (TxDOT). The Texas government suffered two ransomware attacks in a few weeks, the first one took place on May 8, 2020 and infected systems at the Texas court.

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Developer in Cyprus Claims Breach of Contacts App

Data Breach Today

Covve Visual Network Says It's Notifying Users and Regulators Covve Visual Network Ltd., a Cyprus-based app developer, acknowledges that it's the owner of 90GB of data - including tens of millions of records - that apparently was left exposed on an open Elasticsearch database.

IT 153

More Trending

Why Cyberthreats Tied to COVID-19 Could Hit Diverse Targets

Data Breach Today

Besides hospitals and academic institutions, dozens of nonprofits, including nongovernmental organizations - or NGOs - around the world must protect their COVID-19 research and related activities from those seeking to steal data or disrupt their operations, says cyber risk management expert Stanley Mierzwa.

Risk 147

ARMA Job Board Lists Over 100 Open Positions

IG Guru

Positions in Information Governance, Cyber Risk, Risk Analysis, Teaching, and HIM positions are some of the posted positions you can find here. The post ARMA Job Board Lists Over 100 Open Positions appeared first on IG GURU.

Risk 78

A bug in Edison Mail iOS app impacted over 6,400 users

Security Affairs

A security bug in the iOS app has impacted over 6,400 Edison Mail users, the issue allowed some users to access other people’s email accounts.

Ransomware Gang Arrested for Spreading Locky to Hospitals

Threatpost

A group of four people calling themselves "Pentaguard" were arrested in house raids. Government Malware Web Security arrests Hospitals Locky pentaguard ransomware RATs Romania

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Mandrake, a high sophisticated Android spyware used in targeted attacks

Security Affairs

Security experts discovered a highly sophisticated Android spyware platform, dubbed Mandrake, that remained undetected for four years.

Ramsey Malware

Schneier on Security

A new malware, called Ramsey, can jump air gaps : ESET said they've been able to track down three different versions of the Ramsay malware, one compiled in September 2019 (Ramsay v1), and two others in early and late March 2020 (Ramsay v2.a and v2.b).

Stored XSS in WP Product Review Lite plugin allows for automated takeovers

Security Affairs

A critical flaw in the WP Product Review Lite plugin installed on over 40,000 WordPress sites could potentially allow their take over.

The FBI Backs Down Against Apple—Again

WIRED Threat Level

The agency cracked the Pensacola iPhones, but it still views Cupertino as a problem—even though it's easier to break into iPhones than it has been in years. Security Security / Security News

IT 67

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Verizon Data Breach Report: DoS Skyrockets, Espionage Dips

Threatpost

Denial of Service (DoS), ransomware, and financially-motivated data breaches were the winners in this year's Verizon DBIR. Breach attack breach data breach denial of service (DoS) hack malware ransomware Verizon Verizon DBIR

Spike in cyber security incidents since lockdown began

IT Governance

Almost half of organisations have suffered a cyber security incident as a result of the sudden shift to remote working, a new study has found.

As DevOps Accelerates, Security's Role Changes

Dark Reading

There remains a disconnect between developers and security teams, with uncertainty around who should handle software security

Scaling AI at Lufthansa: A Think digital 2020 spotlight

IBM Big Data Hub

In the airline industry, timing and synchronization are everything when it comes to the customer experience. Mitigating unforeseen circumstances against customer expectations and good old supply and demand are all issues well within the wheelhouse of AI’s predictive capabilities.

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Cryptocurrency Hardware Wallets Can Get Hacked, Too

WIRED Threat Level

New research shows vulnerabilities in popular cold storage options that would have revealed their PINs. Security Security / Cyberattacks and Hacks

Edison Mail iOS Bug Exposes Emails to Strangers

Threatpost

A bug introduced in an iOS software update on the Edison Mail app allowed emails to be viewed by strangers. Web Security Edison mail Edison mail flaw Edison software Email privacy email security ios iOS update

Legendary Help: Powering global supply chains during a time of crisis

Rocket Software

Global supply chains were one of the first industries impacted by the pandemic, and they continue to be one of the hardest hit industries. Non-essential manufacturing has slowed down as essential services become prioritized.

B2B 56

ProLock Ransomware Teams Up With QakBot Trojan to Infect Victims

Threatpost

ProLock is relatively new, but already the ransomware is making waves by using QakBot infections to access networks, gain persistence and avoid detection. Malware malware Microsoft ProLock qakbot qbot ransomware RDP Remote Desktop Protocol Trojan

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

SINGAPORE: Important changes proposed to Singapore’s Personal Data Protection Act

DLA Piper Privacy Matters

Organisations should plan ahead for significant changes to Singapore’s Personal Data Protection Act (“ PDPA ”), proposed in a consultation paper published on 14 May 2020.

Game Theory: Why System Security Is Like Poker, Not Chess

ForAllSecure

The 1980’s film “Wargames” asked a computer to learn whether global thermonuclear war made sense. In the film, thermonuclear war didn’t make sense but what if, in real life, preemptive cyberattacks were our best hope for winning?

IT 56

What if today’s contact center technology existed a quarter of a century ago?

OpenText Information Management

Some 26 years ago, I was a tech support representative working at a call center for a prominent software company. I started as a first-tier support agent, working primarily on consumer fax products before I moved up the ladder and became the international support liaison.

Private Equity Firm Stalls $1.9B Forescout Acquisition

Dark Reading

Officials say "there can be no assurance" Forescout and Advent International will reach an agreement, though talks are ongoing

54

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

Ready or not, here we come!

RFID Global Solution, Inc.

We can debate if the time should be now, in a few weeks or months from now, in slow and measured phases as recommended by health experts, or all at once, but it seems we are on a path to reopen the US economy. For manufacturing this presents a set of new challenges.

European Commission’s Public Consultation on Proposed EU Artificial Intelligence Regulatory Framework

Data Matters

On 19 February 2020, the European Commission published a white paper on the use of artificial intelligence (“AI”) in the EU (the “White Paper”). The White Paper forms part of the Commission President, Ursula Von der Leyen’s, digital strategy, one of the key pillars of her administration’s five year tenure, recognising that the EU has fallen behind the US and China with respect to the strategic deployment of AI.

Top Security Considerations on Virtual Desktops

Cllax

Many companies are looking into Virtual Desktop Infrastructure (VDI) environments and looking to overcome the security challenges posed by VDI environments (maximizing guest OS density, scheduled scan “storms” hammering servers, Guest Post