Mon.Feb 10, 2020

Law Firms Race to File Phishing Breach Lawsuits

Data Breach Today

Class Action Suits Would Focus on PIH Health Breach That Affected 200,000 Several law firms are racing to be among the first to file class action lawsuits against PIH Health in the wake of the California-based regional healthcare network reporting last month that a 2019 phishing breach affected nearly 200,000 individuals. Why the rush?

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Was Internet in Iran Hit by DDoS Attack?

Data Breach Today

NetBlocks Describes Extensive Disruption of Service Over the weekend, an extensive disruption to Iran's telecommunication networks knocked out about 25 percent of the country's internet service for several hours, according to NetBlocks, which tracks internet freedom across the globe

215
215

Malaysia’s MyCERT warns cyber espionage campaign carried out by APT40

Security Affairs

Malaysia’s MyCERT issued a security alert to warn of a hacking campaign targeting government officials that was carried out by the China-linked APT40 group.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

4 in Chinese Army Charged With Breaching Equifax

Data Breach Today

Justice Department Unveils Indictments Against Members of China's PLA Four members of China's People's Liberation Army have been indicted for allegedly hacking Equifax in 2017 and stealing the personal data of over 145 million Americans as well as a vast trove of the company's trade secrets and intellectual property, the U.S.

More Trending

Facebook's Privacy Practices Targeted by Canadian Regulator

Data Breach Today

To Force Changes, Regulator Must Prove Facebook Violated Canada's Privacy Law Canada's privacy commissioner is taking Facebook to court to try and force the social network to make specific changes to its privacy practices.

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

As if cybersecurity weren’t already a red-letter issue, the United States and, most likely, its allies–in other words, the global economic community–are in Iran’s cyber sites, a major player in cyber warfare and politically divisive disinformation campaigns.

10 Hot Cybersecurity Topics at RSA Conference 2020

Data Breach Today

From the Human Element and Frameworks to Secure Engineering, Privacy and More Which cybersecurity topics are hot? One topical answer to that question comes via the upcoming RSA Conference 2020. Organizers say they received 2,400 responses to their call for speakers, and they've have highlighted 10 predominant themes, including secure design, frameworks, privacy and the human element

China's Military Behind 2017 Equifax Breach: DoJ

Dark Reading

Four members of China's People Liberation Army hacked the information broker, leading to the theft of sensitive data on approximately 145 million citizens

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Onna is breaking down how the concept of information governance has evolved and ways today’s businesses can develop a holistic framework to keep up with a rapidly accelerating datasphere.

1.2 million CPR numbers for Danish citizen leaked through tax service

Security Affairs

A glitch in the TastSelv Borger ta x service has sent over one million Danish CPR numbers to the US companies Google and Adobe.

How 4 Chinese Hackers Allegedly Took Down Equifax

WIRED Threat Level

The Department of Justice has pinned the hack on China. Here's how it was done, according to the indictment. Security Security / Cyberattacks and Hacks

IT 85

Chinese Military personnel charged with hacking into credit reporting agency Equifax

Security Affairs

The United States Department of Justice charged 4 Chinese military hackers with hacking into credit reporting agency Equifax.

7 best practices in customer experience

OpenText Information Management

In today’s world, customer experience determines success. Regardless of your organization’s size, products, service or industry, providing your customers with a consistently great experience only means good things for your bottom line.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Netanyahu’s party Elector app exposes data on over 6.5M Israelis

Security Affairs

A misconfiguration in the Elector election day app developed by Likud, the Netanyahu’s party might have exposed data on over 6.5 million Israelis. A misconfiguration in an election day app developed by the N etanyahu’s party L ikud, might have exposed p ersonal details of over 6.5

Zdenek Hanzal gives a global cosmetics company an analytics makeover

IBM Big Data Hub

Analytics Hero blog celebrating how Zdenek Hanzal finds success

A sad story of pedophilia on how disgusting images fed the web

Security Affairs

The journalist Livio Varriale sheds the light on a story about pedophilia that starts from afar and still today finds its roots in the darker side of the internet.

Why you don’t want to run a roll-your-own cloud

DXC

Thanks to my job, I have accounts on many public clouds. I also have production private clouds — open-source OpenStack and NextCloud spring to mind. But, but, as someone who cut his teeth on Unix system administration back in the 80s, I also run my own smaller private clouds using a homebrew of programs. Self-hosting […]. Cloud

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Breaking: ARMA International Announces New CEO

IG Guru

Check out the press release here. The post Breaking: ARMA International Announces New CEO appeared first on IG GURU. ARMA Business IG News Information Governance Mona Buckley

Too Weak, Too Slow: MicroStrategy World 2020’s Big Theme

Perficient Data & Analytics

“Too weak. Too slow.” That’s what Norwegian chess grandmaster Magnus Carlsen , who thinks 15-20 moves ahead, says matter-of-factly to his opponents.

Emotet Now Hacks Nearby Wi-Fi Networks to Spread Like a Worm

Threatpost

The new tactic used by Emotet allows the malware to infect nearby insecure Wi-Fi networks - and their devices - via brute force loops. Malware binary brute force emotet executable insecure network malware malware attack Password ransomware RAR file WiFi wifi spreading

Data Architecture: 2.5 Types of Modern Data Integration Tools

Perficient Data & Analytics

As we move into the modern cloud data architecture era, enterprises are deploying 2 primary classes of data integration tools to handle the traditional ETL and ELT use cases. The first type of Data integration tools are GUI-Based Data Integration solutions.

MDM 61

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Docker Registries Expose Hundreds of Orgs to Malware, Data Theft

Threatpost

Misconfigured Docker registries could leak confidential data, lead to a full-scale compromise and interrupt the business operations.”. Breach Cloud Security confidential data Docker Images malware misconfiguration Palo Alto registries

Cloud 96

6 Factors That Raise The Stakes For IoT Security

Dark Reading

Developments that exacerbate the risk and complicate making Internet of Things devices more secure

Risk 61

Active PayPal Phishing Scam Targets SSNs, Passport Photos

Threatpost

Phishing emails have been uncovered that request a full rundown of personal data - even asking for photos of passports. Web Security data theft passport PayPal PayPal scam personal data Phishing phishing email phishing landing page Social Security Number

Day in the Life of a Bot

Dark Reading

A typical workday for a bot, from its own point of view

IT 59

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

BYO-Bug Tactic Attacks Windows Kernel with Outdated Driver

Threatpost

The RobbinHood ransomware is using a deprecated Gigabyte driver as the tip of the spear for taking out antivirus products. Malware Vulnerabilities attack technique Baltimore CVE-2018-19320 gigabyte motherboard Malware analysis ransomware robbinhood Sophos vulnerable driver windows kernel

How North Korea's Senior Leaders Harness the Internet

Dark Reading

Researchers learn how North Korea is expanding its Internet use in order to generate revenue and bypass international sanctions

IT 59

CISCO 2020 Privacy Benchmark Study Measures Return on Investing in Privacy Accountability

Hunton Privacy

On January 27, 2020, CISCO released its 2020 Data Privacy Benchmark Study entitled “From Privacy to Profit: Achieving Positive Returns on Privacy Investments” (the “Study”).

Sales 83