Mon.Jun 01, 2020

Big GDPR Fines in UK and Ireland: What's the Holdup?

Data Breach Today

Both Countries Have Each Issued Only a Single, Finalized Fine Under EU's Privacy Law The EU's General Data Protection Regulation was meant to finally bring in line organizations that didn't treat Europeans' personal data with respect.

GDPR 247

Data on Indian Mobile Payments App Reportedly Exposed via Open S3 Bucket

Dark Reading

Over 7 million records exposed, according to vpnMentor, but app maker says there is no sign of malicious use

100
100

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

TrickBot Update Makes Malware Harder to Detect: Report

Data Breach Today

Updated Module Runs on System Memory, Leaving Little Trace The developers behind TrickBot have updated it to run from an infected device's memory to help better avoid detection, according to researchers at Palo Alto Network's Unit 42.

IT 219

26 IoT Flaws Enable Denial-of-Service Attacks, Privilege Escalation

Dark Reading

Research details vulnerabilities in the Zephyr Real Time Operating Systems and MCUboot, both used in IoT devices and sensors

IoT 99

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Researcher Discloses 'Sign in with Apple' Zero-Day Flaw

Data Breach Today

Bug Bounty Hunter Reveals Critical Issue Affecting Third-Party Applications An independent security researcher disclosed a zero-day vulnerability contained in the "Sign in with Apple" feature that, if exploited, could have resulted in a full account takeover.

IT 170

More Trending

Analysis: Verizon's Latest Data Breach Investigation Report

Data Breach Today

Verizon's Data Breach Investigations Report 2020 highlights the leading causes of breaches last year, including credential theft, phishing, ransomware as well as issues linked to cloud implementations and web applications. In an interview, Verizon's Ashish Thapar offers an in-depth analysis

Modernization Facts: The Path to Digital Transformation

Micro Focus

A Changing Normality The worldwide pandemic of 2020 is forcing rapid change for entire organizations—even industries. The ability for organizations to transform into digital-first entities is key to survival. IDC predicts that 60 percent of global GDP will be digitized by 2022.

Inside Job at Clinics: Mobile Phone Used for Fraud

Data Breach Today

Worker Sentenced in Case Involving Theft of Patient Data A former administrative employee of a medical marijuana clinic and several other clinics was recently sentenced to serve time in federal prison after pleading guilty to identity theft and wire fraud.

Risk 158

Password Changing After a Breach

Schneier on Security

This study shows that most people don't change their passwords after a breach, and if they do they change it to a weaker password. Abstract: To protect against misuse of passwords compromised in a breach, consumers should promptly change affected passwords and any similar passwords on other accounts.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

The team behind the Joomla CMS discloses a data breach

Security Affairs

Maintainers at the Joomla open-source content management system (CMS) announced a security breach that took place last week.

CMS 90

A time to modernize

Micro Focus

Introduction Digital transformation is today’s key business imperative to ensure organizations remain relevant in a constantly evolving and competitive landscape.

KingNull leaks DB of Daniel’s Hosting dark web hosting provider

Security Affairs

Earlier this year a hacker breached Daniel’s Hosting, the largest free web hosting provider for dark web hidden services and now leaked its DB. A threat actor has leaked the database of Daniel’s Hosting (DH) , the largest free web hosting provider for dark web hidden services.

Rare NSA Advisory About Russia-Based Cyberattacks Unlikely to Stop Them

Dark Reading

The Sandworm group -- behind disinformation and election-hacking campaigns and responsible for a 2016 power outage in the Ukraine -- is now targeting e-mail servers

84

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Expert earns $100,000 for ‘Sign in with Apple’ authentication bypass bug

Security Affairs

The expert Bhavuk Jain received an award of $100,000 for reporting a severe security issue in ‘Sign in with Apple’ authentication bypass bug that could allow the takeover of third-party user accounts. .

This Bot Hunts Software Bugs for the Pentagon

WIRED Threat Level

Mayhem emerged from a 2016 government-sponsored contest at a Las Vegas casino hotel. Now it's used by the military—and Netflix. Security Business Business / Artificial Intelligence

Analysing the (Alleged) Minneapolis Police Department "Hack"

Troy Hunt

The situation in Minneapolis at the moment (and many other places in the US) following George Floyd's death is, I think it's fair to say, extremely volatile.

VMware addresses Fusion flaw introduced in the attempt to fix CVE-2020-3950 issue

Security Affairs

VMware has released an update to address a privilege escalation flaw in VMware for the macOS version of Fusion that was introduced by a previous patch.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Minneapolis Police Department Hack Likely Fake, Says Researcher

Threatpost

Troy Hunt said that the supposed data breach perpetrated by Anonymous is most likely a hoax. Breach Government Hacks Web Security Anonymous data breach fake george floyd Hoax Leaked credentials minneapolis police department Troy Hunt

The Micro Focus INSPIRE 20 podcast series

Micro Focus

Shine a light Working in tech, you get to experience and be involved in so many interesting and exciting initiatives whether that be learning about new technologies or seeing how technologies can help make a difference in the lives of customers and consumers around the world.

72

Apple Pays Researcher $100,000 for Critical Vulnerability

Dark Reading

Apple has fixed a flaw in the "Sign in with Apple" feature that could have enabled attackers to break into user accounts for third-party services

69

Joomla CMS Discloses Data Leak

Adam Levin

Administrators of the open source Joomla content management system announced a data incident that potentially compromised the information of 2,700 developers.

CMS 68

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Time to Act

OpenText Information Management

COVID-19 has made all our worlds smaller, but for the Black American community, the world gets even smaller. For many, this is a crisis within a crisis within a crisis.

64

Apple Pays $100K Bounty for Critical ‘Sign in With Apple’ Flaw

Threatpost

Apple has fixed a critical flaw in its Sign in with Apple feature, which could have been abused by attackers to takeover victims' third-party applications.

IT 90

Learning to fly: Managing an external and internal workforce

OpenText Information Management

Guest blog by Mike Theaker, VP, HR Advisory & Digital Transformation, SAP SuccessFactors Remember when careers were linear? A workforce comprised of full-time employees moving through a series of sequential promotions doing defined jobs.

WHAT YOU NEED TO KNOW ABOUT KEEPING CONFIDENTIAL DOCUMENTS SAFE DURING RECOVERY via Polygon

IG Guru

Read more about their recommendations here. The post WHAT YOU NEED TO KNOW ABOUT KEEPING CONFIDENTIAL DOCUMENTS SAFE DURING RECOVERY via Polygon appeared first on IG GURU.

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Selling and utilising personal data in an insolvency situation

Data Protection Report

Many businesses are suffering serious financial difficulties as a result of COVID-19, particularly those in the retail, hospitality and tourism sectors. For many of these businesses the one asset that will undoubtedly retain value, despite the pandemic, will be their customer database.

Hosting Provider’s Database of Crooked Customers Leaked

Threatpost

Database of sensitive info, including emails and passwords, from owners of Daniel’s Hosting portals could be incriminating. Breach Hacks

Will COVID Stave Off Hospital Bankruptcies?

InfoGoTo

Washington’s Astria Regional Medical Center is getting a second chance thanks to the coronavirus pandemic, shares Becker’s Hospital Review. The 366-bed St. Vincent Medical Center in Los Angeles is experiencing a similar rebirth after its Chapter 11 bankruptcy and January closing.