Wed.Feb 19, 2020

Hackers Were Inside Citrix for Five Months

Krebs on Security

Networking software giant Citrix Systems says malicious hackers were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees, contractors, interns, job candidates and their dependents.

Phishing Campaigns Tied to Coronavirus Persist

Data Breach Today

UN's World Health Organization Warns of Fraud Attempts As the coronavirus generates headlines around the world, cybercriminals are continuing to use this public health crisis to spread phishing emails and create malicious domains for a variety of fraud. Here's an update on the latest developments

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

44% of Security Threats Start in the Cloud

Dark Reading

Amazon Web Services is a top source of cyberattacks, responsible for 94% of all Web attacks originating in the public cloud

Cloud 87

Canadian Government Breaches Exposed Citizens' Data: Report

Data Breach Today

Series of Breaches Occurred Over a Two-Year Period Data breaches at Canadian government agencies exposed the personal information of approximately 144,000 citizens over a two-year period, according to a news report

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Uncovering New Magecart Implant Attacking eCommerce

Security Affairs

Security expert Marco Ramilli shared the results of an analysis of a skimmer implant spotted in the wild that could be potentially linked to Magecart group. If you are a credit card holder, this post could be of your interest.

More Trending

Hackers are actively exploiting a Zero-Day in WordPress ThemeREX Plugin to create Admin Accounts

Security Affairs

A new flaw was discovered in a WordPress plugin, this time experts found a zero-day vulnerability in the ThemeREX Addons to create admin accounts.

Sales 83

Health Data Breach Tally Update: 2020 Trends

Data Breach Today

Email-Related Incidents Continue to Dominate, But Other Breaches Still Popping Up Hacking incidents involving email appear to be the most common type of major health data breach being reported to federal regulators so far in 2020.

DRBControl cyber-espionage group targets gambling, betting companies

Security Affairs

The DRBControl APT group has been targeting gambling and betting companies worldwide with malware that links to two China-linked APT groups.

Coronavirus Update: Tips for Travel

Data Breach Today

Globally, the coronavirus has infected more than 75,000 people and led to over 2,000 deaths. But business travelers should avoid panic, says pandemic expert Regina Phelps, who offers preventive health tips for those headed to international events, such as the RSA 2020 conference

152
152

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure

Security Affairs

Artificial intelligence is an immensely helpful tool for businesses and consumers alike, how to use artificial intelligence to secure sensitive Information. Artificial intelligence (AI) is an immensely helpful tool for businesses and consumers alike.

Amazon's Ring Mandates Two-Factor Authentication

Data Breach Today

Company's Action Follows Similar Move by Google Nest Amazon's Ring is mandating the use of two-factor authentication for all users, a move designed to help stop creepy takeovers of the web-connected home security cameras. A passcode will be sent to a user's email address or by SMS

Don't Let Iowa Bring Our Elections Back to the Stone Age

Dark Reading

The voting experience should be the same whether the vote is in person, by mail, or over the Internet. Let's not allow one bad incident stop us from finding new ways to achieve this

70

Hacked Off: Patients Sue Ransom-Paying Hospital Group

Data Breach Today

Post-Ransomware Attack Lawsuit Against Hackensack Meridian Health Seeks Damages Hacked-off patients are suing New Jersey healthcare organization Hackensack Meridian Health for damages after it suffered a ransomware attack last December and paid attackers an unspecified ransom to unlock its systems

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Researchers Fool Smart Car Camera with a 2-Inch Piece of Electrical Tape

Dark Reading

McAfee researchers say they were able to get a Tesla to autonomously accelerate by tricking its camera platform into misreading a speed-limit sign

IT 69

Preview: 12 Top Keynote Sessions at RSA Conference 2020

Data Breach Today

Cryptography, Critical Infrastructure, Supply Chain, Bug Bounties and More Are you attending the RSA 2020 conference?

DHS's CISA Warns of New Critical Infrastructure Ransomware Attack

Dark Reading

An attack on a natural gas compression facility sent the operations offline for two days

SMS Attack Spreads Emotet, Steals Bank Credentials

Threatpost

A new Emotet campaign is spread via SMS messages pretending to be from banks and may have ties to the TrickBot trojan. Malware Mobile Security Vulnerabilities 2020 summer olympics bank credentials campaign Cyberattacks email emotet malware Smishing SMS SMS messages tokyo TrickBot TrickBot Trojan

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Ron Lewis makes retail sense with analytics

IBM Big Data Hub

This story is part of Analytics Heroes , a series of profiles on leaders transforming the future of business analytics

U.S. Pipeline Disrupted by Ransomware Attack

Threatpost

The attack took a gas compression facility offline for two days, disrupting the supply chain. Critical Infrastructure Malware critical infrastructure cyberattack gas compression facility ICS industrial environments loss of view offline pipeline programmable logic controllers ransomware

2020 Webroot Threat Report shows 640% increase in phishing attacks

OpenText Information Management

OpenText™ is pleased to issue the 2020 Webroot Threat Report. The report highlights not only the agility and innovation of cybercriminals who continue to seek out new ways to evade defenses, but also their commitment to long-established attack methods.

Latest Tax Scams Target Apps and Tax-Prep Websites

Threatpost

Traditional e-mail based scams are also in the mix this year, one in particular that uses the legitimate app TeamViewer to take over victims’ systems.

88

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Oracle Analytics Server (OAS) vs Oracle Analytics Cloud (OAC)

Perficient Data & Analytics

OAC and OAS are congruent products and therefore enable organizations to leverage both deployments simultaneously. Going from OAS to OAC or vice-versa is as simple as creating a snapshot from one place and restoring it onto another. However, there are some differences between the two.

Healthcare-life sciences convergence accelerates patient-centered care

DXC Technology

by Mark Wren It wasn’t long ago that healthcare and pharmaceuticals were treated as separate industries and the crossover – when it happened – was just in terms of how clinicians used drugs and devices. But today those lines are blurring.

Hundreds of confidential Georgia files discovered landfill…in 2020 via North Augusta Star

IG Guru

Yes, the title is snarky! Recent records found in a landfill in 2020! Check out this story here. The post Hundreds of confidential Georgia files discovered landfill…in 2020 via North Augusta Star appeared first on IG GURU.

BlueKeep Flaw Plagues Outdated Connected Medical Devices

Threatpost

More than 55 percent of medical imaging devices - including MRIs, XRays and ultrasound machines - are powered by outdated Windows versions, researchers warn.

IoT 81

Spotlight Podcast: How Machine Learning is revolutionizing Application Fuzzing

The Security Ledger

In this Spotlight episode of the Podcast, sponsored* by ForAllSecure we speak with CEO David Brumley about application "fuzzing" and how advancements in machine learning technology are allowing security researchers to find more and more serious vulnerabilities faster.

IoT 52

Automation Anywhere Announces World’s First Integrated Process Discovery Solution

Document Imaging Report

Discovery Bot uses AI to identify repetitive processes and creates bots to automate them. San Jose, CA – Feb.

Zero-Factor Authentication: Owning Our Data

Dark Reading

Are you asking the right questions to determine how well your vendors will protect your data? Probably not

Square 9 Receives Platinum Rating in BLI Solutions Report for 2020

Document Imaging Report

GlobalSearch® 5.0 Awarded Platinum Rating Certification in Buyers Lab Evaluation. NEW HAVEN, CONN., February 20, 2020 – Square 9 Softworks® has been awarded Buyers Laboratory (BLI) Platinum Rating for its Enterprise Content Management platform, GlobalSearch 5.0.