Mon.Sep 20, 2021

US to Unveil Sanctions on Use of Cryptocurrency for Ransoms

Data Breach Today

Report: Treasury Department to Announce Sanctions as Early as This Week The Biden administration may soon unveil plans to curtail the ransomware attacks that have crippled corporate networks this year.

Does Your Organization Have a Security.txt File?

Krebs on Security

It happens all the time: Organizations get hacked because there isn’t an obvious way for security researchers to let them know about security vulnerabilities or data leaks.

Retail 220

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Ransomware Reportedly Hits Iowa Farm Services Cooperative

Data Breach Today

Researchers Believe NEW Cooperative Targeted By BlackMatter Gang NEW Cooperative, an Iowa-based farm services cooperative, has reportedly been targeted by the BlackMatter ransomware gang, demanding a $5.9 million payment from the organization, according to security researchers and published reports.

SHARED INTEL: How ‘observability’ has enabled deep monitoring of complex modern networks

The Last Watchdog

An array of promising security trends is in motion. New frameworks, like SASE , CWPP and CSPM , seek to weave security more robustly into the highly dynamic, intensely complex architecture of modern business networks. Related: 5 Top SIEM myths. And a slew of new application security technologies designed specifically to infuse security deeply into specific software components – as new coding is being developed and even after it gets deployed and begins running in live use.

Cloud 126

Monitoring AWS Container Environments at Scale

In this eBook, learn how to monitor AWS container environments at scale with Datadog and which key metrics to monitor when leveraging two container orchestration systems (ECS and EKS).

Chinese APT Data-Harvesting Campaign Analyzed

Data Breach Today

Nation-State Chinese Groups APT27, APT41 Likely Candidates Earlier this month, McAfee Enterprise's Advanced Threat Research team, working with McAfee's Professional Services IR team, reported that an APT campaign dubbed Operation Harvest had been in operation for years.


More Trending

Shipping Giant CMA CGM Hit With Second Attack

Data Breach Today

Compromised PII Includes Names, Email and Phone Numbers The French shipping firm CMA CGM reported on Monday that it had been struck with a data breach almost a year after it was hit with a ransomware attack that knocked its systems offline for several days

Apache OpenOffice is currently impacted by a remote code execution flaw

Security Affairs

Apache OpenOffice (AOO) is currently impacted by a remote code execution flaw, tracked as CVE-2021-33035, that has yet to be fixed in the official release.

Hacker Makes Off With $12 Million in Latest DeFi Breach

Data Breach Today

Cross-Chain Protocol pNetwork Offers Hacker 'Clean' $1.5

Black Matter gang demanded a $5.9M ransom to NEW Cooperative

Security Affairs

The farmers cooperative NEW Cooperative was hit by Black Matter ransomware gang that is demanding a $5.9 million ransom. BlackMatter ransomware gang hit NEW Cooperative, a farmer’s feed and grain cooperative, and is demanding a $5.9 million ransom.

The Importance of PCI Compliance and Data Ownership When Issuing Payment Cards

This eBook provides a practical explanation of the different PCI compliance approaches that payment card issuers can adopt, as well as the importance of both protecting user PII and gaining ownership and portability of their sensitive data.

Post-Attack, Health Agency Notifying 'All Alaskans'

Data Breach Today

IT 158

Large phishing campaign targets EMEA and APAC governments

Security Affairs

Security researchers uncovered a large phishing campaign targeting multiple government departments in APAC and EMEA countries. . Researchers from cybersecurity firm Cyjax uncovered a large phishing campaign targeting multiple government departments in APAC and EMEA countries. .

No Bounty for Bug Hunters in India

Data Breach Today

Experts Discuss Challenges, Solutions for Bounty Hunters While there is no dearth of talent among Indian bug bounty hunters, hurdles such as lack of trust, payment disputes, cost, unethical practices and lack of regulatory laws deter the growth of the bug bounty programs in the country, according to some experts.


White House Cybersecurity Summit: A Missed Opportunity

Dark Reading

Last month's summit with the president was missing something crucial: representation from those who deal with critical infrastructure

Assess and Advance Your Organization’s DevSecOps Practices

In this white paper, a DevSecOps maturity model is laid out for technical leaders to use to enable their organizations to stay competitive in the digital economy.

Europol arrested 106 fraudsters, members of a major crime ring

Security Affairs

Europol, along with Italian and Spanish police, dismantled a major crime organization linked to the Italian Mafia that focuses on online frauds.

Webinar: VIRTUAL PROJECT MANAGEMENT via ARMA NOVA on September 21, 2021 at 12pm EST

IG Guru

VIRTUAL PROJECT MANAGEMENT Enable People and Organizations to Exceed Their Potential No cost to register! What is good project management? How can we best do that virtually or in the new hybrid world? What are lessons learnt and best practices for sustaining virtual project management?

Wondering Where to Start with Modernization? Rocket® Process Insights Has the Answer

Rocket Software

Rocket helps organizations evolve their IBM® i platforms to take advantage of modern technologies and user experiences without disruption.

Open Source Software Projects Up Their Security Game but Face More Attacks

Dark Reading

Patches for dependencies are trickling up through the open source ecosystem faster than ever — a good thing because attackers are focusing more on open source software

Make Payment Optimization a Part of Your Core Payment Strategy

Everything you need to know about payment optimization – an easy-to-integrate, PCI-compliant solution that enables companies to take control of their PSPs, minimize processing costs, maximize approval rates, and keep control over their payments data.

“Staying Current” is Not Just a Fashion Statement

Micro Focus

Keeping up with the latest fashion trends can be an uncomfortable and costly exercise. Having mistakenly perceived the wisdom of flared trousers, twice, I am fully aware of such risks. In the software world, too, being addicted to new and shiny objects is a fool’s errand.

Risk 72

Google: New Privacy Feature Will Affect 'Billions' of Android Devices

Dark Reading

Starting in December, Google will expand its "permissions auto-reset feature" to devices using Android 6.0 and higher

Washington says a transatlantic data deal is close. Brussels disagrees via Politico

IG Guru

Check out the article here. The post Washington says a transatlantic data deal is close. Brussels disagrees via Politico appeared first on IG GURU. GDPR Information Destruction Information Governance information privacy information security Privacy Record Retention Risk News GFDPR Records Managemen

10 Ways to Avoid Zero-Trust Failure

Dark Reading

Here are the prerequisites to have in order before getting past the zero-trust gate


Address the Challenges of Siloed Monitoring Tools

Companies frequently experience monitoring tool sprawl. Find out why monitoring tool sprawl occurs, why it’s a problem for businesses, and the positive business impacts of monitoring tool consolidation.

Spoliation and Defensible Deletion: What’s the Difference?

eDiscovery Daily

Spoliation and Sanctions. Spoliation, the destruction or manipulation of ESI, has become a prevalent issue in e-discovery. As evidenced by Atalian US New England, LLC v. Navarro , spoliation is often done deliberately.

F5 Networks to Buy Threat Stack

Dark Reading

F5 Networks plans to combine its application and API security tools with Threat Stack's cloud protection capabilities

Cloud 61

Regulatory Update: NAIC Summer 2021 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2021 National Meeting (Summer Meeting) August 14-17, 2021. As a result of the continuing COVID-19 pandemic, the NAIC met in a hybrid format with attendees participating both in person and virtually.

Bring Your APIs Out of the Shadows to Protect Your Business


APIs are immensely more complex to secure. Shadow APIs—those unknown or forgotten API endpoints that escape the attention and protection of IT¬—present a real risk to your business. Learn how to identify shadow APIs and take control of them before attackers do. Sponsored Web Security

Risk 82

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

DXC London Innovation Centre takes on business challenges with teamwork and emerging tech


A conversation with Sukhi Gill about meeting the challenge of turning digital transformation ideas into reality Two years ago DXC launched our London Innovation Centre, a collaborative environment that brings together DXC employees, customers and partners to transform and accelerate innovative solutions in a rapidly changing digital era.

Amazon Driver-Surveillance Cameras Roll Out, Sparking Debate


Drivers bristle under constant surveillance by artificial-intelligence (AI) tech, but Amazon says it works and boosts safety. Cloud Security Privacy

Ransomware: Now Is the Time to Address This Challenge

Thales Cloud Protection & Licensing

Ransomware: Now Is the Time to Address This Challenge. divya. Tue, 09/21/2021 - 05:07. Reports are indicating that cyberattacks are growing in volume and impact as ransomware tactics have become more advanced and damaging.