Mon.Jan 30, 2023

article thumbnail

JD Sports Details Data Breach Affecting 10 Million Customers

Data Breach Today

Exposed: Online Customer Details, But Not Complete Payment Card Data JD Sports, a sports fashion retailer with global operations, says personal details pertaining to about 10 million online customers of JD Sports and its Size?,

article thumbnail

Cybercrime Ecosystem Spawns Lucrative Underground Gig Economy

Dark Reading

The complex nature of cyberattacks has increased demand for software developers, reverse engineers, and offensive specialists — attracting workers facing financial insecurity

132
132
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HHS, AHA Warn of Surge in Russian DDoS Attacks on Hospitals

Data Breach Today

Alerts Come as Attack Threats Spike in Recent Days Government authorities and industry groups are warning the healthcare sector of ongoing distributed denial-of-service attacks on hospitals and other medical entities by Russian nuisance hacking group KillNet, whose name comes from a tool used to launch DDoS attacks.

article thumbnail

Convincing, Malicious Google Ads Look to Lift Password Manager Logins

Dark Reading

Users searching for Bitwarden and 1Password's Web vaults on Google have recently reported seeing paid ads with links to cleverly spoofed sites for stealing credentials to their password vaults

Passwords 122
article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

This exclusive webinar with Ryan McInerny will teach you all about cryptocurrency and NFTs! Register to learn more about identifying crypto transactions, crypto asset market trends, managing risk and compliance, and supporting customers and partners using crypto-based payments.

article thumbnail

Are We Doomed? Not If We Focus on Cyber Resilience

Data Breach Today

In this episode of "Cybersecurity Unplugged," Patricia Muoio, a partner at SineWave Ventures, discusses the need for cyber resilience as security leaders face the inevitable stream of cybercrimes, how to achieve it through a zero trust approach, and how CISOs and the government can help

More Trending

article thumbnail

Tenable's $25M Venture Capital Fund Seeks Early-Stage Firms

Data Breach Today

New Tenable Ventures Fund Focuses on Cloud, OT, Code, Identity and Backs 3 Startups Tenable has debuted a $25 million corporate investment program to support prevention-focused startups focused on technologies such as cloud, OT and identity.

Cloud 130
article thumbnail

Open Source Security Index Lists Top Projects

eSecurity Planet

Two venture investors have launched an index to track the most popular open source security projects. Chenxi Wang of Rain Capital and Andrew Smyth of Atlantic Bridge unveiled the Open Source Security Index last month.

Security 110
article thumbnail

Long Con Impersonates Financial Advisers to Target Victims

Dark Reading

Cybercriminals are co-opting the identities of legitimate US financial advisers to use them as fodder for relationship scams (aka "pig butchering"), which end with the theft of investments

108
108
article thumbnail

Top factors driving higher demand for Cognitive Search

OpenText Information Management

Businesses strive to compete in today’s market by exercising cost leadership and delivering a winning proposition. Success lies in the organizational knowledge and data locked within its people and information silos.

article thumbnail

Contact vs. Company Intent Signal Data

Intent signal data comes in two types: either companies or individuals signaling interest in products like yours. Which kind of data delivers more advantages to B2B marketers? It depends. Get this infographic to learn about the advantages of intent-based leads and how you can most effectively use both types of data.

article thumbnail

Facebook Bug Allows 2FA Bypass Via Instagram

Dark Reading

The Instagram rate-limiting bug, found by a rookie hunter, could be exploited to bypass Facebook 2FA in vulnerable apps, researcher reports

105
105
article thumbnail

Researcher received a $27,000 bounty for 2FA bypass bug in Facebook and Instagram

Security Affairs

A researcher disclosed technical details of a two-factor authentication bypass vulnerability affecting Instagram and Facebook. The researcher Gtm Manoz received a $27,000 bug bounty for having reported a two-factor authentication bypass vulnerability affecting Instagram and Facebook.

article thumbnail

Spotlight on 2023 DevSecOps Trends

Dark Reading

Solutions that provide more actionable results — remediation that frees up engineers, processes which integrate security into software development from its design, along with automation, IAC, and tool consolidation — are among the DevSecOps strategies that will prevail this year

article thumbnail

QNAP addresses a critical flaw impacting its NAS devices

Security Affairs

Taiwanese vendor QNAP is warning customers to install QTS and QuTS firmware updates to address a critical flaw impacting its NAS devices. QNAP released QTS and QuTS firmware updates to address a critical vulnerability, tracked as CVE-2022-27596 (CVSS v3 score: 9.8), that affects QNAP NAS devices.

IT 95
article thumbnail

Exploring the Overlap: Cost Optimization and Digital Transformation

Speaker: Alex Jiménez, Managing Principal, Financial Service Consulting for EPAM

The largest banks have increased reserves for protection against deteriorating economic conditions. Should banks delay their digital transformation investments and focus on cost reductions? In this webinar, Alex Jiménez will walk us through that question and examine the prudent course of action.

article thumbnail

Russia's Sandworm APT Launches Swarm of Wiper Attacks in Ukraine

Dark Reading

The incidents are the latest indication of the growing popularity of dangerous disk wipers, created to disrupt and degrade critical infrastructure and other organizations

97
article thumbnail

JD Sports discloses a data breach impacting 10 million customers

Security Affairs

Sports fashion retail JD Sports discloses a data breach that explosed data of about 10M customers who placed orders between 2018 and 2020. UK sports fashion chain JD Sports disclosed a data breach that exposed customer data from orders placed between November 2018 and October 2020.

article thumbnail

10M JD Sports Customers' Info Exposed in Data Breach

Dark Reading

UK sportswear retailer asks exposed customers to stay "vigilant" against phishing attempts following cyberattack

Retail 90
article thumbnail

Sandworm APT group hit Ukrainian news agency with five data wipers

Security Affairs

The Ukrainian (CERT-UA) discovered five different wipers deployed on the network of the country’s national news agency, Ukrinform.

article thumbnail

Intent Signal Data 101

Intent signal data helps B2B marketers engage with buyers sooner in the sales cycle. But there are many confusing terms used to describe intent data. Read this infographic to better understand three common areas of confusion.

article thumbnail

SentinelOne and KPMG Announce Alliance To Accelerate Cyber Investigations and Response

Dark Reading

89
article thumbnail

ICYMI – Late December in privacy and cybersecurity

Data Protection Report

Late December and early January tend to be a busy time for everyone, so you may have missed a privacy update or two during that time. We have set out some updates in the form of questions, with some links where you can find more information. Answers are below.

article thumbnail

How $6 Can Buy Hacked Social Media & Streaming Accounts From the Dark Web, Whizcase Study Reveals

Dark Reading

85
article thumbnail

Alert: Refund Scam Targeting Federal Agencies via RMM Software

KnowBe4

At least two federal civilian agencies were the unfortunate victims of a refund scam campaign, perpetrated through the use of remote monitoring and management (RMM) software.

IT 77
article thumbnail

The Anti-Money Laundering Act of 2020: Initial Catalysts, Current Implications, and Future Impacts

Speaker: Elizabeth "Paige" Baumann, Founder and CEO of Paige Baumann Advisory, LLC

In this session, Elizabeth “Paige” Baumann will cover the Anti-Money Laundering Act of 2020, which also includes the Corporate Transparency Act. She'll take a deep dive into the catalysts that brought on the act, the current implications of the act, and what impacts the act has on the future of banking and finance.

article thumbnail

Make Developers the Driver of Software Security Excellence

Dark Reading

Those who are wrangling code every day could fuel a genuinely transformational approach to security — if they are adequately upskilled

article thumbnail

Lights, Camera, AMC Action!

Micro Focus

This year the AMC Product Group have been delighted to welcome 15 new candidates onto the FY22 Application Modernisation and Connectivity (AMC) Engineering Graduate Programme.

69
article thumbnail

The Threat from Within: 71% of Business Leaders Surveyed Think Next Cybersecurity Breach Will Come from the Inside

Dark Reading

article thumbnail

What is employee document management?

OpenText Information Management

What is employee document management? Employee document management is the practice of keeping an official record for all current and past employees. It includes all key documents generated or collected through the hire-to-retire lifecycle and is subject to multiple audits and controls.

article thumbnail

Aggregage Intent Signal Service

Aggregage Intent Signal Service helps your sales team reach more active buyers sooner. You’ll get names and contact information of specific in-market buyers plus all companies and job titles signaling intent for your product or service. Get the overview to learn more!

article thumbnail

IT and Security Professionals Spend an Average of 4,300 Hours Annually Achieving or Maintaining Compliance

Dark Reading

New research from Drata shows compliance remains a business challenge for many organizations

article thumbnail

The Untold Story of a Crippling Ransomware Attack

WIRED Threat Level

More than two years ago, criminals crippled the systems of London’s Hackney Council. It's still fighting to recover. Security Security / Cyberattacks and Hacks

article thumbnail

The Journal, Artificial Intelligence in the Life Sciences, Highlights the Contributions of Women in Artificial Intelligence in the Life Sciences

Dark Reading

The launch of a new article collection and webinar by the journal AILSCI recognises prominent female scientists in the field of AI