Tue.Sep 15, 2020

Breach of COVID-19 Test Data Undermines Pandemic Response

Data Breach Today

Human Error' Results in 18,000 Individuals' Test Results Being Exposed in Wales What's one of the worst things that can happen during a pandemic? The answer is anything that gives people less reason to trust in their public health system to handle the crisis.

One Data Scientist’s Quest to Quash Misinformation

WIRED Threat Level

Sara-Jayne Terp uses the tools of cybersecurity to track false claims like they’re malware. Her goal: Stop dangerous lies from hacking our beliefs. Security Security / Cyberattacks and Hacks Backchannel

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hackers Divert VA Payments Intended for Healthcare Providers

Data Breach Today

Fraud Scheme Exposes Data of 46,000 Veterans A security incident in which hackers used social engineering techniques to divert Department of Veterans Affairs payments intended for healthcare providers compromised the personal information of 46,000 U.S. veterans

CISA Issues Alert for Microsoft Netlogon Vulnerability

Dark Reading

CISA has issued an alert following the discovery of publicly available exploit code for Windows elevation of privilege flaw CVE-2020-1472


Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Payment Card Skimming Hits 2,000 E-Commerce Sites

Data Breach Today

Researchers: Hackers May Have Used Magento Zero-Day Exploit From Friday through Monday, malicious JavaScript skimming code was injected into nearly 2,000 e-commerce sites that were running an older version of Adobe's Magento software, possibly resulting in the theft of payment card data, according to Sanguine Security.

More Trending

Fighting Payment Fraud: Going Beyond Protecting Card Data

Data Breach Today

Mastercard's Sujay Vasudevan on the New Payment Fraud Trends Fighting payment fraud requires protecting far more than just payment data, says Sujay Vasudevan, vice president of cyber and intelligence solutions at Mastercard, who describe key steps


Taking Security With You in the WFH Era: What to Do Next

Dark Reading

As many organizations pivot to working from home, here are some considerations for prioritizing the new security protocols

Privacy Analysis of Ambient Light Sensors

Schneier on Security

Interesting privacy analysis of the Ambient Light Sensor API. And a blog post. Especially note the “Lessons Learned” section. Uncategorized academic papers privacy risks security engineering

5 Security Lessons Humans Can Learn From Their Dogs

Dark Reading

Without the right reinforcements, you could be barking at the moon

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Onna is breaking down how the concept of information governance has evolved and ways today’s businesses can develop a holistic framework to keep up with a rapidly accelerating datasphere.

A Texas County Clerk’s Bold Crusade to Transform How We Vote

WIRED Threat Level

How Dana DeBeauvoir set off the biggest, weirdest, and most promising revolution in election technology since the 1800s. Security Security / Cyberattacks and Hacks Backchannel

More Cyberattacks in the First Half of 2020 Than in All of 2019

Dark Reading

The pandemic-related shift to remote work and the growing availability of ransomware-as-a-service were two major drivers, CrowdStrike says

Stacey Abrams on How We’ll Beat Back Voter Suppression

WIRED Threat Level

The former Democratic candidate for Georgia governor talks democracy, election tech, and why speaking Klingon doesn’t always help. As told to Gilad Edelman. Security Security / National Security

Rethinking Resilience: Tips for Your Disaster Recovery Plan

Dark Reading

As more organizations face disruptions, a defined approach to recovery is imperative so they can successfully recover, experts say


The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!



IT 83

Microsoft open-sourced its Project OneFuzz fuzzing framework for Azure

Security Affairs

Microsoft released the Project OneFuzz, an open-source fuzzing framework for its cloud computing service Azure. Microsoft this week announced the release of the Project OneFuzz which is an open-source fuzzing framework for its cloud computing service Azure.

IT 79

MFA Bypass Bugs Opened Microsoft 365 to Attack


Vulnerabilities ‘that have existed for years’ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio.

Public Health Wales accidentally publishes 18,000 coronavirus patients’ data

IT Governance

Public Health Wales has confirmed that it accidentally published the personal data of 18,105 people who tested positive for coronavirus. The information was accessible on a publicly accessible server for 20 hours on 30 August.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Windows Exploit Released For Microsoft ‘Zerologon’ Flaw


Security researchers and U.S. government authorities alike are urging admins to address Microsoft's critical privilege escalation flaw.

Experts warn of surge in DDoS attacks targeting education institutions

Security Affairs

Experts warn of a surge in the DDoS attacks against education institutions and the academic industry across the world.

Simplify Your Privacy Approach to Overcome CCPA Challenges

Dark Reading

By building a privacy-forward culture from the ground up and automating processes, organizations can simplify their approach to privacy and be prepared for any upcoming regulations

UK NCSC releases the Vulnerability Disclosure Toolkit

Security Affairs

The British National Cyber Security Centre (NCSC) released a guideline, dubbed The Vulnerability Disclosure Toolkit, for the implementation of a vulnerability disclosure process.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

The International Playbook for Foiling Russian Interference

WIRED Threat Level

The Kremlin has meddled in so many elections that democracy’s immune system has gotten wise to its threats. Here are lessons other countries can teach us. Security Security / Cyberattacks and Hacks

IT 68

Data Breaches Exposes Vets, COVID-19 Patients


Social engineering and employee mistakes lead to breach Veteran's Administration and the National Health Service. Breach Cloud Security Hacks coronavirus covid-19 patients data breach hack internal tool national health service server mistake Veteran's Administration veterans wales

How We’ll Know the Election Wasn’t Rigged

WIRED Threat Level

Whether you’re casting a ballot in person or by mail, there’s plenty to worry about. Mass voter fraud shouldn’t be on the list. Security Security / Cyberattacks and Hacks Backchannel

Out-of-band security update fixes Adobe Media Encoder issu

Security Affairs

Adobe has released an out-of-band security update to address three ‘Important’ security vulnerabilities in the Adobe Media Encoder. Adobe has released an out-of-band security update for Adobe Media Encoder that addresses three ‘Important’ Information Disclosure flaws.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Securing Remote Workforce Is Top Security Priority: Gartner

eSecurity Planet

Gartner's top security project for 2020-2021 is secure access for the nearly 50% of employees who are suddenly working from home

The Institute of Certified Records Managers (ICRM) Announces 2020 Election Results

IG Guru

Members & Candidates: We are pleased to announce that this year’s Board of Regent election winners are as follows: President-Elect (2021-2023)Andrew Ysasi, CRM Regent, Exam Development (2021-2022)Caroline J.

QR Codes Serve Up a Menu of Security Concerns


QR code usage is soaring in the pandemic -- but malicious versions aren't something that most people think about. Cloud Security Mobile Security Most Recent ThreatLists Web Security malicious qr mobileiron Pandemic qr code security concerns touchless menu what QR codes can do