Thu.Jun 25, 2020

US Now Accuses Assange of Conspiring With Hacking Groups

Data Breach Today

Superseding Indictment Expands Scope of Case, But Doesn't Add Charges The U.S Department of Justice unsealed a superseding indictment against WikiLeaks founder Julian Assange that expands the scope of the government's case against him.

New Charges, Sentencing in Satori IoT Botnet Conspiracy

Krebs on Security

The U.S. Justice Department today criminally charged a Canadian and a Northern Ireland man for allegedly conspiring to build botnets that enslaved hundreds of thousands of routers and other Internet of Things (IoT) devices for use in large-scale distributed denial-of-service (DDoS) attacks.

IoT 189

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Breach Notification Delay: A Step-by-Step Timeline

Data Breach Today

Senior Care Facility Operator Describes Investigation Why are some breach notifications delayed for months? This week, a company that operates senior care facilities in North Carolina and South Carolina issued a statement offering a step-by-step explanation

221
221

Akamai mitigated the largest ever PPS DDoS attack

Security Affairs

Akamai announced to have mitigated a record distributed denial-of-service (DDoS) attack that hit a European bank. Akamai revealed that a bank in Europe was hit by a massive distributed denial-of-service (DDoS) attack that peaked a record 809 million packets per second (PPS).

Cloud 104

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

European Bank Targeted in Massive Packet-Based DDoS Attack

Data Breach Today

Akamai Describes Unusual Approach Taken in This Incident A massive DDoS attack generating 809 million packets per second was recently directed against a large European bank, according to the security firm Akamai, which describes in a new report the unusual approach the attackers took

More Trending

Hacker Group Stole $200 Million From Cryptocurrency Exchanges

Data Breach Today

Researchers: 'CryptoCore' Group Used Spear-Phishing Emails to Lure Victims A hacking group dubbed CryptoCore has stolen more than $200 million in virtual currency from several cryptocurrency exchanges over the past two years, the security firm ClearSky Cyber Security reports

Lucifer Malware Aims to Become Broad Platform for Attacks

Dark Reading

The recent spread of the distributed denial-of-service tool attempts to exploit a dozen web-framework flaws, uses credential stuffing, and is intended to work against a variety of operating systems

97

Reopened pubs and cafes to collect customers’ personal details

IT Governance

England’s coronavirus lockdown will all but end on 4 July, with the government allowing pubs, restaurants, cinemas, museums and hotels to reopen. The decision comes after steady progress in mitigating the spread of COVID-19 and the partial reopening of other sectors over the previous six weeks.

Vulnerabilities Declining in Open Source, But Slow Patching Still a Problem

Dark Reading

Even as more code is produced, indirect dependencies continue to undermine security

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Maze ransomware operators claim to have breached LG Electronics

Security Affairs

Maze ransomware operators claims to have breached the South Korean multinational electronics company LG Electronics. Researchers at Cyble discovered a data leak of LG Electronics published by Maze ransomware operators.

Analyzing IoT Security Best Practices

Schneier on Security

New research: " Best Practices for IoT Security: What Does That Even Mean? " by Christopher Bellman and Paul C.

IoT 86

New Lucifer DDoS botnet targets Windows systems with multiple exploits

Security Affairs

A new botnet, tracked as Lucifer, appeared in the threat landscape, it leverages close to a dozen exploits to hack Windows systems. A new botnet tracked as Lucifer appeared in the threat landscape, it leverages a dozen exploits for high and critical severity flaws affecting Windows systems.

Another Record-Breaking DDoS Attack Signals Shift in Criminal Methods

Dark Reading

Malicious botnet sources explode in new attacks that push boundaries in terms of volume and duration

82

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

WikiLeaks founder Julian Assange faces superseding indictment for conspiring with LulzSec hackers

Security Affairs

WikiLeaks founder Julian Assange attempted to recruit hackers at conferences in Europe and Asia who could have stolen info for his anti-secrecy site, states DoJ.

'GoldenSpy' Malware Hidden in Tax Software Spies on Companies Doing Business in China

Dark Reading

Advanced persistent threat (APT) campaign aims to steal intelligence secrets from foreign companies operating in China

81

Nvidia Warns Windows Gamers of Serious Graphics Driver Bugs

Threatpost

Several high-severity flaws in Nvidia's GPU display drivers for Windows users could lead to code-execution, DoS and more. Vulnerabilities gamers GPU display driver high severity flaw Nvidia nvidia fix nvidia flaw patch Security Security Vulnerabilities vGPU Windows

Criminals Turn to IM Platforms to Avoid Law Enforcement Scrutiny

Dark Reading

Researchers from IntSights observed a sharp increase in the use of popular instant messaging apps over the past year among threat groups

75

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

Threatpost

Threat actors shift focus from COVID-19 to employee coronavirus training and current events like Black Lives Matter as cyber-attacks continue to rise.

7 Tips for Effective Deception

Dark Reading

The right decoys can frustrate attackers and help detect threats more quickly

74

The Difference Between Technical Architecture and Enterprise Architecture

erwin

The most straightforward way to convey the difference between technical architecture and enterprise architecture (EA) is by looking at the scope and focus of each.

Golang Worm Widens Scope to Windows, Adds Payload Capacity

Threatpost

A first-stage malware loader spotted in active campaigns has added additional exploits and a new backdoor capability. Malware Vulnerabilities Web Security backdoor Barracuda Cryptominer cryptomining drupalgeddon 2.0 exploits golang Linux Oracle Security Vulnerabilities Windows Worm XMRig

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Better Collaboration Between Security & Development

Dark Reading

Security and development teams must make it clear why their segment of the development life cycle is relevant to the other teams in the pipeline

Nationwide Facial Recognition Ban Proposed By Lawmakers

Threatpost

Lawmakers proposed a new bill that would ban the use of facial recognition by law enforcement nationwide. Government Privacy Biometrics Congress facial recognition Facial Recognition and Biometric Technology Moratorium Act facial recognition ban federal ban

Contact Tracing & Threat Intel: Broken Tools & Processes

Dark Reading

How epidemiology can solve the people problem in security

UK: New COVID-19 rules for the hospitality industry on collecting visitor contact information : Data protection considerations

DLA Piper Privacy Matters

Andrew Dyson, Alexa Smith. The hospitality industry has been hard hit by COVID-19.

GDPR 65

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

How Thousands of Misplaced Emails Took Over This Engineer's Inbox

WIRED Threat Level

Kenton Varda gets dozens of messages a day from Spanish-speakers around the world, all thanks to a Gmail address he registered 16 years ago. Security Security / Security News

What’s new in OpenText Media Management Cloud Edition (CE) 20.2

OpenText Information Management

All organizations are faced with increasing demands for images and video for marketing and operational purposes. Managing higher volumes, larger file sizes, more diverse formats, new content providers and proliferating distribution channels requires robust and efficient processes.

EU: EU Commission publishes its evaluation of GDPR

DLA Piper Privacy Matters

Rachel de Souza and Anne-Gabrielle Haie. On 24 June, the European Commission published its evaluation report of the GDPR, just over two years after the GDPR become applicable.

GDPR 56