Fri.Aug 07, 2020

Exploring the Forgotten Roots of 'Cyber'

Data Breach Today

Cyber Always Points to the Future, But It Has a Past One day, you may drive your Tesla Cybertruck on Cyber Monday to your cybersecurity job, backed by a cyber insurance policy as you safeguard cyberspace against the threat of cyberwar. Or cyber whatever, since we've obviously entered the era of "maximum cyber." But what does cyber even mean

IoT Security During COVID-19: What We've Learned & Where We're Going

Dark Reading

Vigilance and ongoing training combined with an integrated security framework are key aspects of a successful strategy in the fight against the latest crop of pandemic opportunists

IoT 80

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Capital One Fined $80 Million Over 2019 Breach

Data Breach Today

Report Finds Bank Failed to Properly Assess Risk of Moving Data to the Cloud A federal banking regulator has fined Capital One $80 million, citing numerous security shortfalls before the 2019 data breach that exposed the financial and personal information of over 100 million individuals in the U.S. and Canada

Hacking the PLC via Its Engineering Software

Dark Reading

Researcher will demonstrate at DEF CON an emerging threat to industrial control networks

IT 79

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Intel Investigating Possible Leak of Internal Data

Data Breach Today

Company Says Individual With Access 'Downloaded and Shared This Data' Chip giant Intel is investigating what led to the posting of 20 GB of internal company data - including what appears to be confidential corporate information - to the MEGA cloud storage and file sharing platform

Cloud 114

More Trending

'Zero Trust': A Strategy for Success

Data Breach Today

Panel Provides Tips on Creating a Frictionless Experience for Remote Workers An effective "zero trust" strategy requires creating a frictionless experience for the remote workforce, according to a panel of security experts, who describe the essential elements

BEC Campaigns Target Financial Execs via Office 365

Dark Reading

A series of business email compromise campaigns has been targeting executives of more than 1,000 companies, most recently in the US and Canada


Researchers: IoT Botnets Could Influence Energy Prices

Data Breach Today

Paper Describes How Connected Devices Could Be Used to Manipulate Markets High-wattage IoT devices and appliances, such as connected refrigerators, air conditioners and heaters, could be turned into massive botnets by malicious actors and used to influence energy prices, according to an academic study released at Black Hat 2020

IoT 114

I'm Open Sourcing the Have I Been Pwned Code Base

Troy Hunt

Let me just cut straight to it: I'm going to open source the Have I Been Pwned code base. The decision has been a while coming and it took a failed M&A process to get here, but the code will be turned over to the public for the betterment of the project and frankly, for the betterment of everyone who uses it. Let me explain why and how.

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Onna is breaking down how the concept of information governance has evolved and ways today’s businesses can develop a holistic framework to keep up with a rapidly accelerating datasphere.

Using Machine Learning to Fight Money Laundering

Data Breach Today

Insights on Using New Technologies to Crack Down on Fraud Machine learning can play a significant role in mitigating money laundering risks, says Andy Gandhi, managing director, data risk and compliance at the consultancy Alvarez and Marsal

Risk 108

Did Maze ransomware operators steal 10 GB of data from Canon?

Security Affairs

An internal memo confirms that the prolonged outage suffered by Canon last week was caused by a ransomware infection, Maze operators took credit for it. According to an internal memo obtained by ZDNet , the recent outage of Canon was caused by a ransomware attack, while Maze ransomware operators are taking the credit for the incident. The memo also reveals that the company has hired an external security firm to investigate the incident.

Analysis: Hijacking of Twitter Hacker's Virtual Hearing

Data Breach Today

The latest edition of the ISMG Security Report analyzes the hijacking of a virtual court hearing in the Twitter hacking case. Also featured: Why network segmentation is more important than ever; update on Windows print spooler vulnerability

Hackers Dump 20GB of Intel’s Confidential Data Online


Chipmaker investigates a leak of intellectual property from its partner and customer resource center. Uncategorized Cerberus Sentinel chips data breach data leak Hackers Intel intellectual property KnowBe4 NDA Processors Security third party threat actors tweet twitter

IT 86

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

400+ Qualcomm Chip Vulnerabilities Threaten Millions of Android Phones

Dark Reading

Security researchers found hundreds of pieces of vulnerable code in the Qualcomm Snapdragon chips powering Android phones

Windows 7 End of Life Presents Hacking Risk, FBI Warns

Adam Levin

The FBI warned in a private industry notification published August 3 that companies and organizations still using Windows 7 are at risk. Microsoft’s end of life (EOL) announcement for version 7 of its flagship Windows operating system means most customers still using it would no longer receive security updates or technical support. According to the FBI notification, continued use of the platform “creates the risk of criminal exploitation.”.

Risk 59

Catches of the month: Phishing scams for August 2020

IT Governance

In our latest round-up of phishing scams, we look at how criminal hackers infiltrated Twitter and sent tweets from dozens of compromised accounts. We also explain how fraudsters impersonated Google Cloud Platform in a PDF download scam, and issue a warning to anyone who has recently received an email supposedly from Microsoft about an update to its terms of use. Celebrity Twitter accounts compromised in spear phishing attack.

Have I Been Pwned Set to Go Open-Source


Fully opening the door to allow people to contribute to – and notably, tinker with – the code for the data-breach information service will be an entirely next-level effort, according to founder Troy Hunt. Breach Privacy data breach Have I Been Pwned Open Source Troy Hunt

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

ARMA eliminates CEO position, will reevaluate business model per message to members

IG Guru

In an email today from ARMA President Jason Sterns, ARMA International will reevaluate their business model and as a result of that decision, they have eliminated the position of CEO. More to come regarding this news. The post ARMA eliminates CEO position, will reevaluate business model per message to members appeared first on IG GURU. ARMA IG News Information Governance ARMA International Breaking News

Qualcomm Bugs Open 40 Percent of Android Handsets to Attack


Researchers identified serious flaws in Qualcomm’s Snapdragon SoC and the Hexagon architecture that impacts nearly half of Android handsets. Hacks Mobile Security Vulnerabilities CVE-2020-11201 CVE-2020-11202 CVE-2020-11206 CVE-2020-11207 CVE-2020-11208 CVE-2020-11209 DEF CON Safe Mode digital signal processor DoS DSP escalation of privileges attack google Hexagon architecture LG OnePlus Qualcomm Samsung Snapdragon SOC xiaomi

COVID-19 opens ‘Pandora’s box’ of Florida businesses’ privacy concerns via CSR and Florida Trends

IG Guru

Ross Federgreen, CEO of CSR, discusses privacy concerns during the COVID-19 pandemic here. The post COVID-19 opens ‘Pandora’s box’ of Florida businesses’ privacy concerns via CSR and Florida Trends appeared first on IG GURU. Business Compliance IG News Information Governance information privacy Privacy Risk News Security Sponsored COVID-19 CSR Cyber Security Ransomware Temperature Checks

Attackers Horn in on MFA Bypass Options for Account Takeovers


Legacy applications don't support modern authentication -- and cybercriminals know this. Breach Cloud Security Hacks Mobile Security Privacy Vulnerabilities Web Security abnormal security account takeover Business Email Compromise conditional access legacy applications MFA bypass multifactor authentication Office 365

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Intel investigates security breach after the leak of 20GB of internal documents

Security Affairs

Intel is investigating reports of an alleged hack that resulted in the theft and leak of 20GB of data coming from the chip giant. Intel is investigating reports that an alleged hacker has leaked 20GB of exfiltrated from its systems. The stolen data includes source code and developer documents and tools, some documents are labeled as “confidential” or “restricted secret.” ” The hackers shared the documents on the file-sharing site MEGA.

Thailand: Personal Data Protection Act (PDPA) Amendments on the way: What does this mean for your company?

DLA Piper Privacy Matters

Thailand’s Personal Data Protection Act (“ PDPA “) is in the process of being updated, and full implementation and compliance is expected by 1 June 2021. This comes by way of the Notification of the Ministry of Digital Economy and Society Re: Personal Data Security Standards B.E. 2563 (2020) (“ Notification “) which was recently released by the Thai Ministry of Digital Economy for Society and is effective from 18 July 2020.

Organizations, Jamf Nation answer the call for help during COVID-19

Jamf on EdTech

Hear some of the inspiring stories that happen when individuals and companies come together for the betterment of others


Fraud Detection and Prevention Market: Fraud Analytics Adoption Trends


New data from a report published by Fortune Business Insights underscores the need for financial institution leaders and fraud managers to align their digital transformation and fraud detection and prevention goals. This report specifically highlights how today's fraud trends have spurred faster adoption of technologies that rely on big data and predictive analytics to detect fraud.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Legendary Help: Feeding communities in need

Rocket Software

Access to food is one of the most important things for any community. Unfortunately, food deserts exist across the U.S., where low-income neighborhoods do not have access to a supermarket. Although these areas have existed for years, they’ve recently seen increased attention. Researchers have discovered links between lack of access to healthy food options and high rates of heart disease, diabetes, and other diseases among America’s poor.

Why a governance foundation is vital for cloud data platforms


Cloud data platforms have become a key component of enterprise data architectures, playing a central role in many organizations’ digital transformation strategies. That is not simply because they offer multipurpose, scalable and cost-effective storage. It is because they foster more agile data operations, cut through siloed architectures and unlock the potential of artificial intelligence and machine learning to drive new trusted business insights. .

Weekly Update 203

Troy Hunt

What. I've been absolutely non-stop publishing data breaches to HIBP whilst simultaneously putting in place the framework to start advising NordVPN on their cybers and open sourcing the HIBP code base at the same time (and a bunch of other more boring stuff that didn't make the cut).