Thu.Jun 10, 2021

Groups Urge Biden, Congress to Bolster Health Sector Cyber

Data Breach Today

Want More Funding, Attention, Support for Healthcare Security As the U.S.

Hackers Stole a Ton of EA Data—Including Valuable Source Code

WIRED Threat Level

The video game publisher confirmed the breach, which could be a boon to the shadowy world of cheat-makers. Security Security / Cyberattacks and Hacks

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

RSA Spins Off Fraud and Risk Business

Data Breach Today

New Stand-Alone Firm Is Tasked With Combatting Digital Commerce Fraud RSA Security LLC has spun off its fraud and risk intelligence business into a stand-alone company named Outseer. The new company will be led by Reed Taussig as CEO, and it will serve a worldwide customer and partner community

Risk 201

11 Cybersecurity Vendors to Watch in 2021

Dark Reading

The cybersecurity landscape continues to spawn new companies and attract new investments. Here is just a sampling of what the industry has to offer

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

26M Passwords Exposed in Botnet Data Leak

Data Breach Today

Data Includes 1.5M Facebook Passwords, Valid Cookies Some 26 million passwords were exposed in a 1.2 terabyte batch of data found by NordLocker, a security company.

More Trending

Ransomware to Riches Story: JBS Pays Criminals $11 Million

Data Breach Today

With Nonstop Cryptocurrency Paydays, No Wonder Extortionists Love Ransomware Is it any wonder that criminals keep flocking to ransomware when their individual haul from a well-executed digital heist can be worth $11 million?

Chrome Browser Bug Under Active Attack

Threatpost

Google has patched its Chrome browser, fixing one critical cache issue and a second bug being actively exploited in the wild. Hacks Mobile Security Vulnerabilities Web Security

IT 114

Biden's Nominees Face Questions Over Cybersecurity Concerns

Data Breach Today

Senators Asked Chris Inglis and Jen Easterly About Cyberthreats President Joe Biden's nominees for White House cyber director and CISA director faced questions from senators during their confirmation hearing Thursday, including how the federal government should respond to a recent spate of ransomware attacks and other cyberthreats.

Google Patches Chrome zero-day actively exploited

Security Affairs

Google this week addressed 14 vulnerabilities in the Chrome browser, including a zero-day flaw that has been exploited in the wild. Google released security updates to address 14 vulnerabilities in the Chrome browser, including a zero-day issue that has been exploited in the wild.

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Detecting Deepfake Picture Editing

Schneier on Security

“Markpainting” is a clever technique to watermark photos in such a way that makes it easier to detect ML-based manipulation: An image owner can modify their image in subtle ways which are not themselves very visible, but will sabotage any attempt to inpaint it by adding visible information determined in advance by the markpainter.

Paper 77

Hackers stole data from the network of the gaming giant Electronic Arts

Security Affairs

Hackers breached the network of the gaming giant Electronic Arts (EA) and have stolen roughly 780 GB of data, including game source code and tools. Hackers have compromised the network of the gaming giant Electronic Arts (EA) and claim to have stolen approximately 780 GB of data.

Cyber Is the New Cold War & AI Is the Arms Race

Dark Reading

Continual cyberattacks have pushed us into a new kind of Cold War, with artificial intelligence the basis of this new arms race

Global Scamdemic: Scams Become Number One Online Crime

Security Affairs

Threat hunting and adversarial cyber intelligence company Group-IB published a comprehensive analysis of fraud cases on a global scale.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

'Beware the Lady Named Katie'

Dark Reading

A semester-long course boiled down to two minutes and 45 seconds

63

Russia-linked APT breached the network of Dutch police in 2017

Security Affairs

Russia-linked cyberspies breached the internal network of Dutch police in 2017 while the authorities were investigating the crash of the MH-17. Russia-linked threat actors breached the internal network of Dutch police in 2017 during the investigation into the MH-17 crash.

New Ransomware Group Claiming Connection to REvil Gang Surfaces

Dark Reading

Prometheus' is the latest example of how the ransomware-as-a-service model is letting new gangs scale up operations quickly

What caused the Internet to crash?

IT Governance

There was widespread panic on Tuesday after a major Internet outage knocked dozens of websites offline. Amazon, Reddit and Twitch were all affected, as were the Guardian, the New York Times and the Financial Times.

Cloud 59

What E-Commerce Performance Metrics Are CTOs Monitoring?

In this eBook, Danny Miles, CTO of Dollar Shave Club, reveals an efficient framework for thinking about and prioritizing the performance metrics that matter most to him, providing a blueprint for fellow e-commerce CTOs to follow as they evaluate their own business.

The Workforce Shortage in Cybersecurity Is a Myth

Dark Reading

What we really have is an automation-in-the-wrong-place problem

JBS Paid $11M to REvil Gang Even After Restoring Operations

Threatpost

The decision to pay the ransom demanded by the cybercriminal group was to avoid any further issues or potential problems for its customers, according to the company’s CEO. Malware Vulnerabilities

IT 81

'Fancy Lazarus' Criminal Group Launches DDoS Extortion Campaign

Dark Reading

The group has re-emerged after a brief hiatus with a new email campaign threatening a DDoS attack against businesses that don't pay ransom

59

‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts

Threatpost

The group, known for masquerading as various APT groups, is back with a spate of attacks on U.S. companies. Web Security

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Healthcare Device Security Firm COO Charged with Hacking Medical Center

Dark Reading

Vikas Singla, chief operating officer of security firm that provides products and services to the healthcare industry, faces charges surrounding a cyberattack he allegedly conducted against Duluth, Ga.-based based Gwinnett Medial Center

Article 28 Standard Contractual Clauses

DLA Piper Privacy Matters

With the publication this week of the new EU Standard Contractual Clauses for data transfers, a great deal of attention is understandably being paid to analysing the differences from the current set of SCCs.

GDPR 56

A Transition to Collaborative Content Services

AIIM

As late as 2010, many end-users and solution providers viewed SharePoint as useful for project groups and document sharing – but more of an interesting tangent to the world of content management than “real” ECM. However, standalone ECM solutions at that time came at a very high cost.

JBS paid $11 million to REvil ransomware out of $22.5M requested

Security Affairs

The beef producer JBS has admitted to have paid an $11 million ransom to the REvil ransomware gang after the group initially demanded $22.5 million.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Celebrating Pride: The Resume Test

Hanzo Learning Center

When I applied to work for Hanzo nearly five years ago, I had to decide what to put on my resume. It was already a very busy document, and not everything could be included. When I applied, I had been involved with LGBTQ activism on and off for 15 years.

IT 52

Episode 216: Signed, Sealed and Delivered: The Future of Supply Chain Security

The Security Ledger

In this episode of the podcast. (#216) 216) we talk with Brian Trzupek, Digicert’s Vice President of Product, about the growing urgency of securing software supply chains, and how digital code signing can help prevent compromises like the recent hack of the firm SolarWinds.

Additional ICRM Virtual Exam Prep Workshop Dates are Now Available!

IG Guru

ICRM Virtual Exam Prep Workshops will be hosted as a series of 4-hour half day workshops for CRA, CRM and Part 6 Practice Business Case.