Mon.Jun 21, 2021

How Cyber Safe is Your Drinking Water Supply?

Krebs on Security

First American Financial's SEC Breach Settlement: $488,000

Data Breach Today

SEC: Executives Left in Dark About Vulnerability in File-Sharing System Title insurance company First American Financial Corp. will pay the SEC a $488,000 penalty as a result of a data breach revealed two years ago.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Future of Machine Learning and Cybersecurity

Schneier on Security

The Center for Security and Emerging Technology has a new report: “ Machine Learning and Cybersecurity: Hype and Reality.” ” Here’s the bottom line: The report offers four conclusions: Machine learning can help defenders more accurately detect and triage potential attacks.

N. Korean Attackers Suspected in S. Korean Nuclear Agency Hack

Data Breach Today

Attackers Exploited VPN Flaw at Nuclear Agency The Korea Atomic Energy Research Institute, a South Korean organization, confirms it was recently hacked, apparently by a North Korean group that exploited a VPN vulnerability

IT 176

Address the Challenges of Siloed Monitoring Tools

Companies frequently experience monitoring tool sprawl. Find out why monitoring tool sprawl occurs, why it’s a problem for businesses, and the positive business impacts of monitoring tool consolidation.

Ragnar Locker ransomware leaked data stolen from ADATA chipmaker

Security Affairs

The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more than 700GB of stolen data. The Ragnar Locker ransomware gang has published on its leak sites more than 700GB of data stolen from Taiwanese memory and storage chip maker ADATA.

More Trending

Baltimore County Public Schools' Ransomware Recovery Tops $8M

Dark Reading

The school district has spent seven months and a reported $8.1 million recovering from the November attack

Ransomware Attack Compromises Fertility Patients' Records

Data Breach Today

Clinic Says It Regained Control of Network, Data Reproductive Biology Associates, an Atlanta-based clinic operator, and its affiliate, MyEggBank North America, report their systems were hit by a ransomware attack in April but say they regained control of their network and data after contacting the attackers.

Software-Container Supply Chain Sees Spike in Attacks

Dark Reading

Attackers target companies' container supply chain, driving a sixfold increase in a year, aiming to steal processing time for cryptomining and compromise cloud infrastructure

Cloud 72

NSA releases guidance for securing Unified Communications and VVoIP

Security Affairs

The US National Security Agency (NSA) released guidance for securing Unified Communications/Voice and Video over IP Systems (VVoIP). NSA last week released guidance for securing their communication systems, specifically Unified Communications (UC) and Voice and Video over IP (VVoIP).

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Are Ransomware Attacks the New Pandemic?

Dark Reading

Ransomware has been a problem for decades, so why is government just now beginning to address it

China: Navigating China Episode 19: China’s new Data Security Law: what multinational businesses need to know

DLA Piper Privacy Matters

Authors: Carolyn Bigg , Venus Cheung, Fangfang Song. China’s Data Security Law (“ DSL ”) has come into force and takes effect on 1 September 2021. The speed of its passing has left multinational businesses scrabbling to understand the key compliance obligations.

Did Companies Fail to Disclose Being Affected by SolarWinds Breach?

Dark Reading

The SEC has sent out letters to some investment firms and publicly listed companies seeking information, Reuters says


EDPB Releases Final Recommendations on Supplementary Measures for International Transfers

Hunton Privacy

On June 21, 2021, following a public consultation, the European Data Protection Board (“EDPB”) published the final version of its recommendations on supplementary measures in the context of international transfer safeguards, such as Standard Contractual Clauses (“SCCs”) (the “Recommendations”).

What E-Commerce Performance Metrics Are CTOs Monitoring?

In this eBook, Danny Miles, CTO of Dollar Shave Club, reveals an efficient framework for thinking about and prioritizing the performance metrics that matter most to him, providing a blueprint for fellow e-commerce CTOs to follow as they evaluate their own business.

Threat actors in January attempted to poison the water at a US facility

Security Affairs

Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the importance of cybersecurity for water and wastewater utilities. The news that a threat actor in January attempted to poison the water at a facility in the U.S.

Data Leaked in Fertility Clinic Ransomware Attack

Dark Reading

Reproductive Biology Associates says the data of 38,000 patients may have been compromised in the April cyberattack

Wegmans Exposes Customer Data in Misconfigured Databases


Cleanup in aisle "Oops": The supermarket chain said that it misconfigured two cloud databases, exposing customer data to public scrutiny. Cloud Security Web Security

The Future of Remote Work (2021)

Record Nations

As June 2021 comes to a close, the future of remote work still seems up in the air. While the United States seems to be keeping Covid-19 at bay, other countries are still struggling to get the virus under control. States are beginning to re-open, and employees are starting to return to the office.


9 Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

Are We Ever Going to Run Out of Digital Storage Space? via Gizmodo

IG Guru

Check out the article here. The post Are We Ever Going to Run Out of Digital Storage Space? via Gizmodo appeared first on IG GURU. Blockchain Business Information Governance Records Management Risk News Storage Digital Storage Gizmodo

Bugs in NVIDIA’s Jetson Chipset Opens Door to DoS Attacks, Data Theft


Chipmaker patches nine high-severity bugs in its Jetson SoC framework tied to the way it handles low-level cryptographic algorithms. Cryptography IoT Vulnerabilities

IT 72

Federal Government Interest in Cyber Continues: Congressional Hearings on the Colonial Pipeline Cyberattack

Data Matters

On May 7, 2021, Colonial Pipeline experienced a ransomware cyberattack on its corporate network. This attack, attributed to the DarkSide hacking group, led the company to temporarily halt the operation of its pipeline network—causing fuel shortages throughout the East Coast. Although highly publicized, the Colonial Pipeline cyberattack is not unique. In fact, the event was just one in a growing pattern of ransomware attacks against major U.S. companies and critical infrastructure.

Stop the network – I want to get off

Thales Cloud Protection & Licensing

Stop the network – I want to get off. sparsh. Tue, 06/22/2021 - 05:24. Data is moving across the network all the time, to and from data centers to headquarters, branch offices, across on-premises, and virtualized networks, to the cloud and back again.

The Forrester Wave™: B2B Marketing Data Providers, Q2 2021

In our 24-criterion evaluation of B2B marketing data providers, we identified the 11 most significant vendors — Data Axle, Dun & Bradstreet, Enlyft, Global Database, InsideView, Leadspace, Oracle, SMARTe, Spiceworks Ziff Davis, TechTarget, and ZoomInfo Technologies — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2B marketing professionals select the right one for their needs.

Embryology Data Breach Follows Fertility Clinic Ransomware Hit


Approximately 38,000 of RBA's customers had their embryology data stolen by a ransomware gang. Breach Cloud Security Malware Web Security

Differences Between Digital Marketing Metadata and Behavioral Data


As technology continues to advance, businesses are changing the way they gather and utilize data. Most brands now rely on online data to study the market and understand consumer behaviors. The post Differences Between Digital Marketing Metadata and Behavioral Data first appeared on Cllax - Top of IT.

Agent Tesla RAT Returns in COVID-19 Vax Phish


An unsophisticated campaign shows that the pandemic still has long legs when it comes to being social-engineering bait. Vulnerabilities Web Security

Offset Printing and Digital Printing – How to Choose Between The Two


If you are planning to start a business of print reselling, you must have some knowledge about the printing industry and the printing technologies so that you can interact with. The post Offset Printing and Digital Printing – How to Choose Between The Two first appeared on Cllax - Top of IT.

IT 26

4 AI Hacks to Make Sales Teams More Efficient

Over the last two years, there’s been a 76 percent increase in AI adoption across sales organizations. For sales teams, AI opens up a world of new possibilities, including automating outreach, identifying best-fit buyers, and keeping CRMs flush with fresh data. Read on to learn the four AI hacks sales teams need to improve their performance. Download the eBook today!

iPhone Wi-Fi Crushed by Weird Network


… until you reset network settings and stop connecting to a weirdly named network, that is. FUD is spreading. iOS Wi-Fi demolition is not. Hacks Mobile Security Vulnerabilities

Best Practices for Accounts Payable: An Insider’s View


DocuWarians is a blog feature that introduces you to the people behind the product. In this post, Gigi Kelso, Manager of Collections and Accounts Receivable tells us about her experience working with and without digital document management. Accounting and Finance Invoice Processing Automation


Top 10 Magento Development Tools


Magento is one of the most popular and highly scalable platforms. It is a truly awesome platform for the eCommerce industry. But managing is not as simple as it should. The post Top 10 Magento Development Tools first appeared on Cllax - Top of IT. Articles

IT 26