Mon.Jan 24, 2022

Are You Prepared to Defend Against a USB Attack?

Dark Reading

Recent "BadUSB" attacks serve as a reminder of the big damage that small devices can cause


GUEST ESSAY: A primer on why AI could be your company’s cybersecurity secret weapon in 2022

The Last Watchdog

Artificial intelligence (AI) is woven into the fabric of today’s business world. However, business model integration of AI is in its infancy and smaller companies often lack the resources to leverage AI. Related: Deploying human security sensors. Even so, AI is useful across a wide spectrum of industries. There already are many human work models augmented by AI. Understanding the established models before integrating AI is critical.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Emotet spam uses unconventional IP address formats to evade detection

Security Affairs

Experts warn Emotet malware campaign using “unconventional” IP address formats in an attempt to evade detection. Threat actors behind a recent Emotet malware campaign have been observed using using “unconventional” IP address formats to evade detection.

A Level-Set on Russia-Borne Cyber Threats

Dark Reading

As hostilities mount between Russia and Ukraine, new and more dangerous cyberattacks are likely to develop. Pinpointing sources and motives will remain elusive, but enterprises should prepare for an escalation in cyberspace


How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

Russian authorities arrested the kingpin of cybercrime Infraud Organization

Security Affairs

Russian authorities arrested four alleged members of the international cyber theft ring tracked as ‘Infraud Organization.’

More Trending

Tales from the Dark Web, Part 2: Ransomware Stacked With Distribution Services Creates the Perfect Storm

Dark Reading

Security professionals need to understand the actors behind ransomware threats, how they operate and how they continuously find new victims to target

Immutable Records vs. Preservation Copies


The need to secure a document for legal holds or to meet industry-specific records compliance is not a new concept for records managers. Historically, records managers had relied on the “immutable records” approach for ensuring compliant records management.

Trickbot Injections Get Harder to Detect & Analyze

Dark Reading

The authors of the infamous malware family have added measures for better protecting malicious code injections against inspection and research


Latest version of Android RAT BRATA wipes devices after stealing data

Security Affairs

A new version of the BRATA malware implements a functionality to perform a factory reset of the device to wipe all data. The new version of the BRATA Android malware supports new features, including GPS tracking and a functionality to perform a factory reset on the device.

The 5 Stages of Account-Based Marketing — and How to Win Them All

Successfully complete the five stages of ABM: define, identify, engage, convert, and connect. We’ll show you how to create a unified system with your sales team to help them land more qualified opportunities and connect with prospects like never before.

The Case for Backing Up Source Code

Dark Reading

As enterprise data security concerns grow, security experts urge businesses to back up their GitLab, GitHub, and BitBucket repositories

Tens of AccessPress WordPress themes compromised as part of a supply chain attack

Security Affairs

Threat actors planted a backdoor into multiple WordPress themes and plugins after compromising the website of their developer. In a classic supply chain attack, threat actors planted a backdoor in dozens of WordPress plugins and themes hosted on a developer’s website.

Registration for the (ISC)² Entry-Level Cybersecurity Certification Exam Pilot Program Is Now Open

Dark Reading

New certification validates students' and career changers' foundational skills and helps kickstart their cybersecurity careers

A flaw in Rust Programming language could allow to delete files and directories

Security Affairs

The maintainers of the Rust programming language fixed a high-severity flaw that could allow attackers to delete files and directories from a vulnerable system.

The Ultimate Guide to Executive Recruiting

Sourcing the right executive candidates and filling key managerial roles in an organization can be difficult, even in the best of times. Download this eBook to level up your discovery process, talent sourcing, and strategies for reaching your best-fit candidates.

Test Your Team, Not Just Your Disaster Recovery Plan

Dark Reading

Cyberattacks imperil business continuity, but there is a much more common security threat — unintentional human error

What are you doing for Data Privacy Week?

IT Governance

Data privacy is a concept that governs our everyday lives. We’re asked to hand over our personal data for seemingly everything that we do – from browsing the web to high-street shopping.

Data Privacy and Security: It Takes Two to Tango

Thales Cloud Protection & Licensing

Data Privacy and Security: It Takes Two to Tango. madhav. Tue, 01/25/2022 - 05:15. The National Cybersecurity Alliance (NCA) announced earlier this year that they have expanded the Data Privacy Day campaign into Data Privacy Week , a full week-long initiative.

Cloud 105

What is Intelligent Document Processing? via The ECM Consultant

IG Guru

Check out the article here. The post What is Intelligent Document Processing? via The ECM Consultant appeared first on IG GURU. IG News Information Governance Records Management Scanning Intelligent Document Processing

ECM 68

12 Plays to Kickstart Your Recruitment Process

To stay ahead in this race, every recruiter needs a good playbook. In this eBook, we lay out 12 recruiting plays that can automate key steps in your recruitment process, helping you reduce both the cost and the time it takes to hire the best candidates.

U.S. Representatives Request Information from COPPA Safe Harbor Programs

Hunton Privacy

On January 7, 2022, U.S. Representatives Kathy Castor (D-Fla.) and Jan Schakowsky (D-Ill.),

DHS Sounds Alarm on Potential for Major Russian Cyberattacks on US

Dark Reading

Latest bulletin out of DHS advises state and local governments, critical infrastructure operators to be on alert

6 things for marketers to keep in mind as the third-party cookie crumbles

OpenText Information Management

2023 will be the year the cookie crumbles. Google announced plans to delay the phase-out of third-party cookies in Chrome, giving marketers just a bit more time to prepare. But does that mean brands are ready?

Ransomware Operators Are Feeling the Heat

Dark Reading

Ransomware has maintained its dominance the past few years; however, increased law enforcement attention may result in changes to how it looks in the future

Understanding Cadence Workflow for Developers and Architects

Explore the basics of Cadence and understand the benefits it can provide to your organization. This whitepaper will dive into a brief history of Cadence, how workflows can be put into practice, and how you can apply Cadence to your data infrastructure.

Uniform Law Commission Proposes “Reasonable” Uniform Personal Data Protection Act for State-by-State Adoption as Federal Privacy Bills Languish

Data Matters

Introduction. As data breaches become more common, increased public attention on privacy has led to a flurry of state-level activity on the issue. With a federal privacy bill languishing in Congress, the states have taken the lead.

We Are Hiring!

National Archives Records Express

Our office has posted a vacancy announcement for four positions in our appraisal program. The positions will be open until Monday, January 31, 2022. Archives Specialist. Agency: National Archives and Records Administration. Salary: $89,834.00 to $138,868.00 /PA. Series and Grade: GS-1421-12/13.

Surge in Malicious QR Codes Sparks FBI Alert


QR codes have become a go-to staple for contactless transactions of all sorts during the pandemic, and the FBI is warning cybercriminals are capitalizing on their lax security to steal data and money, and drop malware. IoT Malware Mobile Security Vulnerabilities Web Security

IoT 81

Laserfiche & Kodak Alaris Announce joint Partnership and Bundle Promotion

Info Source

On January 10, 2022, Kodak Alaris announced a new partnership with Laserfiche to offer a bundled promotion of the Kodak Alaris S2060W departmental scanner with a Laserfiche Cloud subscription. The promotion entails with each package of five or more Laserfiche licenses, customers will receive a free scanner. Promotion availability is currently North America only.

12 Tips for Selling to the C-Suite

The question for sales pros is this: Are you ready for the challenge, and opportunity, of selling to the C-suite? The following 12 tips can help ensure that you and your team are.

Linux Servers at Risk of RCE Due to Critical CWP Bugs


The two flaws in Control Web Panel – a popular web hosting management software used by 200K+ servers – allow code execution as root on Linux servers. News Vulnerabilities Web Security

Risk 76

Laserfiche & Kodak Alaris Announce joint Partnership and Bundle Promotion

Info Source

On January 10, 2022, Kodak Alaris announced a new partnership with Laserfiche to offer a bundled promotion of the Kodak Alaris S2060W departmental scanner with a Laserfiche Cloud subscription. The promotion entails with each package of five or more Laserfiche licenses, customers will receive a free scanner. Promotion availability is currently North America only.

Dark Souls 3 Servers Shut Down Due to Critical RCE Bug


The bug can allow attackers to remotely execute code on gamers’ computers. The devs temporarily deactivated PvP servers across multiple affected versions. Vulnerabilities Web Security