Mon.Aug 03, 2020

Twitter Hack: Suspects Left Easy Trail for Investigators

Data Breach Today

Bitcoin Accounts Linked to Driver's Licenses, Leading to Arrests Suspects in the epic attack against Twitter were uncovered in part by the use of their real photo identification for cryptocurrency accounts they used to broker the sale of stolen usernames. The mistakes proved crucial to their identification, according to court documents

Sales 167

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers, email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Breaches Tied to Pharmacy Looting: Security Lessons

Data Breach Today

Walgreens and CVS Are Among the Chains Affected As more reports emerge regarding data breaches at pharmacy chains as a result of earlier break-ins and looting incidents during civil unrest, security experts are calling attention to important security issues, including the need to check physical security measures as well as encrypt mobile devices

List of data breaches and cyber attacks in July 2020 ­– 77 million records breached

IT Governance

After mammoth amounts of personal data were leaked in May and June, we’ve seen a reversion to the mean this month. By our count, 77,775,496 records were leaked in 86 incidents. This includes the Twitter hack on 130 people, including Bill Gates, Barack Obama and Elon Musk, as well as the less flashy but equally concerning attack on dozens of universities and charities across the UK, US and Canada. You can find our full list of publicly disclosed data breaches from July in this blog.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Fraud Detection: Lessons From Novartis Case

Data Breach Today

Compliance Expert Thomas Fox on the Role Data Analytics Can Play Incidents of fraud at pharmaceutical giant Novartis that resulted in over $1 billion in fines worldwide might have been avoided if the company's compliance team used data analytics to detect patterns, says Thomas Fox, a compliance evangelist and author

More Trending

FastPOS Malware Creator Pleads Guilty

Data Breach Today

Prosecutors Say He Provided Help to Cybercriminals Via Infraud Site A member of the infamous Infraud Organization who was the creator of a malware strain called FastPOS has pleaded guilty to a federal conspiracy charge. Valerian Chiochiu assisted other cybercriminals through the Infraud site before authorities shuttered it in 2018, prosecutors say

IT 121

FBI Warns on New E-Commerce Fraud

Dark Reading

A wave of new, fraudulent websites has popped up to take advantage of the rise in online shopping during the coronavirus pandemic


Insights on Revamping Recovery Strategies

Data Breach Today

Experts at Dell Technologies and Unisys Discuss Current Threats and Best Security Practices In a joint video interview, David Finley at Dell Technologies and Andrew Peters at Unisys offer insights on enterprise strategies for disaster recovery and cyber recovery in light of emerging threats

Travel Management Firm CWT Pays $4.5M to Ransomware Attackers

Dark Reading

Attackers claimed to steal two terabytes of files including financial reports, security files, and employees' personal data

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Onna is breaking down how the concept of information governance has evolved and ways today’s businesses can develop a holistic framework to keep up with a rapidly accelerating datasphere.

Secret Service Agent Offers Cybercrime-Fighting Insights

Data Breach Today

Christopher Leone, assistant special agent in charge, United States Secret Service, offers advice to organizations on forging relationships with law enforcement as part of their cybersecurity incident preparedness plans

11 Hot Startups to Watch at Black Hat USA

Dark Reading

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor


BlackBerry Phone Cracked

Schneier on Security

Australia is reporting that a BlackBerry device has been cracked after five years: An encrypted BlackBerry device that was cracked five years after it was first seized by police is poised to be the key piece of evidence in one of the state's longest-running drug importation investigations. In April, new technology "capabilities" allowed authorities to probe the encrypted device. No details about those capabilities. australia blackberry cracking crime drugtrade encryption lawenforcement phones

IT 71

New 'Nanodegree' Program Provides Hands-On Cybersecurity Training

Dark Reading

Emerging streamlined curriculum programs aim to help narrow the skills gap

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Belarussian authorities arrested GandCrab ransomware distributor

Security Affairs

Last week, the Minister of Internal Affairs of Belarus announced the arrest of a 31-year-old man that is accused of distributing the infamous GandCrab ransomware. Last week, the Minister of Internal Affairs of Belarus announced the arrest of a man on charges of distributing the infamous GandCrab ransomware. The arrest is the result of an investigation conducted with help from law enforcement from the UK and Romania.

DHS Urges 'Highest Priority' Attention on Old Chinese Malware Threat

Dark Reading

"Taidoor" is a remote access tool that has been used in numerous cyber espionage campaigns since at least 2008

Reading the 2020 Cost of a Data Breach Report

Security Affairs

2020 Cost of a Data Breach Report: the global total cost of a data breach averaged $3.86 million in 2020, down about 1.5% from the 2019 study. Every year, I write about the annual report published by the Ponemon Institute on the cost of a data breach, it is a very interesting study that explores the economic impact of a “data breach.”.

11 Hot Startups to Watch at Black Hat USA

Dark Reading

A sneak peek at the up-and-coming organizations to check out on the Black Hat USA virtual show floor


Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Hackers stole €1.2m worth of cryptocurrency from 2gether

Security Affairs

2gether has disclosed a security breach, hackers have stolen roughly €1.2 million worth of cryptocurrency from cryptocurrency investment accounts. . Hackers stole roughly €1.183 million worth of cryptocurrency from investment accounts of 2gether, 26.79% of overall funds stored by the accounts. The attack took place on July 31 at 6.00 pm CEST, when hackers compromised the company servers.

How Should I Securely Destroy/Discard My Devices?

Dark Reading

While it is possible to do data destruction in-house, doing it correctly and at scale can be tedious

IT 63

Garmin Pays Up to Evil Corp After Ransomware Attack — Reports


The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said. Cryptography Hacks Malware decryptor key Dridex evil corp garmin Kaspersky Malware analysis paid up Ransomware Attack wastedlocker

A Patriotic Solution to the Cybersecurity Skills Shortage

Dark Reading

Why now is the right time for the security industry to invest in the human capital that will make technology better, smarter, and safer

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Japan: Protection of Personal Information (APPI) Act to be Amended: Is your Business Ready?

DLA Piper Privacy Matters

The Japanese Diet has recently approved a bill to amend the APPI. This is expected to result in a strengthening of rights for data subjects while making data breach notifications mandatory and increasing penalties for noncompliance. Is your business ready for these upcoming changes? Overview of the Amendment. On 5 June 2020, the Japanese Diet approved a bill to partially amend the Act on the Protection of Personal Information (the “ APPI” ).

Omdia Cybersecurity Accelerator Analysts to Take Part in Black Hat USA 2020

Dark Reading

Analysts will participate in the Black Hat Briefings, taking place Aug. 4-6, discussing cybersecurity research, offering exclusive video presentations, and meeting with vendors and attendees

Havenly discloses data breach, 1.3M accounts available online

Security Affairs

Havenly, a Denver-Based company, that realized an interior designer marketplace has disclosed a data breach that impacted 1.3 million users. The US-based interior design web site Havenly has disclosed a data breach after the known threat actor ShinyHunters has leaked for free the databases of multiple companies on a hacker forum.

Netgear Won’t Patch 45 Router Models Vulnerable to Serious Flaw


Almost two months after a high-severity flaw was disclosed - and seven months after it was first reported - Netgear has yet to issue fixes for 45 of its router models. Vulnerabilities Web Security flaw NETGEAR R6700 R7800 remote code execution Router router flaw router model vulnerability

IT 71

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

FAQ: My Record Is Nowhere to Be Found on a Schedule—Now What?

The Texas Record

The local government schedules or your state agency’s retention schedule should list all of the types of records your local government or state agency creates or receives since the disposition of a record cannot be carried out if it is not included on a retention schedule.

IT 45

How utilities can leverage robotic process automation to enhance business processes and customer experiences


How utilities can leverage robotic process automation to enhance business processes and customer experiences. The ability to see the precise minute my hot pizza will arrive, get real-time breaking news, and receive same-day groceries have set the bar for instant information expectancy. This has been amplified further during the stay-at-home requirements resulting from the pandemic. Mon, 08/03/2020 - 10:40

A lesson from Wonder Woman and the Power of Collaboration

Micro Focus

We are a quarter of the way into our INSPIRE 20 podcast journey, and I’m pleased to bring you podcast number five with Sheridan Ash of PwC. Sheridan has an impressive and varied resume – she left school at 16, a decision she made after being bullied as a result of undiagnosed dyslexia. She then. View Article. Company Culture CSR INSPIRE 20 Micro Focus PwC