Thu.May 21, 2020

Bank of America: COVID-19 Loan Data May Have Leaked

Data Breach Today

Client Data May Have Been Exposed During Test of SBA Loan Platform Bank of America disclosed this week that some customers' data may have been exposed during the uploading of loan applications related to the Paycheck Protection Program - a U.S.

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

The Last Watchdog

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to connect to the internet we could achieve better accountability.

GDPR 173

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Apple and Google Release Contact-Tracing APIs for COVID-19

Data Breach Today

Privacy-Centered Approach May Bolster Public Confidence in Contact-Tracing Apps Apple and Google have released new APIs designed to support contact-tracing apps being developed by governments to help combat the COVID-19 pandemic. Already at least three U.S.

Tens of thousands Israeli websites defaced

Security Affairs

Thousands of Israeli websites have been defaced earlier today, hackers published an anti-Israeli message on their homepage and attempted to implant malicious code.

IT 113

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Hot Offering on Darknet: Access to Corporate Networks

Data Breach Today

Access 194

More Trending

Hacked Law Firm May Have Had Unpatched Pulse Secure VPN

Data Breach Today

REvil Gang Still Threating to Release More Data A recent ransomware attack that targeted a law firm that serves celebrities may have been facilitated by a Pulse Secure VPN server that was not properly patched and mitigated against a well-known vulnerability, some security experts say

Sophos blocked attacks exploiting XG Firewall zero-day to deploy Ransomware

Security Affairs

Hackers attempted to exploit a zero-day flaw in the Sophos XG firewall to distribute ransomware to Windows machines, but the attack was blocked.

Remote Workforce Security - the Long Game

Data Breach Today

"Risk acceptance" was the operative term as organizations quickly deployed remote workforces in response to the global crisis. But now, as this deployment becomes a long-term option, enterprises need to take a future-focused view toward identity, cloud, and the attack surface.

Cloud 147

Centralized Contact Tracing Raises Concerns Among Privacy-Conscious Citizens

Dark Reading

The long debate over whether encryption and anonymity shield too much criminal behavior also has staged a resurgence

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

ShinyHunters Is a Hacking Group on a Data Breach Spree

WIRED Threat Level

In the first two weeks of May, they've hit the dark web, hawking 200 million stolen records from over a dozen companies. Security Security / Cyberattacks and Hacks

Santander, one of the biggest European banks, was leaking sensitive data on their website

Security Affairs

Santander Consumer Bank, the Belgian branch of the bank, had a misconfiguration in its blog domain that was allowing its files to be indexed. Our new research recently discovered a security issue with Santander , the 5th largest bank in Europe and the 16th largest in the world.

The Hypocrisy of Mike Pompeo

WIRED Threat Level

In the few short years since his time in Congress, the secretary of state has conveniently reversed himself on multiple fronts. Security Security / National Security

Meal delivery service Home Chef discloses data breach

Security Affairs

Meal delivery service Home Chef has confirmed that it recently suffered a security breach that exposed its customer information. Meal delivery service Home Chef has disclosed a data breach that exposed its customer information.

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

A Tunnel of Opportunity


On May 5, 2020 I participated in a panel discussion (fun starts at the 1:35 mark), presented by AO Docs , about how the COVID-19 pandemic is affecting work and how technology is helping, or hurting, us adapt. The pandemic hasn’t really impacted the way I work.

IT 82

Iran-linked Chafer APT group targets governments in Kuwait and Saudi Arabia

Security Affairs

Cybersecurity researchers uncovered an Iranian cyber espionage campaign conducted by Chafer APT and aimed at critical infrastructures in Kuwait and Saudi Arabia.

The Need for Compliance in a Post-COVID-19 World

Dark Reading

With the current upheaval, business leaders may lose focus and push off implementing security measures, managing risk, and keeping up with compliance requirements. That's a big mistake

Facebook Messenger Adds Safety Alerts—Even in Encrypted Chats

WIRED Threat Level

By using metadata instead of content to spot suspicious behavior, the social network can keep privacy intact. Security Security / Privacy

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Web Scrapers Have Bigger-Than-Perceived Impact on Digital Businesses

Dark Reading

The economic impact of bot traffic can be unexpectedly substantial, a PerimeterX-commissioned study finds


Japan suspects HGV missile data leak in Mitsubishi security breach

Security Affairs

Japan continues to investigate a cyberattack that hit this year Mitsubishi Electric Corp., it suspects a possible leak of data including details of a prototype missile. Japan is still investigating a cyberattack that was disclosed by Mitsubishi Electric Corp. early this year.

Most Bluetooth Devices Vulnerable to Impersonation Attacks

Dark Reading

Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find

Crooks Tap Google Firebase in Fresh Phishing Tactic


Cybercriminals are taking advantage of the Google name and the cloud to convince victims into handing over their login details. Cloud Security Web Security cloud credential harvesting email google firebase Office 365 phishing campaign TrustWave

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Hackers Serve Up Stolen Credentials from Home Chef

Dark Reading

Some 8 million of the meal delivery company's customer records have been offered for sale on the Dark Web

Sales 73

Jamf Protect adds malware prevention and unified log forwarding


We heard you and are happy to announce that Jamf Protect has added malware prevention and unified log forwarding


Telcos Become Richer Hacking Targets

Dark Reading

The shift of moving telecommunications networks toward more commercial networking equipment and systems also expanded their attack surface


Ann Mitchell, Bletchley Park Cryptanalyst, Dies

Schneier on Security

Obituary. cryptanalysis cryptography historyofcryptography war


How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

How an Industry Consortium Can Reinvent Security Solution Testing

Dark Reading

By committing to independent testing to determine value, vendors will ensure that their products do what they say they do

What Is The Analytic Hierarchy Process?


The analytic hierarchy process (AHP) or pairwise comparison is a framework for decision making, rooted in mathematics and psychology. The widely used technique was created by Thomas L. Saaty , a Distinguished University Professor at the University of Pittsburgh, in the 1970s.

Long Tail Analysis: A New Hope in the Cybercrime Battle


Looking for niche anomalies in an automated way with AI and machine learning is the future.

Cloud 89