Tue.May 19, 2020

EasyJet Data Breach Exposes 9 Million Customers' Details

Data Breach Today

European Budget Airline Says Payment Card Data Stolen, But Only for 2,200 Customers European budget airline EasyJet says it suffered a data breach that exposed 9 million customers' personal details.

Ukraine Nabs Suspect in 773M Password ‘Megabreach’

Krebs on Security

In January 2019, dozens of media outlets raised the alarm about a new “megabreach” involving the release of some 773 million stolen usernames and passwords that was breathlessly labeled “the largest collection of stolen data in history.”

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

U.S. Treasury Warning: Beware of COVID-19 Financial Fraud

Data Breach Today

Financial Crimes Enforcement Network Advises Banks to Be on the Lookout for Scams The U.S.

Sales 211

The Nigerian Fraudsters Ripping Off the Unemployment System

WIRED Threat Level

Security researchers have spotted the “Scattered Canary” group scamming vital benefits programs amid the Covid-19 pandemic. Security Security / Cyberattacks and Hacks

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Verizon: Breaches Targeting Cloud-Based Data Doubled in 2019

Data Breach Today

Analysts Predict Attacks in the Cloud Will Continue to Surge This Year Attacks targeting cloud-based data nearly doubled in 2019 as companies shifted more of their valuable information off-premises and misconfigurations and other issues made it more vulnerable, according to the 2020 Verizon Data Breach Investigations Report.

Cloud 198

More Trending

DoJ Blasts Apple on Lack of Encryption Backdoor - Again

Data Breach Today

Law Enforcement Leaders Say Encryption Delayed Terrorist Investigation; Apple Pushes Back Although FBI technicians were able to gain access to data in two iPhones belonging to a Saudi national who killed three U.S.

IRELAND: First GDPR fine issued in Ireland

DLA Piper Privacy Matters

Eilis McDonald & John Magee. Tusla, Ireland’s child and family agency, has become the first organisation fined under the GDPR in Ireland. The Irish Data Protection Commission filed papers in the Circuit Court on Friday to confirm the €75,000 fine against the Agency.

GDPR 92

Spoofed Website Templates Help Spread COVID-19 Scams: Report

Data Breach Today

Fake Websites Linked to Phishing Attacks Designed to Steal Credentials, Banking Data Fraudsters are now using numerous spoofed website templates with COVID-19 themes as part of phishing attacks designed to steal login credentials and banking data, according to Proofpoint

AI and Cybersecurity

Schneier on Security

Ben Buchanan has written " A National Security Research Agenda for Cybersecurity and Artificial Intelligence." It's really good -- well worth reading. artificialintelligence attribution cybersecurity nationalsecuritypolicy reports

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Cybersecurity Leadership: What's Your 180-Day Plan?

Data Breach Today

CEOs, CISOs on Authentication, Access and Defending the Hybrid Workforce Business and security leaders accept that a hybrid workforce is the new norm - some staff members based in a central office and many others permanently working at home.

Unpatched Open Source Libraries Leave 71% of Apps Vulnerable

Dark Reading

PHP and JavaScript developers need to pay close attention because different languages and frameworks have different rates of vulnerability, research finds

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

Security Affairs

Experts from Palo Alto Networks discovered that the Mirai and Hoaxcalls botnets are targeting a vulnerability in legacy Symantec Web Gateways.

IoT 87

WolfRAT Android Malware Targets WhatsApp, Facebook Messenger

Threatpost

Researchers link the malware to Wolf Research operators with "high confidence" after it was spotted in campaigns targeting Thai users. Malware Mobile Security Android espionage Facebook Facebook Messenger Line app malware mobile app mobile malware Spyware WhatsApp Wolf Research wolfRAT

IT 111

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Hackers Target Oil Producers During COVID-19 Slump

Security Affairs

Recent research shows that the oil industry — already experiencing difficulties due to COVID-19 — must remain abreast of threats to stay safe from hackers. Spear-phishing is a rapidly emerging threat.

Web Application Attacks Double from 2019: Verizon DBIR

Dark Reading

Verizon's annual data breach report shows most attackers are external, money remains their top motivator, and web applications and unsecured cloud storage are hot targets

Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices

Threatpost

A host of unpatched security bugs that allow BIAS attacks affects Bluetooth chips from Apple, Intel, Qualcomm, Samsung and others.

Bluetooth BIAS attack threatens billions of devices

Security Affairs

Boffins disclosed a security flaw in Bluetooth, dubbed BIAS, that could potentially be exploited by an attacker to spoof a remotely paired device.

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Hackers Hit Food Supply Company

Dark Reading

The attackers behind the REvil ransomware family has also threatened to release personal data on Madonna and other celebrities to the highest bidders

Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials

Threatpost

The attack discovered by Cofense can steal sensitive user data stored on the cloud as well as find other victims to target. Hacks Web Security Cloud Computing Cloud Security Credential Theft data theft email Microsoft Office Sharepoint threat actors multi-factor authentication Office 365 Phishing

129 million records of Russian car owners available on the dark web

Security Affairs

A hacker is offering for sale on a dark web forum a database containing 129 million records of car owners in Moscow. A hacker is attempting to sell on a dark web forum a database containing 129 million records of car owners in Moscow.

Magecart Plants Card Skimmers via Old Magento Plugin Flaw

Dark Reading

The FBI has warned ecommerce sites about attacks targeting a more than three-year-old flaw in the Magmi mass importer

71

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Web Giants Scrambled to Head Off a Dangerous DDoS Technique

WIRED Threat Level

Firms like Google and Cloudflare raced to prevent an amplification attack that threatened to take down large portions of the internet with just a few hundred devices. Security Security / Cyberattacks and Hacks

Cybersecurity Extends Far Beyond Security Teams & Everyone Plays a Part

Dark Reading

Security isn't about tools or technology; it's about establishing a broad, fundamental awareness and sense of responsibility among all employees

The Best Memberships for Information Professionals

AIIM

“It’s 2020,” you might be thinking, “Who needs associations?” Associations and professional memberships can often be thought of as a relic of the past or a resume builder, but not as a valuable personal development tool. For an introvert, I’m a pretty social, member-y kinda guy.

Australian product steel producer BlueScope hit by cyberattack

Security Affairs

The Australian flat product steel producer BlueScope Steel Limited was hit by a cyberattack that caused disruptions to some of its operations. Australian steel producer BlueScope was recently hit by a cyberattack that disrupted some of its operations.

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

Google Chrome Redesign Puts Security & Privacy in Users' Hands

Dark Reading

The Chrome browser will tell users if their browser is up to date, malicious extensions are installed, and/or a password has been compromised

What’s new in OpenText IoT 20.2

OpenText Information Management

Amidst an environment of increasingly global and complex supply chains, organizations must collaborate closely with customers, suppliers and partners to achieve real-time visibility across every part of the supply chain.

IoT 61

Long-Term Remote Work: Keeping Workers Productive & Secure

Dark Reading

The pandemic has changed how we get work done. Now, data security must catch up