Thu.Oct 22, 2020

Is Climbing the Corporate Ladder Still a Thing?

erwin

Thoughts on erwin Insights Day No. 2 Keynote. If you didn’t watch New York Times Best-Selling Author Keith Ferrazzi’s keynote from erwin Insights 2020 , what are you waiting for?

Elite Russian Sandworm Hackers' OPSEC Problem

Data Breach Today

US Indictment Airs Russian Military's Dirty Laundry Although Russia's elite nation-state hackers are capable of waging destructive attacks, the GRU military intelligence Sandworm operators have not been able to remain in the shadows, a U.S. federal grand jury indictment suggests

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Now-Defunct Firms Behind 8chan, QAnon

Krebs on Security

Some of the world’s largest Internet firms have taken steps to crack down on disinformation spread by QAnon conspiracy theorists and the hate-filled anonymous message board 8chan.

US Alleges Iran Sent Threatening Emails to Democrats

Data Breach Today

Iran is Attempting to Intimidate Voters and Manipulate Election, US Officials Warn U.S.

218
218

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Botnet Infects Hundreds of Thousands of Websites

Dark Reading

KashmirBlack has been targeting popular content management systems, such as WordPress, Joomla, and Drupal, and using Dropbox and GitHub for communication to hide its presence

More Trending

8 New and Hot Cybersecurity Certifications for 2020

Dark Reading

While the usual security certs remain popular, interest in privacy skills and cloud experience are pushing new credentials into the market

Cloud 106

Indian Pharmaceutical Company Investigates Security Incident

Data Breach Today

Reddy's Laboratories Says Plants in Four Countries Affected Dr. Reddy's Laboratories, a multinational pharmaceutical company based in India that's testing a COVID-19 vaccine, says it isolated its data center services Thursday following what it calls a "detected cyberattack

Facebook Promises Privacy Reform. Critics Aren't Convinced

WIRED Threat Level

In an interview with WIRED, Facebook's chief privacy officers argue that the company has turned a corner. Again. Security Security / Privacy

7 Mobile Browsers Vulnerable to Address-Bar Spoofing

Dark Reading

Flaws allow attackers to manipulate URLs users see on their mobile devices, Rapid7 says

94

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

VMware fixes several flaws in its ESXi, Workstation, Fusion and NSX-T

Security Affairs

VMware patched several flaws in its ESXi, Workstation, Fusion and NSX-T products, including a critical code execution vulnerability. VMware has fixed several vulnerabilities in its ESXi, Workstation, Fusion and NSX-T products, including a critical flaw that allows arbitrary code execution.

IT 89

Need for 'Guardrails' in Cloud-Native Applications Intensifies

Dark Reading

With more organizations shifting to cloud services in the pandemic, experts say the traditionally manual process of securing them will be replaced by automated tools in 2021 and beyond

Cloud 81

Microsoft Teams Phishing Attack Targets Office 365 Users

Threatpost

Up to 50,000 Office 365 users are being targeted by a phishing campaign that purports to notify them of a "missed chat" from Microsoft Teams.

Credential-Stuffing Attacks Plague Loyalty Programs

Dark Reading

But that's not the only type of web attack cybercriminals have been profiting from

78

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Today’s organizations are faced with the overwhelming challenge of managing, finding, and leveraging their information. This eBook discusses a newly discovered information discipline and is filled to the brim with helpful information.

Cisco addresses 17 high-severity flaws in security appliances

Security Affairs

Security Advisory Bundled Publication for October 2020 – Cisco announced the release of patches for 17 high-severity flaws in its security appliances.

12 Cyber Threats That Could Wreak Havoc on the Election

WIRED Threat Level

From targeted misinformation to manipulated data, these are the cybersecurity concerns election officials worry about most. Security Security / National Security

Taiwanese vendor QNAP issues advisory on Zerologon flaw

Security Affairs

Taiwanese vendor QNAP published an advisory to warn customers that certain versions of its NAS OS (QTS) are affected by the Zerologon vulnerability.

Facebook, News and XSS Underpin Complex Browser Locker Attack

Threatpost

An elaborate set of redirections and hundreds of URLs make up a wide-ranging tech-support scam. Facebook Vulnerabilities Web Security browser locker Cross Site Scripting grupo ppe Malwarebytes news site Open Redirect peru redirections security bug tech support scam XSS

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Positioning Rules as Solutions

AIIM

As you already know, people are more likely to follow your rules after they buy in to the reasons behind them. But you can take it one step further, and provide your “rules” as solutions instead of orders. Amazon’s Kindle publishing team understands this concept well.

EU Council sanctions two Russian military intelligence officers over 2015 Bundestag hack

Security Affairs

The Council of the European Union announced sanctions imposed on Russian military intelligence officers for 2015 Bundestag hack.

Implementing Proactive Cyber Controls in OT: Myths vs. Reality

Dark Reading

Debunking the myths surrounding the implementation of proactive cyber controls in operational technology

67

Chrome 86 Aims to Bar Abusive Notification Content

Threatpost

Google said Chrome 86 will automatically block malicious notifications that may be used for phishing or malware.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

To Err Is Human: Misconfigurations & Employee Neglect Are a Fact of Life

Dark Reading

The cyber kill chain is only as strong as its weakest link, so organizations should reinforce that link with a properly equipped dedicated security team

Publisher Lawsuit Against Internet Archive Puts Future of Book Ownership In Question via WDET.org

IG Guru

Check out the article here. The post Publisher Lawsuit Against Internet Archive Puts Future of Book Ownership In Question via WDET.org appeared first on IG GURU. Archives IG News Information Governance Risk News Book Ownership Intellectual Property Lawsuit

WordPress Plug-in Updated in Rare Forced Action

Dark Reading

The Logonizer login security plug-in was automatically updated to patch a SQL injection vulnerability

Romania: Key aspects in the Romanian Data Protection Authority’s annual activity report (2019)

DLA Piper Privacy Matters

Irina Macovei, Roxana Rosu and Andrei Stoica. On 28 September 2020, the Romanian National Supervisory Authority for the Processing of Personal Data (ANSPDCP) published on its website the annual activity report for 2019.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

McAfee Raises $740M in Second IPO

Dark Reading

The security software giant and its investors sold 37 million shares priced at $20 each, putting McAfee's value around $8.6 billion

Malware Data Breach Alert: Dickey's Barbecue Pit

Rippleshot

Dickey's Barbecue Pit, a restaurant franchise with 156 locations across 30 states, was hit by a malware-based, point-of-sale data breach.

Building Upon Zowe: How Rocket is Building Commercial Software for Zowe Users

Rocket Software

This content was originally presented at the inaugural Open Mainframe Project Summit in September 2020. Over two years ago, Rocket Software joined forces with IBM and Broadcom/CA to create the Zowe project. Our goal? To build a z/OS framework for the modern age.