Tue.Nov 24, 2020

Instagram Leaked Minors' PII Again, But Now It's Fixed

Data Breach Today

Exposure Comes as Ireland Probes Facebook's Handling of Children's Data For at least a month, Instagram leaked the email addresses of minors, which occurred as Ireland's Data Protection Commission probed whether its parent company, Facebook, failed to protect children's personal data.

How Ransomware Defense is Evolving With Ransomware Attacks

Dark Reading

As data exfiltration threats and bigger ransom requests become the norm, security professionals are advancing from the basic "keep good backups" advice


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Updated Trickbot Malware Is More Resilient

Data Breach Today

Researchers Find 2 Fresh Versions Following Takedown Efforts The gang operating Trickbot is continuing its activities despite recent takedown efforts, rolling out two updates that make the malware more difficult to kill, according to the security firm Bitdefender

2FA bypass in cPanel potentially exposes tens of millions of websites to hack

Security Affairs

2FA bypass discovered in web hosting software cPanel. More than 70 million sites are managed via cPanel software, according to the company. Researchers discovered a major issue in cPanel that could be exploited by attackers to bypass two-factor authentication for cPanel accounts.

The Best Data Retention Policy & Template To Get You Started

In this whitepaper from Onna, we will walk you through data retention best practices and provide you with a downloadable template to help you get organized and gain better visibility into your data’s lifecycle.

Chinese Hacking Group Rebounds With Fresh Malware

Data Breach Today

Researchers: TA416 Ramping Up Phishing Emails Targeting Diplomatic Missions A Chinese advanced persistent threat group has recently begun ramping up its activities with a new phishing campaign leveraging updated malware that's targeting diplomatic missions around the world to collect data and monitor communications, according to Proofpoint.

More Trending

Fraudsters Spoof FBI Domain

Data Breach Today

Bureau Identifies Nearly 100 Spoofed Websites Created by Cybercriminals The FBI has identified nearly 100 spoofed websites that use some incarnation of the agency's name. Fraudsters and other cybercriminals potentially could leverage the sites disinformation campaigns and credential theft


Baidu Apps Leaked Location Data, Machine Learning Reveals

Dark Reading

Several apps available on the Google Play Store, including two made by Chinese Internet giant Baidu, leaked information about the phone's hardware and location without the user's knowledge, research finds


Alleged Fraud at Billing Firm Spotlights Insider Risks

Data Breach Today

Employee Indicted for ID Theft, Medicaid Fraud Federal prosecutors have indicted an employee of a Florida medical billing company in a case involving alleged identity theft and Medicaid fraud

Risk 164

US Treasury's OFAC Ransomware Advisory: Navigating the Gray Areas

Dark Reading

Leveraging the right response strategy, following the regulations, and understanding the ransom entity are the fundamentals in any ransomware outbreak

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

You've finally done it: You've won over C-Suite and your DevSecOps team is up and running. But how do you monitor your new program? Join Shannon Lietz, Leader and Director of DevsecOps at Intuit, and learn to lead your DevSecOps team to the top.

UK Telecommunications Security Bill Would Ban Huawei

Data Breach Today

Latest Version of TrickBot Employs Clever New Obfuscation Trick

Dark Reading

The malware takes advantage of how the Windows command line interpreter works to try and slip past anti-detection tools, Huntress Labs says


On That Dusseldorf Hospital Ransomware Attack and the Resultant Death

Schneier on Security

Wired has a detailed story about the ransomware attack on a Dusseldorf hospital, the one that resulted in an ambulance being redirected to a more distant hospital and the patient dying.

Baidu Android apps removed from Play Store because caught collecting user details

Security Affairs

Two Baidu Android apps have been removed from the Google Play Store in October after they’ve been caught collecting sensitive user details.

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

What's in Store for Privacy in 2021

Dark Reading

Changes are coming to the privacy landscape, including more regulations and technologies

Microsoft fixes Kerberos Authentication issues with an out-of-band Update

Security Affairs

Microsoft released an out-of-band update for Windows to address authentication flaws related to a recently patched Kerberos vulnerability.

Alexa, Disarm the Victim's Home Security System

Dark Reading

Researchers who last year hacked popular voice assistants with laser pointers take their work to the next level

Credential stuffing attack targeted 300K+ Spotify users

Security Affairs

Researchers uncovered a possible credential stuffing campaign that is targeting Spotify accounts using a database of 380 million login credentials. Security experts from vpnMentor have uncovered a possible credential stuffing operation that affected some Spotify accounts.

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Printers' Cybersecurity Threats Too Often Ignored

Dark Reading

Remote workforce heightens the need to protect printing systems against intrusion and compromise

Blackrota Golang Backdoor Packs Heavy Obfuscation Punch


Blackrota is targeting a security bug in Docker, but is nearly impossible to reverse-analyze. Malware backdoor Blackrota docker flaw Docker Remote API EKANS ransomware ELF go language gobfuscate golang honeypot malware obfuscation reverse analysis security vulnerability Snake unauthorized access

Cloud Security Startup Lightspin Emerges From Stealth

Dark Reading

The startup, founded by former white-hat hackers, has secured a $4 million seed round to close security gaps in cloud environments

Cloud 71

Tesla Hacked and Stolen Again Using Key Fob


Belgian researchers demonstrate third attack on the car manufacturer’s keyless entry system, this time to break into a Model X within minutes.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

CISA Warns of Holiday Online Shopping Scams

Dark Reading

The agency urges shoppers to be cautious of fraudulent websites, unsolicited emails, and unencrypted financial transactions


Crooks social-engineered GoDaddy staff to take over crypto-biz domains

Security Affairs

Crooks were able to trick GoDaddy staff into handing over control of crypto-biz domain names in a classic DNS hijacking attack. Crooks were able to hijack traffic and email to various cryptocurrency-related websites as a result of a DNS hijacking attack on domains managed by GoDaddy.

‘Minecraft Mods’ Attack More Than 1 Million Android Devices


Fake Minecraft Modpacks on Google Play deliver millions of abusive ads and make normal phone use impossible.

TrickBot operators continue to update their malware to increase resilience to takedown

Security Affairs

Following the recent takedown, the TrickBot operators have implemented various improvements to make it more resilient.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Do I Need Change Management?


Sometimes, change is natural. The caterpillar changing to a butterfly, the tadpole changing to a frog – these types of changes happen all the time in nature. Yet, change in business can feel anything but natural. And it’s not just at your place of business.

IT 63

Baidu Apps in Google Play Leak Sensitive Data


Cyberattackers could use the information to track users across devices, disable phone service, or intercept messages and phone calls. Mobile Security Privacy Vulnerabilities Web Security Baidu Data leakage google play IMEI IMSI intercept phone calls mobile app user tracking

Fruit of the Loom is looking for an Archivist in Bowling Green, Kentucky

IG Guru

Check out the job posting here. The post Fruit of the Loom is looking for an Archivist in Bowling Green, Kentucky appeared first on IG GURU. Archives Jobs Archivist Fruit of the Loom Job Posting