Fri.Oct 16, 2020

Cybercrime Losses Up 50%, Exceeding $1.8B

Dark Reading

Fewer companies are being hit by cyber incidents, but those that do get hit are hit harder and more often

105
105

20 Arrested in Money-Laundering Crackdown

Data Breach Today

Group Allegedly Laundered Cash, Cryptocurrency for Other Cybercriminals A international law enforcement operation involving 16 countries has resulted in the arrest of 20 individuals suspected of belonging to the QQAAZZ criminal network, which helped launder cash and cryptocurrency for other cybercriminals.

219
219

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Massive New Phishing Campaigns Target Microsoft, Google Cloud Users

Dark Reading

At least three campaigns are now underway

For Sale: 3 Million Cards Used at Dickey's Barbeque Pit

Data Breach Today

Joker's Stash Darknet Marketplace Offering Payment Cards Used at Franchise Restaurants The Joker's Stash darknet marketplace has posted a fresh collection of 3 million credit cards that are likely related to a breach of the Dickey's Barbecue Pit chain of franchised restaurants, according to Gemini Advisory.

Sales 205

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Is it still necessary for data protection laws to have particular processing rules for specific types pf personal data?

Data Protector

I think not. European laws have special rules for the processing of “sensitive data” or “special category data” regardless of the context within which the data will be processed. This has been the case in the UK since the coming into force of the first (1984) Data Protection Act.

More Trending

Academia Adopts Mitre ATT&CK Framework

Dark Reading

Security pros and academic researchers discuss the best ways to use MITRE's framework to inform cybersecurity efforts, analyze threats, and teach future workers

'Black Box' and Physical Attacks Against ATMs Surge

Data Breach Today

Physical Attacks Increase in US; ATM Malware and Logical Attacks Rise in Europe Criminals have been seeking innovative new ways to steal cash from ATMs. In the U.S.,

190
190

Almost 800,000 SonicWall VPN appliances online are vulnerable to CVE-2020-5135

Security Affairs

The Tripwire VERT security team spotted almost 800,000 SonicWall VPN appliances exposed online that are vulnerable to the CVE-2020-5135 RCE flaw.

British Airways' GDPR Fine Dramatically Reduced

Data Breach Today

Fined $26 Million in Connection With 2018 Breach Britain's Information Commissioner's Office announced this week a dramatic reduction in its fine against British Airways for violating the EU's General Data Protection Regulation.

GDPR 185

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

Breach at Dickey’s Barbecue Pit compromises 3 million Cards

Security Affairs

Dickey’s Barbecue Pit, the largest barbecue restaurant chain in the US, suffered a POS breach, card details for 3 Million customers were posted online.

Sales 92

Iranian Hacking Group Suspected of Deploying Ransomware

Data Breach Today

ClearSky: 'MuddyWater' APT Linked to Attacks Targeting Israel, Others A hacking group with links to Iran's government is suspected of using ransomware in attempts to damage the systems of organizations in Israel and other countries, the security firm ClearSky reports

Fancy Bear Imposters Are on a Hacking Extortion Spree

WIRED Threat Level

Nice looking website you've got there. It'd be a shame if someone DDoS'd it. Security Security / Cyberattacks and Hacks

IT 89

Singapore Launches IoT Cybersecurity Labelling

Data Breach Today

Labels Will Indicate What Security Standards Products Meet Singapore has launched an IoT cybersecurity labelling program intended to improve the baseline security of internet-connected consumer products. The program is voluntary, but Singapore eventually intends to make it mandatory

IoT 170

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Today’s organizations are faced with the overwhelming challenge of managing, finding, and leveraging their information. This eBook discusses a newly discovered information discipline and is filled to the brim with helpful information.

An Uncommon 20 Years of Commonly Enumerating Vulns

Dark Reading

Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list

88

Analysis: Ransomware Dominates the Cybercrime Landscape

Data Breach Today

The latest edition of the ISMG Security Report analyzes a new report that labels ransomware as the No. 1 cybercrime threat. Also featured: A former FBI agent offers an update on "disruptionware" attacks; how Tesla's autopilot is tricked by phantom images

Google mitigated a 2.54 Tbps DDoS attack in 2017, the largest DDoS ever seen

Security Affairs

The Google Cloud team revealed that in September 2017 it has mitigated DDoS attack that reached 2.54 Tbps, the largest DDoS attack of ever. The Google Cloud team revealed that back in September 2017 it has mitigated a powerful DDoS attack that clocked at 2.54

Cloud 87

Supply Chain Risk Management: Areas of Concern

Data Breach Today

Many healthcare organizations are failing to address shortcomings in security risk management for their supply chains, says former healthcare CIO David Finn, describing findings of a recent study assessing the state of cybersecurity in the sector

Risk 141

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Barnes & Noble Experiences Major Data Breach

Adam Levin

Barnes & Noble has confirmed a data breach following a cyberattack that took many of their services offline. . The bookseller sent an email to customers notifying them that their personal information had been exposed, but that their financial information had not been compromised. .

Why Automation is an Information Governance Game-Changer

InfoGoTo

Information governance is growing in complexity as the volume and variety of information that organizations must manage expands at unprecedented rates. Automation is needed, but the task is so large that many organizations don’t know where to start. Our experts are here to help.

Britain’s information commissioner fines British Airways for 2018 Hack

Security Affairs

Britain’s information commissioner has fined British Airways 20 million pounds for the 2018 hack that exposed data of 400,000 customers. In September 2018, British Airways suffered a data breach that exposed the personal information of 400,000 customers.

GDPR 75

Microsoft Fixes RCE Flaws in Out-of-Band Windows Update

Threatpost

The two important-severity flaws in Microsoft Windows Codecs Library and Visual Studio Code could enable remote code execution.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

Juniper fixes tens of flaws affecting the Junos OS

Security Affairs

Juniper Networks has addressed tens of vulnerabilities, including serious flaws that can be exploited to take over vulnerable systems. Juniper Networks has addressed tens of vulnerabilities, including serious issues that can be exploited to take control of vulnerable systems.

US Counterintelligence Director & Fmr. Europol Leader Talk Election Security

Dark Reading

The US counterintelligence lead joins a former Europol cyber chief to discuss modern election threats and the benefits of public-private collaboration

Adobe fixes Magento flaws that can lead to code execution

Security Affairs

Adobe released a series of out-of-band security fixes to address multiple Magento vulnerabilities that lead to code execution, customer list tampering.

CMS 66

Surviving Radical Disruption with Data Intelligence

erwin

It’s certainly no secret that data has been growing in volume, variety and velocity, and most companies are overwhelmed by managing it, let alone harnessing it to put it to work. We’re now generating 2.5

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Phishers Capitalize on Headlines with Breakneck Speed

Threatpost

Marking a pivot from COVID-19 scams, researchers track a single threat actor through the evolution from the pandemic to PayPal, and on to more timely voter scams -- all with the same infrastructure.

Twitter’s ‘Hacked Materials’ Rule Tries to Thread an Impossible Needle

WIRED Threat Level

The company’s flip-flopping on the policy after banning a shady New York Post story highlights the challenges facing social media in 2020. Security Security / National Security

An Uncommon 20 Years of Commonly Enumerating Vulns

Dark Reading

Larry Cashdollar, a researcher with more than 300 CVEs to his credit, looks back at his favorite vulnerabilities (and being the only individual CNA on Mitre's list

62