Tue.Oct 22, 2019

Facebook Shuts Misleading Accounts Ahead of 2020 Election

Data Breach Today

Newly Discovered Pages Tied to Russia, Iran Facebook has removed four networks - three from Iran and one from Russia - after its investigation revealed they were spreading misinformation regarding politics and news related to the 2020 U.S. presidential election.

IT 158

Ransomware Hits B2B Payments Firm Billtrust

Krebs on Security

Business-to-business payments provider Billtrust is still recovering from a ransomware attack that began last week. The company said it is in the final stages of bringing all of its systems back online from backups. With more than 550 employees, Lawrence Township, N.J.-based

B2B 157

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

NordVPN Says Server Compromised Due to Misconfiguration

Data Breach Today

Security Expert Says Attacker Would Have Had 'God Mode' on VPN Node Virtual private network provider NordVPN says an error by its Finish data center provider allowed an attacker to gain control of a server, but it says its broader service was not hacked.

NordVPN, TorGuard, and VikingVPN VPN providers disclose security breaches

Security Affairs

NordVPN and TorGuard VPN firms were hacked, threat actors leaked the private keys used to secure their web servers and VPN configuration files. .

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Unsecure Database Exposed US Military Personnel Data: Report

Data Breach Today

Exposed Database Owned by AutoClerk Hotel Reservation Management System An unsecure database belonging to a company that provides hotel reservation management technology exposed about 179 GB of customer data, including travel arrangements and other data for U.S.

More Trending

Veterans' Data at Risk on Shared Network Storage Devices

Data Breach Today

OIG Report Highlights the Risks; Do Others Face Similar Challenges? Inadequately protected shared network storage devices at a Department of Veterans Affairs regional office left veterans' personal and health information vulnerable to ID theft, fraud and other compromises, according to a new report.

Risk 141

Experts believe the Magecart Group 5 could be linked to the Carbanak APT

Security Affairs

Security experts linked the Magecart group 5 to the infamous Dridex banking Trojan and the Carbanak cybercrime group. Researchers at Malwarebytes found a link between a scheme associated with the Magecart group and Dridex phishing campaigns and the activities of the Carbanak group. .

Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities

Data Breach Today

Draft regulations to carry out the California Consumer Protection Act do not go far enough to clarify ambiguities in the law, which goes into effect Jan. 1, 2020, says privacy attorney Sadia Mirza of the law firm Troutman Sanders, who encourages organizations to submit comments on the proposed regs

Calculating the Benefits of the Advanced Encryption Standard

Schneier on Security

NIST has completed a study -- it was published last year, but I just saw it recently -- calculating the costs and benefits of the Advanced Encryption Standard.

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Security Affairs - Untitled Article

Security Affairs

German company Pilz, one of the world’s biggest producers of automation tools is still down after getting infected by ransomware more than a week ago. German firm Pilz was still down after getting infected by the BitPaymer ransomware more than a week ago, on October 13, 2019.

SnoPUD connects content to business processes to realize operational excellence

OpenText Information Management

At Enterprise World 2019 in Toronto, we hosted a panel with a few of our customers to discuss their various digital transformation journeys and how they’re supporting their organizational goals by deploying content services technologies.

ECM 65

Is Your Data Protection Ready for the Hybrid Data Center? [On-demand Webcast]

Quest Software

Going hybrid? Learn how to protect your data both on premises and in the cloud. This webcast prepares you to think about everywhere your data is now.( read more ). Data Protection Hybrid Data Centers NetVault

Cloud 65

Trend Micro Anti-Threat Toolkit could be used to run malware on Win PCs

Security Affairs

A vulnerability in the Trend Micro Anti-Threat Toolkit (ATTK) can be exploited by attackers to run malware on targets’ Windows systems.

IT 65

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

In Hong Kong, Which Side Is Technology On?

WIRED Threat Level

Yes, authoritarians have co-opted tech. But the story is far from over. Security Security / Privacy

Autoclerk travel reservations platform data leak also impacts US Government and military

Security Affairs

vpnMentor’s discovered a breach in a database belonging to Autoclerk, a reservations management system owned by Best Western Hotels and Resorts Group.

How Much Security Is Enough? Practitioners Weigh In

Dark Reading

Most IT and security pros surveyed say they could afford some, but not all, of the minimum security needed to protect themselves

IT 60

It's Time to Get a Password Manager: Bitwarden, 1Password, Dashlane, LastPass

WIRED Threat Level

Your brain has better things to do than store secure passwords. Get a dedicated password manager to keep your login data synced and secure across all devices. Gear Gear / How To and Advice Security

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Bugcrowd Enters the IT Asset Discovery Business

Dark Reading

New service searches for errant or vulnerable devices on the Internet

IT 60

A Look at the Partnership Between Hyland and Blue Prism

Document Imaging Report

At CommunityLIVE 2019, Hyland announced a partnership with Blue Prism, a leader in the RPA market. This comes a year after Hyland announced plans to develop its own RPA technology. “We We are excited about the relationship with Blue Prism,” said Hyland CEO Bill Priemer.

Alliance Forms to Focus on Securing Operational Technology

Dark Reading

While mainly made up of vendors, the Operational Technology Cyber Security Alliance aims to offer security best practices for infrastructure operators and industrial partners

The Age of Intelligent Robots is Coming

Document Imaging Report

A couple weeks ago, I noticed that when my 13-year old and his friends were insulting each other, they used the term “bots.”

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Autoclerk Database Spills 179GB of Customer, US Government Data

Dark Reading

An open Elasticsearch database exposed hundreds of thousands of hotel booking reservations, compromising data from full names to room numbers

What is ISO 20614, and why does it matter?


The search to ensure the privacy and protection of digital and physical information is an ongoing one. While physical information security has been practiced for centuries, most people view digital information security as a new concern.

NordVPN Breached Via Data Center Provider's Error

Dark Reading

The VPN company said that one of its 3,000 servers in a third-party data center was open to exploitation through a misconfigured management tool

IT 52

Automation Anywhere Reveals Next-Gen RPA

Document Imaging Report

It’s no secret that the RPA market has been growing rapidly. According to Harvey Spencer Associates, it grew 200% in 2018 and is expected to grow another 65% this year to reach $1.2 billion.

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Doing more with less: A conundrum for creatives

OpenText Information Management

A survey from OpenText™ Hightail™ and Digiday confirmed what creatives in marketing, agencies, and publishing have known for some time: The pressure is on to deliver more content through more review processes – all while having fewer resources to do so.

Are Your Emojis Saying What You Think They Are? A Cautionary Tale From Harrison v. City of Tampa

Hanzo Learning Center

How are you preserving emojis for ediscovery? ediscovery Slack Case Law Summary emoji


Epicor Announces Newest Release of Next-Generation DocStar Solution 

Document Imaging Report

Latest DocStar ECM release adds new features to empower digital transformation so organizations can work smarter to reduce costs and invest in growth.