Mon.Oct 21, 2019

Avast, NordVPN Breaches Tied to Phantom User Accounts

Krebs on Security

Clinton Email Probe Cites 38 for Violations

Data Breach Today

State Dept.

Czech Police and Intelligence agency dismantled Russian Spy ring on its soil

Security Affairs

Czech police and intelligence services have identified a Russian espionage network operating having a nerve center in its Prague embassy. Czech police and intelligence services have dismantled a Russian espionage network operating that was operating via its Prague embassy.

Zappos' Offer to Breach Victims: A 10 Percent Discount

Data Breach Today

Proposed Data Breach Settlement Follows Supreme Court's Refusal to Hear Appeal Zappos is close to settling a long-running class action lawsuit filed by consumers over a 2012 data breach.

Retail 130

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

In the Workplace, Safety Is Sexy. And It All Starts With Your HR Department

Adam Levin

Maintaining workplace safety can seem like a rare form of torture–videos and quizzes and talks and such. For most of us, it’s a necessary chore. But despite the looks among employees with each new H.R.

More Trending

Avast internal network breached for the second time by sophisticated hackers

Security Affairs

The popular security firm Avast disclosed today a security breach that impacted its internal network accessed via a compromised VPN profile.

Assange Denied Delay for US Extradition Hearing

Data Breach Today

British Judge Says Five-Day Hearing for WikiLeaks Founder Will Begin in February A British judge has denied WikiLeaks founder Julian Assange's request to delay a five-day hearing, slated to begin Feb. 25, on whether he should be extradited to the United States to face espionage charges

130
130

Winnti APT group uses skip-2.0 malware to control Microsoft SQL Servers

Security Affairs

Security experts have a new malware, dubbed skip-2.0 used by the China-linked APT group to establish a backdoor in Microsoft SQL Server systems. Security experts at ESET have discovered a new malware, dubbed skip-2.0,

Details of the Olympic Destroyer APT

Schneier on Security

Interesting details on Olympic Destroyer, the nation-state cyberattack against the 2018 Winter Olympic Games in South Korea. Wired's Andy Greenberg presents evidence that the perpetrator was Russia, and not North Korea or China.

52

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

The Benefits of a Records Management App

Archive Document Data Storage

As Brexit looms, the ADDS team has seen a rise in the number of clients reviewing their processes around three management topics: time, money and people.

UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackers

Security Affairs

A joint UK and US investigation has revealed that the Russian cyber espionage group Turla carried out cyber attacks masqueraded as Iranian hackers.

Free Webinar— Information Governance Plans Stalling? 5 Things You Need this Wednesday

IG Guru

A Brief History of Russian Hackers' Evolving False Flags

WIRED Threat Level

Most hackers know how to cover their tracks. But Russia’s elite groups are working at a whole other level. Security Security / Cyberattacks and Hacks

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

Tough Choices

Dark Reading

If you could only protect one category of your organization's data, what would it be

IT 52

Microsoft's Secured-Core PC Feature Protects Critical Code

WIRED Threat Level

The “secured-core PC” feature for Windows looks to head off firmware hacks. Security Security / Security News

Surviving Security Alert Fatigue: 7 Tools and Techniques

Dark Reading

Experts discuss why security teams are increasingly overwhelmed with alerts and share tactics for lightening the load

IBM Cloud Pak for Data 2.5: Bringing open source to the core

IBM Big Data Hub

IBM is announcing the latest update to the IBM Cloud Pak for Data platform, Version 2.5.

IT 52

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Turning Vision to Reality: A New Road Map for Security Leadership

Dark Reading

Among the takeaways from a Gartner Symposium/Xpo session: who should be accountable for data security, why security groups should stop thinking of themselves as protectors, and the consequence of locking down 'dumb' users

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

As we noted yesterday , the 2019 Relativity Fest conference is going on this week, CloudNine is once again here as a Sponsor and Exhibitor and I will be covering the show for eDiscovery Daily. Let’s check out some of the sessions lined up for today (including the one I’m speaking at!).

OCR Provides Insight into Enforcement Priorities and Breach Trends

HL Chronicle of Data Protection

Regulators, industry experts, and researchers provided insight into health privacy and security enforcement trends, emerging threats, and new tools at a recent conference focused on the Health Insurance Portability and Accountability (HIPAA) regulatory framework.

Avast Foils Another CCleaner Attack

Dark Reading

Abiss' attackers used an older VPN profile to get into Avast's network and targeted its CCleaner utility

IT 52

U.S. Government, Military Personnel Data Leaked By Autoclerk

Threatpost

The travel reservation data, along with personal details, of hundreds of thousands was discovered in a database exposed online for all to see. Government Hacks Autoclerk database government data leaky database personal data travel agency data

Jamf Nation is an Apple community, not just a Jamf community

Jamf

From an email list to nearly 100,000 members, see why Jamf Nation has become a one-stop-shop for those charged with managing Apple devices

52

Gustuff Android Banker Switches Up Technical Approach

Threatpost

A host of new features have been added to the malware. Malware Mobile Security Android Australia banking trojan Cisco Talos gustuff october campaign scripting engine technical features victim targeting

This is your gateway to Data Intelligence

Collibra

Standing still is never an option. That’s what makes our field so exciting. There’s a constant flow of new devices, new apps, new channels, new infrastructures, new capabilities, new markets, new data (of course) and new expectations for that data.

Turla Compromises, Infiltrates Iranian APT Infrastructure

Threatpost

The Russian-speaking APT stole the Neuron and Nautilus implants and accessed the Iranian APT's C2 infrastructure. Hacks apt 34 infiltrate iranian apt middle east targets Nautilus neuron Snake stolen implants Turla

CILIP?s first Thai accreditation at Chulalongkorn University, Bangkok

CILIP

CILIP?s s first Thai accreditation at Chulalongkorn University, Bangkok.