Mon.Oct 21, 2019

Russian Hackers Coopted Iranian APT Group's Infrastructure

Data Breach Today

UK and US Intelligence Agencies Report That Turla Group Seized OilRig APT Assets Turla, an advanced persistent threat group with apparent ties to Russia, seized attack infrastructure and tools used by OilRig, an Iranian APT group, U.K. and U.S. intelligence agencies have jointly reported.

IT 184

Avast, NordVPN Breaches Tied to Phantom User Accounts

Krebs on Security

Antivirus and security giant Avast and virtual private networking (VPN) software provider NordVPN each today disclosed months-long network intrusions that — while otherwise unrelated — shared a common cause: Forgotten or unknown user accounts that granted remote access to internal systems with little more than a password.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Clinton Email Probe Cites 38 for Violations

Data Breach Today

State Dept.

UK/US investigation revealed that Russian Turla APT masqueraded as Iranian hackers

Security Affairs

A joint UK and US investigation has revealed that the Russian cyber espionage group Turla carried out cyber attacks masqueraded as Iranian hackers.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Zappos' Offer to Breach Victims: A 10 Percent Discount

Data Breach Today

Proposed Data Breach Settlement Follows Supreme Court's Refusal to Hear Appeal Zappos is close to settling a long-running class action lawsuit filed by consumers over a 2012 data breach.

Retail 164

More Trending

Assange Denied Delay for US Extradition Hearing

Data Breach Today

British Judge Says Five-Day Hearing for WikiLeaks Founder Will Begin in February A British judge has denied WikiLeaks founder Julian Assange's request to delay a five-day hearing, slated to begin Feb. 25, on whether he should be extradited to the United States to face espionage charges


Czech Police and Intelligence agency dismantled Russian Spy ring on its soil

Security Affairs

Czech police and intelligence services have identified a Russian espionage network operating having a nerve center in its Prague embassy. Czech police and intelligence services have dismantled a Russian espionage network operating that was operating via its Prague embassy.

IT 75

Avast Foils Another CCleaner Attack

Dark Reading

Abiss' attackers used an older VPN profile to get into Avast's network and targeted its CCleaner utility

IT 74

Details of the Olympic Destroyer APT

Schneier on Security

Interesting details on Olympic Destroyer, the nation-state cyberattack against the 2018 Winter Olympic Games in South Korea. Wired's Andy Greenberg presents evidence that the perpetrator was Russia, and not North Korea or China.


Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Winnti APT group uses skip-2.0 malware to control Microsoft SQL Servers

Security Affairs

Security experts have a new malware, dubbed skip-2.0 used by the China-linked APT group to establish a backdoor in Microsoft SQL Server systems. Security experts at ESET have discovered a new malware, dubbed skip-2.0,

In the Workplace, Safety Is Sexy. And It All Starts With Your HR Department

Adam Levin

Maintaining workplace safety can seem like a rare form of torture–videos and quizzes and talks and such. For most of us, it’s a necessary chore. But despite the looks among employees with each new H.R.

Researchers Turn Alexa and Google Home Into Credential Thieves

Dark Reading

Eight Amazon Alexa and Google Home apps were approved for official app stores even though their actual purposes were eavesdropping and phishing

U.S. Government, Military Personnel Data Leaked By Autoclerk


The travel reservation data, along with personal details, of hundreds of thousands was discovered in a database exposed online for all to see. Government Hacks Autoclerk database government data leaky database personal data travel agency data

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

IBM Cloud Pak for Data 2.5: Bringing open source to the core

IBM Big Data Hub

IBM is announcing the latest update to the IBM Cloud Pak for Data platform, Version 2.5.

Cloud 81

A Brief History of Russian Hackers' Evolving False Flags

WIRED Threat Level

Most hackers know how to cover their tracks. But Russia’s elite groups are working at a whole other level. Security Security / Cyberattacks and Hacks

Avast Network Breached As Hackers Target CCleaner Again


Avast said it believes that threat actors are again looking to target CCleaner in a supply chain attack. Breach Hacks antivirus Avast breach CCleaner ccleaner 2017 attack Network security VPN

IT 81

Russian Hackers Using Iranian APT's Infrastructure in Widespread Attacks

Dark Reading

New advisory from the UK's NCSC and the NSA throws fresh light on activity first revealed by Symantec in June


B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

The Benefits of a Records Management App

Archive Document Data Storage

As Brexit looms, the ADDS team has seen a rise in the number of clients reviewing their processes around three management topics: time, money and people.

Microsoft Aims to Block Firmware Attacks with New Secured-Core PCs

Dark Reading

Partnerships with Intel, Qualcomm, and AMD will bring a new layer of device security that alters the boot process to detect firmware compromise

Free Webinar— Information Governance Plans Stalling? 5 Things You Need this Wednesday

IG Guru

Join us for this informative webinar on Wednesday, October 23, 2019 2:00-2:45 pm EDT (GMT-4) 1 pm CDT; 12 pm MDT; 11 am PDT 7 pm British Time (GMT+1); 8 pm Central Europe Time (GMT +2) *If you’re unable to attend the live event, register and we will send you the replay shortly after the […].

Tough Choices

Dark Reading

If you could only protect one category of your organization's data, what would it be

IT 53

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Tuesday’s Relativity Fest 2019 Sessions: eDiscovery Trends

eDiscovery Daily

As we noted yesterday , the 2019 Relativity Fest conference is going on this week, CloudNine is once again here as a Sponsor and Exhibitor and I will be covering the show for eDiscovery Daily. Let’s check out some of the sessions lined up for today (including the one I’m speaking at!).

Surviving Security Alert Fatigue: 7 Tools and Techniques

Dark Reading

Experts discuss why security teams are increasingly overwhelmed with alerts and share tactics for lightening the load

Microsoft's Secured-Core PC Feature Protects Critical Code

WIRED Threat Level

The “secured-core PC” feature for Windows looks to head off firmware hacks. Security Security / Security News

Turning Vision to Reality: A New Road Map for Security Leadership

Dark Reading

Among the takeaways from a Gartner Symposium/Xpo session: who should be accountable for data security, why security groups should stop thinking of themselves as protectors, and the consequence of locking down 'dumb' users

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Dark data under the spotlight: How organizations can turn liability into asset

Information Management Resources

Bringing dark data to light holds the potential for eliminating repetitive human effort and increasing the productivity of the entire organization, says Kon Leong of ZL Technologies. Data visualization Analytics Data management

Surviving Alert Fatigue: 7 Tools and Techniques

Dark Reading

Experts discuss why security teams are increasingly overwhelmed with alerts and share tactics for lightening the load

Jamf Nation is an Apple community, not just a Jamf community


From an email list to nearly 100,000 members, see why Jamf Nation has become a one-stop-shop for those charged with managing Apple devices