Mon.Oct 07, 2019

Unpatched VPN Servers Targeted by Nation-State Attackers

Data Breach Today

NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

The Last Watchdog

It seems like any discussion of cybersecurity these days invariably circles back to automation. Our growing fixation with leveraging artificial intelligence to extract profits from Big Data – for both constructive and criminal ends—is the order of the day.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How Google Is Using AI to Help Ensure Android App Security

Data Breach Today

Google Security Evangelist Mike Burr Describes Android Security Measures Mike Burr of Google provides an overview of Android security efforts, including using artificial intelligence to scan Android apps

D-Link router models affected by remote code execution issue that will not be fixed

Security Affairs

Researchers at Fortinet’s FortiGuard Labs have publicly disclosed a critical remote code execution vulnerability affecting some models of D-Link routers. Security experts at Fortinet’s FortiGuard Labs disclosed a remote code execution vulnerability tracked as CVE-2019-16920.

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

New Zealand Breach May Affect 1 Million

Data Breach Today

Health Data Breach Could Have Started as Early as 2016 Officials in New Zealand are investigating one or more data breaches at a healthcare provider that could have affected nearly 1 million patients.

More Trending

Malicious Bots: Mitigating the Threat

Data Breach Today

Eric Bucher of Sequence Security on the Role of Machine Learning Malicious bot attacks are on the rise. Eric Bucher of Cequence Security describes the role machine learning can play in mitigating the threat

US will help Baltic states to secure baltic energy grid

Security Affairs

The United States and Baltic announced cooperation to protect the Baltic energy grid from cyber attacks as they disconnect from the Russian electricity grid.

Report: Android Banking Botnet Targeted Russians

Data Breach Today

Researchers Discovered Geost Botnet After Attackers Made Operational Security Mistakes A large-scale banking botnet has targeted approximately 800,000 Android devices belonging to Russian citizens since at least 2016, according to a new research report by a trio of cybersecurity researchers

Data from Sephora and StreetEasy data breaches added to HIBP

Security Affairs

The popular data breach notification service Have I Been Pwned? HIBP) has added the stolen data from the StreetEasy and Sephora data incidents.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Initial CCPA Compliance Costs Could Hit $55 Billion: Study

Data Breach Today

Report Estimates Anticipated Expenses for California Consumer Privacy Act Compliance The California Consumer Privacy Act could cost companies in the state a total of $55 billion for initial compliance expenses, according to a new study prepared for the state attorney general's office.

What is the ethical supply chain?

OpenText Information Management

Today, supply chains are considered strategic to the business, and meeting customer expectations for ethical and sustainable supply chain operations is increasingly becoming a top priority for supply chain managers.

B2B 88

How to Prioritize Vulnerability Patching

Data Breach Today

Risk 182

Users reported problems with patches for CVE-2019-1367 IE zero-day

Security Affairs

Patches for Internet Explorer Zero-Day Causing Problems for Many Users. Microsoft released a new set of patches for a zero-day flaw in Internet Explorer recently fixed due to problems reported by users with the previous patch.

IT 86

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

New Card Fraud Countermeasures

Data Breach Today

Gord Jamieson of Visa Canada Offers an Update Gord Jamieson of Visa Canada offers an update on fraud-fighting efforts by describing two new fraud schemes and Visa's countermeasures

160
160

Edward Snowden's Memoirs

Schneier on Security

Ed Snowden has published a book of his memoirs: Permanent Record. I have not read it yet, but I want to point you all towards two pieces of writing about the book.

Sales 84

Responding to Ransomware Attacks: Critical Steps

Data Breach Today

Organizations must take a number of critical steps to prepare a response to ransomware attacks before they hit, says Caleb Barlow, the new president and CEO of security consulting firm CynergisTek, who offers a guide

D-Link Home Routers Open to Remote Takeover Will Remain Unpatched

Threatpost

CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device. Vulnerabilities CVE-2019-16920 D-Link end-of-life Home routers remote code execution unpatched

114
114

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Lack of Role Models, Burnout & Pay Disparity Hold Women Back

Dark Reading

New ISACA data emphasizes a gap between men and women who share their opinions on underrepresentation of women and equal pay in the tech industry

79

Vulnerable Twitter API Leaves Tens of Thousands of iOS Apps Open to Attacks

Threatpost

Millions of iOS users could be vulnerable to man-in-the-middle attacks that trace back to flawed Twitter code used in popular iPhone apps. Mobile Security Vulnerabilities CVE-2019-16263 Fraunhofer SIT ios iphone it-sa 2019 oauth Twitter API twitter Kit

IT 111

Magecart Skimmers Spotted on 2M Websites

Dark Reading

Researchers say supply chain attacks are responsible for the most significant spikes in Magecart detections

72

Alabama Hospitals Pay Up in Ransomware Attack

Threatpost

A trio of Alabama hospitals have decided to pay for a decryption key. Cryptography Hacks Malware Alabama dch health system Hospitals payment ransomware

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Drupalgeddon2 Vulnerability Still Endangering CMSes

Dark Reading

A new wave of attacks has been discovered on Drupal-based content management systems that weren't patched for the older flaw

69

5 things HR departments need to know about data protection

IT Governance

HR plays a crucial role in an organisation’s GDPR (General Data Protection Regulation) compliance. The department is full of personal data, whether it’s of employees, their next of kin or candidates responding to job adverts.

10 Steps to Assess SOC Maturity in SMBs

Dark Reading

Facing a system and organization controls audit doesn't have to be stressful for small and midsize businesses if they follow these guidelines

69

California Bans Deepfakes in Elections, Porn

Threatpost

A pair of laws provides recourse for victims of deepfake technology. Facebook Hacks Privacy adult content. legislation ban California deepfake Election influence campaign

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

Join us in San Diego for ILTA: Preparing for the California Consumer Privacy Act

Information Governance Perspectives

We share and store our most sensitive personally identifiable information (PII) on countless computers, networks, and devices. Within an organization, PII can be found scattered in emails, databases, shared drives and more. Events Privacy California Consumer Privacy Act CCPA ILTA Legal

Thank You, El Paso CAD

The Texas Record

Bonnie Zuber, Andrew Glass and Erica Siegrist with El Paso CAD staff. Last week three TSLAC Government Information Analysts were given the opportunity to travel as far from Austin as you possibly can without leaving the state of Texas.

Archives*RM Testimonial #2

The Schedule

This testimonial about the intersections of archives and records management comes from Kris Kobialka (Kobi), Archivist and Institutional Records Manager at Boston Architectural College.