Sat.Oct 17, 2020 - Fri.Oct 23, 2020

How AI Will Supercharge Spear-Phishing

Dark Reading

To keep pace with intelligent, unpredictable threats, cybersecurity will have to adopt an intelligent security of its own

Trickbot Rebounds After 'Takedown'

Data Breach Today

CrowdStrike: Botnet's Activity Has Already Picked Up The recent "takedown" of Trickbot by Microsoft and others had only a temporary effect; the botnet's activity levels have already rebounded, according to Crowdstrike and other security firms

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Facebook Promises Privacy Reform. Critics Aren't Convinced

WIRED Threat Level

In an interview with WIRED, Facebook's chief privacy officers argue that the company has turned a corner. Again. Security Security / Privacy

The Now-Defunct Firms Behind 8chan, QAnon

Krebs on Security

Some of the world’s largest Internet firms have taken steps to crack down on disinformation spread by QAnon conspiracy theorists and the hate-filled anonymous message board 8chan.

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

There is no shortage of innovative cybersecurity tools and services that can help companies do a much better job of defending their networks. Related: Welcome to the CyberXchange Marketplace In the U.S. alone, in fact, there are more than 5,000 cybersecurity vendors. For organizations looking to improve their security posture, this is causing confusion and vendor fatigue, especially for companies that don’t have a full time Chief Information Security Officer. The vendors are well-intentioned.

B2B 137

More Trending

Botnet Infects Hundreds of Thousands of Websites

Dark Reading

KashmirBlack has been targeting popular content management systems, such as WordPress, Joomla, and Drupal, and using Dropbox and GitHub for communication to hide its presence

US Indicts Sandworm, Russia's Most Destructive Cyberwar Unit

WIRED Threat Level

The Department of Justice has named and charged six men for allegedly carrying out many of the most costly cyberattacks in history. Security Security / Cyberattacks and Hacks

New Report on Police Decryption Capabilities

Schneier on Security

There is a new report on police decryption capabilities: specifically, mobile device forensic tools (MDFTs). Short summary: it’s not just the FBI that can do it. This report documents the widespread adoption of MDFTs by law enforcement in the United States.

6 Russians Indicted for Destructive NotPeyta Attacks

Data Breach Today

DOJ: Russian GRU Officers Targeted 2018 Olympics, French Elections and More The U.S.

Testing at Every Stage of Development

Up to 80% of new products fail. The reality is harsh and the reasons why are endless. Perhaps the new product couldn’t oust a customer favorite. Maybe it looked great but was too hard to use. Or, despite being a superior product, the go-to-market strategy failed. There’s always a risk when building a new product, but you can hedge your bets by understanding exactly what your customers' expectations truly are at every step of the development process.

NSS Labs Shuttered

Dark Reading

The testing firm's website says it has 'ceased operations' as of Oct.

IT 111

Four npm packages found opening shells and collecting info on Linux, Windows systems

Security Affairs

On Thursday, four JavaScript packages have been removed from the npm portal because they have been found containing malicious code. NPM staff removed four JavaScript packages from the npm portal because were containing malicious code.

Split-Second Phantom Images Fool Autopilots

Schneier on Security

Researchers are tricking autopilots by inserting split-second images into roadside billboards.

Paper 104

Elite Russian Sandworm Hackers' OPSEC Problem

Data Breach Today

US Indictment Airs Russian Military's Dirty Laundry Although Russia's elite nation-state hackers are capable of waging destructive attacks, the GRU military intelligence Sandworm operators have not been able to remain in the shadows, a U.S. federal grand jury indictment suggests

Rethinking Information Governance In The Age of Unstructured Enterprise Data

Today’s organizations are faced with the overwhelming challenge of managing, finding, and leveraging their information. This eBook discusses a newly discovered information discipline and is filled to the brim with helpful information.

Cybercriminals Could be Coming After Your Coffee

Dark Reading

Researchers show no IoT device is too small to fall victim to ransomware techniques

IoT 109

Cognitive Technologies White Paper

National Archives Records Express

This post is written by Sharmila Bhatia and Markus Most. We are pleased to announce the release of a white paper on the records management implications of: Internet of Things (IoT) Robotic Process Automation (RPA) Machine Learning (ML) Artificial Intelligence (AI).

Paper 99

NSA Advisory on Chinese Government Hacking

Schneier on Security

The NSA released an advisory listing the top twenty-five known vulnerabilities currently being exploited by Chinese nation-state attackers.

US Alleges Iran Sent Threatening Emails to Democrats

Data Breach Today

Iran is Attempting to Intimidate Voters and Manipulate Election, US Officials Warn U.S.


The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Ransomware Attacks Show Little Sign of Slowing in 2021

Dark Reading

Attackers have little motivation to stop when businesses are paying increasingly larger ransoms, say security experts who foresee a rise in attacks

FBI and CISA joint alert blames Russia’s Energetic Bear APT for US government networks hack

Security Affairs

The US government declared that Russia-linked APT group Energetic Bear has breached US government networks and exfiltrated data.

How Police Can Crack Locked Phones—and Extract Information

WIRED Threat Level

A report finds 50,000 cases where law enforcement agencies turned to outside firms to bypass the encryption on a mobile device. Business Business / National Affairs Security

6 Russians Indicted for NotPeyta Campaign, Other Attacks

Data Breach Today

DOJ: Russian GRU Officers Targeted 2018 Olympics, French Elections and More The U.S.

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

8 New and Hot Cybersecurity Certifications for 2020

Dark Reading

While the usual security certs remain popular, interest in privacy skills and cloud experience are pushing new credentials into the market

Cloud 106

Hackers claim to have compromised 50,000 home cameras and posted footage online

Security Affairs

A hacker collective claims to have hacked over 50,000 home security cameras and published their footage online, some of them on adult sites. A group of hackers claims to have compromised over 50,000 home security cameras and published their private footage online.

Paper 98

Is Climbing the Corporate Ladder Still a Thing?


Thoughts on erwin Insights Day No. 2 Keynote. If you didn’t watch New York Times Best-Selling Author Keith Ferrazzi’s keynote from erwin Insights 2020 , what are you waiting for?

Phishing Campaign Mimics Microsoft Teams Alerts

Data Breach Today

Researchers: Fraudsters Target Office 365 Users to Harvest Credentials Researchers have uncovered a fresh phishing campaign that mimics the automated messages of the popular business communication platform Microsoft Teams in an attempt to harvest users' Office 365 login credentials

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

NSA Reveals the Top 25 Vulnerabilities Exploited by Chinese Nation-State Hackers

Dark Reading

Officials urge organizations to patch the vulnerabilities most commonly scanned for, and exploited by, Chinese attackers


Nefilim ransomware gang published Luxottica data on its leak site

Security Affairs

The Nefilim ransomware operators have posted a long list of files that appear to belong to Italian eyewear and eyecare giant Luxottica. Luxottica Group S.p.A. is an Italian eyewear conglomerate and the world’s largest company in the eyewear industry.

The US Sanctions Russians For Potentially ‘Fatal’ Malware

WIRED Threat Level

The message is meant to deter any similar attack against US infrastructure. Security Security / National Security