Sat.Jun 19, 2021 - Fri.Jun 25, 2021

Experienced Users Share Their Best Tips for Process Automation

AIIM

There are still many organizations that could benefit from the adoption of process automation technologies like Business Process Management (BPM), Robotic Process Automation (RPA), and Case Management.

Lawmakers Unveil Cybersecurity Legislation

Data Breach Today

Bills Address Criminal Penalties, School District Protection and More Republican and Democratic lawmakers have recently introduced several cybersecurity-related bills seeking to address issues ranging from imposing tougher penalties for cybercriminals to improving protection of school districts

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Chart: Strength in Numbers

Dark Reading

More companies are heeding expert advice to beef up their incident-response teams

66

How Cyber Sleuths Cracked an ATM Shimmer Gang

Krebs on Security

In 2015, police departments worldwide started finding ATMs compromised with advanced new “shimming” devices made to steal data from chip card transactions.

Address the Challenges of Siloed Monitoring Tools

Companies frequently experience monitoring tool sprawl. Find out why monitoring tool sprawl occurs, why it’s a problem for businesses, and the positive business impacts of monitoring tool consolidation.

What the Pentagon’s New UFO Report Reveals About Humankind

WIRED Threat Level

The document says less about the search for life in the universe, and more about our current cultural climate and distrust of expertise. Science Security Science / Space

More Trending

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Related: How ‘PAM’ improves authentication. SMBs today face a daunting balancing act. To boost productivity, they must leverage cloud infrastructure and participate in agile software development. But this also opens up a sprawling array of fresh security gaps that threat actors are proactively probing and exploiting.

How Cyber Safe is Your Drinking Water Supply?

Krebs on Security

John McAfee Dies in Spanish Prison After Extradition Order

WIRED Threat Level

The antivirus pioneer and alleged cryptocurrency scammer was 75 years old. Security Security / Security News

Lawsuits Allege Colonial Pipeline Had Inadequate Cybersecurity

Data Breach Today

Gas Stations as Well as Consumers Seek Damages Colonial Pipeline Co. now faces at least two lawsuits seeking class action status in the aftermath of a ransomware attack in May that led the firm to shut down the operations of a 5,500-mile pipeline for nearly a week

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

MY TAKE: Equipping SOCs for the long haul – automation, edge security solidify network defenses

The Last Watchdog

Network security is in the throes of a metamorphosis. Advanced technologies and fresh security frameworks are being implemented to deter cyber attacks out at the services edge, where all the action is. Related: Automating security-by-design in SecOps. This means Security Operations Centers are in a transition. SOCs came on the scene some 20 years ago as the focal point for defending on-premises datacenters of large enterprises.

MyBook Users Urged to Unplug Devices from Internet

Krebs on Security

Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious hackers are remotely wiping the drives using a critical flaw that can be triggered by anyone who knows the Internet address of an affected device.

Access 224

NFC Flaws Let Researchers Hack ATMs by Waving a Phone

WIRED Threat Level

Flaws in card reader technology let a security firm consultant wreak havoc with point-of-sale systems and more. Security Security / Cyberattacks and Hacks

Sales 104

Ransomware Attack on Eye Clinic Chain Affects 500,000

Data Breach Today

Wolfe Eye Clinic Refused to Pay Ransom Wolfe Eye Clinic, which operates diagnostic and surgical centers in 40 Iowa communities, is notifying 500,000 current and former patients that their data may have been inappropriately accessed during a recent ransomware attack.

What E-Commerce Performance Metrics Are CTOs Monitoring?

In this eBook, Danny Miles, CTO of Dollar Shave Club, reveals an efficient framework for thinking about and prioritizing the performance metrics that matter most to him, providing a blueprint for fellow e-commerce CTOs to follow as they evaluate their own business.

Banning Surveillance-Based Advertising

Schneier on Security

The Norwegian Consumer Council just published a fantastic new report: “ Time to Ban Surveillance-Based Advertising.

Risk 83

John McAfee found dead in prison cell ahead of extradition to US

Security Affairs

One of the fathers of antivirus software, the entrepreneur John McAfee has been found dead in a Barcelona prison cell while he was waiting for extradition to the US.

A Bug in the Android Google App Put Privacy at Risk

WIRED Threat Level

Plus: Airbnb's safety squad, a fake pharmacy crackdown, and more of the week's top security news. Security Security / Security News

Risk 99

EU Proposes Joint Cybersecurity Unit

Data Breach Today

Agency Would Help Member States Respond to Cyberattacks The European Commission has proposed creating a Joint Cyber Unit to help EU member states respond to and prevent cyberattacks, especially those involving ransomware. The goal is for the unit to begin operations by the end of next year

9 Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

7 Powerful Cybersecurity Skills the Energy Sector Needs Most

Dark Reading

Those looking to join the fight might want to polish up or acquire some (or all) of these hottest skills on the market

The Future of Machine Learning and Cybersecurity

Schneier on Security

The Center for Security and Emerging Technology has a new report: “ Machine Learning and Cybersecurity: Hype and Reality.” ” Here’s the bottom line: The report offers four conclusions: Machine learning can help defenders more accurately detect and triage potential attacks.

A Well-Meaning Feature Leaves Millions of Dell PCs Vulnerable

WIRED Threat Level

Flaws in a firmware security tool affect as many as 30 million desktops, laptops, and tablets. Security Security / Security News

High-Ranking FIN7 Gang Member Receives 7-Year Prison Term

Data Breach Today

Prosecutors Say Andrii Kolpakov Was a 'Pen Tester' for Payment Card Theft Group A high-ranking member of the FIN7 payment card theft group has been sentenced to seven years in federal prison. Andrii Kolpako worked as a "pen tester" for the organization, prosecutors say

178
178

The Forrester Wave™: B2B Marketing Data Providers, Q2 2021

In our 24-criterion evaluation of B2B marketing data providers, we identified the 11 most significant vendors — Data Axle, Dun & Bradstreet, Enlyft, Global Database, InsideView, Leadspace, Oracle, SMARTe, Spiceworks Ziff Davis, TechTarget, and ZoomInfo Technologies — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2B marketing professionals select the right one for their needs.

DirtyMoe botnet infected 100,000+ Windows systems in H1 2021

Security Affairs

DirtyMoe is a Windows botnet that is rapidly growing, it passed from 10,000 infected systems in 2020 to more than 100,000 in the first half of 2021.

7 Unconventional Pieces of Password Wisdom

Dark Reading

Challenging common beliefs about best practices in password hygiene

US Takedown of Iranian Media Sites Extends a Thorny Precedent

WIRED Threat Level

Free speech advocates raised concerns after the Justice Department seized more than 30 domains this week. Security Security / Security News

First American Financial's SEC Breach Settlement: $488,000

Data Breach Today

SEC: Executives Left in Dark About Vulnerability in File-Sharing System Title insurance company First American Financial Corp. will pay the SEC a $488,000 penalty as a result of a data breach revealed two years ago.

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

ChaChi, a GoLang Trojan used in ransomware attacks on US schools

Security Affairs

A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools.

Cisco ASA Bug Now Actively Exploited as PoC Drops

Threatpost

In-the-wild XSS attacks have commenced against the security appliance (CVE-2020-3580), as researchers publish exploit code on Twitter. Vulnerabilities Web Security

French Spyware Executives Are Indicted for Aiding Torture

WIRED Threat Level

The managers are accused of selling tech to Libya and Egypt that was used to to identify activists, read private messages, and kidnap, torture, or kill them. Business Business / Computers and Software Security