Sat.May 16, 2020 - Fri.May 22, 2020

A Tunnel of Opportunity

PHIGs

On May 5, 2020 I participated in a panel discussion (fun starts at the 1:35 mark), presented by AO Docs , about how the COVID-19 pandemic is affecting work and how technology is helping, or hurting, us adapt. The pandemic hasn’t really impacted the way I work.

IT 82

How Cloud Storage Streamlines Work Collaboration

Record Nations

Today, there is an increase in remote workers. In the past, workers have used paper files which has its own set of benefits. However, paper can be expensive, difficult to manage, and hard to collaborate with. The business world is shifting towards digital accessibility, including cloud storage.

Paper 67

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Need for Compliance in a Post-COVID-19 World

Dark Reading

With the current upheaval, business leaders may lose focus and push off implementing security measures, managing risk, and keeping up with compliance requirements. That's a big mistake

EasyJet Data Breach Exposes 9 Million Customers' Details

Data Breach Today

European Budget Airline Says Payment Card Data Stolen, But Only for 2,200 Customers European budget airline EasyJet says it suffered a data breach that exposed 9 million customers' personal details.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Unpatched Open Source Libraries Leave 71% of Apps Vulnerable

Dark Reading

PHP and JavaScript developers need to pay close attention because different languages and frameworks have different rates of vulnerability, research finds

More Trending

U.S. Treasury Warning: Beware of COVID-19 Financial Fraud

Data Breach Today

Financial Crimes Enforcement Network Advises Banks to Be on the Lookout for Scams The U.S.

Sales 219

AI and Cybersecurity

Schneier on Security

Ben Buchanan has written " A National Security Research Agenda for Cybersecurity and Artificial Intelligence." It's really good -- well worth reading. artificialintelligence attribution cybersecurity nationalsecuritypolicy reports

Easyjet hacked: 9 million customer’s data exposed along with 2,200+ credit card details

Security Affairs

British airline EasyJet announced it was the victim of a “highly sophisticated” cyber attack that exposed email addresses and travel details of around 9 million of its customers.

Now Chrome Can Block Ads That Leach Power From Your CPU

WIRED Threat Level

Google developers have built a feature to help you avoid abusive ads. Here’s how to turn it on now. Security Security / Security News

IT 83

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Coronavirus-Themed Phishing Fears Largely Overblown, Researchers Say

Dark Reading

As COVID-19-themed spam rises, phishing-not so much. An analysis of newly registered domains finds that only 2.4% are actually phishing sites aiming to steal credentials

Both Mirai and Hoaxcalls IoT botnets target Symantec Web Gateways

Security Affairs

Experts from Palo Alto Networks discovered that the Mirai and Hoaxcalls botnets are targeting a vulnerability in legacy Symantec Web Gateways.

IoT 86

Hackers Target Oil Producers During COVID-19 Slump

Security Affairs

Recent research shows that the oil industry — already experiencing difficulties due to COVID-19 — must remain abreast of threats to stay safe from hackers. Spear-phishing is a rapidly emerging threat.

Hackers Hit Food Supply Company

Dark Reading

The attackers behind the REvil ransomware family has also threatened to release personal data on Madonna and other celebrities to the highest bidders

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Phishing Attack Bypassed Office 365 Multifactor Protections

Data Breach Today

Researchers: Campaign Designed to Steal Users' Credentials, Launch Other Attacks A recent phishing campaign bypassed multifactor authentication protections within Microsoft Office 365 to steal users' credentials stored in the cloud or launch other attacks, according to the security firm Cofense

This Service Helps Malware Authors Fix Flaws in their Code

Krebs on Security

Almost daily now there is news about flaws in commercial software that lead to computers getting hacked and seeded with malware.

GUEST ESSAY: What everyone should know about the pros and cons of online fingerprinting

The Last Watchdog

When it was first introduced, device fingerprinting – or online fingerprinting in general – was meant to create a safer, more responsible internet. The idea was that by fingerprinting devices used to connect to the internet we could achieve better accountability.

GDPR 169

Tens of thousands Israeli websites defaced

Security Affairs

Thousands of Israeli websites have been defaced earlier today, hackers published an anti-Israeli message on their homepage and attempted to implant malicious code.

IT 113

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Bank of America: COVID-19 Loan Data May Have Leaked

Data Breach Today

Client Data May Have Been Exposed During Test of SBA Loan Platform Bank of America disclosed this week that some customers' data may have been exposed during the uploading of loan applications related to the Paycheck Protection Program - a U.S.

Ukraine Nabs Suspect in 773M Password ?Megabreach?

Krebs on Security

In January 2019, dozens of media outlets raised the alarm about a new “megabreach” involving the release of some 773 million stolen usernames and passwords that was breathlessly labeled “the largest collection of stolen data in history.”

The Nigerian Fraudsters Ripping Off the Unemployment System

WIRED Threat Level

Security researchers have spotted the “Scattered Canary” group scamming vital benefits programs amid the Covid-19 pandemic. Security Security / Cyberattacks and Hacks

Researchers disclose five Microsoft Windows zero-days

Security Affairs

Security experts have disclosed five unpatched vulnerabilities in Microsoft Windows, four of which rated as high-risk severity. Security experts from Trend Micro’s Zero Day Initiative (ZDI) have published information on five unpatched vulnerabilities in Microsoft Windows.

Risk 108

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Microsoft Warns of COVID-19 Phishing Emails Spreading RAT

Data Breach Today

Malicious Messages Attempt to Install NetSupport Manager Tool on Devices Microsoft is warning Windows users about an ongoing "massive" COVID-19-themed phishing campaign that is attempting to install the NetSupport Manager on devices. Attackers can turn NetSupport into a remote access Trojan, or RAT

5 Tips for Fighting Credential Stuffing Attacks

Dark Reading

With stolen credentials an easy find online, what are some measures to put in place to keep hackers from breaking into secure accounts

Bart Gellman on Snowden

Schneier on Security

Bart Gellman's long-awaited (at least by me) book on Edward Snowden, Dark Mirror: Edward Snowden and the American Surveillance State , will finally be published in a couple of weeks. There is an adapted excerpt in the Atlantic.

Web Giants Scrambled to Head Off a Dangerous DDoS Technique

WIRED Threat Level

Firms like Google and Cloudflare raced to prevent an amplification attack that threatened to take down large portions of the internet with just a few hundred devices. Security Security / Cyberattacks and Hacks

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Apple and Google Release Contact-Tracing APIs for COVID-19

Data Breach Today

Privacy-Centered Approach May Bolster Public Confidence in Contact-Tracing Apps Apple and Google have released new APIs designed to support contact-tracing apps being developed by governments to help combat the COVID-19 pandemic. Already at least three U.S.

Texas Department of Transportation (TxDOT) hit by a ransomware attack

Security Affairs

A new ransomware attack hit the Texas government, the malware this time infected systems at the state’s Department of Transportation (TxDOT). The Texas government suffered two ransomware attacks in a few weeks, the first one took place on May 8, 2020 and infected systems at the Texas court.

Security 101: Cross-Site Scripting

Dark Reading

Cross-site scripting has been around longer than most security professionals have been on the job. Why is it still such an issue when we've known about it for so long