Sat.Nov 16, 2019 - Fri.Nov 22, 2019

Latest Ransomware Attacks Show Diversity of Victims

Data Breach Today

What Do They Have in Common? Difficult Recovery A ransomware attack against a chain of veterinary medicine clinics plus an attack against a New York hospital show this threat remains pervasive, victims are diverse and recovery is difficult

Opinion: Websites Ask for Permissions And Attack Forgiveness

WIRED Threat Level

Web pages are increasingly powerful—asking for notifications, webcam access, or location—but this great power comes with great vulnerabilities. Security Security / Privacy

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Just How Important Is It to Protect the Privacy of Biometric Data?


The post Just How Important Is It to Protect the Privacy of Biometric Data? appeared first on Zapproved. Best Practices biometric data data breach data privacy Security technology

110 Nursing Homes Cut Off from Health Records in Ransomware Attack

Krebs on Security

A ransomware outbreak has besieged a Wisconsin based IT company that provides cloud data hosting, security and access management to more than 100 nursing homes across the United States.

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

Target Sues Insurer Over 2013 Data Breach Costs

Data Breach Today

Lawsuit Claims Insurer Owes Retailer for Coverage of Card Replacement Costs Target has filed a lawsuit against its long-time insurer, ACE American Insurance Co., in an attempt to recoup money it spent to replace payment cards as part of settlements over the retailer's massive 2013 data breach.

More Trending

1.2 Billion Records Found Exposed Online in a Single Server 

WIRED Threat Level

Here's the next jumbo data leak, complete with Facebook, Twitter, and LinkedIn profiles. Security Security / Security News

Ransomware Bites 400 Veterinary Hospitals

Krebs on Security

Louisiana Government Recovering From Ransomware Attack

Data Breach Today

Governor Describes 'Aggressive' Incident Response Efforts After a ransomware attack on Monday forced Louisiana's government to take several servers and websites offline to prevent the malware from spreading, state officials spent Tuesday restoring online services

BEST PRACTICES: Resurgence of encrypted thumb drives shows value of offline backups — in the field

The Last Watchdog

Encrypted flash drives, essentially secure storage on a stick, are a proven technology that has been readily available for at least 15 years. A few years back, it seemed like they would fade into obsolescence, swept aside by the wave of streaming services and cloud storage. Related: Can Europe’s GDPR restore data privacy? And yet today there is a resurgence in demand for encrypted flash drives.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Leaks of NSA, CIA Tools Have Leveled Nation-State Cybercriminal Capabilities

Dark Reading

The wide availability of tools leaked by the Shadow Brokers and WikiLeaks in 2016 and 2017 have given emerging cyber powers a way to catch up, DarkOwl says


DDoS-for-Hire Boss Gets 13 Months Jail Time

Krebs on Security

A 21-year-old Illinois man was sentenced last week to 13 months in prison for running multiple DDoS-for-hire services that launched millions of attacks over several years.

IT 184

Ransomware Attackers Leak Stolen Data

Data Breach Today

Maze Crew Reportedly Threatens to Release More of Allied Universal's Data Unless Ransom Paid Ransomware attacks have taken an unwelcome turn: The Maze gang reportedly has begun leaking a victim's files to create pressure to pay a ransom.

Personal and social information of 1.2B people exposed on an open Elasticsearch install

Security Affairs

Security duo discovered personal and social information 1.2 billion people exposed online on an unsecured Elasticsearch server. Researchers Bob Diachenko and Vinny Troia discovered an unsecured Eslasticsearch server containing an unprecedented 4 billion user accounts.

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Why Multifactor Authentication Is Now a Hacker Target

Dark Reading

SIM swaps, insecure web design, phishing, and channel-jacking are four ways attackers are circumventing MFA technology, according to the FBI

Data Protection on Demand: The Key to Cloud-Based Key Management

Thales eSecurity

Some organizations presume that encryption is a one-and-done affair that can solve all of their security woes. But that’s not the case. Even when organizations effectively implement encryption, they might forget to safely store their encryption keys.

Ransomware Analysis: 'Shade' Surges; Other Trends Emerge

Data Breach Today

Researchers Explain Resurgence in Ransomware, Persistence of Exploit Kits Attacks tied to Shade ransomware continue to surge as part of an overall resurgence in ransomware, security researchers warn.

WhatsApp flaw CVE-2019-11931 could be exploited to install spyware

Security Affairs

The popular messaging platform WhatsApp made the headlines again, a new bug could be exploited by hackers to secretly install spyware.

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

1.2B Records Exposed in Massive Server Leak

Dark Reading

A single server leaked 4 terabytes of personal data, including social media profiles, work histories, and home and mobile phone numbers

Artificial Intelligence Is Coming For You! (Or Is It?)

Weissman's World

A new finding by the Brookings Institution says Artificial Intelligence is coming for white collar jobs. I say, not so much! The post Artificial Intelligence Is Coming For You! (Or Or Is It?) appeared first on Holly Group.

PayMyTab Exposes Restaurant Customer Data: Report

Data Breach Today

Researchers Say Company Left Customer Data Unsecured in AWS S3 Bucket An unsecure database belonging to PayMyTab, a company that provides U.S.

Hackers leak 2TB of Data From Cayman National Bank stolen by Phineas Fisher

Security Affairs

New data leak threatens the world of finance after the Panama Papers , hackers published 2TB of the Cayman National bank’s confidential data.

Paper 112

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

6 Top Nontechnical Degrees for Cybersecurity

Dark Reading

A computer science degree isn't the only path into a cybersecurity career

Burglars Really Do Use Bluetooth Scanners to Find Laptops and Phones

WIRED Threat Level

Bluetooth scanners are readily available and easy to use—which means that smash-and-grab car break-in might not have been pure chance. Security Security / Cyberattacks and Hacks

Unsecured Server Exposed Records of 1.2 Billion: Researchers

Data Breach Today

Over 4 Terabytes of Data Exposed, Including Social Media Profiles, Personal Information Some 4 terabytes of data on over 1.2


A critical flaw in Jetpack exposes millions of WordPress sites

Security Affairs

A critical flaw in the Jetpack WordPress Plugin could be exploited by threat actors to hack WordPress websites running flawed versions of the plugin. A critical vulnerability affects the Jetpack WordPress Plugin version Jetpack 5.1.

IT 110

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

As Retailers Prepare for the Holiday Season, So Do Cybercriminals

Dark Reading

Online shoppers need to be wary about domain spoofing, fraudulent giveaways, and other scams, ZeroFOX study shows

Retail 109

The NSA Warns of TLS Inspection

Schneier on Security

The NSA has released a security advisory warning of the dangers of TLS inspection: Transport Layer Security Inspection (TLSI), also known as TLS break and inspect, is a security process that allows enterprises to decrypt traffic, inspect the decrypted content for threats, and then re-encrypt the traffic before it enters or leaves the network.

Risk 107

Microsoft Moves Toward DNS Over HTTPS

Data Breach Today

Microsoft Emphasizes DNS Configurations Will Be in Admins' Hands Microsoft has outlined its plans for supporting the encryption of Domain Name System queries, which allows for more private internet browsing.