Sat.Nov 23, 2019 - Fri.Nov 29, 2019

3 Everyday Things in Your Office That Could Lead to a Data Breach

Adam Levin

When you think about cyberthreats , what comes to mind? An extortionist announcing your doom with a dark monitor and a laughing skull? State-sponsored cyber-warriors working from a secure command post? President Trump’s certain, “somebody sitting on their bed that weighs 400 pounds ?”

Group-IB presents its annual report on global threats to stability in cyberspace

Security Affairs

Group-IB, has analyzed key recent changes to the global cyberthreat landscape in the “Hi-Tech Crime Trends 2019/2020” report. Group-IB , a Singapore-based cybersecurity company that specializes in preventing cyberattacks, has analyzed key recent changes to the global cyberthreat landscape.

Defining Security Awareness: Understanding Comes Before Improvement


Distraction is the ultimate challenge in terms of day-to-day computer usage. Its consequences can be detrimental — links that shouldn’t have been clicked, attachments that shouldn’t have been opened, sensitive information that should not have been shared.

Tainted Data Can Teach Algorithms the Wrong Lessons

WIRED Threat Level

Researchers show how AI programs can be sabotaged by even subtle tweaks to the data used to train them. Security Security / Cyberattacks and Hacks Business

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

It’s Way Too Easy to Get Domain Name

Krebs on Security

Many readers probably believe they can trust links and emails coming from U.S. federal government domain names, or else assume there are at least more stringent verification requirements involved in obtaining domain versus a commercial one ending

IT 208

More Trending

Taking Stock of Your Data Security to Deliver a Happy Holiday Shopping Season

Thales eSecurity

Originally published in Security Magazine on November 20, 2019. With the holidays approaching, many of us are thinking about taking time off from work to be with friends and family, as well all the last minute shopping that needs to be done.

Great Plains center hit by ransomware attack

Security Affairs

A few days ago the Great Plains center was hit by a ransomware attack that forced its staff to to pen and paper. A few days ago the Great Plains Health medical center was hit by a ransomware attack that forced its staff to switch to pen and paper.A

Sale of 4 Million Stolen Cards Tied to Breaches at 4 Restaurant Chains

Krebs on Security

On Nov. 23, one of the cybercrime underground’s largest bazaars for buying and selling stolen payment card data announced the immediate availability of some four million freshly-hacked debit and credit cards.

Sales 207

Dell Considering Selling RSA: Report

Data Breach Today

Company Acquired RSA as One Component of Its Purchase of EMC in 2016 Dell Technologies is considering the possible sale of its RSA security division, hoping such a deal could be worth $1 billion, according to Bloomberg, which cites "people familiar with the matter

Sales 196

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Manipulating Machine Learning Systems by Manipulating Training Data

Schneier on Security

Interesting research: " TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents ": Abstract: : Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time.

International law enforcement operation shuts down Imminent Monitor RAT operations

Security Affairs

A successful new operation was announced by Europol, it announced to have dismantled the global organized cybercrime ring behind Imminent Monitor RAT.

Hidden Cam Above Bluetooth Pump Skimmer

Krebs on Security

Tiny hidden spy cameras are a common sight at ATMs that have been tampered with by crooks who specialize in retrofitting the machines with card skimmers. But until this past week I’d never heard of hidden cameras being used at gas pumps in tandem with Bluetooth-based card skimming devices.

Sales 207

Magento Marketplace Suffers Data Breach, Adobe Warns

Data Breach Today

E-Commerce Platform User Data Exposed Exploited; Vulnerability Now Fixed Adobe says its e-commerce Magento Marketplace has been breached, exposing usernames, email addresses and more. The software giant has yet to detail how many users were affected or the breach duration.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

List of data breaches and cyber attacks in November 2019 – 1.34 billion records breached

IT Governance

It was a big month for data breaches this month, with a confirmed 1,341,147,383 records being exposed in 87 incidents. However, almost all of those came from one leaked database , the origin of which is unclear.

Dutch National Cyber Security Centre warns ransomware infected thousands of businesses

Security Affairs

According to a confidential report from the Dutch National Cyber Security Centre (NCSC), at least 1,800 companies were infected with 3 ransomware.

Major Hotel Group Leaks 1TB of Customer Data

Adam Levin

One terabyte of data belonging to a major hotel booking platform was found leaked online. A huge trove of customer data belonging to Gekko Group was found online in an unsecured format.

B2B 83

Attackers Demand $14 Million Ransom From IT Services Firm

Data Breach Today

Incident Could Have Ripple Effect on Virtual Care Provider's 110 Healthcare Clients Virtual Care Provider Inc.,

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Think Twice Before Giving Gifts With a Microphone or Camera

WIRED Threat Level

Black Friday is going to be overrun with cheap, internet-connected gifts. Just make sure you know exactly what you’re buying. Security Security / Security Advice

RevengeHotels campaign – crooks target the hospitality industry

Security Affairs

RevengeHotels campaign – The hospitality industry continues to be a privileged target for cybercriminals that target hotels, restaurant chains, and tourism services.

T-Mobile data breach affects more than 1 million customers

IT Governance

T-Mobile has confirmed that its systems have been hacked, with cyber criminals stealing the personal data of more than one million US customers. According to the organisation, customer names, addresses, phone numbers, rate plans and plan features were all exposed.

FCC Takes Steps Toward Squeezing Out Huawei, ZTE

Data Breach Today

FCC Funds Can No Longer Be Used to Buy Their Gear; Rip-and-Replace Plan Proposed The FCC voted unanimously Friday to ban telecommunications companies from using FCC funds to buy equipment from Chinese manufacturers Huawei and ZTE because they pose a "national security threat."

DHS Mandates Federal Agencies to Run Vulnerability Disclosure Policy

Schneier on Security

The DHS is requiring all federal agencies to develop a vulnerability disclosure policy. The goal is that people who discover vulnerabilities in government systems have a mechanism for reporting them to someone who might actually do something about it.

A Ransomware infected the network of the cybersecurity firm Prosegur

Security Affairs

A piece of the Ryuk Ransomware infected the network of the multinational cybersecurity firm Prosegur, forcing the company to shut down it. The Spanish multinational security company Prosegur announced that it was of a ransomware attack that disrupted its telecommunication platform.

The Debate Over How to Encrypt the Internet of Things

WIRED Threat Level

So-called lightweight encryption has its place. But some researchers argue that more manufacturers should stick with proven methods. Security Security / Security News

Google: Government-Backed Hackers Targeted 12,000 Users

Data Breach Today

Technology Giant Issues Warnings to Targeted Individuals Across 149 Countries Google has directly warned more than 12,000 users across 149 countries that they have been targeted by government-backed hackers.

Enterprise Architecture Tools and the Changing Role of the Enterprise Architect


Enterprise architecture tools are becoming more important than ever.

Adobe revealed that the Magento Marketplace was hacked

Security Affairs

Adobe discloses security breach impacting Magento Marketplace users. Adobe discloses a security breach that affected the users of the Magento marketplace website, the incident was discovered last week.

CMS 83