Sat.Jun 06, 2020 - Fri.Jun 12, 2020

Honda Confirms Hack Attack Disrupted Global Production

Data Breach Today

Ransomware Is the Likely Culprit, Security Experts Say Japanese auto giant Honda has confirmed that it sustained a hack attack earlier this week that has affected production operations at several of its global facilities, including plants in the U.S., Japan, Turkey and Italy.

Safeguard Your Remote Workforce

Dark Reading

DDoS attacks on VPN servers can not only bring remote work to a standstill but also cut off admins from accessing their systems. Here are three ways to stay safer

Access 106

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

3 Ways the Pandemic Will Affect Enterprise Security in the Future

Dark Reading

While CISOs have been focused on immediate threats, it's time to look ahead to what a post-COVID-19 future will look like

IT 83

Will Vote-by-App Ever Be Safe?

Dark Reading

Even with strong security measures, Internet voting is still vulnerable to abuse from state-sponsored actors and malicious insiders

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

7 Ransomware Trends: Gangs Join Forces, Decryptors Improve

Data Breach Today

Can't Stop the Crypto-Locking Malware Attacks? Criminals Keep Hitting Big Targets Ransomware gangs continue to innovate: Recently, reports have emerged of collaboration between the Maze and Lockbit gangs, and REvil not just leaking stolen data for free, but auctioning it off to the highest bidder.

More Trending

Report: Tycoon Ransomware Targets Windows, Linux Systems

Data Breach Today

Attacks Targeting Education and Software Companies Started in December 2019 A sophisticated strain of ransomware called Tycoon has been selectively targeting education and software companies since December 2019, according to a joint report released by BlackBerry and KPMG.

How Covid-19 Contact Tracing Works on Your Phone

WIRED Threat Level

Developers are working on track-and-trace systems to keep infection levels low. The apps aren't here yet, but here's what they do—and how you can enable them. Gear Gear / How To and Advice Security

Critical flaw could have allowed attackers to control traffic lights

Security Affairs

A critical vulnerability in traffic light controllers manufactured by SWARCO could have been exploited by attackers to disrupt traffic lights. A critical vulnerability in traffic light controllers designed by SWARCO could have been exploited by hackers to disrupt traffic lights.

Asset Management Mess? How to Get Organized

Dark Reading

Hardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure it

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Kingminer Botnet Targeting SQL Servers for Cryptomining

Data Breach Today

Sophos: Botnet Uses Brute-Force Attacks Targeting Vulnerable Databases The operators behind the Kingminer botnet have recently started targeting vulnerable Microsoft SQL Server databases using brute-force methods in order to mine cryptocurrency, according to research from Sophos.

Mining 219

Phishing Attacks Traced to Indian Commercial Espionage Firm

Data Breach Today

Researchers at Citizen Lab Accuse Indian Firm of Criminal Hacking for Hire Surveillance researchers at Citizen Lab have tied thousands of "Dark Basin" corporate espionage phishing attacks to a small Indian cybersecurity firm called BellTroX InfoTech Services.

Microsoft Fixes 129 Bugs in Largest Patch Tuesday Release

Dark Reading

The June release of security updates addresses several remote code execution vulnerabilities in SharePoint, Excel, Windows OLE, and other services

Honda Hit By Possible Ransomware Attack

Adam Levin

Japanese automotive manufacturer Honda is investigating a possible ransomware attack that has caused company-wide network outages.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

How to keep your remote work team together

OpenText Information Management

Remote work teams around the world are showing that despite today’s extraordinary circumstances, we can still churn out hearty levels of productivity. But it’s challenging.

IT 90

7 Ransomware Trends: Gangs Join Forces, Auction Stolen Data

Data Breach Today

Can't Stop the Crypto-Locking Malware Attacks? Criminals Keep Hitting Big Targets Ransomware gangs keep innovating: Maze has begun leaking data on behalf of both Lockbit and RagnarLocker, while REvil has started auctioning data - from victims who don't meet its ransom demands - to the highest bidder.

Florence, Ala. Hit By Ransomware 12 Days After Being Alerted by KrebsOnSecurity

Krebs on Security

In late May, KrebsOnSecurity alerted numerous officials in Florence, Ala. that their information technology systems had been infiltrated by hackers who specialize in deploying ransomware.

Spies Can Eavesdrop by Watching a Light Bulb's Vibrations

WIRED Threat Level

The so-called lamphone technique allows for real-time listening in on a room that's hundreds of feet away. Security Security / Cyberattacks and Hacks

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Honda Pauses Production Due to Cyberattack

Dark Reading

The attack reportedly infected internal servers and forced Honda to halt production at plants around the world on Monday

113
113

City Pays Ransom Despite Pre-Ransomware Outbreak Hack Alert

Data Breach Today

DoppelPaymer Hit Comes as Ransomware Attacks - and Data-Leaking Shakedowns - Surge The attack sounds ripped from an episode of TV show "24": Hackers have infiltrated a government network, and they're days away from unleashing ransomware.

Owners of DDoS-for-Hire Service vDOS Get 6 Months Community Service

Krebs on Security

The co-owners of vDOS , a now-defunct service that for four years helped paying customers launch more than two million distributed denial-of-service (DDoS) attacks that knocked countless Internet users and websites offline, each have been sentenced to six months of community service by an Israeli court. vDOS as it existed on Sept. 8, 2016.

Google is indexing the phone numbers of WhatsApp users raising privacy concerns

Security Affairs

A researcher is warning that Google is indexing the phone numbers of WhatsApp users raising serious privacy concerns. Google is indexing the phone numbers of WhatsApp users that could be abused by threat actors for malicious activities.

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

ICS Threat Snake Ransomware Suspected in Honda Attack

Dark Reading

An attack targeting the automaker reportedly infected internal servers and led to the suspension of production at plants around the world

IoT Privacy and Security: Will Product Labels Help Buyers?

Data Breach Today

Food-Like Labeling for Connected Devices Developed by Carnegie Mellon University With internet connectivity getting added to an increasing number of products, privacy and security risks abound. But buyers may be unaware.

IoT 251

Microsoft Patch Tuesday, June 2020 Edition

Krebs on Security

Microsoft today released software patches to plug at least 129 security holes in its Windows operating systems and supported software, by some accounts a record number of fixes in one go for the software giant.

Gamaredon group uses a new Outlook tool to spread malware

Security Affairs

Russia-linked Gamaredon APT use a new module for Microsoft Outlook that creates custom emails with malicious documents and sends them to a victim’s contacts.

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Inside Stealthworker: How It Compromises WordPress, Step-by-Step

Dark Reading

A new wave of attacks using old malware is threatening WordPress sites that don't have strong password policies

Kubeflow Targeted in XMRig Monero Cryptomining Campaign

Data Breach Today

Researchers: Admin Shortcut May Have Opened the Door to Hackers Microsoft's Azure Security Center has detected a new hacking campaign that for the first time specifically targets the Kubeflow platform on Kubernetes and uses XMRig cryptominer to mine for monero across multiple clusters

Mining 242

Facebook Helped Develop a Tails Exploit

Schneier on Security

This is a weird story : Hernandez was able to evade capture for so long because he used Tails, a version of Linux designed for users at high risk of surveillance and which routes all inbound and outbound connections through the open-source Tor network to anonymize it.

Risk 102