Sat.Jan 15, 2022 - Fri.Jan 21, 2022

GUEST ESSAY: The case for network defenders to focus on leading — not lagging — indicators

The Last Watchdog

A key CEO responsibility is reporting results that deliver on a company’s mission to shareholders. This reporting often requires a host of metrics that define success, like Annual Recurring Revenue and sales for software as a service (SaaS) companies. These are lagging indicators where the results follow behind the work required to achieve them. Related: Automating SecOps. Lagging indicators are separate from leading indicators that could include marketing leads, pipeline generation and demos.

B2B 117

Experts warn of attacks using a new Linux variant of SFile ransomware

Security Affairs

The operators of the SFile ransomware (aka Escal) have developed a Linux version of their malware to expand their operations. SFile ransomware (aka Escal), has been active since 2020 , it was observed targeting only Windows systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

An Examination of the Bug Bounty Marketplace

Schneier on Security

Here’s a fascinating report: “ Bounty Everything: Hackers and the Making of the Global Bug Marketplace.”

Risk 69

A Teen Took Control of Teslas by Hacking a Third-Party App

WIRED Threat Level

Plus: Open source sabotage, Ukrainian website hacks, and more of the week's top security news. Security Security / Security News

100 Pipeline Plays: The Modern Sales Playbook

For the first time, we’re sharing the winning plays that took us from scrappy startup to a publicly traded company. Use our proven data-driven plays to grow your pipeline and crush your revenue targets.

Biology or Technology? A Whiffle is in the Air

Micro Focus

Now that it’s winter in the northern hemisphere, migratory birds have made their way south to their warmer homes. Most often noticed is the goose, a faithful friend who has some interesting things to teach the IT industry. Geese are interesting creatures.

IT 65

More Trending

Mastering the Art of Cloud Tagging Using Data Science

Dark Reading

Cloud tagging, the process of labeling cloud assets by certain attributes or operational values, can unlock behavioral insights to optimize and automate cyber asset management at scale

58

Destructive Hacks Against Ukraine Echo Its Last Cyberwar

WIRED Threat Level

A data wiper posing as ransomware bears a discomfiting resemblance to the earlier wave of Russian cyberattacks that ended with NotPetya. Security Security / Security News

FAA Statements on 5G – Releases list of 50 airports slated for buffer zones

IG Guru

Check out the statement on their page. The post FAA Statements on 5G – Releases list of 50 airports slated for buffer zones appeared first on IG GURU. Compliance information security Risk News 5G FAA

Risk 40

One of the REvil members arrested by FSB was behind Colonial Pipeline attack

Security Affairs

A senior Biden administration official said that the one of the Russian hacker arrested by FSB was behind the Colonial Pipeline attack. Yesterday, the Russian Federal Security Service (FSB) announced to have dismantled the REvil ransomware operation and arrested 14 alleged members of the gang.

Optimize the Performance of Your Serverless Functions

Run mission-critical applications on serverless without sacrificing visibility.

Top 10 Microsoft Dynamics 365 Consultants in the USA

Cllax

Your in-house CRM and ERP solution is competent enough to meet the advanced business need. Are they transforming your operational behaviour as per the recent trends of the market? The post Top 10 Microsoft Dynamics 365 Consultants in the USA first appeared on Cllax - Top of IT. Articles

26

How Apple's iCloud Private Relay Can Keep You Safe

WIRED Threat Level

The newest security measure is still in beta. But if you want to make use of it, here's what you need to know. Security Security / Security Advice Security / Privacy

IT 54

Threat actors stole $18.7M from the Lympo NTF platform

Security Affairs

Threat actors hacked the hot wallet of the NFT platform Lympo and managed to steal 165.2 Million LMT (worth $18.7 million). NFT and DeFi platforms are privileged targets for cybercriminals, and the NFT platform Lympo was the last platform in order of time to suffer a security breach.

Kyiv blames Belarus-linked APT UNC1151 for recent cyberattack

Security Affairs

Ukrainian government attributes the recent attacks against tens of Ukrainian government websites to Belarusian APT group UNC1151. The government of Kyiv attributes the defacement of tens of Ukrainian government websites to Belarusian APT group UNC1151 , the Reuters agency reported in exclusive.

CMS 70

Discover the 10 Rules for Managing PostgreSQL

PostgreSQL is one of the most successful open source projects in existence. But each year it becomes harder and harder to get familiarized with the PostgreSQL ecosystem and its new features. Learn 10 rules that will help you perfect your PostgreSQL installation.

Zoho fixes a critical vulnerability (CVE-2021-44757) in Desktop Central solutions

Security Affairs

Zoho addressed a new critical severity flaw (CVE-2021-44757) that affects its Desktop Central and Desktop Central MSP unified endpoint management (UEM) solutions.

62

Prominent Carding Marketplace UniCC announced it’s shutting down

Security Affairs

One of the biggest underground carding marketplaces, UniCC, announced it’s shutting down its operations. UniCC, one of the biggest underground carding marketplaces announced it is shutting down.

Security Affairs newsletter Round 349

Security Affairs

A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here. Threat actors stole $18.7M

A new wave of Qlocker ransomware attacks targets QNAP NAS devices

Security Affairs

QNAP NAS devices are under attack, experts warn of a new Qlocker ransomware campaign that hit devices worldwide. A new wave of Qlocker ransomware it targeting QNAP NAS devices worldwide, the new campaign started on January 6 and it drops ransom notes named !!!READ_ME.txt

The Importance of PCI Compliance and Data Ownership When Issuing Payment Cards

This eBook provides a practical explanation of the different PCI compliance approaches that payment card issuers can adopt, as well as the importance of both protecting user PII and gaining ownership and portability of their sensitive data.

Microsoft spotted a destructive malware campaign targeting Ukraine

Security Affairs

Microsoft spotted a new destructive malware operation targeting government, non-profit, and IT entities in Ukraine. Microsoft spotted a destructive attack that targeted government, non-profit, and IT entities in Ukraine with a wiper disguised as ransomware.

European Union simulated a cyber attack on a fictitious Finnish power company

Security Affairs

The European Union simulated a cyber attack on a fictitious Finnish power company to test its cyber-defense capabilities.

What Are The Common Mistakes Upon Ordering The Food Deliveries?

Cllax

Let’s say you are at home, work remotely, and don’t have time to prepare food. What would you do? Most probably, you will opt for food delivery services and place. The post What Are The Common Mistakes Upon Ordering The Food Deliveries? first appeared on Cllax - Top of IT. Articles

26

Impact of Covid-19 on the Lending Industry

Cllax

Covid-19 has significantly impacted most commercial sectors, including the lending industry. The stringent measures employed by the government, such as social distancing and border closure, affected the livelihood of most.

Your Guide to Using Conversational Marketing to Drive Demand Generation

What is conversational marketing really about? This guide will examine the market forces at play, shifting buyer trends, how to leverage conversation marketing, and the tactics involved in adopting it for a B2B demand generation strategy.