Mon.Nov 29, 2021

Modernizing Content Services to Keep Pace with Market Demands

OpenText Information Management

A large Canadian food and pharmacy retailer, and long-time OpenText™ customer, with more than 2,500 corporate-owned retail locations serving nearly 13,000 independent distribution customers had been running OpenText™ Extended ECM on-premises since 2009.

GUEST ESSAY: The shock waves of mental illness have begun exacerbating cybersecurity exposures

The Last Watchdog

Mental health at work is undergoing a rapid transformation. Even before the COVID-19 pandemic, which has caused an increase in feelings of loneliness and isolation, workers’ mental health was under pressure. Related: Capital One hacker demonstrated ‘erratic behavior’ According to a recent workforce health survey, 40% of workers experienced mental health issues this past year , double the year before.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Israel cut cyber export list, excluding totalitarian regimes

Security Affairs

Israel’s Ministry of Defense bans the sale of surveillance software and offensive hacking tools to tens of countries. Israel’s Ministry of Defense has cut the list of countries to which Israeli surveillance and cybersecurity firms could sell their products and services.

Sales 55

Armis Now Valued at $3.4B

Dark Reading

One Equity Partners led the $300 million round, increasing the valuation of Armis from the $2 billion valuation it achieved less than 8 months ago

IT 52

Migrating Oracle to PostgreSQL

Considering migrating away from Oracle? Learn why PostgreSQL is the right move.

Google experts found 2 flaws in video conferencing software Zoom

Security Affairs

Google Project Zero researchers have discovered two vulnerabilities in the video conferencing software Zoom that expose users to attacks. Security researchers from Google Project Zero discovered two vulnerabilities in the video conferencing software Zoom that expose users to attacks.

More Trending

Panasonic confirmed that its network was illegally accessed by attackers

Security Affairs

Panasonic disclosed a security breach after threat actors gained access to its servers storing potentially sensitive information. Japanese electronics giant Panasonic disclosed a security breach after threat actors gained access to some servers of the company containing sensitive data.

Phishing Remains the Most Common Cause of Data Breaches, Survey Says

Dark Reading

Despite heightened concerns over ransomware, fewer organizations in a Dark Reading survey reported being an actual victim of a ransomware attack over the past year

A Hacking Spree Against Iran Spills Out Into the Real World

WIRED Threat Level

Hackers have targeted the country's trains, gas stations, and airline infrastructure, as cyber conflict with Israel continues to escalate. Security Security / Cyberattacks and Hacks

Google Analyzes Methods Behind GCP Workload Attacks

Dark Reading

The vast majority of cloud workload compromises stem from poor security configurations or compromised passwords, while cryptojacking is the common payload, research shows

The Modern Software Checklist: The Secret to Understanding Your Data Security Needs

Understanding your data security needs is tough enough, but what can be even more difficult is choosing the right software to fit your company. This checklist will help you evaluate the scope of services offered by various encryption solutions on the market.

Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server

Security Affairs

Threat actors are exploiting the recently patched CVE-2021-40438 flaw in Apache HTTP servers, warns German Cybersecurity Agency and Cisco. Threat actors are exploiting a recently addressed server-side request forgery (SSRF) vulnerability, tracked as CVE-2021-40438, in Apache HTTP servers.

NanoLock Security and Waterfall Security Partner to Deliver OT Security for Industrial and Energy Applications

Dark Reading

The solution combines NanoLock’s device-level, zero-trust protection with Waterfall’s hardware-enforced IT/OT perimeter protection to provide a powerful OT security solution that mitigates cyber events from both IT and OT networks

IT 52

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

On 16 November 2021, the French data protection supervisory authority (the “CNIL”) published a practical guide (“Guide”) on Data Protection Officers (“DPOs”).

Paving the Road to Zero Trust With Adaptive Authentication

Dark Reading

A gradual transition to a world beyond passwords predisposes zero-trust projects to success

The Importance of PCI Compliance and Data Ownership When Issuing Payment Cards

This eBook provides a practical explanation of the different PCI compliance approaches that payment card issuers can adopt, as well as the importance of both protecting user PII and gaining ownership and portability of their sensitive data.

Your Fingerprint Can Be Hacked For $5. Here’s How via Kraken.com

IG Guru

Check out the article here. The post Your Fingerprint Can Be Hacked For $5. Here’s How via Kraken.com appeared first on IG GURU. Breach IG News Information Governance information privacy information security Risk News Security Biometrics Fingerprints Kraken Privacy

Risk 52

Biopharmaceutical firm Supernus Pharmaceuticals hit by Hive ransomware during an ongoing acquisition

Security Affairs

Biopharmaceutical company Supernus Pharmaceuticals discloses a ransomware attack, the Hive ransomware claims to have stolen company data. Biopharmaceutical company Supernus Pharmaceuticals confirmed it was the victim of a data breach after a ransomware attack that hit the firm last in Mid-November.

9 out of 10 Healthcare Organizations Provide Telehealth Services, Yet Almost Half Face Patients' Mistrust Toward Privacy

Dark Reading

Kaspersky surveyed healthcare decision-makers to learn how the digital transformation of the industry is going and which problems they believe should be solved to create a world in which everyone can gain access to quality care

US – Federal banking regulators issue computer-security incident notification final rule

DLA Piper Privacy Matters

US – Federal banking regulators issue computer-security incident notification final rule. Rule takes effect April 1, 2022. The Federal Deposit Insurance Corporation, Federal Reserve, and Office of the Comptroller of the Currency (collectively the federal banking regulators) have issued a final rule requiring banking organizations and bank service providers to make certain notifications in the event of a “computer-security incident.”.

Make Payment Optimization a Part of Your Core Payment Strategy

Everything you need to know about payment optimization – an easy-to-integrate, PCI-compliant solution that enables companies to take control of their PSPs, minimize processing costs, maximize approval rates, and keep control over their payments data.

Stellar Cyber Raises $38M Series B to Address Need to Provide 360-Degree Visibility Across Entire Attack Surface

Dark Reading

Oversubscribed round, including Samsung, rewards technical innovations and rapid market adoption, positions company for continued leadership

Why Your Bank Needs Biometric Verification Systems

HID Global

Why Your Bank Needs Biometric Verification Systems. tseeley. Mon, 11/29/2021 - 12:31

52

Panasonic Hit in Data Breach

Dark Reading

Tech firm reveals that data on one of its file servers was accessed by attackers

True Crime Stories – Unknown

HID Global

True Crime Stories – Unknown. stilmann. Mon, 11/29/2021 - 12:36

52

Open Source is Quickly—and Rightfully— Becoming Enterprise’s First Choice

Open source is not just a community, it’s a movement. And while its popularity has, of course, existed for decades, its accelerating growth in today’s enterprise is unmistakable. Find out why enterprises are going all-in on their open source strategy.

Over 1,000 Individuals Arrested in Global Cybercrime-Fighting Operation

Dark Reading

HAECHI-II initiative represents Interpol's stepped-up efforts to tackle the operators of financially motivated online scams and other cyberattacks

40

ScarCruft APT Mounts Desktop/Mobile Double-Pronged Spy Attacks

Threatpost

The North Korea-linked group is deploying the Chinotto spyware backdoor against dissidents, journalists and other politically relevant individuals in South Korea. Malware Mobile Security Web Security

IKEA Email Systems Targeted in Cyberattack

Dark Reading

Attackers are reportedly targeting IKEA employees in a phishing campaign that leverages stolen reply-chain emails

Researchers Flag 300K Banking Trojan Infections from Google Play in 4 Months

Threatpost

Attackers are honing Google Play dropper campaigns, overcoming app store restrictions. Malware Mobile Security

Cassandra Data Modeling Guide to Best Practices

Are you a developer, database architect, or database administrator that's new to Cassandra but have been tasked with developing a Cassandra schema design? Learn the basic rules to keep in mind when designing your schema for Cassandra.

SMB: Best security practices

Jamf

Basic security and privacy processes set the foundation for building more advanced protections and implementing them to comprehensively secure personal data, ensure compliance and keep user privacy data safeguarded

IKEA Hit by Email Reply-Chain Cyberattack

Threatpost

IKEA, king of furniture-in-a-flat-box, warned employees on Friday that an ongoing cyberattack was using internal emails to malspam malicious links in active email threads. Malware Vulnerabilities Web Security

Shopping for data with Collibra and Okera

Collibra

Today, more and more enterprises are moving to the cloud to reap the benefits of cost-savings and increased flexibility with their data. However, a successful cloud migration is not easy.