Sat.Apr 18, 2020 - Fri.Apr 24, 2020

article thumbnail

What Is Agile Enterprise Architecture? Just Enough, Just in Time

erwin

Having an agile enterprise architecture (EA) is the difference between whether an organization flourishes or flounders in an increasingly changing business climate. Over the years, EA has gotten a bad reputation for not providing business value. However, frameworks and languages like TOGAF, ArchiMate and DODAF aren’t responsible for this perception.

article thumbnail

Hackers Target Oil Companies as Prices Plunge

WIRED Threat Level

The sophisticated spear-phishing campaign hit as energy companies planned their response to falling crude prices. .

Phishing 174
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Nintendo Confirms Breach of 160,000 Accounts

Threatpost

After gamers reported unauthorized logins and purchases, Nintendo confirmed that over 160,000 accounts had been hacked.

article thumbnail

Remote Workforce: Securing the Next Normal

Data Breach Today

SailPoint's Mike Kiser on Rising Need for Zero Trust, Cloud Governance The global pandemic has revealed a lot about the extended remote workforce and its haves and have-nots, says Mike Kiser of SailPoint Technologies. In a preview of an upcoming virtual roundtable, he describes the cybersecurity forces shaping the new post-crisis workforce.

Security 147
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

Expert identifies new Nazar APT group referenced in 2017 Shadow Brokers leak

Security Affairs

A security expert uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017. Juan Andres Guerrero-Saade, a former Kaspersky and Google researcher, uncovered an old APT operation, tracked Nazar, by analyzing the NSA hacking tools included in the dump leaked by Shadow Brokers in 2017.

Libraries 349

More Trending

article thumbnail

Automated Bots Are Increasingly Scraping Data & Attempting Logins

Dark Reading

The share of bot traffic to online sites declines, but businesses are seeing an overall increase in automated scraping of data, login attempts, and other detrimental activity.

86
article thumbnail

A new Insomnia iOS exploit used to spy on China’s Uyghur minority

Security Affairs

Security researchers from Volexity discovered a new Insomnia iOS exploit that was being used to spy on China’s Uyghur minority. The Uyghur group is a Turkic minority ethnic group originating from and culturally affiliated with the general region of Central and East Asia. “The Uyghurs are recognized by the Chinese government only as a regional minority within a multicultural nation.

article thumbnail

IT Services Firm Cognizant Hit with Maze Ransomware

Dark Reading

Cognizant is working with cyber defense firms and law enforcement to investigate the attack, disclosed April 17.

article thumbnail

Secure Together: Netflix scams and how to report suspicious emails

IT Governance

With the UK government recently confirming that the lockdown will be extended for a further three weeks, we hope you’re comfortable in your remote work set-up – or, at least, as comfortable as one can hope. The isolation will be challenging in the best of situations, but plenty of people – such as those with children or unruly housemates – are facing a particularly tough time.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Attackers Increasingly Using Web Shells to Create Backdoors

Data Breach Today

NSA, Australian Signals Directorate, Offer Mitigation Tips The U.S. National Security Agency and the Australian Signals Directorate offer guidance on how to mitigate the growing threat posed by attackers using web shells to create backdoors.

Security 251
article thumbnail

Hacking Apple iPhones and iPads by sending emails to the victims

Security Affairs

Two zero-day flaws in the default mailing app pre-installed on iPhones and iPads allow attackers to hack the devices just by sending emails. Experts at cybersecurity firm ZecOps have discovered two zero-day vulnerabilities in iPhone and iPad devices that have been exploited in a series of attacks that targeted iOS high-profile users since at least January 2018.

Libraries 355
article thumbnail

A Dozen Nation-Backed APTs Tap COVID-19 to Cover Spy Attacks

Threatpost

Iran's Charming Kitten and other nation-state actors are using the coronavirus pandemic to their advantage, for espionage.

article thumbnail

COVID-19 Caption Contest Winners

Dark Reading

It was a tough choice! And the winner is.

IT 78
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Expert discloses 4 zero-days in IBM Data Risk Manager

Security Affairs

A security researcher disclosed details of four zero-day flaws impacting an IBM security product after the IT giant refused to address them. The security researcher Pedro Ribeiro, Director of Research at Agile Information Security, has published details about four zero-day vulnerabilities affecting the IBM Data Risk Manager (IDRM) after the company refused to address the issues.

Risk 343
article thumbnail

When in Doubt: Hang Up, Look Up, & Call Back

Krebs on Security

Many security-conscious people probably think they’d never fall for a phone-based phishing scam. But if your response to such a scam involves anything other than hanging up and calling back the entity that claims to be calling, you may be in for a rude awakening. Here’s how one security and tech-savvy reader got taken for more than $10,000 in an elaborate, weeks-long ruse.

Phishing 363
article thumbnail

Genetic Testing Lab Hack Affects 233,000

Data Breach Today

Second Largest Health Data Breach So Far This Year A California-based genetic testing laboratory has reported an email hacking incident that may have exposed medical information on nearly 233,000 individuals. It's the second-largest health data breach posted to the federal health data breach tally so far in 2020.

article thumbnail

Amid Its Covid-19 Crisis, China Was Still Hacking Uighurs’ iPhones

WIRED Threat Level

Security researchers reveal a months-long, indiscriminate campaign targeting the iPhones of Chinese Muslims.

IT 262
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

State-sponsored hackers are using COVID-19 lures, Google warns

Security Affairs

Google warns that nation-backed hackers are exploiting the COVID-19 pandemic to organizations involved in the fight against the pandemic. Google is warning that nation-state actors are exploiting the COVID-19 (Coronavirus) pandemic to target health care organizations and entities involved in the fight against the pandemic. Google’s Threat Analysis Group (TAG) shared its latest findings related to state-backed attacks and revealed that it has identified more than a dozen state-sponsored groups us

Phishing 363
article thumbnail

How to Bring Business Process Management to Your Business

AIIM

Businesses looking for ongoing growth and scalability try to achieve these goals through different approaches that can provide “that extra advantage.” One such approach is business process management , which aims to find and make ongoing improvements in the operations of a business. This is currently a popular tactic in the business world, featuring various applications, techniques, and tools which make it a complex field of business development.

Analytics 259
article thumbnail

Cognizant: Ransomware Attack Disrupting Services

Data Breach Today

SEC Filing Shows Company Still Assessing Maze Attack IT services and consulting giant Cognizant is still assessing the damage from a ransomware attack on Friday. And it's warning that the incident is disrupting services to some of its clients and could affect the company's revenue.

article thumbnail

25 Years After Oklahoma City, Domestic Terrorism Is on the Rise

WIRED Threat Level

In an exclusive interview with WIRED, FBI director Christopher Wray discusses a scourge that “moves at the speed of social media.”.

Security 253
article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

267 Million Facebook identities available for 500 euros on the dark web

Security Affairs

Over 267 million Facebook profiles are offered for sale on dark web sites and hacker forums, the dump is offered for £500 ($623) and doesn’t include passwords. Hackers are offering for sale over 267 million Facebook profiles for £500 ($623) on dark web sites and hacker forums, the archive doesn’t include passwords. Early March, the security expert Bob Diachenko uncovered an Elasticsearch cluster containing more than 267 million Facebook user IDs, phone numbers, and names.

Sales 364
article thumbnail

Information Management Business Issues Hit Distance Learning

AIIM

Like many other areas around the country and around the world, my daughter's school has joined the " learn from home " movement. I've been a teleworker for nearly 16 years, so we already have the technology infrastructure required, including an older but still useful laptop and fairly robust Wi-Fi. But it's come with more than a few challenges, some of which are the same types of information management challenges we all struggle with at times in the world of business.

Metadata 187
article thumbnail

Prosecutors: Insider 'Sabotaged' Medical Equipment Shipments

Data Breach Today

Hacker Disrupted Delivery of Supplies Used in COVID-19 Crisis, DOJ Says The former vice president of finance at a Georgia-based medical supplies company has been charged with hacking into the firm's computers and "sabotaging" shipment of personal protective equipment in the midst of the COVID-19 crisis.

330
330
article thumbnail

Google Sees State-Sponsored Hackers Ramping Up Coronavirus Attacks

WIRED Threat Level

More than 12 government-backed groups are using the pandemic as cover for digital reconnaissance and espionage, according to a new report.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Cyberattack reports quadrupled during Coronavirus outbreak, FBI warns

Security Affairs

The FBI announced that the number of cybercrime reports is spiked since the beginning of the Coronavirus (COVID-19) pandemic. Speaking at the Aspen Institute, FBI Deputy Assistant Director Tonya Ugoretz, announced that the bureau has observed a spike in cybercrime reports since the beginning of the C oronavirus pandemic. The FBI official explained that the number of reports has quadrupled compared to months before the COVID-19 outbreak. “The FBI has an Internet Crime Complaint Center, the

article thumbnail

White-Hat Hackers Help 'Fold' COVID-19 Proteins

Dark Reading

A grassroots effort provides scientists with computing power to help simulate the novel coronavirus' proteins and come up with therapeutic solutions for the disease.

145
145
article thumbnail

SBA May Have Exposed Data on 8,000 Loan Applicants

Data Breach Today

Reports: Application Portal Flaw May Have Leaked Social Security Numbers, Other Data The U.S. Small Business Administration says a flaw in an online application portal may have exposed the personal data - including Social Security numbers - of approximately 8,000 loan applicants seeking help coping with the economic impact of the COVID-19 pandemic, according to news reports.