Sat.May 09, 2020 - Fri.May 15, 2020

article thumbnail

6 Free Cybersecurity Training and Awareness Courses

Dark Reading

Most are designed to help organizations address teleworking risks related to COVID-19 scams.

article thumbnail

Botnet Watch: Anubis Mobile Malware Gets New Features

Data Breach Today

Powerful Platform Can Spot If Victim Is Looking at the Screen Anubis, one of the most potent Android botnets, apparently is getting a refresh a year after its source code was leaked, security researchers say. The changes could help fraudsters more closely monitor activity on hacked devices.

Security 338
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Enhanced Zeus Sphinx Trojan Used in COVID-19 Schemes

Data Breach Today

Researchers Say New Features and Functionality Added The operators behind the Zeus Sphinx malware have added new features and functionality to the Trojan, and more cybercriminals have deployed it within phishing campaigns that use the COVID-19 crisis as a lure, according to IBM X-Force. The Trojan has become more efficient at stealing banking data.

Phishing 349
article thumbnail

Total cost of ownership: Mac versus PC in the enterprise

Jamf

If the upfront cost is more, how can Mac be less expensive than PC? We examine the numbers and put the Mac versus PC in the enterprise myths to bed.

145
145
article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

Executive leaders and board members are pushing their teams to adopt Generative AI to gain a competitive edge, save money, and otherwise take advantage of the promise of this new era of artificial intelligence. There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday. 💡 This new webinar featuring Maher Hanafi, CTO of Betterworks, will explore a practical framework to transform Generative AI prototypes into

article thumbnail

How to Set Your Facebook, Twitter, and Instagram to Control Who Sees What

WIRED Threat Level

Pick who sees your tweets, posts, and stories—and choose what you want to see, too.

Privacy 110

More Trending

article thumbnail

US Say China-Linked Hackers Targeting COVID-19 Researchers

Data Breach Today

FBI, CISA Issue Joint Warning to Organizations Conducting Research Hacking groups linked to China's government are targeting research and healthcare facilities that are working on developing vaccines, testing procedures and treatments for COVID-19, the FBI and the U.S. Cybersecurity and Infrastructure Security Agency warn in an alert.

article thumbnail

Toll Group Says Ransomware Attackers Stole Data

Data Breach Today

Australian Shipping Giant, Hit With Nefilim Ransomware, Vows to Not Pay Ransom Australian shipping giant Toll Group has vowed to again not pay a ransom after suffering its second ransomware attack of the year. In the latest incident, however, the company warns that attackers also stole corporate data - and it may get leaked.

article thumbnail

Astaroth’s New Evasion Tactics Make It ‘Painful to Analyze’

Threatpost

The infostealer has gone above and beyond in its new anti-analysis and obfuscation tactics.

IT 94
article thumbnail

Ransomware Hit ATM Giant Diebold Nixdorf

Krebs on Security

Diebold Nixdorf , a major provider of automatic teller machines (ATMs) and payment technology to banks and retailers, recently suffered a ransomware attack that disrupted some operations. The company says the hackers never touched its ATMs or customer networks, and that the intrusion only affected its corporate network. Canton, Ohio-based Diebold [ NYSE: DBD ] is currently the largest ATM provider in the United States, with an estimated 35 percent of the cash machine market worldwide.

article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today. Related: Why U.S. cybersecurity policy needs to match societal values CISOs must preserve and protect their companies in a fast-changing business environment at a time when their organizations are under heavy bombardment.

Security 309
article thumbnail

Ransomware Reminder: Paying Ransoms Doesn't Pay

Data Breach Today

Funding Criminals Perpetuates Cybercrime Security experts and law enforcement officials have long argued that paying ransoms doesn't pay. For starters, it directly funds the cybercrime ecosystem and makes it attractive for criminals to keep launching ransomware attacks.

article thumbnail

Scaling Your Business for Digital Transformation - 6 Important Factors

AIIM

Each year brings a rapid increase in technological advancements that can benefit both your personal and professional life. Constant tech advancements can make it feel hard to keep up with competing businesses if your company isn't adapting fast enough. In this day and age, digital transformations are integral for a growing business's future, as technology changes the advancements and operations of every company.

article thumbnail

Microsoft Patch Tuesday, May 2020 Edition

Krebs on Security

Microsoft today issued software updates to plug at least 111 security holes in Windows and Windows-based programs. None of the vulnerabilities were labeled as being publicly exploited or detailed prior to today, but as always if you’re running Windows on any of your machines it’s time once again to prepare to get your patches on. May marks the third month in a row that Microsoft has pushed out fixes for more than 110 security flaws in its operating system and related software.

Risk 276
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Dutch DPA Fines Company 750,000 Euros for Unlawful Employee Fingerprint Processing

Hunton Privacy

The Dutch Data Protection Authority ( Autoriteit Persoonsgegevens , the “Dutch DPA”) recently imposed a €750,000 fine on a company for unlawful processing of employees’ fingerprints for attendance taking and time registration purposes. Biometric data, such as fingerprints, qualify as sensitive personal data under the EU General Data Protection Regulation (the “GDPR”) and their processing is subject to more stringent requirements.

GDPR 136
article thumbnail

Ransomware Attackers Exfiltrate Data From Magellan Health

Data Breach Today

Another Example of How Cybercriminals' Tactics Are Changing Magellan Health, a U.S. managed care company that focuses on specialty areas of healthcare, says it was hit by a ransomware attack that involved the exfiltration of data. Ransomware gangs are increasingly going beyond encrypting data, stealing information to put more pressure on victims to pay ransoms.

article thumbnail

[Podcast] Tips and Advice for Legacy Replacement

AIIM

We're now operating twenty years into a new millennium. But despite the futuristic potential, many organizations continue to operate with systems and software that are a decade or more behind the times. Organizations that continue to operate in the past will be challenged to keep pace today – and in the future. Think about the technology you use in your personal life.

Libraries 118
article thumbnail

Coronavirus and the future of remote working

IT Governance

With the UK slowly beginning to ease its lockdown measures, organisations have a lot to consider. Some employees who can’t work from home will be itching to get back into the office, in which case you’ll need to take the appropriate steps to make sure they are able to work safely and follow social distancing rules. Other employees will have come to appreciate the benefits of working from home and want to continue to do so.

Risk 130
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Accelerating the Journey to AI for government in a post-COVID world

IBM Big Data Hub

AI is transforming how businesses operate and deliver value, while simultaneously improving efficiencies across the organization. Governments have taken an increasingly important role in the advent of COVID-19 as citizens look to government agencies for trusted information for their individual safety, well-being and beyond – to both support and benefit themselves socially, economically and emotionally.

article thumbnail

The Urgency of Re-Examining Security Practices During Pandemic

Data Breach Today

Cybersecurity Expert Reviews Key Questions to Ask Organizations must carefully re-examine their security procedures to make sure they're adequate for the new work-from-home environment during the COVID-19 crisis, says Shelton Newsham, a British law enforcement official who specializes in cybersecurity. He reviews key questions to ask.

Security 343
article thumbnail

GDPR Data Security Checklist in the Age of COVID-19 and the Remote Workforce

Security Affairs

During COVID-19 outbreak data processors have to be extra vigilant to maintain their compliance with data protection authorities like GDPR. COVID-19 has abruptly changed the world. It has imposed online learning and earning, which in turn has open new doors of cybersecurity threats and data breaches. Now the data processors have to be extra vigilant to maintain their compliance with data protection authorities like GDPR.

GDPR 131
article thumbnail

UK: ICO ISSUES NEW GUIDANCE ON COVID-19 TESTING AND MONITORING IN THE WORKPLACE

DLA Piper Privacy Matters

The Information Commissioner’s Office (“ ICO ”) has published guidance for employers on complying with data protection law when taking steps to manage Covid-19 health and safety risk in the workplace (“ Guidance ”). The Guidance focuses on ‘testing’ of employees (which includes collecting data about symptoms and the conducting of temperature checks, and well as collecting data about Covid-19 test results), but also touches on other measures which businesses might be considering in order to moni

GDPR 126
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

The Top 10 Reasons to Attend Micro Focus Virtual Universe

Micro Focus

Micro Focus Virtual Universe launches on May 19! There’s still time to register for this free event—join fellow technology leaders, innovators and Micro Focus solution experts and partners to see how we can help you drive value and innovate faster, with less risk, in the race to digital transformation. Here’s my Top 10 reasons: Top. View Article.

article thumbnail

'Smart' Factories Could Face Unique Attacks: Report

Data Breach Today

Connected Devices Could Allow Attackers to Target Industrial Systems, Trend Micro Reports The increasing use of internet-connected devices in manufacturing facilities is opening up new ways for hackers to target so-called "smart" factories with unconventional attack methods, according to an analysis by security firm Trend Micro and the Polytechnic University of Milan.

article thumbnail

Interserve UK defense contractor hacked, up to 100,000 past and present employees details exposed

Security Affairs

Britain’s Ministry of Defence contractor Interserve has been hacked, intruders have stolen up to 100,000 past and present employees’ details. Interserve, a contractor for the Britain’s Ministry of Defence suffered a security breach, hackers have stolen up to 100,000 of past and current employees details. The company currently has around 53,000 employees.

article thumbnail

IT support automation keeps remote workforces productive

DXC Technology

Enterprise clients have looked to automate IT support for several years. With millions of employees across the globe now working from home, support needs have increased dramatically, with many unprepared enterprises suffering from long service desk wait times and unhappy employees. Many companies may have already been on a gradual pace to exploit digital solutions […].

IT 118
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

RATicate Group Hits Industrial Firms With Revolving Payloads

Threatpost

A new threat group uses NSIS as an installer to target industrial companies with revolving payloads, including LokiBot, FormBook, BetaBot, Agent Tesla and Netwire.

123
123
article thumbnail

Fresh Twist for Pandemic-Related Phishing Campaigns

Data Breach Today

Microsoft Spots Malicious Messages Spreading LokiBot Infostealer Fraudsters are honing their phishing emails tied to the COVID-19 crisis, using fake messages about business continuity plans and new payment procedures to spread the LokiBot information stealer, Microsoft researchers report.

Phishing 327
article thumbnail

USCYBERCOM shares five new North Korea-linked malware samples

Security Affairs

The United States Cyber Command (USCYBERCOM) has uploaded five new North Korean malware samples to VirusTotal. The United States Cyber Command (USCYBERCOM) has shared five new malware samples attributed to the North Korea-linked Lazarus APT , it has uploaded the malicious code to VirusTotal. “On May 12, 2020, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) released three Malware Analysis Reports (MA

Analytics 119