Sat.Dec 14, 2019 - Fri.Dec 20, 2019

article thumbnail

Ransomware Risk Management: 11 Essential Steps

Data Breach Today

Tips From a Cybersecurity Veteran on Winning the Battle In this in-depth blog, a long-time cybersecurity specialist who recently joined the staff of Information Security Media Group sizes up evolving ransomware risks and offers a list of 11 critical mitigation steps.

Risk 124
article thumbnail

Don't Make Security Training a 'One-and-Done'

Dark Reading

How to move beyond one-off campaigns and build a true security awareness program.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It’s Time for Your SOC to Level Up

Threatpost

Artificial intelligence can provide manpower, context and risk assessment.

article thumbnail

CCPA 2.0 Moves to Next Critical Stage of Referendum Process

Data Matters

In the evening of December 17, 2019, Californians for Consumer Privacy , the consumer privacy rights organization led by Alastair Mactaggart that propelled California towards the U.S.’s first comprehensive privacy legislation , tweeted the Attorney General’s release of the title and summary for Initiative 19-0021. This Initiative would substantively amend and essentially replace the California Consumer Privacy Act (“CCPA”) with the proposed Consumer Privacy Rights Act of 2020—also known colloqu

Privacy 60
article thumbnail

State of AI in Sales & Marketing 2025

AI adoption is reshaping sales and marketing. But is it delivering real results? We surveyed 1,000+ GTM professionals to find out. The data is clear: AI users report 47% higher productivity and an average of 12 hours saved per week. But leaders say mainstream AI tools still fall short on accuracy and business impact. Download the full report today to see how AI is being used — and where go-to-market professionals think there are gaps and opportunities.

article thumbnail

5 Pieces of GDPR Advice for Teams Without Privacy Compliance Staff

Dark Reading

Are you an army of one tasked with compliance and data privacy? Try these tips to get you and your organization in alignment with regulators.

More Trending

article thumbnail

Maze Ransomware operators threaten victims to publish their data online

Security Affairs

The victims of the Maze Ransomware now face another threat because operators behind the malware could become publish their data online. The victims of the Maze Ransomware are facing another risk, after having their data encrypted now crooks are threatening to publish their data online. The Maze ransomware also implements data harvesting capabilities, operators are threatening to release the data for all those victims who refuse to pay the ransom.

article thumbnail

The Lifecycle of Stolen Payment Data

Data Breach Today

Fiserv's Christine El Eris on How Fraudsters Sit on and Sell Stolen Card Data Even in the post-EMV era, payment card data is very much thriving on the dark web. Why is data still so accessible to fraudsters, and how can card issuers and merchants alike improve card data security? Christine El Eris of Fiserv discusses fraud trends.

Access 245
article thumbnail

Creditors Seek to Exhume the Body of a Dead Crypto Executive 

WIRED Threat Level

Gerry Cotten took at least $137 million to the grave when he died without giving anyone the password to his encrypted laptop.

article thumbnail

Ransomware Gangs Now Outing Victim Businesses That Don’t Pay Up

Krebs on Security

As if the scourge of ransomware wasn’t bad enough already: Several prominent purveyors of ransomware have signaled they plan to start publishing data stolen from victims who refuse to pay up. To make matters worse, one ransomware gang has now created a public Web site identifying recent victim companies that have chosen to rebuild their operations instead of quietly acquiescing to their tormentors.

article thumbnail

How to Achieve High-Accuracy Results When Using LLMs

Speaker: Ben Epstein, Stealth Founder & CTO | Tony Karrer, Founder & CTO, Aggregage

When tasked with building a fundamentally new product line with deeper insights than previously achievable for a high-value client, Ben Epstein and his team faced a significant challenge: how to harness LLMs to produce consistent, high-accuracy outputs at scale. In this new session, Ben will share how he and his team engineered a system (based on proven software engineering approaches) that employs reproducible test variations (via temperature 0 and fixed seeds), and enables non-LLM evaluation m

article thumbnail

Dacls RAT, the first Lazarus malware that targets Linux devices

Security Affairs

Researchers spotted a new Remote Access Trojan (RAT), dubbed Dacls, that was used by the Lazarus APT group to target both Windows and Linux devices. Experts at Qihoo 360 Netlab revealed that the North-Korea Lazarus APT group used a new Remote Access Trojan (RAT), dubbed Dacls, to target both Windows and Linux devices. The activity of the Lazarus APT group (aka HIDDEN COBRA ) surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks.

CMS 266
article thumbnail

Insurer Races to Fix Security Flaws After Whistleblower Alert

Data Breach Today

Report: Blue Cross and Blue Shield Minnesota Had Thousands of Old 'Critical' Vulnerabilities Blue Cross and Blue Shield Minnesota is reportedly racing to address tens of thousands of security vulnerabilities after a whistleblower on the health insurer's security team alerted the company's board of trustees about the problems. Why do some companies lag on addressing security issues?

Insurance 245
article thumbnail

The War Vet, the Dating Site, and the Phone Call From Hell

WIRED Threat Level

Jared Johns found out too late that swapping messages with the pretty girl from a dating site would mean serious trouble. If only he had known who she really was.

Security 210
article thumbnail

How to Perform a Content Migration - Your Checklist for Success

AIIM

You’ve made a New Year’s resolution to clean up one of your digital landfills. Congratulations! But where do you start? In this blog post, we present an approach and checklist for migrating your information from one system to another. While the details will differ depending on a number of factors (the systems being migrated from and to, the nature of the information being migrated, etc.), many of the steps in the migration process will be similar.

Metadata 121
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

A study reveals the list of worst passwords of 2019

Security Affairs

Another year is ending and this is the right time to discover which are the worst passwords of 2019 by analyzing data leaked in various data breaches. Independent anonymous researchers, compiled and shared with security firm NordPass a list of 200 most popular passwords that were leaked in data breaches during 2019. The company collected 500 million passwords in total and the results were disconcerting.

Passwords 251
article thumbnail

Wawa Stores: POS Malware Attack Undetected for 8 Months

Data Breach Today

Convenience Store Chain Says Payment Card Data Exposed The Wawa convenience store chain is investigating why malware planted on point-of-sale devices at nearly all of its over 850 locations throughout the East Coast went undetected for nearly eight months.

Sales 236
article thumbnail

Meet Cliff Stoll, the Mad Scientist Who Invented the Art of Hunting Hackers

WIRED Threat Level

Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.

article thumbnail

Immigration and Customs Enforcement Scheduled Approved

National Archives Records Express

On December 11, 2019, the Archivist of the United States approved a request for disposition authority from the U.S. Immigration and Customs Enforcement (ICE) for Detainee Records (schedule DAA-0567-2015-0013). This schedule was originally proposed to NARA on October 26, 2015. NARA published notice of the pending schedule in the Federal Register on July 14, 2017.

FOIA 107
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

More than 267 millions of Facebook user phone numbers exposed online

Security Affairs

Security researcher Bob Diachenko discovered more than 267 million Facebook user IDs, phone numbers and names in an unsecured database. Security expert Bob Diachenko, along with Comparitech, has discovered more than 267 million Facebook user IDs, phone numbers and names in an unsecured database. The huge trove of data is likely the result of an illegal scraping operation or Facebook API abuse by a group of hackers in Vietnam.

Archiving 246
article thumbnail

Fraud Prevention: Keeping Up With Attackers

Data Breach Today

Anthony Cardoza of XTN Cognitive Security on Defensive Measures Fraud prevention is a perpetual cat-and-mouse game as fraudsters develop new tools and uncover new ways to monetize their activities, says Anthony Cardoza of XTN Cognitive Security, who offers defensive insights.

Security 200
article thumbnail

Chrome Will Automatically Scan Your Passwords Against Data Breaches

WIRED Threat Level

Google's Password Checkup feature will be fully integrated into the desktop and mobile versions of Chrome 79.

Passwords 167
article thumbnail

[Podcast] Innovations That Put the “Intelligence” into Intelligent Information Management

AIIM

With the new year just a few weeks away, many have shifted their day-to-day focus to long-term planning and prioritizing their efforts for 2020. For most, it’s likely that the new year will bring with it new technology and innovation. But, with all the developments in technology and changes in process and workflow these days, it can be difficult to translate innovation into real improvements for your organization.

article thumbnail

The GTM Intelligence Era: ZoomInfo 2025 Customer Impact Report

ZoomInfo customers aren’t just selling — they’re winning. Revenue teams using our Go-To-Market Intelligence platform grew pipeline by 32%, increased deal sizes by 40%, and booked 55% more meetings. Download this report to see what 11,000+ customers say about our Go-To-Market Intelligence platform and how it impacts their bottom line. The data speaks for itself!

article thumbnail

TP-Link Archer routers allow remote takeover without passwords

Security Affairs

TP-Link has addressed a critical vulnerability impacting some TP-Link Archer routers that could allow attackers to login without passwords. TP-Link addressed a critical zero-day vulnerability ( CVE-2017-7405 ) in its TP-Link Archer routers that could be exploited by attackers to remotely take their control over LAN via a Telnet connection without authentication. “This is a zero-day flaw that was not previously reported and can affect both home and business environments.” explained

Passwords 246
article thumbnail

Facebook Wins an EU Privacy Ruling

Data Breach Today

Will Dispute Over Sharing European's Data With US Continue? Facebook's sharing of data of European users with the U.S. is legal and provides enough protections, the legal adviser to the EU's top court said on Thursday.

Privacy 195
article thumbnail

Hackers Could Use Smart Displays to Spy on Meetings

WIRED Threat Level

By exploiting flaws in popular video conferencing hardware from DTEN, attackers can monitor audio, capture slides—and take full control of devices.

Security 160
article thumbnail

Launching DXC’s Applied AI Studio

DXC Technology

Self-driving cars, the sharing economy and smart factories are just a few examples of the massive change and extraordinary opportunities that digital technologies can help us create. There’s just one catch—the tools themselves can’t imagine, innovate or self-engineer. That’s up to us. And the current shortage of skilled workers and inspired thinkers is creating a […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

A thief stole hard drives containing Facebook payroll data from a car

Security Affairs

Facebook informed its employees that hard drives containing information about its workers’ payroll were stolen from a car last month. On Friday, Facebook announced that hard drives containing information about its workers’ payroll were stolen from a car last month. According to the company, a thief stole unencrypted hard drives containing banking data belonging to 29,000 Facebook employees.

Security 246
article thumbnail

AI: 'We're Having the Wrong Conversation'

Data Breach Today

Chris Calvert of Respond Software on the Proper Roles for Machines Just by using the term "artificial intelligence," we're already having the wrong conversation about machines and cybersecurity, says Chris Calvert of Respond Software. What conversations should we be having? Calvert discusses the proper balance of humans and machines.

article thumbnail

5G Is More Secure Than 4G and 3G—Except When It’s Not

WIRED Threat Level

The next-generation wireless networks make it harder to track and spoof users, but security holes remain because devices still connect to older networks.

Security 160