thehackernews.com – With its latest and last Patch Tuesday for 2019, Microsoft is warning billions of its users of a new Windows zero-day vulnerability that attackers are actively exploiting in the wild in combination w… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1204650880651288576
Lauren Smith
specialcounsel.com – Lauren Smith is the Senior Director of the National Partner Group at Special Counsel, sitting in DC but assisting branches throughout the nation. She focuses on representing individual partners, coun… Tweeted by @SpecialCounsel https://twitter.com/SpecialCounsel/status/1204094612123639810
Anti-Money Laundering Isn’t Working – Salv Hopes To Fix That With Data Sharing And More
artificiallawyer.com – Salv, an anti-money laundering (AML) startup founded by former TransferWise and Skype staff, hopes to address the incredible failure rate to prevent money laundering, with an estimated 98%-plus of do… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1204158618079240192
Managing the Impact of AML Compliance: Technology vs. Human Capital | Corporate Compliance Insights
corporatecomplianceinsights.com – As compliance regulations grow in complexity, organizations will need to both protect their reputation and avoid costly enforcement actions. LexisNexis Risk Solutions’ Leslie Bailey discusses how bes… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1204065427543990279
Soaring ransomware risks require vigilance – Business Insurance
businessinsurance.com – Policyholders are finding there is no simple solution for protecting themselves against ransomware, although there are measures they can take to minimize their chances of becoming a victim. The risk … Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1204114454474039298
The Cost of Doing Business? Winter 2020 eDiscovery Pricing Survey Results
complexdiscovery.com – The eDiscovery Pricing Survey is a non-scientific and non-comprehensive survey designed to provide general insight into eDiscovery pricing as shared by individuals working in the eDiscovery ecosystem. Tweeted by @ComplexD https://twitter.com/ComplexD/status/1204366869664354316
Who is the Audience for an Internal Investigation Report? | LexBlog
lexblog.com – Too often, internal investigators mistakenly conclude that their reports are for the exclusive review of decision-makers. Sometimes, this may be true. However, more often than not, there are two audi… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1203754125365825538
The death of Legal Tech? — Hyperscale Group Limited
hyperscalegroup.com – The last three years has seen a huge surge in the uptake of technology used by law firms and in-house legal teams. More has happened during this period than in the 30 years before. The market has gon…
Detecting unsafe path access patterns with PathAuditor
security.googleblog.com – Posted by Marta Rożek, Google Summer Intern 2019, and Stephen Röttger, Software Engineer #!/bin/sh cat /home/user/foo What can go wrong if this command runs as root? Does it change anything if foo is… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1204040355038892032
google/path-auditor
github.com – The PathAuditor is a tool meant to find file access related vulnerabilities by auditing libc functions. The idea is roughly as follows: We’re using LD_PRELOAD to hook all filesystem related library c… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1204040355038892032
Help you understand HTTP Smuggling in one article
blog.zeddyu.info – 1. TL;NR 2. TimeLine 3. Causes 3.1. HTTP Connection Mod 3.1.1. Keep-Alive 3.1.2. Pipline 3.2. Message Body 3.2.1. Transfer-Encoding 3.3. Background 3.4. Attack Method 3.4.1. Chunks Priority On Conten… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1203965948023042048
6 Tips for Protecting Your Data During a Job Hunt
blog.specialcounsel.com – October is National Cybersecurity Awareness Month, which is the perfect time to think about protecting data in all aspects of your life. One area that many people—including lawyers—may be wary of is … Tweeted by @SpecialCounsel https://twitter.com/SpecialCounsel/status/1203369832156213249
Cyber Security Training in Fairfax | SANS Northern VA – Fairfax 2020
sans.org – Threats approach from every direction and SANS delivers reliable, professional information security training for every member of your organization – leaving no one unprepared. “SANS is the pinnacle o… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1203335975000330241
5 Things All Smart Security Leaders Need to Do Right Now
bankinfosecurity.com – Governance , Managed Security Service Provider (MSSP) I joined Relativity in January 2018, right in the middle of a Chicago blizzard. Maybe it was a symbol of things to come, since the weather in the… Tweeted by @RelativityHQ
How to avoid ransomware attacks: 10 tips – Network Midlands
network-midlands.co.uk – Nigerian princes are no longer the only menaces lurking in an employee’s Inbox. Ransomware attacks – an especially sinister type of malware delivered through spear phishing emails that locks up valua… Tweeted by @networkmidlands https://twitter.com/networkmidlands/status/1203633375619305474
Cyber Security Essentials Training Courses | Bridgend | Swansea | Cardiff
computertrainingwales.co.uk – Price: £175.00 | Duration: 1 Day | Venue: Llynfi Enterprise Centre, Bridgend, CF34 0BQ The threat from cyber criminals is extremely high and systems that are highly vulnerable to attack. The repercus… Tweeted by @cyber_wales https://twitter.com/cyber_wales/status/1203615795818958849
Microsoft Is Using Blockchain to Help Firms Trust AI – CoinDesk
coindesk.com – One of Microsoft’s customers, Icertis, a cloud-based platform for contract management, tried out Blockchain Data Manager “in preview,” prior to the release at Ignite, and built use cases involving et… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1202985623134593031
Merck cyberattack’s $1.3 billion question: Was it an act of war?
inquirer.com – By the time Deb Dellapena arrived for work at Merck & Co.’s 90-acre campus in North Wales, there was a handwritten sign on the door: The computers are down. It was worse than it seemed. Some employee… Tweeted
Tips to Avoid Being Hacked over the Holidays
rsaconference.com – With the holiday season upon us and the end of the year quickly approaching, a sense of urgency is in the air. After all, there’s much to get done—holiday shopping, health benefits renewals, goal set… Tweeted by @SANSInstitute
OUTFIGHT the adversary: Anticipate threats instead of reacting to them – SANS Institute
sans.org – Join us for a series of 3 webinars where we provide you with strategies for outperforming, outmaneuvering and outfighting attackers so you can gain the decisive advantage in the cyber battle. To OUTF… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1202966169923268609