infosecurity-magazine.com – The Tennessee city of Knoxville has been forced to shut down its computer network after falling victim to a ransomware attack. Cyber-criminals mounted their attack on the county seat of Knox County i… Tweeted by @InfosecurityMag https://twitter.com/InfosecurityMag/status/1271482206117146624
Playing Chess Against Nation-State and Ransomware Threat Actors
advisenltd.com – Nation-state and other cyber threat actors are increasingly sophisticated and well-funded, looking to steal intellectual property, cause business disruption, and inflict financial harm upon victims. … Tweeted by @advcyberrisk https://twitter.com/advcyberrisk/status/1271487445805281282
ACEDS Announces New Partnership with Prism Litigation Technology
blog.aceds.org – June 12, 2020– EAGAN, Minn. – The Association of Certified E-Discovery Specialists (ACEDS), the world’s leading e-discovery training and certification professional association and part of The BARBRI … Tweeted by @acedsonline https://twitter.com/acedsonline/status/1271537536289177600
Managing Contract Compliance During the Crisis
corporatecomplianceinsights.com – In just a few months, the concept of “business as usual” has gone out the window. The coronavirus pandemic has much of the world in lockdown, upending day-to-day life and business as we know it. Link… Tweeted by
NIST Looks into the Black Box of Computer and Mobile Phone Forensics
complexdiscovery.com – Editor’s Note: Taken directly from the recent NIST media release highlighting the first large-scale “black box” study to test the accuracy of computer and mobile forensics, the following information … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1270777630728564738
LOSS
advisenltd.com – LOSS INSIGHT provides data on significant accidents, lawsuits, regulatory actions, and events. A complementary suite of analytical tools enables analysis of trends to support decisions on risk evalua… Tweeted by @advcyberrisk https://twitter.com/advcyberrisk/status/1270762690307383296
Stackstrings, type 2
isc.sans.edu – When I teach FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques, one of the things we talk about is stackstrings. This is a technique that is used to ‘hide’ strings from the m… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1270817529196425216
Cyber Risk Summit Virtual Programming
gateway.on24.com – NetDiligence is dedicated to cultivating a community where the cyber industry can come together and better educate themselves and thus, better serve their organizations and end users alike. With supp… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1271064640445915137
e-estonia
e-estonia.com – The e-Estonia Live webinar series is hosted weekly on our e-Estonia Facebook page, where we connect with Estonian state experts and company representatives to discuss current issues and the developme… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1271038797128642560
Estonia Woos Remote Workers With A Digital Nomad Visa
forbes.com – Could you picture yourself living and working in Tallinn, Estonia? The country just announced it … [+] will offer a digital nomad visa for folks who can work from anywhere. Getty Can you work from … Tweeted by
[Webinar] 2020 Data Discovery Legal Mid-Year Update – June 23rd, 12:00 pm – 1:00 pm ET | JD Supra
jdsupra.com – Prior to her judicial service, Judge Fischer began her legal career as a legal editor at Callaghan & Company. She became the first female associate at Meyer Darragh Buckler Bebenek & Eck, an insuranc… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1270409392555528193
What Not to Do When You’re Trying to Motivate Your Team
hbr.org – When I speak to large groups about leadership, one question I often ask is, “How many of you have ever received a compliment from your boss that actually offended you?” Without exception, more than t… Tweeted by @ComplexD
Cmd Hijack – a command/argument confusion with path traversal in cmd.exe
hackingiscool.pl – This one is about an interesting behavior 🤭 I identified in cmd.exe in result of many weeks of intermittent (private time, every now and then) research in pursuit of some new OS Command Injection at… Tweeted by @TheHackersNews
Security Drift – The Silent Killer
thehackernews.com – Global spending on cybersecurity products and services is predicted to exceed $1 trillion during the period of five years, between 2017 to 2021, with different analysts predicting the Compound Annual… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1270649474306707457
KrattAI: Estonia’s National Artificial Intelligence Strategy
interestingengineering.com – “Organizations which design systems are constrained to produce designs which are copies of the communication of these organizations.” -Melvin E. Conway, Computer Scientist, Conway’s Law, 1967 In Esto… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1270122553114312704
Magecart Targets Emergency Services-related Sites via Insecure S3 Buckets
thehackernews.com – Hacking groups are continuing to leverage misconfigured AWS S3 data storage buckets to insert malicious code into websites in an attempt to swipe credit card information and carry out malvertising ca… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1270252807271088132
Press Release |ILTA Announces Update to ILTACON Meeting
iltanet.org – For Immediate Release: (Chicago, IL): June 8, 2020: The International Legal Technology Association (ILTA) announces that the in-person ILTACON 2020 meeting will become a fully-virtual conference: ILT… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1270086313786642434
Address Emerging Risk: Best Practices and AI Considerations
advisenltd.com – Thursday, June 11, 2020 at 11 AM ET The changing digital landscape, and evolving regulations such as global privacy laws, have created a number factors that contribute to the growing risk ecosystem. … Tweeted by @advcyberrisk https://twitter.com/advcyberrisk/status/1270037894061793280
The 2020 IDG Cloud Computing Survey
infoworld.com – Not long ago, if you were a business stakeholder or IT manager, you had to work hard to explain exactly why you would opt for applications or infrastructure in the public cloud. Today, in many organi… Tweeted by
Is a ‘Cyber Pandemic’ Coming?
govtech.com – For more than a decade, security leaders predicted that a “Cyber Pearl Harbor” or “Cyber 9/11” was coming that would dramatically change society as we know it. For example, back in 2013, Secretary of… Tweeted by @bamitav https://twitter.com/bamitav/status/1269679140602429440