informationsecuritybuzz.com – We don’t know if the employee who clicked the bad link (or links) was on the security team or if they were in another function such as sales, marketing or operations. If they were not on the security…
Trump orders Chinese owner of TikTok to sell US assets within 90 days
marketwatch.com – President Donald Trump on Friday gave the Chinese company ByteDance 90 days to divest itself of any assets used to support the popular TikTok app in the United States. Trump’s executive order said th… Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1294870363587960832
AI at Work Still a Work in Progress
reworked.co – The robots are coming. You just might not see them. The use of artificial intelligence and machine learning at work continues to grow, with a majority of organizations expecting it to play a major ro… Tweeted by @ComplexD
alexandreborges/malwoverview
github.com – Malwoverview.py is a simple tool to perform an initial and quick triage of malware samples, URLs and hashes. Additionally, Malwoverview is able to show some threat intelligence information. Determine… Tweeted by @ale_sp_brazil https://twitter.com/ale_sp_brazil/status/1294934013820522497
Local attackers can use Group Policy flaw to take over enterprise Windows systems
csoonline.com – Microsoft fixed 129 vulnerabilities today across its entire range of software products, from Windows and Office to Visual Studio, Azure DevOps and Microsoft Apps for Android. Eleven of those flaws ar… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1294377167032332288
Casualty Currents: Hard Market of Last Resort: E&S Update
ev2.perigonlive.com – Business often flows from the standard market to non-admitted carriers during a hard market. This session will examine growth and profitability trends in the E&S market, describe the characteristics … Tweeted by @advcyberrisk https://twitter.com/advcyberrisk/status/1294317901701414913
Aero UI is Coming. Here’s What to Expect.
relativity.com – We’ve been talking about it for months, and it’s finally here. Aero UI begins rolling out on August 15, and we can’t wait for you to see it. Purpose built to meet the needs of the entire Relativity
Adapting Negotiations to a Remote World
hbr.org – CURT NICKISCH: Welcome to the HBR IdeaCast from Harvard Business Review. I’m Curt Nickisch. Many people get flustered when they negotiate. Total pros who are great at their jobs sit down across from … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1294612340994904066
Security Awareness Training – Keys to Delivering a Successful Program
securitymagazine.com – Security awareness training is no longer a “nice-to-have” for organizations. End users have become a critical component of effective security postures. Employees must have a strong understanding of c… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1294605000920846338
How to (Actually) Change Someone’s Mind
hbr.org – If you’re a leader, it’s likely that not everyone who works with you will agree with the decisions you make — and that’s okay. Leadership involves making unpopular decisions while navigating complex … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1293913996060311560
KLDiscovery Inc. Announces Second Quarter Financial Results
kldiscovery.com – McLEAN, Va. — (BUSINESS WIRE)– KLDiscovery Inc. (“KLDiscovery” or the “Company”), a leading global provider of electronic discovery, information governance and data recovery services, announced tod… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1293976841682853890
Cost of US Cyber Command Program Quintuples
infosecurity-magazine.com – A new cyber weapon system being created by the United States Air Force will cost over five times more than originally estimated, according to a government watchdog. The United Platform program was in… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1293927624553705476
Million Dollar Laptop: HIPAA, Encryption, and Mobile Devices | JD Supra
jdsupra.com – The United States Department of Health and Human Services (HHS) has closed an investigation into a Rhode Island health system stemming from a 2017 breach. Briefly summarized, Lifespan Health System A… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1294242444326907912
Healthcare Industry Sees Respite From Attacks in First Half of 2020
darkreading.com – The number of breaches disclosed by healthcare companies to the US government declined slightly in the first half of the year compared with the latter half of 2019, according to a new analysis of the… Tweeted by @pmenonkp
‘A Growth Industry Like I’ve Never Seen’: Inside America’s No. 1 Fastest-Growing Company
inc.com – “There’s a lot that goes on behind the cookie banner,” says Kabir Barday, the founder and CEO of OneTrust. He’s talking about that now-ubiquitous pop-up on websites that lets you know the site is col… Tweeted by @ComplexD
Threat actors join in the race towards a coronavirus vaccine
blog.checkpoint.com – It seems that Covid-19 is here to stay, at least in the foreseeable future, and for many, a vaccine is the only hope for everyone being able to return to what we once knew as normal . This
ScamNation: Monetizing the Pandemic Through Partisan Content Farms and Subscription Traps | RiskIQ
riskiq.com – During major global events, threat actors take advantage of charged political environments and a prevailing overload of information to help lend credence to the delivery mechanisms they use to carry … Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1293628388947587074
New Attack Lets Hackers Decrypt VoLTE Encryption to Spy on Phone Calls
thehackernews.com – “The keystream reuse occurs when the target and keystream call use the same user-plane encryption key. As this key is updated for every new radio connection, the attacker must ensure that the first p… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1293899871473283076
A New Model for Cybersecurity? NIST Details Framework for Zero Trust Architecture
complexdiscovery.com – A short percentage-based assessment of the qualitative benefit of the recent post sharing NIST’s new special publication on Zero Trust Architecture. Editor’s Note: According to the recently published… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1293898747265589248
Google Chrome Bug Could Let Hackers Bypass CSP Protection; Update Web Browsers
thehackernews.com – If you haven’t recently updated your Chrome, Opera, or Edge web browser to the latest available version, it would be an excellent idea to do so as quickly as possible. Cybersecurity researchers on Mo… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1293192856719339520