thehackernews.com – A new Microsoft Exchange Autodiscover bug exposes the credentials of nearly 100,000 Windows domain accounts. Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1441092417629741057
Walking Before Running? Debiasing and the Regulation of Artificial Intelligence
complexdiscovery.com – “Debiasing locates the problems and solutions in algorithmic inputs and outputs, shifting political problems into the domain of design, dominated by commercial actors.” (Agathe Balayn and Dr Seda Gür… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1441004859898179591
PREX 2021
aceds.org – Join ACEDS at PREX 2021, a conference driving e-discovery innovation by our partner Zapproved. Earn CLE credit and participate in breakout sessions curated to deliver actionable strategies. Attend th… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1440766879916695554
Automation is not here to close the cybersecurity skills shortage gap, but it can help
helpnetsecurity.com – In this interview with Help Net Security, Daniel Claytonfrom Bitdefender, talks about the cybersecurity skills shortage gap. Tweeted by @helpnetsecurity https://twitter.com/helpnetsecurity/status/1440986868141674501
U.S. Department of the Treasury announces set of actions to counter ransomware
helpnetsecurity.com – As part of the whole-of-government effort to counter ransomware, the U.S. Department of the Treasury announced a set of actions. Tweeted by @CeptBiro https://twitter.com/CeptBiro/status/1441021719595061251
Protecting IoT devices requires a DNS-based solution
helpnetsecurity.com – Whilst IoT devices will always have vulnerabilities, by using DNS technology, businesses can be confident they are protecting their data. Tweeted by @01_security_01 https://twitter.com/01_security_01/status/1440976473855299584
High Five? HaystackID™ Earns SOC 2 Type II Attestation in Five Trust Service Areas
complexdiscovery.com – HaystackID announced it has successfully received Service Organization Control for Service Organizations (SOC 2) Type II attestation in all five trust service areas. Tweeted by @ComplexD https://twitter.com/ComplexD/status/1440656480663851020
OneTrust to Acquire Tugboat Logic Security Assurance and Certification Automation Platform
prnewswire.com – /PRNewswire/ — OneTrust, the category-defining enterprise platform to operationalize trust, today announced it signed a definitive agreement to acquire… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1440318053284077573
High-Severity RCE Flaw Disclosed in Several Netgear Router Models
thehackernews.com – A critical RCE vulnerability has been found in several Netgear router models Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1440520728349011977
The Future of Cybersecurity Education
webinars.securityboulevard.com – Join our panel of cybersecurity experts as they explore how we train and equip the cybersecurity workforce of today and the future. Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1440349329605074957
Unpatched High-Severity Vulnerability Affects Apple macOS Computers
thehackernews.com – An UNPATCHED high-severity vulnerability has been disclosed in macOS Finder on Apple machines running macOS Big Sur and earlier versions. Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1440357559576137734
You’ve trained at the cutting edge, here’s how to keep your DFIR skills razor sharp
theregister.com – Sometimes the most important tool is a bookmark Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1440235179730034692
Obfuscating Malicious, Macro-Enabled Word Docs
depthsecurity.com – Using multiple layers of obfuscation techniques in a VBA Macro in a word document to ultimately receive a shell on a target computer. Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1439962552151285762
Unauthenticated Remote Code Execution in Motorola Baby Monitors
randywestergren.com – When my wife and I were expecting our first child, a good baby monitor was one of the top items on our shopping list. Most of the available options of course now include Wi-Fi, a mobile app, and
Available Position: Senior Product Manager – Platform (remote) | Relativity
relativity.com – Relativity strives to be a great Chicago-based software company & we need awesome people to help. View the available positions for more details. Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1439545028225945601
What’s Hiding in That Massive, Unstructured Data Set?
relativity.com – Unstructured data brings with it a myriad of unknowns. Without good data governance or classification, it is almost impossible to know what your company is holding onto data-wise. Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1439223950509318148
Load Only the Projects You Need with Solution Filters
site.wmk-tech.net – WMK-TECH Tweeted by @machine_ml https://twitter.com/machine_ml/status/1439490348192079873
VPN Software Solutions For Business | Speed & Secure
onpassive.com – Create the best and fastest VPN, secure VPN online services for your business through O-Virtual. Easy to use this private internet access for all devices like Android, Mac, IOS, etc. Tweeted by @ONPASSIVE https://twitter.com/ONPASSIVE/status/1439567471988592640
Top 10 Affordable Countries to Study Data Science
analyticsinsight.net – In this data driven world, the need for data scientist has increased you are passionate toward data science then check this article out to know more about the top 10 affordable countries to study sci… Tweeted by @BigData_Fr
Connect, Contest, and Challenge: Counter-Marketing and Social Media
complexdiscovery.com – Three techniques that can be used to help organize social media counter-marketing efforts include connecting, contesting, and challenging competitors in the social media field of play. Tweeted by @ComplexD https://twitter.com/ComplexD/status/1438502824761970690