article thumbnail

Lazarus malware delivered to South Korean users via supply chain attacks

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. that is requested to visit particular government and banking domains.

article thumbnail

Netsparker Product Review

eSecurity Planet

Netsparker was launched in 2009 to alleviate frustrations around manual vulnerability verification processes. Government: South Dakota Bureau of Information & Telecommunications. Financial Services: ING. About Netsparker. Compliance reports Yes Yes Yes. Netsparker case studies. Healthcare: Wellcome Sanger Institute.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

White House Releases Cybersecurity Legislative Proposal

Hunton Privacy

Cybersecurity Information Sharing – This section would create a system intended to encourage, incentivize and protect the voluntary sharing of cyber incident and cybersecurity information between federal, state and local governments and private industry.

article thumbnail

Observations on the Cybersecurity Executive Order and Presidential Policy Directive

Hunton Privacy

On May 29, 2009, the President promised to avoid security regulations even though he acknowledged that “the vast majority of our critical information infrastructure in the United States is owned and operated by the private sector.” by passing legislation to give our government a greater capacity to secure our networks and deter attacks.”

article thumbnail

LinkedIn to IPO in 2010? Facebook to Find a Business Model? | ZDNet

Collaboration 2.0

Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. By Oliver Marks | December 29, 2009, 12:36pm PST Summary Despite the claims from LinkedIn that an IPO isn’t imminent, I wouldn’t be surprised to see that happen in 2010. Hot Topics iPhone iPad Enterprise 2.0

Paper 51
article thumbnail

Zero Trust: Can It Be Implemented Outside the Cloud?

eSecurity Planet

government and others, we are still no closer to seeing zero trust architecture widely adopted. The only exception, it seems, has been cloud service providers, who boast an enviable record when it comes to cybersecurity, thanks to rigorous security practices like Google’s continuous patching. The document can be found here.

Cloud 91
article thumbnail

Best Network Security Tools 2021

eSecurity Planet

Kaspersky has been dogged by ties to the Russian government to the point we felt obligated to inform readers of the best alternatives to Kaspersky. Since 2009, Okta has been a thought leader in the access, authentication, and authorization space. Read more about this solution in our Microsoft Cloud App Security (MCAS) review.