article thumbnail

U.S., U.K. Sanction 7 Men Tied to Trickbot Hacking Group

Krebs on Security

.” According to a 2016 story from Forbes.ru , Botnet’s opening scene was to depict the plight of Christina Svechinskaya , a Russian student arrested by FBI agents in September 2010. Christina Svechinskaya, a money mule hired by Bentley who was arrested by the FBI in 2010. This is not the U.S.

article thumbnail

Experts linked ransomware attacks to China-linked APT27

Security Affairs

The APT group has been active since 2010, targeted organizations worldwide, including U.S. defense contractors , financial services firms, and a national data center in Central Asia. If APT27 focuses on cyberespionage, Winnti is known for its financial motivation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

In the past two years, multiple state bills that have been introduced in the US to provide for cybersecurity requirements and standards to the insurance sector, with recent legislative activity taking place in particular within the States of Ohio, South Carolina, and Michigan. NYDFS: Setting a new bar for state cybersecurity regulation.

article thumbnail

FTC Seeks Comment on Proposed Changes to its GLBA Safeguards and Privacy Rules

Data Matters

Of particular note, the Safeguards Rule NPRM proposes to align the FTC’s requirements with those of the New York Department of Financial Services (“NYDFS”), as found in its cybersecurity regulations, and the National Association of Insurance Commissioners (“NAIC”), as found in its insurance data security model law.

Privacy 68
article thumbnail

Emissary Panda APT group hit Government Organizations in the Middle East

Security Affairs

The Emissary Panda APT group has been active since 2010, targeted organizations worldwide, including U.S. defense contractors , financial services firms, and a national data center in Central Asia. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

article thumbnail

FTC Seeks Comment on Proposed Changes to GLBA Implementing Rules

HL Chronicle of Data Protection

The proposed Rule will also require multi-factor authentication for any individual accessing customer information, but, unlike the NYDFS which imposed a similar requirement in the Cybersecurity Regulation, the FTC declined to endorse text messages as a permitted second factor.

Privacy 40
article thumbnail

Nation-state actors target critical sectors by exploiting the CVE-2021-40539 flaw

Security Affairs

Cybersecurity experts from Palo Alto Networks warn of an ongoing cyberespionage campaign that has already compromised at least nine organizations worldwide from critical sectors, including defense, healthcare, and energy. The APT group has been active since 2010, targeted organizations worldwide, including U.S.