Remove 2015 Remove Examples Remove Insurance Remove Retail
article thumbnail

Key Ring digital wallet exposes data of 14 Million users in data leak

Security Affairs

The images include scans of government-issued IDs, retail club membership and loyalty cards, NRA membership cards, gift cards, credit cards with all details exposed (including CVV), medical insurance cards, medical marijuana ID cards, and more. ” ~ Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

Retail 105
article thumbnail

Rent a hacker: Group-IB uncovers corporate espionage group RedCurl

Security Affairs

Since then, it has conducted 26 targeted attacks on commercial organizations alone, including companies in the fields of construction , finance , consulting , retail , banking , insurance , law ,and travel. For example, the employees would receive the same email about annual bonuses. Pierluigi Paganini.

Cloud 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The blockchain bowling alley: How distributed ledger technology goes mainstream

CGI

A good example is an early use case that included CGI and Ripple , but there are other more recent examples from Southeast Asia to Saudi Arabia. For example, blockchain could revolutionize stock exchanges as shares could change hands within minutes instead of days. Immutability of record.

article thumbnail

The blockchain bowling alley: How distributed ledger technology goes mainstream

CGI

A good example is an early use case that included CGI and Ripple , but there are other more recent examples from Southeast Asia to Saudi Arabia. For example, blockchain could revolutionize stock exchanges as shares could change hands within minutes instead of days. Immutability of record.

article thumbnail

The blockchain bowling alley – how distributed ledger technology goes mainstream

CGI

A good example is an early use case that included CGI and Ripple , but there are other more recent examples from Southeast Asia to Saudi Arabia. For example, blockchain could revolutionize stock exchanges as shares could change hands within minutes instead of days. Immutability of record.

article thumbnail

Group-IB presents its annual report on global threats to stability in cyberspace

Security Affairs

The threat actor mainly targets insurance, consulting, and construction companies. For example, in 2019, Lazarus attacked a nuclear organization in India, which led to the power plant’s second unit being shut down. With the exception of the above-mentioned example, the tools used by these groups remain under the radar.

IT 84