article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. “Shevlyakov also attempted to acquire computer hacking tools.” ” reads a press release published by DoJ.

article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded? That brings the total for 2020 to more than 20 billion. The post List of data breaches and cyber attacks in December 2020 – 148 million records breached appeared first on IT Governance UK Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in May 2020 – 8.8 billion records breached

IT Governance

in fraud over the sale of a Constable painting (1). Advanced Computer Software Group exposed data of 190 law firms (10,000). Tesla has been getting rid of computers without wiping the hard drives (unknown). Ontario’s Middlesex London Health Unit abandoned electronics after moving premises (unknown). Hackers steal £2.4m

article thumbnail

Citizen of Croatia charged with running the Monopoly Market drug marketplace

Security Affairs

Desnica was personally involved in the review and approval of the sale of narcotics through his marketplace. “In December 2021, in coordination with foreign law enforcement partners in Germany and Finland, the computer server hosting Monopoly was seized and taken offline.” ” reads the press release published by DoJ.

article thumbnail

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Krebs on Security

But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing. Yes, they successfully encrypted the data.

MDM 357
article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups. In 2020, Grichishkin was arrested outside of Russia on a warrant for providing bulletproof hosting services to cybercriminal gangs.

article thumbnail

Debut of the Texas State Records Retention Schedule (RRS): 5th Edition – 5/10/2020

The Texas Record

On May 10, 2020 , the newest and fifth-est edition of the Texas State Records Retention Schedule (RRS) will go live! 2.1.001 Processing Files These types of records should be classified under Master Files and Application Data (2.1.002) and Computer Software Programs (2.1.007), as applicable. The amendments to 13 TAC §6.10(a)