article thumbnail

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Security Affairs

Talos believes that NineRAT was built around May 2022, but was first spotted on March 2023 as part of Operation Blacksmith. The experts observed the use of NineRAT at around September 2023 against a European manufacturing entity. In March, the threat actors hit a South American agricultural organization.

article thumbnail

Big California Privacy News: Legislative and Enforcement Updates

Data Matters

As a provider subject to CMIA, mental health apps would be subject to HIPAA-like constraints on their ability to use and share data collected and will have increased litigation exposure, as CMIA includes a private right of action. If this bill becomes law, it will be effective beginning January 1, 2023.

Privacy 197
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sustainability trends: 5 issues to watch in 2024

IBM Big Data Hub

Industry 4.0 : Manufacturers are integrating new technologies, including Internet of Things (IoT) , cloud computing and AI and machine learning, into their production facilities and throughout their operations. Join the IBM Sustainability Community 1 Green transition creates $10.3T

article thumbnail

What will 2023 bring in the realms of cybersecurity and privacy?

Thales Cloud Protection & Licensing

What will 2023 bring in the realms of cybersecurity and privacy? Thu, 01/05/2023 - 05:52. What will 2023 bring in the realms of cybersecurity and privacy? I predict that in 2023, there will be a major security breach that can be traced back to inefficient management of redundancies. Data sovereignty hits the road.

Privacy 87
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

VAMOSI: That’s on the data collection side. You know, you've read the cybersecurity strategy that's just come out where security is being pushed onto the manufacturer. Get those and then come talk to me that so rather than strict, strict control language, I think it's gonna be more of a capability model.

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 April 2024

IT Governance

Known data breached Discord (via Spy.pet) Source (New) IT services USA Yes 4,186,879,104 Baidu, Inc., Source (New) Finance USA Yes 1,955,385 BerryDunn and Reliable Networks Source (New) Finance and IT services USA Yes 1,107,354 VISAV Limited Source (New) IT services UK Yes >1,000,000 Designed Receivable Solutions, Inc.

article thumbnail

Why Your Wi-Fi Router Doubles as an Apple AirTag

Krebs on Security

student Erik Rye found they could mostly avoid requesting unallocated BSSIDs by consulting the list of BSSID ranges assigned to specific device manufacturers. Rye said Apple’s response addressed the most depressing aspect of their research: That there was previously no way for anyone to opt out of this data collection.