Remove 10
article thumbnail

Lenovo Solution Centre flaw allows hacking Windows laptop in 10 minutes

Security Affairs

The task created by the LSC runs the LSC.Services.UpdateStatusService.exe binary 10 minutes after a login event. The binary executed by the scheduled task overwrites the DACL of the Lenovo product’s logs folder, giving everyone in the Authenticated Users usergroup full read/write access to them. Pierluigi Paganini.

article thumbnail

Cruise line operator Carnival Corporation suffers a ransomware attack

Security Affairs

Carnival Corporation & plc is a British-American cruise operator, currently the world’s largest travel leisure company, with a combined fleet of over 100 vessels across 10 cruise line brands. x base score of 10. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using a WordPress flaw to leverage Zerologon vulnerability and attack companies’ Domain Controllers

Security Affairs

million sites, and by today, September 10, 2020, the total number of sites attacked has increased to over 2.6 Note that the entire malicious chain was automated by the threat author – “September 10, 2020, the total number of sites attacked has increased to over 2.6 Figure 10: Zerologon flaw ([link]. million, WordFence said.

article thumbnail

Consumers have their Say about Protection of Personal Data – Call for More Stringent Controls

Thales Cloud Protection & Licensing

Tue, 10/11/2022 - 06:46. In addition to a multibillion dollar fine, and a drop in share value of $100 billion, the incident tarnished the reputation of the company and a Pew Research Center 2 study revealed that a quarter of Americans surveyed quit the service four years ago when the event occurred. Governments need to take action.

article thumbnail

Ohio Adopts National Association of Insurance Commissioners’ (NAIC) Insurance Data Security Model Law

Data Matters

See CT Gen Stat § 38a-999b (2015) ; 23 NYCRR 500. (For The Act is designed to “establish standards for data security and for the investigation and notification to the Superintendent of Insurance of a cybersecurity event.”. For more information on South Carolina’s adoption of the Model Law, see our prior coverage.) .

article thumbnail

Michigan Adopts National Association of Insurance Commissioners’ (NAIC) Insurance Data Security Model Law

Data Matters

S ee CT Gen Stat § 38a-999b (2015) ; 23 NYCRR 500. Michigan’s Act, which adds chapter 5A to Michigan’s Insurance Code, seeks to establish “the exclusive standards applicable to licensees for data security, the investigation of a cybersecurity event” and certain regulatory notifications. MCL § 500.550. MCL § 500.561.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. The NIS Directive was enacted in the UK as the NIS Regulations on 10 May. Hello and welcome to the final IT Governance podcast of 2018.