article thumbnail

Hive ransomware gang starts leaking data allegedly stolen from Tata Power

Security Affairs

The Hive ransomware gang, which claimed the responsibility for the Tata Power data breach, started leaking data. Now the ransomware gang Hive started leaking the alleged stolen files on its Tor leak site. The main difference between the new variant of the Hive ransomware and old ones is the programming language used by the operators.

article thumbnail

New Hive ransomware variant is written in Rust and use improved encryption method

Security Affairs

Hive ransomware operators have improved their file-encrypting module by migrating to Rust language and adopting a more sophisticated encryption method. The operators of the Hive ransomware upgraded their malware by migrating the malware to the Rust language and implementing a more sophisticated encryption method, Microsoft researchers warn.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly podcast: Australian Cabinet Files, Matt Hancock MP’s app and Monero mining

IT Governance

Unfortunately, however, the BBC reports that there are a few “teething troubles […] with some users saying their privacy has been compromised after responding to an on-screen prompt asking for access to their photo library. The app then still […] accesses the photo library whether the user denies access or not.”. What’s that?

Mining 66
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Some technology trends such as real-time data analytics are on-going, while others are more recent, such as blockchain. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Blockchain, Provenance, and Authentic Information. Introduction.

article thumbnail

Weekly podcast: Browsealoud cryptojacking, Bee Token phishing and Olympic attacks

IT Governance

All of this brings us to this week, when it emerged that thousands of government and public bodies’ websites were unwittingly running cryptomining software after a third-party plug-in’s JavaScript library was compromised. and NHS sites in the UK.

article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 January 2024

IT Governance

LockBit claims responsibility for Capital Health security incident The LockBit ransomware group has claimed responsibility for an attack on Capital Health , a healthcare provider in Pennington, New Jersey, last November. The compromised data allegedly includes names, email addresses and phone numbers. Data breached: 41,500,000 records.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Some technology trends such as real-time data analytics are on-going, while others are more recent, such as blockchain. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways.