article thumbnail

REvil ransomware gang recommends that Apple buy back its data stolen in Quanta hack

Security Affairs

REvil ransomware gang is attempting to extort Apple ahead of the Apple Spring Loaded event threatening to sell stolen blueprints belonging to the IT giant that were stolen from Quanta Computer. Quanta Computer is a Taiwan-based manufacturer of notebook computers and other electronic hardware.

article thumbnail

Delaware County, Pennsylvania, opted to pay 500K ransom to DoppelPaymer gang

Security Affairs

. “The County of Delaware recently discovered a disruption to portions of its computer network. We commenced an immediate investigation that included taking certain systems offline and working with computer forensic specialists to determine the nature and scope of the event. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Global Data Breaches and Cyber Attacks in April 2024 – 5,336,840,757 Records Breached

IT Governance

The number of records breached this month was high – particularly compared to March – largely due to two outlier events: Spy.pet, a data scraping website, offering 4,186,879,104 Discord messages for sale. We discuss both events in more detail below. Critical vulnerabilities in 9 pinyin keyboard apps, affecting up to 1 billion users.

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. Transferring files electronically is what encryption is for.

article thumbnail

5 things to know: IBM Cloud’s mission to accelerate innovation for clients

IBM Big Data Hub

We continue to make key updates to our cloud infrastructure to drive progress that has resulted in improvements to cloud stability and resiliency, including an 87% year-over-year reduction in Severity 1 Customer Impacting Events (CIEs) and a 38% decrease in Severity 1 CIE disruption time for the same compared periods in 2022 versus 2021.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. O’Neill now heads the agency’s Global Investigative Operations Center , which supports investigations into transnational organized criminal groups.

article thumbnail

How should you investigate a data breach?

IT Governance

Digital Guardian recently asked a group of cyber security experts what the most important step is following a data breach. This might be, for example,the victim’s computer, a web page or a physical space in which documents were compromised. Several answered with some variation of ‘find out how it happened’. The crime scene.