article thumbnail

Security Affairs newsletter Round 463 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

France Travail data breach impacted 43 Million people Scranton School District in Pennsylvania suffered a ransomware attack Lazarus APT group returned to Tornado Cash to launder stolen funds Moldovan citizen sentenced in connection with the E-Root cybercrime marketplace case UK Defence Secretary jet hit by an electronic warfare attack in Poland Cisco (..)

article thumbnail

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

Indian cardholders’ data found for sale on the dark web (7 million) Payroll data compromised after ransomware attack on Town of Ludlow, MA (unknown) Proliance Surgeons notifies patients of payment card breach (unknown) Hezbollah-affiliated financial org, Al-Qard Al-Hassan hacked (unknown). Financial information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Extending intranets to hard-to-reach staff: Controlled documents kiosk example

ChiefTech

The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

article thumbnail

China’s PIPL has finally arrived, and brings helpful clarification (rather than substantial change) to China’s data privacy framework

DLA Piper Privacy Matters

Definition of Personal information and Sensitive Personal information “Personal information” means any kind of information relating to an identified or identifiable natural person, either electronically or otherwise recorded, but excluding information that has been de-identified or anonymised.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Yesterday, we looked back at cases related to discovery about discovery, technology assisted review, form of production disputes, objections to production requests and an interesting dispute between an eDiscovery provider and their former sales people. Wilkinson, Jr. WAIVER OF PRIVILEGE. Holding Funeral Home, Inc.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

You just knew 2022 was going to be The Year of Crypto Grift when two of the world’s most popular antivirus makers — Norton and Avira — kicked things off by installing cryptocurrency mining programs on customer computers. ” The employees who kept things running for RSOCKS, circa 2016.

Passwords 225
article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

Among other news: Lancashire-based Lad Media was wound up , and its director, Keith Hancock, was banned from forming or managing an organisation for four years, after the company was deemed to have violated the PECR (Privacy and Electronic Communications Regulations).