article thumbnail

Chronicle experts spotted a Linux variant of the Winnti backdoor

Security Affairs

Chronicle researchers while investigating the cyber attack that hit the Bayer pharmaceutical company in April. “In April 2019, reports emerged of an intrusion involving Winnti malware at a German Pharmaceutical company.” At the time the malware was used in the hack of a Vietnamese gaming company.

article thumbnail

IG: The Whole Is More Than the Sum of Its Parts

Positively RIM

Attorneys may consider an “archive” to be the reference library of legal matters or cases. Within a single entity, it may be called Case/Matter Management, Cybersecurity, Records Management or Data Optimization. The team managing an IG implementation will be most effective when the members use vocabulary appropriately for each group.

IT 40
article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Macorin: My name is Justin Macorin cybersecurity research. My current role is CEO of a cybersecurity firm out of Toronto called Satkhira Secure. But overall I think that having a multi layered approach to cybersecurity is really the only way to really secure ourselves, because no one layer is going to do it.