article thumbnail

Accused ‘Raccoon’ Malware Developer Fled Ukraine After Russian Invasion

Krebs on Security

A 26-year-old Ukrainian man is awaiting extradition from The Netherlands to the United States on charges that he acted as a core developer for Raccoon , a popular “malware-as-a-service” offering that helped paying customers steal passwords and financial data from millions of cybercrime victims. The Raccoon v.

Military 288
article thumbnail

Chinese actor ‘Unfading Sea Haze’ remained undetected for five years

Security Affairs

A previously unknown China-linked threat actor dubbed ‘Unfading Sea Haze’ has been targeting military and government entities since 2018. Bitdefender researchers discovered a previously unknown China-linked threat actor dubbed ‘Unfading Sea Haze’ that has been targeting military and government entities since 2018.

92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Connecticut Tightens its Data Breach Notification Laws

Data Protection Report

credit or debit card number, or any financial account number in combination with any required security code, access code or password that would permit access to such financial account. 60-Day Notification Window.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

Internal Revenue Service website for months: Anyone seeking to create an account to view their tax records online would soon be required to provide biometric data to a private company in Virginia — ID.me. Super Bowl Sunday watchers are treated to no fewer than a half-dozen commercials for cryptocurrency investing. ” SEPTEMBER.

Passwords 229
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Because discretionary access control policies share this transitive characteristic and also are particularly vulnerable to Trojan horse attacks, these policies should be limited to contexts with non-sensitive data or among a trusted subset of users. Mandatory Access Control. Role-Based Access Control. Authentication and Lifecycle Management.