Remove Definition Remove Manufacturing Remove Security Remove Tools
article thumbnail

Researchers Quietly Cracked Zeppelin Ransomware Keys

Krebs on Security

Peter is an IT manager for a technology manufacturer that got hit with a Russian ransomware strain called “ Zeppelin ” in May 2020. There are multiple examples of ransomware groups doing just that after security researchers crowed about finding vulnerabilities in their ransomware code. This is not an idle concern.

article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. It has since been confirmed by Anukul Peedkaew, the permanent secretary of social development and human security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The proposed EU Cyber Resilience Act: what it is and how it may impact the supply chain

Data Protection Report

The CRA introduces common cybersecurity rules for manufacturers, developers and distributors of products with digital elements, covering both hardware and software. These security requirements are high level and drafted broadly. The CRA complements the “NIS2 Directive” which is also going through the EU legislative process.

article thumbnail

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Security Affairs

The experts observed the use of NineRAT at around September 2023 against a European manufacturing entity. Lazarus APT is an umbrella for sub-groups, each of them has specific objectives in defense, politics, national security, and research and development. In March, the threat actors hit a South American agricultural organization.

article thumbnail

Siemens Metaverse exposes sensitive corporate data

Security Affairs

While metaverse is no longer a buzzword, amid the sudden popularity of ChatGPT and similar AI tools, those virtual worlds are still here, presenting exciting opportunities for companies, users, and, unfortunately, threat actors. More likely, they’ll plug in an infected USB drive that could eventually even lead to ransomware.

IoT 98
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

alongside Tony Sager , senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. Tony Sager, senior vice president and chief evangelist at the Center for Internet Security. TS: Like a lot of things in security, the economics always win.

Security 209
article thumbnail

Interview With a Crypto Scam Investment Spammer

Krebs on Security

Chaput said whoever was behind the DDoS was definitely not using point-and-click DDoS tools, like a booter or stresser service. ” Chaput says the spam waves have died down since they retrofitted mastodon.social with a CAPTCHA, those squiggly letter and number combinations designed to stymie automated account creation tools.