article thumbnail

Biopharmaceutical firm Supernus Pharmaceuticals hit by Hive ransomware during an ongoing acquisition

Security Affairs

Biopharmaceutical company Supernus Pharmaceuticals discloses a ransomware attack, the Hive ransomware claims to have stolen company data. Biopharmaceutical company Supernus Pharmaceuticals confirmed it was the victim of a data breach after a ransomware attack that hit the firm last in Mid-November. “Supernus Pharmaceuticals, Inc.

article thumbnail

New Cybersecurity Directives (NIS2 and CER) Enter into Force

Hunton Privacy

However, the concept of an “essential entity” is much broader and will also capture many organizations that have, to-date, not been subject to the NIS regime—for example, pharmaceutical companies and operators of hydrogen production, storage and transmission. Reporting of incidents.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Connecting the Bots – Hancitor fuels Cuba Ransomware Operations

Security Affairs

An example of spam email content Clicking the malicious link obviously leads to downloading a weaponized document. As always, the document contains instructions on how to remove “protection”: Figure 2. Files are encrypted using ChaCha20 with 12-bytes length IV. The keys are encrypted with RSA-4096 algorithm.

article thumbnail

Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry

Security Affairs

The APT group targeted organizations in various industries, including the aviation, gaming, pharmaceuticals, technology, telecoms, and software development industries. Experts noticed that modules are stored encrypted on disk at the same location with inoffensive-looking names. ” continues the report.

article thumbnail

The Value of Data Governance and How to Quantify It

erwin

For example, one global pharmaceutical giant reduced cost by 70 percent and generated 95 percent of production code with “zero touch.” Identify regulatory risks and guide the fortification of network and encryption security standards and policies by understanding where all personally identifiable information is stored, processed and used.

article thumbnail

Understanding Blockchain and its Impact on Legal Technology, Part Two

eDiscovery Daily

Areas such as financial services, technology, manufacturing, pharmaceutical, and energy industries all needed systems with these two factors. Or think of it as a document in Google Docs that is being seen by multiple people simultaneously. How Blockchain Works.

article thumbnail

List of Data Breaches and Cyber Attacks in April 2023 – 4.3 Million Records Breached

IT Governance

More worryingly, the same database contained usernames, email addresses and encrypted passwords. The crooks were able to download nightly backups of the complete database, which contained all public forum posts, team forum posts and direct messages.