Remove Document Remove Encryption Remove Healthcare Remove Security
article thumbnail

Biopharmaceutical firm Supernus Pharmaceuticals hit by Hive ransomware during an ongoing acquisition

Security Affairs

Biopharmaceutical company Supernus Pharmaceuticals discloses a ransomware attack, the Hive ransomware claims to have stolen company data. Biopharmaceutical company Supernus Pharmaceuticals confirmed it was the victim of a data breach after a ransomware attack that hit the firm last in Mid-November. “Supernus Pharmaceuticals, Inc.

article thumbnail

New Cybersecurity Directives (NIS2 and CER) Enter into Force

Hunton Privacy

However, the concept of an “essential entity” is much broader and will also capture many organizations that have, to-date, not been subject to the NIS regime—for example, pharmaceutical companies and operators of hydrogen production, storage and transmission. Reporting of incidents. Enforcement.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Connecting the Bots – Hancitor fuels Cuba Ransomware Operations

Security Affairs

An example of spam email content Clicking the malicious link obviously leads to downloading a weaponized document. As always, the document contains instructions on how to remove “protection”: Figure 2. Files are encrypted using ChaCha20 with 12-bytes length IV. The keys are encrypted with RSA-4096 algorithm.

article thumbnail

Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry

Security Affairs

The APT group targeted organizations in various industries, including the aviation, gaming, pharmaceuticals, technology, telecoms, and software development industries. Experts noticed that modules are stored encrypted on disk at the same location with inoffensive-looking names. ” continues the report. Pierluigi Paganini.

article thumbnail

The Value of Data Governance and How to Quantify It

erwin

For example, one global pharmaceutical giant reduced cost by 70 percent and generated 95 percent of production code with “zero touch.” Strengthen data security. Greater agility and faster time to value in data preparation, deployment and governance. Cross-platform support of scripting languages and data movement technologies.

article thumbnail

List of Data Breaches and Cyber Attacks in April 2023 – 4.3 Million Records Breached

IT Governance

Meanwhile, if you enjoy this sort of cyber security news, be sure to subscribe to our Weekly Round-up to receive the latest stories straight to your inbox. In a statement, Shields said that it “takes the confidentiality, privacy, and security of information in our care seriously. Biggest data breaches of April 2023 1.

article thumbnail

Article 29 Working Party Issues Guidance on European Patients Smart Open Services

Hunton Privacy

On January 25, 2012, the Article 29 Working Party (the “Working Party”) issued a Working Document providing guidance on data protection issues relating to the European Patients Smart Open Services (“epSOS”) project. View a copy of the Working Document.