Mon.Apr 19, 2021

Payment Card Theft Ring Tech Leader Gets 10-Year Sentence

Data Breach Today

Fedir Hladyr of Ukraine Admitted to Working as System Admin for FIN7 A Ukrainian national who admitted to working as a system administrator and IT manager for the notorious FIN7 cybercriminal gang, which has been involved in the theft of millions of payment cards, has been sentenced to 10 years in federal prison.

XCSSET malware now targets macOS 11 and M1-based Macs

Security Affairs

XCSSET, a Mac malware targeting Xcode developers, was now re-engineered and employed in a campaign aimed at Apple’s new M1 chips.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Payment Card Theft Ring Tech Leader Sentenced to 10 Years

Data Breach Today

Fedir Hladyr of Ukraine Admitted to Working as System Admin for FIN7 A Ukrainian national who admitted to working as a system administrator and IT manager for the notorious FIN7 cybercriminal gang, which has been involved in the theft of millions of payment cards, has been sentenced to 10 years in federal prison.

SolarWinds: A Catalyst for Change & a Cry for Collaboration

Dark Reading

Cybersecurity is more than technology or safeguards like zero trust; mostly, it's about collaboration

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

White House 'Stands Down' SolarWinds, Exchange Response Groups

Data Breach Today

Unified Coordination Groups Were Created to Respond to Cybersecurity Incidents The White House announced Monday that it is "standing down" two Unified Coordination Groups that were created to coordinate the federal response to the SolarWinds supply chain attack and attacks on vulnerable on-premises Microsoft Exchange email servers.

More Trending

What Are the Reasons Behind Health Data Breach Surge?

Data Breach Today

Ransomware Attacks, Vendor Breaches Continue as Leading Causes About 70 major health data breaches have been added to the federal tally in the last four weeks as ransomware attacks have persisted and breaches at vendors have affected clients

Nitroransomware demands gift codes as ransom payments

Security Affairs

A new ransomware dubbed ‘NitroRansomware’ has appeared in the threat landscape, it demands a Discord Nitro gift code to decrypt files.

ATM Attacks: Terminal Fraud Dives in Europe During Pandemic

Data Breach Today

Malware Attacks and Losses Due to Explosives Increased, While Skimming Plummeted Criminals continue to target ATMs with black boxes to run cash-out attacks and use explosives to get cash out of machines.

Sales 176

Crooks made more than $560K with a simple clipboard hijacker

Security Affairs

Avast researchers analyzed the activity of a simple cryptocurrency malware dubbed HackBoss that allowed its operators to earn over $560K.

Insights on Choosing an Identity Verification Solution Provider

Sort through today’s crowded identity verification solutions landscape with our guide, designed to help you choose the right provider based on your unique needs.

Going Beyond HIPAA to Protect Health Data Privacy

Data Breach Today

A proposed privacy framework from the eHealth Initiative & Foundation and the Center for Democracy and Technology aims to set standards for the collection, disclosure and use of health data that falls outside the protection of HIPAA, says attorney Andrew Crawford of CDT

Details on the Unlocking of the San Bernardino Terrorist’s iPhone

Schneier on Security

The Washington Post has published a long story on the unlocking of the San Bernardino Terrorist’s iPhone 5C in 2016. We all thought it was an Israeli company called Cellebrite. It was actually an Australian company called Azimuth Security.

How to Prevent Wire Transfer Fraud

Data Breach Today

Experts Offer Risk Mitigation Insights How is wire transfer fraud evolving, and how can the risk be mitigated? Three experts provide insights in this panel discussion

Risk 169

Small Acts Make a Big Difference: Earth Day and Beyond

Micro Focus

At Micro Focus, we are committed to reducing our environmental impact – as are our customers, partners and suppliers. Our aim is to make sustainable and responsible business part of the way we operate.

Cassandra Data Modeling Guide to Best Practices

Are you a developer, database architect, or database administrator that's new to Cassandra but have been tasked with developing a Cassandra schema design? Learn the basic rules to keep in mind when designing your schema for Cassandra.

PR Campaign: Babuk Ransomware Gang Claims Decryptor Repaired

Data Breach Today

Gang Issued Statement After Emsisoft Found Decryptor Flaw The Babuk ransomware gang launched a public relations campaign Saturday, posting a message on its website saying it had repaired a defect in its decryptor that it provides to its victims who pay the ransom demand

White House Scales Back Response to SolarWinds & Exchange Server Attacks

Dark Reading

Lessons learned from the Unified Coordination Groups will be used to inform future response efforts, a government official says

Ransomware: A Deep Dive into 2021 Emerging Cyber-Risks


Our new eBook goes beyond the status quo to take a look at the evolution of ransomware and what to prepare for next. Cloud Security Critical Infrastructure eBook Government IoT Malware Web Security

Risk 109

Attackers Test Weak Passwords in Purple Fox Malware Attacks

Dark Reading

Researchers share a list of passwords that Purple Fox attackers commonly brute force when targeting the SMB protocol

Use It, Save It, Or Lose It: Spring Cleaning for Information Governance

Speaker: Speakers Michelle Kirk of Georgia Pacific, Darla White of Sanofi, & Scott McVeigh of Onna

As an organization’s most valuable asset, data should be cared for and integrated, managed, archived, and deleted as appropriate. Join Onna, Georgia Pacific, and Sanofi for this on-demand webinar as they discuss proactive, practical steps for kicking off your organization's own digital cleanup.

Tracking Bills in the 2021 Legislative Session

The Texas Record

Where the legislative magic happens… The determination of retention periods is based on a review of the administrative, fiscal, legal, and historical value of the information being created or received in the course of conducting business.

IT 75

Lazarus Group Uses New Tactic to Evade Detection

Dark Reading

Attackers conceal malicious code within a BMP file to slip past security tools designed to detect embedded objects within images

What COVID-19 Taught Us: Prepping Cybersecurity for the Next Crisis


Sivan Tehila, cybersecurity strategist at Perimeter 81, discusses climate change and the cyber-resilience lessons companies should take away from dealing with the pandemic. Cloud Security Critical Infrastructure InfoSec Insider IoT Web Security

Trailblazing record holder: Margaret Cross Norton wrote the book on archives via the Illinois Times

IG Guru

In 1995 the Illinois General Assembly voted to name the State Archives building the Margaret Cross Norton Building. It was the first building on the Capitol complex to be named after a woman.

Open Source & Open Standards: Navigating the Intricacies of a Symbiotic Partnership

Speaker: Guy Martin, Executive Director of OASIS Open

The COVID-19 global pandemic has raised the already bright visibility of technology to an even higher level. Join Guy Martin, Executive Director at OASIS Open, as he presents this webinar that will discuss how we can make open source and open standards even more effective by helping them recapture their strong partnership.

NitroRansomware Asks for $9.99 Discord Gift Codes, Steals Access Tokens


The malware seems like a silly coding lark at first, but further exploration shows it can wreak serious damage in follow-on attacks. Malware Web Security

EDPB Opinion on UK Adequacy: Strong Alignment but Challenges Remain

DLA Piper Privacy Matters

During its 48th plenary session, the European Data Protection Board ( EDPB ) has adopted two opinions on the European Commission’s draft U.K. adequacy decision. Background.


Ditch those spreadsheets when it comes to legal holds

OpenText Information Management

Despite organizations seeing an overall reduction in resources and budgets, their spending on legal department technology is on the rise. According to Thomson Reuters, law department leaders are increasing their investments by 30 percent. And 44 percent are expanding their technology tools.

IT 59

Telematics: Driving Conversations Around Telematics

Information Governance Perspectives

Even the most cutting-edge technologies like Telematics are creating abundant opportunities at all skill levels, from entry-level to management. We spoke to a #telematics specialist for our book Tomorrow's Jobs Today, to see how his work has changed in this evolving tech landscape.


Leading Advertising and Analytics Company Outperforms With a Graph Database

Xandr, a division of AT&T, has built an identity graph that connects information on people, households, and more. The company is using this graph to provide advertisers an ability to deliver commercials more successfully than ever before. Learn more.

Could digital fax be a secret weapon for cybersecurity in financial services?

OpenText Information Management

Last year, a foreign exchange company in the UK, Travelex, cited cyberattack as a key factor in its decision to file for bankruptcy. It’s estimated that the financial services sector could see as much as $6 trillion in cybercrime damages in 2021.

Meet Team Hanzo: Justin Kreamer — Working the Angles For The Best Solution

Hanzo Learning Center

Meet Justin Kreamer, Hanzo’s senior enterprise executive. Justin brings his friendly spirit of team collaboration and his thirst for knowledge, to work every day.

What is software implementation?

OpenText Information Management

Every year, organizations all over the world implement new software packages and systems. Every year, many of those organizations struggle to realize the benefits of that software implementation.