Sun.Jan 26, 2020

Authorities arrest 3 Indonesian hackers behind many Magecart attacks

Security Affairs

The Indonesian National Police and the Interpol announced the arrest of three Indonesian hackers who carried out Magecart attacks.

Australian government secretly releasing sensitive medical records to police

The Guardian Data Protection

Lawyers and health privacy advocates condemn laxness of privacy provisions in guidelines The Australian government is releasing highly sensitive medical records to police through a secret regime that experts say contains fundamentally flawed privacy protections.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

City of Potsdam offline following a cyberattack

Security Affairs

The City of Potsdam suffered a major cyberattack that took down its servers earlier this week, but emergency services were not impacted.

Britain could lose access to EU data after series of scandals

The Guardian Data Protection

Exchange of key security information at risk after Dutch concerns over data protection ?British

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

A new piece of Ryuk Stealer targets government, military and finance sectors

Security Affairs

A new piece of the Ryuk malware has been improved to steal confidential files related to the military, government, financial statements, and banking.

More Trending

Security Affairs newsletter Round 248

Security Affairs

A new round of the weekly newsletter arrived! The best news of the week with Security Affairs. Bot list with Telnet credentials for more than 500,000 servers and IoT devices leaked online. Hackers patch Citrix servers to deploy their own backdoor.

Understanding Patient’s Rights Under HIPAA


When it comes to PHI, patients have certain rights under the HIPAA Privacy Rule. All covered entities must follow these rules and guidelines and communicate these rights to every patient, Guest Post