article thumbnail

Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

Krebs on Security

One example can be found on Telegram, wherein a member who favors the handle “ Bug ” has for the past month been selling access to various police and government email accounts. 30, Bug posted a sales thread to the cybercrime forum Breached[.]co Bug posted this sales thread on Wednesday.

article thumbnail

The Sheriffs are in Town: Recent Developments in Initial Coin Offerings (ICO) Enforcement and Investor Education

Data Matters

Tomahawk: “Free” Tokens or Convertible Equity Instruments Constitute the Offer and Sale of Securities. The SEC’s order noted that the lack of monetary consideration is not dispositive and such a “free” distribution may still constitute an offer or sale of securities. Bounty Programs and Airdrops. securities laws. securities laws.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

These services can be used in a legitimate manner for several business purposes — such as price comparisons or sales intelligence — but they are also massively abused for hiding cybercrime activity because they can make it difficult to trace malicious traffic to its original source. “Runet”).

Cloud 273
article thumbnail

GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’

The Last Watchdog

Popular examples include artificial intelligence-as-a-service (AIaaS), software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS). Phishing-as-a-service, also called PhaaS, is the same as the SaaS business model, except the product for sale is designed to help users launch a phishing attack. PhaaS is not going anywhere.

Phishing 198
article thumbnail

Connecticut Enacts Consumer Privacy Law

Hunton Privacy

The CTDPA exempts certain entities, including, for example, state and local government entities, nonprofits, higher education institutions, financial institutions subject to the Gramm-Leach-Bliley Act (“GLB”), and qualifying covered entities and business associates subject to the Health Insurance Portability and Accountability Act (“HIPAA”).

Privacy 118
article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

We put those questions to channel sales director Sophie Sayer. But to give you an example, one of our partners, Tela Technology, an IT and telecoms solutions provider, was unable to offer ISO accreditations for its clients – something that could be a dealbreaker for certain clients with specific legal or business requirements.

article thumbnail

GUEST ESSAY: 6 steps any healthcare organization can take to help mitigate inevitable cyber attacks

The Last Watchdog

While some product and sales professionals may try to convince you they can eradicate the chance your data will be breached or systems infected with malware, that’s unfortunately too optimistic and short-sighted given today’s threat landscape. Educate employees. Note that I say, “reduce your risk,” not eliminate it.

Passwords 214