China-linked APT41 group exploits Citrix, Cisco, Zoho flaws

Security Affairs

The group hit entities in several industries, including the gaming, healthcare, high-tech, higher education, telecommunications, and travel services industries. The China-linked group tracked as APT41 exploited vulnerabilities in Citrix, Cisco, and ManageEngine in a campaign on a global scale.

Connecting the Bots – Hancitor fuels Cuba Ransomware Operations

Security Affairs

As of April 28, the site mentioned nine companies primarily from aviation, financial, education and manufacturing industries. The Cuba Ransomware gang has partnered with the crooks behind the Hancitor malware in attacks aimed at corporate networks.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

List of data breaches and cyber attacks in August 2020 – 36.6 million records breached

IT Governance

There were a massive 99 data breaches and cyber attacks in August, making it the third-biggest monthly total of the year by number of security incidents. But, by contrast, only 36,673,575 records were confirmed to have been leaked, which is the fewest we’ve recorded since May 2018.

China-linked hackers target government agencies by exploiting flaws in Citrix, Pulse, and F5 systems, and MS Exchange

Security Affairs

CISA published an advisory on China-linked groups targeting government agencies by exploiting flaws in Microsoft Exchange, Citrix, Pulse, and F5 systems.

US DoJ charged two Chinese hackers working with MSS

Security Affairs

The duo targeted organizations in multiple industries, including high tech manufacturing, medical device, civil, and industrial engineering, business, educational, gaming software, solar energy, pharmaceuticals and defense.

How To Solve The Cybersecurity Skills Shortage

Cyber Info Veritas

Solving and closing the gap for the cybersecurity skills shortage can’t be achieved with the traditional education and formation of employees by creating a curriculum in a college, training a person on how to “do” or “work” in cybersecurity, submitting an application for a cybersecurity job, then hiring the selected candidate to fill the position. Stop treating this profession as a profitable mass education opportunity like just any other profession.

Anonymization & Pseudonymization as Tools for Cross-Border Discovery Compliance

ARMA International

For example, consider the hypothetical case of Class Action Plaintiffs vs. ABC Pharmaceutical Company. Assume that the plaintiffs are alleging that a drug manufactured by ABC causes adverse effects in patients, and they’re further alleging that ABC did not adequately investigate or disclose those adverse effects when originally seeking approval for the drug. Introduction.

Court Rules “No Harm, No Foul” in Allowing Clawback After Protective Order Deadline: eDiscovery Case Law

eDiscovery Daily

In this products liability case against pharmaceutical manufacturers, the plaintiffs’ used an internal BMS email and PowerPoint during the January 31, 2018, deposition of BMS’ executive director for Abilify marketing from February 2007-December 2008. eDiscovery Daily is made available by CloudNine solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance.