article thumbnail

ENISA 2023 Threat Landscape Report: Key Findings and Recommendations

Thales Cloud Protection & Licensing

The report also highlights that ransomware attacks are becoming more targeted, with attackers focusing on high-value targets with particular emphasis on the Industrial and Manufacturing sectors. Ensure you maintain offline, encrypted data backups that are regularly tested, following your backup procedures.

article thumbnail

The Week in Cyber Security and Data Privacy: 27 November – 3 December 2023

IT Governance

35 TB of data exfiltrated from Henry Schein, plus ALPHV/BlackCat re-encrypted the newly restored files As we first reported last month , the US healthcare solutions provider Henry Schein announced on 15 October that it had suffered a cyber attack that caused disruption to its manufacturing and distribution businesses.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Username (and password) free login with security keys

Imperial Violet

Of course, there are other manufacturers who make security keys and, if it advertises “CTAP2” support, there's a good chance that it'll work too. In practical terms, web sites exercise this capability via WebAuthn , the same API that handles the traditional security key flow. But those Yubikeys certainly do.

Passwords 114
article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

To achieve these, local data processing or anonymization of data must be considered; The security and confidentiality of the personal data processed in the context of connected vehicles must be guaranteed, in particular by implementing measures such as the encryption of the communication channel. . Relevance and data minimization.

Privacy 69
article thumbnail

Weekly Vulnerability Recap – November 6, 2023 – Windows Drivers and Exchange Flaws

eSecurity Planet

EoP exploit for AMD driver (PDFWKRNL.sys) on HVCI-enabled Windows 11 The fix: To address this issue, thorough action is required: Driver Patching: Developers and manufacturers of affected drivers must deliver patches and upgrades as soon as possible to address the reported vulnerabilities.

article thumbnail

The Hacker Mind Podcast: Tales From A Ransomware Negotiator

ForAllSecure

” Over the next few weeks, chats from encrypted Telegram, and other communications were leaked. We know that you know, manufacturing is an area that we've seen a lot of targets over the last quarter. Again, because if you bring down manufacturing operations, there's a high impact to the business and necessity to recover quickly.

article thumbnail

And then there were five: CCPA amendments pass legislature

Data Protection Report

The amendments change and clarify a business’ obligation to permit consumers to submit requests to exercise their CCPA rights. The amendment also includes a technical fix to correct the cross-reference for notification of financial incentives from § 1798.135 to § 1798.130. – § 1798.130. – § 1798.140.

B2B 40