Remove Encryption Remove Government Remove Healthcare Remove Manufacturing
article thumbnail

China-linked APT Bronze Starlight deploys ransomware as a smokescreen

Security Affairs

The victims include pharmaceutical companies in Brazil and the U.S., based media organization with offices in China and Hong Kong, electronic component designers and manufacturers in Lithuania and Japan, a law firm in the U.S., and an aerospace and defense division of an Indian conglomerate.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

Next to these two entities, Annex II contains the ones listed below: postal and courier services; waste management; manufacturers and distributors of certain chemicals; food producers and distributors; manufacturers of certain critical products, such as some medical devices, transport equipment, motor vehicles, trailers, electrical equipment, etc.;

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

IT Governance is closing out the year by rounding up 2019’s biggest information security stories. This meant they weren’t encrypted, making them freely accessible to as many as 20,000 employees, most of whom had no legitimate reason to access the information. IT Governance released its final Weekly Podcast.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 March 2024

IT Governance

Glosbe dictionary exposes almost 7 million records The multilingual online dictionary Glosbe left a MongoDB instance unsecured last year, exposing nearly 7 million users’ information, including personal data, encrypted passwords and social media identifiers. Glosbe did not reply, but the open instance was soon closed. TB Paysign, Inc.

article thumbnail

The Applications of Blockchain in Data Management

AIIM

It is also unique in that it is decentralized, so there is no single authority governing its use. Other large companies, agencies, and government bodies have also been subject to damaging attacks in the last decade. They are stored on blockchain and distributed on a private government network. Data Sharing.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Affected information includes users’ names, email addresses, IP addresses and encrypted passwords. Nearly 20 million Cutout.Pro users’ data breached Cutout.Pro, an AI photo and video editing platform, has suffered a data breach. The threat actor, KryptonZambie, listed a 5.93