Remove Energy and Utilities Remove Government Remove Industry Remove Retail
article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 December 2023

IT Governance

Source (New) Insurance USA Yes 105,387 Carter’s | Oshkosh Israel Source (New) Retail Israel Yes >100,000 SodaStream Source (New) Manufacturing Israel Yes >100,000 Amsellem & Weitz Source (New) Legal Israel Yes 100 GB Stanley Steemer International, Inc. Source (New) Retail USA Yes 2,469 Three GreatStar Industrial Co.

article thumbnail

Strategize your next move to become a utilities leader, delivering value at scale and pace

CGI

Strategize your next move to become a utilities leader, delivering value at scale and pace. In 2019, our CGI Client Global Insights reveal, once again, that utilities are making considerable progress in their digital transformation journey, with 92% of executives now reporting their organization has a defined digital strategy in place.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked APT28 compromised Ubiquiti EdgeRouters to facilitate cyber operations

Security Affairs

. “As early as 2022, APT28 actors had utilized compromised EdgeRouters to facilitate covert cyber operations against governments, militaries, and organizations around the world.” and foreign governments and military, security, and corporate organizations. ” reads the joint report. ” concludes the report.

article thumbnail

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

IT Governance

Known records breached Real Estate Wealth Network Source 1 ; source 2 (New) Real estate USA Unknown 1,523,776,691 TuneFab Source (New) Software Hong Kong Unknown >151,000,000 Dori Media Group Source (New) Media Israel Yes >100 TB Rosvodokanal Source (New) Utilities Russia Yes 50 TB breached; 1.5

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 January 2024

IT Governance

Compromised data includes victims’ names, addresses, phone numbers and Aadhaar numbers (a 12-digit government identification number). It remains unclear how the data breach occurred, but the attackers apparently suggested it was the result of “exploiting vulnerabilities within government databases of telecommunication systems”.

article thumbnail

The Week in Cyber Security and Data Privacy: 27 November – 3 December 2023

IT Governance

Source (New) Professional services USA Yes Unknown Thillens Source (New) Finance USA Yes Unknown Elston-Nationwide Carriers Source (New) Transport USA Yes Unknown American Insulated Glass Source (New) Retail USA Yes Unknown MooreCo Inc.

article thumbnail

Lessons for In-House Counsel from Cybersecurity’s Front Lines

HL Chronicle of Data Protection

In today’s environment, any organization can be the target of a cyberattack, regardless of industry, size, or geographic footprint. Lessons for In-House Counsel from Cybersecurity’s Front Lines was written by members of the Hogan Lovells Privacy and Cybersecurity practice Peter M. Marta and Asmaa Awad-Farid for Bloomberg Law.