Business ID Theft Soars Amid COVID Closures

Krebs on Security

To prove ownership over the hijacked firms, they hire low-wage image editors online to help fabricate and/or modify a number of official documents tied to the business — including tax records and utility bills.

SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations

Security Affairs

The attacks targeted a major utility provider, a university, and a government agency in the United States, a health agency in Canada, a health insurance provider, an energy company in Australia, and a European medical publishing company to deliver various malware families.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

Finance and insurance finished a close second at 22.4%. Finance and insurance companies were particularly vulnerable to the sort of phishing scams we’re talking about. Cybercrime is a growth industry like no other.

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

The threat of attacks against Critical National Infrastructure (CNI) – energy, utilities, telecommunications, and transportation – is now front of mind for many. The Ongoing Cyber Threat to Critical Infrastructure. divya. Thu, 07/21/2022 - 12:28.

Cloud 68

List of Data Breaches and Cyber Attacks in August 2022 – 97 Million Records Breached

IT Governance

August 2022 has been a lesson in being careful with whom you provide sensitive information. In a month that saw the former US president accused of misappropriating classified government documents, there were also a spate of malicious insiders compromising their employer’s systems.

Scanning for Flaws, Scoring for Security

Krebs on Security

The stated use cases for the Cyber Risk Score include the potential for cyber insurance pricing and underwriting, and evaluating supply chain risk (i.e., But in a marketing email sent to FICO members on Tuesday advertising its new benchmarking feature, FICO accidentally exposed the FICO Cyber Risk Score of energy giant ExxonMobil.

State Attackers Moving from Stealing Data to Social Meddling

Ascent Innovations

The utilities and energy industries experienced high indicators of attack activity, suggests that attackers have access to critical infrastructure and are waiting to exploit this access. State actors tend to zero in on government agencies or utilities and energy targets. They look to steal credit card numbers from financial services & insurance companies or install malware on the critical systems used by healthcare companies.

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded? We logged 134 security incidents in December, which accounted for 148,354,955 breached records. That brings the total for 2020 to more than 20 billion.

NHTSA Set to Release New Automobile Cybersecurity Best Practices

Hunton Privacy

This letter came in response to an earlier request from the House Committee on Energy and Commerce (“Energy and Commerce Committee”) that NHTSA convene an industry-wide effort to develop a plan to address vulnerabilities posed to vehicles by On-Board Diagnostics (“OBD-II”) ports. OBD-II ports provide valuable vehicle diagnostic information and allow for aftermarket devices providing services such as “good driver” insurance benefits and vehicle tracking.

NHTSA Releases New Automobile Cybersecurity Best Practices

Hunton Privacy

The guidance, entitled Cybersecurity Best Practices for Modern Vehicles (the “Cybersecurity Guidance”), was recently previewed in correspondence with the House of Representatives’ Committee on Energy and Commerce (“Energy and Commerce Committee”). Furthermore, in its response to the Energy and Commerce Committee, NHTSA indicated that at their request, “SAE International has started a working group that is looking to explore ways to harden the OBD-II port.”.

GUEST ESSAY: HIPAA’s new ‘Safe Harbor’ rules promote security at healthcare firms under seige

The Last Watchdog

The Health Insurance Portability and Accountability Act — HIPAA — has undergone some massive changes in the past few years to minimize the burden of healthcare entities. The House Energy and Commerce Committee was a part of passing this bill stating that the OCR has issued severe penalties against organizations victimized by cyberattacks, in spite of how well organizations have employed industry best cybersecurity practices.

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

This post has been updated. . On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. The Cybersecurity Law of China establishes a new category of information infrastructure, called “key [or critical] information infrastructure,” and imposes certain cybersecurity obligations on enterprises that operate such infrastructure.

Innovative Solutions to Real Business Problems with Big Data from Space


We are particularly interested in the following markets and potential application areas, although good solutions in any business area are welcome: Energy: Submission to support site surveys, monitor pollution, or inform environmental regulatory requirements. Utilities: Submissions to monitor networks/assets for threats, target maintenance needs, or enable more efficient operations. Innovative Solutions to Real Business Problems with Big Data from Space.

The Internet of Things (IoT): Managing the Data Tsunami


The Internet-of-Things has the potential to transform a range of industries – from automotive and agriculture through to healthcare, home appliances and insurance services. But exactly how that data is utilized (and potentially monetised) will differ across sectors. For example, data collected by wearable health-tracking devices has become of increasing importance and value to providers of life and medical insurance.