article thumbnail

The US government sanctioned four entities and one individual for supporting cyber operations conducted by North Korea

Security Affairs

The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against four entities and one individual for their role in malicious cyber operations conducted to support the government of North Korea. The sanctioned entities conducted operations to steal funds to support the military strategy of the regime.

article thumbnail

Government By Numbers: Some Interesting Insights

John Battelle's Searchblog

Examples include identity (from driver’s licenses and SSNs to Visa, MasterCard, Amex, and Facebook), delivery of important information and items (from the Post Office to Telcos, Internet, and FedEx and UPS), and protection (outsourcing both prisons and military jobs to private companies). Very interesting.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Executive Order on access to Americans’ bulk sensitive data and Attorney General proposed regulations – Part 2

Data Protection Report

The proposed definition of “listed identifier” is Full or truncated government identification or account number (such as a Social Security Number, driver’s license or state identification number, passport number, or Alien Registration Number) [Note that this definition apparently includes truncated Social Security Numbers.]

Access 58
article thumbnail

Security Affairs newsletter Round 450 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA and ENISA enhance their Cooperation CISA adds Qlik bugs to exploited vulnerabilities catalog Report: 2.6

article thumbnail

Understanding China’s Data Regulatory Regime: What Are Important Data? And Can They Be Transferred Outside Of China?

Data Matters

Once finalized, it will be enacted by the State Council (China’s central government) as an “administrative regulation”, which is subordinate to the national laws (e.g., the CSL, the DSL and the PIPL) but prevails over all other sectorial and local regulations.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 March 2024

IT Governance

Source (New) Professional services Netherlands Yes 28.3 The Internet Crime Report 2023 also reports that four online crimes caused the most financial losses in the US last year: BEC (business email compromise), investment fraud, ransomware, and tech/customer support and government impersonation scams.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 January 2024

IT Governance

Australian government sets out risk-based system to respond to AI The Australian government has launched its plan to respond to the rise in AI, using a risk-based system to impose proportionate controls on its use.