Remove Healthcare Remove Manufacturing Remove Presentation Remove Security
article thumbnail

Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk

The Security Ledger

Related Stories Episode 155: Disinformation is a Cyber Weapon and APTs warm to Mobile Malware Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats NotPetya Horror Story Highlights Need for Holistic Security. Read Security Ledger coverage of NotPetya here. one of the most virulent malware attacks ever.

article thumbnail

Connecting the Bots – Hancitor fuels Cuba Ransomware Operations

Security Affairs

As of April 28, the site mentioned nine companies primarily from aviation, financial, education and manufacturing industries. The command should be presented as one of the following symbols: «b», «e», «l», «n», «r». The post Connecting the Bots – Hancitor fuels Cuba Ransomware Operations appeared first on Security Affairs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”). social networking services platforms.

article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

IT Governance is closing out the year by rounding up 2019’s biggest information security stories. Countless office workers were forced to get back to their jobs after Reddit suspended a host of accounts in light of security concerns. Facebook said that the breach was discovered in January 2019 as part of an internal security review.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. Van Norman: Right right.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

I’m just not convinced that a fingerprint or an image of my face is secure enough. So of course when I saw that some researchers were presenting a talk at SecTor 2021 in Toronto on defeating biometrics with artificial intelligence, well I knew I had to talk to them as well. I'm a cyber security professional, I guess.