article thumbnail

Connecticut Tightens its Data Breach Notification Laws

Data Protection Report

Effective October 1, 2021, an amendment [1] to the Connecticut General Statute concerning data privacy breaches, Section 36a-701b, will impact notification obligations in several significant ways.

article thumbnail

List of Data Breaches and Cyber Attacks in October 2022 – 9.9 Million Records Breached

IT Governance

For now, it’s unclear what damage the data could cause if exposed, so we’ve omitted the figure from our tally. However, it’s a warning sign for all organisations about the dangers of misconfigured Internet-facing servers. Million Records Breached appeared first on IT Governance UK Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in July 2020 ­– 77 million records breached

IT Governance

Canadian insurer Heartland Farm Mutual says an employee’s email account breached (unknown). Brazilian health insurer Hapvida discloses cyber attack (unknown). Four military schools in Canada targeted in ‘mysterious’ cyber attack (unknown).

article thumbnail

Group-IB presents its annual report on global threats to stability in cyberspace

Security Affairs

According to Group-IB’s experts, the most frustrating trend of 2019 was the use of cyberweapons in military operations. As for 2019, it has become the year of covert military operations in cyberspace. Its main vector will be blackmailing as part of ransomware attacks.

article thumbnail

Healthcare giant Magellan Health discloses data breach after ransomware attack

Security Affairs

Magellan Health, a for-profit managed health care and insurance firm, was the victim of a ransomware attack. Magellan Health is a for-profit managed health care and insurance firm that ranks 417 on the Fortune 500 list of the largest US corporations by total revenue.

article thumbnail

List of data breaches and cyber attacks in February 2022 – 5.1 million records breached

IT Governance

You can find out more about the cyber security implications of the Ukraine by registering for our special presentation hosted by IT Governance’s founder and executive chairman, Alan Calder. It will take place on Thursday, 3 March at 3pm, and you can register for on our website.

article thumbnail

Colonial Pipeline discloses data breach after May ransomware attack

Security Affairs

The Colonial Pipeline facility in Pelham, Alabama was hit by a cybersecurity attack, its operators were forced to shut down its systems.

article thumbnail

List of data breaches and cyber attacks in June 2021 – 9.8 million records breached

IT Governance

But don’t be fooled by that number – it comes from 106 incidents, which is roughly average for the year. If you find yourself facing a cyber security disaster, IT Governance is here to help. million records breached appeared first on IT Governance UK Blog.

article thumbnail

List of data breaches and cyber attacks in August 2020 – 36.6 million records breached

IT Governance

There were a massive 99 data breaches and cyber attacks in August, making it the third-biggest monthly total of the year by number of security incidents. But we’ll take a positive however we can take it, particularly given how leaky organisations have been throughout lockdown.

article thumbnail

China-linked Moshen Dragon abuses security software to sideload malware

Security Affairs

RedFoxtrot has been active since at least 2014 and focused on gathering military intelligence from neighboring countries, it is suspected to work under the PLA China-linked Unit 69010.

Military 114
article thumbnail

USAA to add 1,000 tech jobs in Phoenix by end of 2020

Information Management Resources

Military insurer will predominantly be looking to hire software engineers and applications developers, it says. Recruiting Customer experience Analytics Data management Data mining USAA

article thumbnail

List of data breaches and cyber attack in March 2019 – 2.1 billion records leaked

IT Governance

There’s a new compiler at the helm of our monthly list of data breaches, following the departure of IT Governance stalwart Lewis Morgan, who leaves me with some mighty big shoes to fill. Fortunately – or, rather, unfortunately ­– the new regime has a familiar ring to it, with another mammoth list of data breaches. Chinese hackers target universities in pursuit of maritime military secrets (unknown). Software company Citrix says hackers accessed its internal network (unknown).

article thumbnail

Pentagon’s Warning on DNA Testing is Applicable to all Consumers

ARMA International

On December 23, Yahoo News [1] reported on a Department of Defense memo [2] warning military personnel that using direct-to-consumer (DTC) DNA testing could pose “personal and operational risks.” As quoted in the Military Times article [3] , citing security risks, Cmdr. Military Times.

Military 106
article thumbnail

£60 million in recovery costs for Norsk Hydro after refusing ransom demand

IT Governance

Earlier this month, Norsk Hydro published its first quarterly report since it fell victim to a devastating ransomware attack in March. For a few hundred thousand pounds, Norsk Hydro could have bought a decryptor from the blackmailers and restored its systems. TrendMicro’s analysis into the ransomware found that it was the same system administration tool abused by the likes of SOREBRECT and Bad Rabbit. Without our special decoder it is impossible to restore the data.”.

article thumbnail

Inside Ireland’s Public Healthcare Ransomware Scare

Krebs on Security

It also found affected hospitals had tens of thousands of outdated Windows 7 systems, and that the health system’s IT administrators failed to respond to multiple warning signs that a massive attack was imminent. By then it was too late.

article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

Related: How DataLocker got its start h. DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. DataLocker has grown to 40 employees and this summer moved it’s headquarters to a larger office, with room to grow. So it’s easy to use for anybody; you don’t have to know how to do encryption.

article thumbnail

Highlights from the New U.S. Cybersecurity Strategy

Krebs on Security

The Biden administration today issued its vision for beefing up the nation’s collective cybersecurity posture, including calls for legislation establishing liability for software products and services that are sold with little regard for security.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

By the second week of January, Russia had amassed more than 100,000 troops along its southern border with Ukraine. ” Meanwhile, Crypto.com is trying to put space between it and recent headlines that a breach led to $30 million being stolen from hundreds of customer accounts.

Security 232
article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

These efforts may integrate diplomatic, information, military (both kinetic and cyber), financial, intelligence, and law enforcement capabilities.” In Strategic Objective 3.2 , the Administration suggests it will pursue a national data privacy law similar to the EU’s GDPR.

article thumbnail

New Connecticut Breach Notification Requirements and Cybersecurity Safe Harbor Effective October 2021

Hunton Privacy

In passing the law, Connecticut joins a number of other states in expanding the definition of “personal information” in its data breach notification statute. The safe harbor also applies in cases where the cybersecurity program conforms to applicable state or federal security laws and regulations ( e.g. , the security requirements of the Health Insurance Portability and Accountability Act and the Gramm-Leach Bliley Act).

Privacy 91
article thumbnail

Best Ransomware Removal and Recovery Services

eSecurity Planet

Malware has been around for nearly 40 years, longer even than the World Wide Web, but ransomware is a different kind of threat, capable of crippling a company and damaging or destroying its critical data. No sector has been spared from its ravages.

article thumbnail

Credit Freezes are Free: Let the Ice Age Begin

Krebs on Security

It is now free in every U.S. But it also includes a silver lining. With a freeze in place on your credit file, ID thieves can apply for credit in your name all they want, but they will not succeed in getting new lines of credit in your name because few if any creditors will extend that credit without first being able to gauge how risky it is to loan to you (i.e., It also changes the rules for “ fraud alerts ,” which currently are free but only last for 90 days.

Insurance 276
article thumbnail

Maze Ransomware gang breached the US chipmaker MaxLinear

Security Affairs

system-on-chip maker MaxLinear disclosed a security incident, Maze ransomware operators infected some of its computing systems in May. ” In response to the incident, the IT staff took all systems offline and retained cybersecurity experts to investigate the incident.

article thumbnail

ROUNDTABLE: Experts react to President Biden’s exec order in the aftermath of Colonial Pipeline hack

The Last Watchdog

This very high-profile caper is part of an extended surge of ransomware attacks, which quintupled globally between the first quarter of 2018 and the fourth quarter of 2020, and is expected to rise 20 percent to 40 percent this year, according to insurance giant Aon. It will not be sufficient to defend against sophisticated adversaries, but it will help organizations on the lower end of the capability spectrum to improve their cyber posture and defense.

article thumbnail

MY TAKE: Massive Marriott breach continues seemingly endless run of successful hacks

The Last Watchdog

I have a Yahoo email account, I’ve shopped at Home Depot and Target , my father was in the military and had a security clearance, which included a dossier on his family, archived at the U.S. Office of Personnel Management , I’ve had insurance coverage from Premera Blue Cross and I’ve stayed at the Marriott Marquis in San Francisco. As this data finds its way to the dark web, these stolen credentials will be acquired by other bad actors.

article thumbnail

In a Few Days, Credit Freezes Will Be Fee-Free

Krebs on Security

Maybe you’ve been holding off freezing your credit file because your home state currently charges a fee for placing or thawing a credit freeze, or because you believe it’s just not worth the hassle. A credit freeze — also known as a “security freeze” — restricts access to your credit file, making it far more difficult for identity thieves to open new accounts in your name.

Military 227
article thumbnail

Security Affairs newsletter Round 226

Security Affairs

Machete cyber-espionage group targets Latin America military. American Insurance firm State Farm victim of credential stuffing attacks. Apple announces major changes to its bug bounty program, including higher rewards. A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs.

article thumbnail

China: Navigating China episode 18: Increased scrutiny over connected car and automobile industry data from Chinese regulators, including push towards data localisation

DLA Piper Privacy Matters

This is a reminder for the automobile industry – and its supporting industries and insurers – to ensure a robust compliance framework to protect that data, and to reconsider processing of such data outside of China. Authors: Carolyn Bigg , Venus Cheung and Fangfang Song.

Privacy 66
article thumbnail

Washington State Comprehensive Privacy Bill Loses Steam, Data Breach Law Amendment Heads to Governor’s Desk

Data Matters

The Washington Privacy Act, SB 5376/HB1854, failed to make its way through the legislative process. The law was delivered to the desk of Governor Jay Inslee of Washington on April 26, where it is expected to be signed. As the legislative session drew to a close, what once seemed like an inevitability suddenly looked unlikely. The Bill’s sponsor, Sen.

article thumbnail

8 Best Password Management Software & Tools for 2022

eSecurity Planet

It’s not uncommon for employees to record passwords in other locations to help them keep track, which also opens the door for attackers to find them. However, it has a Mac-centric approach and provides an overall better experience for Mac and iOS.

article thumbnail

Ransomware Protection in 2021

eSecurity Planet

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security pros than the threat of ransomware. Here, then, is a comprehensive look at ransomware, what it is, how to prevent it, and what to do if you become one of its unfortunate victims.

article thumbnail

Vermont’s Amendments to Data Breach Law and New Student Privacy Law Effective July 1, 2020

Hunton Privacy

heath records or records of a wellness program or similar program of health promotion or disease prevention, a health care professional’s medical diagnosis or treatment of the consumer or a health insurance policy number.

article thumbnail

Episode 155: Disinformation is a Cyber Weapon and APTs warm to Mobile Malware

The Security Ledger

» Related Stories Israeli Group Exploited WhatsApp to Spy on Users Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk Episode 149: How Real is the Huawei Risk? In our first segment, we speak with Jerome Segura , the director of threat intelligence at Malwarebytes , about Russian efforts to shape public understanding of the downing of Malaysian Airlines Flight 17 which was shot down over Eastern Ukraine in July 2014 by rebels armed by the Russian military.

article thumbnail

What is personal information under the CCPA?

Collibra

Despite coming at the heels of the GDPR, the recent California privacy law promptly established and defined its own concepts around consumer-related data. . Misclassified data may lead organizations to undercount or overcount the personal information it possesses.

article thumbnail

Have We Become Apathetic About Breaches?

Thales Cloud Protection & Licensing

It’s sarcastic, it’s comical, but it’s also real. Sometimes, it does not even make the front page of a newspaper. Arguably, with that breach and others like it, the average person saw for the very first time that it was not just corporate data that was at risk, but personal identities and credit cards. Planes flew overhead regularly and it unnerved some of my friends because of the regular jet noise above us. Another day, another breach.

Cloud 89
article thumbnail

Amended Colorado Bill Aims to Enhance Data Privacy Laws

Data Protection Report

On Wednesday, February 14, 2018, an amended bill passed unanimously in Colorado’s House Committee on State, Veterans and Military Affairs. The proposed bill overlaps with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and state privacy laws. The amended bill further expands the definition of “personal information” to include student, military, or passport identification numbers.

article thumbnail

Colorado Amends Data Breach Notification Law and Enacts Data Security Requirements

Hunton Privacy

Attorney General Notification: If an entity must notify Colorado residents of a data breach, and reasonably believes that the breach has affected 500 or more residents, it must also provide notice to the Colorado Attorney General. Notice to the Attorney General is required even if the covered entity maintains its own procedures for security breaches as part of an information security policy or pursuant to state or federal law.

Privacy 67
article thumbnail

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

The Last Watchdog

The basic notion is that in today’s complex operating environment, it is important for businesses to proactively identify operational hazards and have a plan in place to account for them. Related: Poll shows seniors execs get cybersecurity A hazard is anything that can interfere with a company meeting its objectives; it could be something physical, such as a fire, a theft or a natural disaster; or it could be an abstract risk, such as a lawsuit or a regulatory fine.

Risk 147
article thumbnail

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

The webcast is CLE accredited in selected states, so come check it out! Court Orders Defendant to Respond to Interrogatories to Identify Number of Phone Calls it Made : In Franklin v.

article thumbnail

Best Password Management Software & Tools

eSecurity Planet

It’s not uncommon for employees to record passwords in other locations to help them keep track, which also opens the door for attackers to find them. However, it has a Mac-centric approach and provides an overall better experience for Mac and iOS.