article thumbnail

City of Dallas has set a budget of $8.5 million to mitigate the May Royal ransomware attack

Security Affairs

The City of Dallas revealed that the Royal ransomware gang that hit the city system in May used a stolen account. In May 2023, a ransomware attack hit the IT systems at the City of Dallas , Texas. To prevent the threat from spreading within the network, the City shut down the impacted IT systems. ” reads the report.

article thumbnail

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

The stolen information allegedly included names and identifying information, hashed passwords, security questions and answers, family information, Social Security numbers, lab results, health insurance information, doctor’s names, and medical conditions, among other things. See Indiana v. Informatics Eng’g, Inc. , 3:18-cv-00969 (N.D.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of data breaches and cyber attacks in February 2020 – 623 million records breached

IT Governance

The US Defence Information Systems Administration discloses 2019 cyber attack (unknown). ISS World shuts down its computer systems amid malware attack (unknown). Pacific Specialty Insurance Company notifies plan members of 2019 data breach (unknown). Advocate Aurora’s HR system breached in phishing campaign (unknown).

article thumbnail

£60 million in recovery costs for Norsk Hydro after refusing ransom demand

IT Governance

For a few hundred thousand pounds, Norsk Hydro could have bought a decryptor from the blackmailers and restored its systems. For a few hundred thousand pounds, Norsk Hydro could have bought a decryptor from the blackmailers and restored its systems. On 19 March 2019, Norsk Hydro’s systems were infected with the LockerGoga ransomware.

article thumbnail

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

The Last Watchdog

Unfortunately, despite steady advances in malware detection and intrusion prevention systems, and much effort put into training employees to be wary of suspicious email, weaponized email and document-based malware remain as virulent as pervasive as it was two decades ago. Employees today receive mixed messages. Talk more soon.

article thumbnail

Georgia Governor Vetoes Broad-Reaching Computer Crime Bill, Highlighting Debate Around Bug Bounty Programs

Data Matters

Specifically, researchers believed that the current version of SB 315 could chill security research—both the purely academic and the “white hats”—ultimately discouraging individuals from identifying vulnerabilities in networks and alerting system administrators of the issues. The incident and Uber’s response prompted the U.S.

article thumbnail

Italy: Privacy law integrating the GDPR adopted, what to do?

DLA Piper Privacy Matters

This is good news as for instance it might introduce an exemption to the need of prior consent for the processing of health data by insurance companies as part of the data processing activities functional to the insurance policies which is currently provided by the above mentioned general authorization issued under the current Italian Privacy Code.

GDPR 45