article thumbnail

Security Affairs newsletter Round 249

Security Affairs

A new piece of Ryuk Stealer targets government, military and finance sectors. CVE-2020-7247 RCE flaw in OpenSMTPD library affects many BSD and Linux distros. Wawa card breach: 30 million card records for sale in the dark web. The best news of the week with Security Affairs. City of Potsdam offline following a cyberattack.

article thumbnail

Breaking the Ice on DICE: scaling secure Internet of Things Identities

The Security Ledger

» Related Stories Expert says: Hack your Smart Home to Secure It Fitness apps: Good for your health, not so much for military security Mobile, automation-industry leaders promote two new IoT security efforts. We have those libraries and we’ve wrapped our heads around how that works. Among them: establishing strong device.

IoT 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

House Passes Two Cybersecurity Bills

Hunton Privacy

Another amendment provides that the federal government may not use shared “information that identifies a person” contained in (1) library circulation records, (2) library patron lists, (3) book sales records, (4) book customer lists, (5) firearms sales records, (6) tax return records, (7) educational records, or (8) medical records.

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. in which the travel records of military and civilian personnel – which included their personal information and credit card data – were compromised.

article thumbnail

List of data breaches and cyber attacks in April 2021 – 1 billion records breached

IT Governance

discloses security incident (unknown) St.

article thumbnail

EP 49: LoL

ForAllSecure

Sometimes it can be really complex DLLs and they call that hijacking or DLL hijacking and what they'll do is they'll use a legitimate program that depends on a library, bring their malicious library with them and it gets sometimes side loaded. Sometimes it can be really complex DLLs and they call that hijacking or DLL hijacking.