Remove Marketing Remove Military Remove Security Remove Trends
article thumbnail

Snatch ransomware gang claims the hack of the food giant Kraft Heinz

Security Affairs

In a statement shared with media [ 1 ] [ 2 ], [ 3 ] the company said that it investigating a cyberattack on a decommissioned marketing website. ” In August the gang claimed the hack of the Department of Defence South Africa and added the military organization to its leak site.

article thumbnail

GUEST ESSAY: Rising cyber risks make business intelligence gathering more vital than ever

The Last Watchdog

Intelligence is required to support the evolving needs of business, providing information for decision makers throughout the company lifecycle – everything from entering and exiting markets to managing mature operations. Cyber security keeps the C-suite up at night and perhaps that’s no surprise. Cyber in a silo? Context of risk.

Risk 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. Park: The trend nowadays is to move everything to the cloud. You need to rely on external storage to securely transport your data.

article thumbnail

Russia-linked APT29 spotted targeting JetBrains TeamCity servers

Security Affairs

Federal Bureau of Investigation (FBI), National Security Agency (NSA), Polish Military Counterintelligence Service (SKW), CERT Polska (CERT.PL), and the UK’s National Cyber Security Centre (NCSC) the group is targeting TeamCity servers since September 2023. The issue does not affect TeamCity Cloud. ” concludes the report.

article thumbnail

Malicious app exploiting CVE-2019-2215 zero-day available in Google Play since March

Security Affairs

Security experts have found a malicious app in the Google Play that exploits the recently patched CVE-2019-2215 zero-day vulnerability. Maddie Stone published technical details and a proof-of-concept exploit for the high-severity security vulnerability, seven days after she reported it to the colleagues of the Android security team.

article thumbnail

Spyware, ransomware and Nation-state hacking: Q&A from a recent interview

Security Affairs

Enjoy” How has spyware changed the rules of cyber security in recent years? What will cyber security look like now that those tools are all over the internet? Pegasus is probably the most popular surveillance software on the market, it has been developed by the Israeli NSO Group. Is the Pegasus spyware as a game-changer?

article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

The initiatives that stand out the most — critical infrastructure security standards, a national data privacy and security law, and liability for security failures — will likely take time and the support of Congress to implement. is the creation of mandatory requirements for critical infrastructure security.