Remove 2009 Remove Financial Services Remove Government Remove Information Security
article thumbnail

Lazarus malware delivered to South Korean users via supply chain attacks

Security Affairs

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems. The WIZVERA VeraPort integration installation program is used to manage additional security software (e.g.,

article thumbnail

White House Releases Cybersecurity Legislative Proposal

Hunton Privacy

Cybersecurity Information Sharing – This section would create a system intended to encourage, incentivize and protect the voluntary sharing of cyber incident and cybersecurity information between federal, state and local governments and private industry.

article thumbnail

Observations on the Cybersecurity Executive Order and Presidential Policy Directive

Hunton Privacy

On May 29, 2009, the President promised to avoid security regulations even though he acknowledged that “the vast majority of our critical information infrastructure in the United States is owned and operated by the private sector.” In last Tuesday’s State of the Union address, the President himself called on Congress to “act.