Remove 2013 Remove Agriculture Remove Government Remove Security
article thumbnail

Hunting the ICEFOG APT group after years of silence

Security Affairs

A security researcher found new evidence of activities conducted by the ICEFOG APT group, also tracked by the experts as Fucobha. Chi-en (Ashley) Shen, a senior security researcher at FireEye, collected evidence that demonstrates that China-linked APT group ICEFOG (aka Fucobha ) is still active. Pierluigi Paganini.

article thumbnail

Observations on the Cybersecurity Executive Order and Presidential Policy Directive

Hunton Privacy

On May 29, 2009, the President promised to avoid security regulations even though he acknowledged that “the vast majority of our critical information infrastructure in the United States is owned and operated by the private sector.” by passing legislation to give our government a greater capacity to secure our networks and deter attacks.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 4 – 10 March 2024

IT Governance

Source (New) Transport USA Yes 3,815 Okta Source 1 ; source 2 (Update) Cyber security USA Yes 3,800 Shah Dixit & Associates, P.C. million for security failings relating to a 2018 cyber attack on its mobile banking platform. UniCredit fined €2.8 about the recent rise in Facebook and Instagram account takeovers by scammers.

article thumbnail

The Week in Cyber Security and Data Privacy: 1 – 7 April 2024

IT Governance

Kid Security breached again: children’s live GPS locations exposed on the Internet Last November , the parental control app Kid Security, which allows parents to monitor and control their children’s online safety, was found to have exposed more than 300 million records via misconfigured Elasticsearch and Logstash instances.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

million records from World-Check, a screening database used to screen potential customers for links to illegal activity and government sanctions. Compromised data includes names, passport numbers, Social Security numbers, online crypto account identifiers and bank account numbers.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. ” So should analyzing a device’s firmware for security flaws be considered illegal?

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. ” So should analyzing a device’s firmware for security flaws be considered illegal?