Remove Healthcare Remove Manufacturing Remove Presentation
article thumbnail

Connecting the Bots – Hancitor fuels Cuba Ransomware Operations

Security Affairs

As of April 28, the site mentioned nine companies primarily from aviation, financial, education and manufacturing industries. The command should be presented as one of the following symbols: «b», «e», «l», «n», «r». Its operators have a DLS site, where they post exfiltrated data from their victims who refused to pay the ransom.

article thumbnail

Supreme Court Strikes Down Vermont Prescriber Privacy Law

Hunton Privacy

Vermont’s law was intended to limit the process of “detailing” whereby pharmaceutical manufacturers use prescriber-identifiable information to “ascertain which doctors are likely to be interested in a particular drug and how best to present a particular sales message.”

Privacy 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

Next to these two entities, Annex II contains the ones listed below: postal and courier services; waste management; manufacturers and distributors of certain chemicals; food producers and distributors; manufacturers of certain critical products, such as some medical devices, transport equipment, motor vehicles, trailers, electrical equipment, etc.;

article thumbnail

ABBYY Achieves Double-Digit Annual Revenue Growth for Third Consecutive Year

Info Source

ABBYY continued to see strong demand for its Digital Intelligence solutions in FY19, with customers including one of the world’s largest pharmaceutical companies, smart infrastructure solutions company Costain , a global medical supply manufacturer and distributor Medline , and other leading enterprises across industries.

article thumbnail

Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk

The Security Ledger

And, for companies impacted, it was impressively damaging: halting production lines and operations at global corporations in shipping, pharmaceuticals and manufacturing. It was one of the most expensive malware attacks of all time : with damages totaling $10 billion. one of the most virulent malware attacks ever.

article thumbnail

Court Rules “No Harm, No Foul” in Allowing Clawback After Protective Order Deadline: eDiscovery Case Law

eDiscovery Daily

In this products liability case against pharmaceutical manufacturers, the plaintiffs’ used an internal BMS email and PowerPoint during the January 31, 2018, deposition of BMS’ executive director for Abilify marketing from February 2007-December 2008. Case Background. So, what do you think?

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

So of course when I saw that some researchers were presenting a talk at SecTor 2021 in Toronto on defeating biometrics with artificial intelligence, well I knew I had to talk to them as well. Here is the crux of their presentation at SecTor. Once again you see how such a simple method can defeat biometrics.