Remove Information Security Remove Insurance Remove Military
article thumbnail

Colonial Pipeline discloses data breach after May ransomware attack

Security Affairs

. “Total number of persons affected (including residents): 5,810” Exposed data includes names, birth dates, contact information, driver’s license information, Social Security numbers, government-issued ID (such as military ID and tax ID), and health-related information (including health insurance information).

article thumbnail

China-linked Moshen Dragon abuses security software to sideload malware

Security Affairs

RedFoxtrot has been active since at least 2014 and focused on gathering military intelligence from neighboring countries, it is suspected to work under the PLA China-linked Unit 69010. Experts observed overlap between the TTPs of the Moshen Dragon group with the ones of the Chinese Nomad Panda (aka RedFoxtrot).

Security 340
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 408 by Pierluigi Paganini

Security Affairs

If you want to also receive for free the newsletter with the international press subscribe here.

Security 246
article thumbnail

Security Affairs newsletter Round 488 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Head Mare hacktivist group targets Russia and Belarus Zyxel fixed critical OS command injection flaw in multiple routers VMware fixed a code execution flaw in Fusion hypervisor U.S.

Security 305
article thumbnail

Watch out! Malware Analysis Sandboxes could expose sensitive data of your organization

Security Affairs

The experts also discovered a large number of insurance certificates that expose various personally identifiable information (PII), such as names, phone numbers, postal and email addresses. CENTCOM requisition form for use of military aircraft. One of the files exposed via the malware analysis sandboxes appeared to be a U.S.

Military 243
article thumbnail

Group-IB presents its annual report on global threats to stability in cyberspace

Security Affairs

According to Group-IB’s experts, the most frustrating trend of 2019 was the use of cyberweapons in military operations. As for 2019, it has become the year of covert military operations in cyberspace. The threat actor mainly targets insurance, consulting, and construction companies.

IT 279
article thumbnail

New Connecticut Breach Notification Requirements and Cybersecurity Safe Harbor Effective October 2021

Hunton Privacy

The safe harbor also applies in cases where the cybersecurity program conforms to applicable state or federal security laws and regulations ( e.g. , the security requirements of the Health Insurance Portability and Accountability Act and the Gramm-Leach Bliley Act).