article thumbnail

Cloak ransomware group hacked the Virginia Attorney General’s Office

Security Affairs

The group has extended its operations to countries in Asia and targets various sectors, including healthcare, real estate, construction, IT, food, and manufacturing.” ” reads a report published by Halcyon.

article thumbnail

North Korean Hackers Target South Korean Naval Shipyards

Data Breach Today

Nation-State Attacks on Defense Manufacturers Rising Since November 2022 South Korean national intelligence has sounded alarms about North Korean hackers targeting the country's shipbuilding industry to steal naval military secrets.

Military 290
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US Cybersecurity Strategy Shifts Liability Issues to Vendors

Data Breach Today

Holding Vendors Liable for Insecure Apps Fuels Safe Harbor, Transparency Questions A new federal strategy to make commercial manufacturers liable for insecure software requires an attainable safe harbor policy and could be a disincentive for software manufacturers in sharing important vulnerability information with the U.S.

article thumbnail

The top tech trends in manufacturing for 2021

OpenText Information Management

The pandemic didn’t completely alter our technology strategies. Cloud is the foundation of digital transformation… According to Forbes, manufacturers will … The post The top tech trends in manufacturing for 2021 appeared first on OpenText Blogs. So, what does the year ahead hold?

article thumbnail

RansomEXX ransomware leaks files stolen from Italian luxury brand Zegna

Security Affairs

Following the company’s strongly export-oriented strategy, exports account for over 90% of total sales. This week the ransomware gang RansomEXX ransomware gang hit the Taiwanese manufacturer and distributor of computer hardware GIGABYTE and claims to have stolen 112GB of data. Follow me on Twitter: @securityaffairs and Facebook.

article thumbnail

Former US CISO on New US Cybersecurity Strategy: 'It's Bold'

Data Breach Today

National Cybersecurity Strategy. His top takeaway: the shift of cybersecurity responsibility from consumers to manufacturers of vulnerable products. Gregory Touhill, the very first U.S. federal CISO back in the Obama administration, says he's encouraged by the new U.S.

article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

However, industries reliant on shared devices—such as healthcare, retail, and manufacturing—face unique challenges. Similarly, in retail and manufacturing, delays caused by authentication procedures reduce overall efficiency. These fast-paced environments need a more flexible approach to balance security, speed, and user privacy.