Seen at DLA Piper: One of the many open questions of data protection law in Europe is how compensation for “non-material damage” will be calculated. In contrast to personal injury claims where lawyers have (hundreds of) years of case law to call upon to help calculate compensation, there is comparatively little case law considering how…
Category: Commentaries and Analyses
Documents give details on Hennepin Healthcare employees fired for ‘improperly’ accessing George Floyd records
Hannah Flood reports: The public is learning more about some employees at Hennepin HealthCare who were fired for accessing George Floyd’s medical information when they weren’t supposed to. An attorney for Floyd’s family was notified last month that his medical records were accessed multiple times by employees at the hospital, violating Floyd’s medical privacy and…
“Front Door” into BazarBackdoor: Stealthy Cybercrime Weapon
Roman Marshanski & Vitali Kremez write: BazarBackdoor is the newer preferred stealthy covert malware leveraged for high-value targets part of the TrickBot group toolkit arsenal. It consists of two components: a loader and a backdoor. [1] Loaders are an essential part of any cybercrime campaign. They start the infection chain by distributing the payload. In…
New action to combat ransomware ahead of U.S. elections
Tom Burt, Corporate Vice President, Customer Security & Trust for Microsoft, explains: Today we took action to disrupt a botnet called Trickbot, one of the world’s most infamous botnets and prolific distributors of ransomware. As the United States government and independent experts have warned, ransomware is one of the largest threats to the upcoming elections. Adversaries can use ransomware to infect…
Report: U.S. Cyber Command Behind Trickbot Tricks
Brian Krebs reports: A week ago, KrebsOnSecurity broke the news that someone was attempting to disrupt the Trickbot botnet, a malware crime machine that has infected millions of computers and is often used to spread ransomware. A new report Friday says the coordinated attack was part of an operation carried out by the U.S. military’s Cyber Command. Read more…
The most common malicious email attachments infecting Windows
Lawrence Abrams reports: To stay safe online, everyone needs to recognize malicious attachments that are commonly used in phishing emails to distribute malware. When distributing malware, threat actors create spam campaigns that pretend to be invoices, invites, payment information, shipping information, eFaxes, voicemails, and more. Included in these emails are malicious Word and Excel attachments,…