Fox Rothschild’s Privacy and Data Security practice group maintains this searchable PDF document as well as the Data Breach 411 app to inform businesses of the breach notification statutes in each of the 50 states, Guam, Puerto Rico and the U.S. Virgin Islands, so they can better understand their rights, obligations and potential liability. Download…
Category: Of Note
US charges two Chinese spies for a global hacking campaign that targeted COVID-19 research
Zack Whittaker reports: U.S. prosecutors have charged two Chinese nationals, said to be working for China’s state intelligence bureau, for their alleged involvement in a massive global hacking operation that targeted hundreds of companies and governments for more than a decade. The 11-count indictment, unsealed Tuesday, alleges Li Xiaoyu, 34, and Dong Jiazhi, 33, stole terabytes…
Argentinian telecom supposedly hit by a crypto ransomware
Ali Raza reports: A string of massive hacking attacks that are related to cryptocurrencies one way or another continues. Last week, the biggest such hack saw the attackers hijack numerous highly-visible accounts to promote a Bitcoin scam. Today, new reports indicate that Argentina’s largest Telecom fell victim to ransomware that demands a massive ransom. According to…
‘Unforgivable’: The privacy breach that exposed sensitive details of WA’s virus fight
Kelly Haywood and Gary Adshead report: One of Western Australia’s biggest privacy breaches, which involves the interception of thousands of State Government communications, is under investigation. Nine News revealed on Monday evening that the most sensitive information to be hacked and posted to a public website relates to the management of the Covid-19 crisis in…
Iranian Spies Accidentally Leaked Videos of Themselves Hacking
Andy Greenberg reports: WHEN SECURITY RESEARCHERS piece together the blow-by-blow of a state-sponsored hacking operation, they’re usually following a thin trail of malicious code samples, network logs, and connections to faraway servers. That detective work gets significantly easier when hackers record what they’re doing and upload the video to an unprotected server on the open internet….
Inside REvil Extortionist “Machine”: Predictive Insights
A new paper by AdvIntel is out, and it looks at the psychology of REvil, something that it obviously of great interest to me: We have investigated REvil’s discourse and behavior by applying the methodologies and concepts of criminal psychology to identify the group’s unique characteristics revealed by their recent involvement in large, ethically questionable…