
Similar Posts

Group Behind SolarWinds Attack Targeted Microsoft Customers
3rd Party Risk Management , Application Security , Breach Notification Company Says Russian-Linked Group Targeted Its Customer Support System Scott Ferguson (Ferguson_Writes) • June 26, 2021 Photo: Microsoft The Russian-linked cyberespionage group behind the supply-chain attack against SolarWinds recently targeted Microsoft‘s customer support system as part of a new campaign, the company disclosed…

SEC Charges BitConnect on $2 Billion Fraud Scheme
Blockchain & Cryptocurrency , Cryptocurrency Fraud , Fraud Management & Cybercrime Experts Warn of Continued Scrutiny in Cryptocurrency Markets Dan Gunderman (dangun127) • September 3, 2021 The U.S. Securities and Exchange Commission this week announced civil action against defunct cryptocurrency lending platform BitConnect; its founder, Satish Kumbhani; and its top U.S. promoter, Glenn…

The Games Ransomware Attackers Play
Business Continuity Management / Disaster Recovery , Fraud Management & Cybercrime , Fraud Risk Management Criminals Regularly Fib About Stealing Data, Sparing Hospitals and Much More Mathew J. Schwartz (euroinfosec) • August 5, 2021 BlackMatter ransom note (Source: Bleeping Computer) If you’re a criminal, practicing good operational security would seem to preclude granting…

Microsoft Power Apps misconfiguration exposes 38m records
Sensitive data including contact tracing, vaccine status, names and e-mail addresses leaked Print Print Pro Read More: cyber security Microsoft security Default settings on Microsoft Power Apps portals have led to several data leaks, with 38 million records held by 47 entities, including US government bodies and corporations, inadvertently made publicly available. Microsoft Power Apps…

Risk in OT and IIoT
Critical Infrastructure Security , Endpoint Security , Governance & Risk Management CEO and CISO Panel Discusses Critical Infrastructure Protection Tom Field (SecurityEditor) • August 6, 2021 OT, IoT, IIoT – each has critical distinctions, and each is increasingly vital to protecting the world’s critical infrastructure from crippling cyberattacks. In a…

What to Know and Commentary
One of the largest disruptions of U.S. critical infrastructure by cyber-attack – the Colonial Pipeline Hack – occurred on Friday and continues to develop. Here’s what you need to know. The Colonial Pipeline company operates a pipeline transporting gasoline, diesel, and natural gas from Texas to New Jersey, serving most of the East Coast. A…