CYBERSECURITY -
Patch Adobe ColdFusion Vulnerabilities Being Exploited in the Wild ASAP -
Adobe has issued alerts on three vulnerabilities affecting its ColdFusion product. The first alert, issued on July 11, 2023,...more
7/24/2023
/ Adobe ,
Artificial Intelligence ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Framework ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Drones ,
EU ,
Hackers ,
Machine Learning ,
Vulnerability Assessments
On July 10, the European Commission (EC) published its data adequacy decision for the new EU-U.S. Data Privacy Framework (EU-U.S. DPF). This means that companies can transfer personal data from EU countries and from Iceland,...more
CYBERSECURITY FBI, CISA + MS-ISAC Warn of LockBit 3.0 Ransomware The FBI, CISA and the Multi-State Information Sharing and Analysis Center (MSISAC) recently released a joint cybersecurity advisory, warning organizations about...more
3/24/2023
/ Artificial Intelligence ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
FBI ,
Hackers ,
Homeland Security Cybersecurity & Infrastructure Security Agency (CISA) ,
TikTok ,
Vulnerability Assessments
CYBERSECURITY -
Joint Advisory Outlines Attacks by Daixin Team -
The Cybersecurity & Infrastructure Security Agency, the FBI and the U.S. Department of Health & Human Services released a Joint Advisory last week warning...more
11/4/2022
/ Biometric Information ,
California Consumer Privacy Act (CCPA) ,
California Privacy Rights Act (CPRA) ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Privacy ,
Data Protection ,
Employee Monitoring ,
EU-US Privacy Shield ,
Popular ,
Ransomware ,
Vulnerability Assessments
President Biden recently signed an executive order establishing the implementation of the new EU-U.S. Data Privacy Framework, which would provide for the possibility of the lawful transfer of personal data from the European...more
11/4/2022
/ Biden Administration ,
Court of Justice of the European Union (CJEU) ,
Cybersecurity ,
Data Protection ,
EU ,
EU-US Privacy Shield ,
Executive Orders ,
International Data Transfers ,
Personal Data ,
Personally Identifiable Information ,
Regulatory Agenda ,
Regulatory Reform ,
Schrems I & Schrems II
CYBERSECURITY -
Second Security Directive Issued by TSA to Pipeline Operators -
The U.S. Transportation Security Administration (TSA) issued its second Security Directive to the pipeline industry on July 20, 2021,...more
7/23/2021
/ Customs and Border Protection ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Drones ,
FBI ,
Hackers ,
Infrastructure ,
Location Data ,
NASA ,
Olympics ,
Pipelines ,
Ransomware ,
TSA
CYBERSECURITY -
Tulsa, OK Refuses to Pay Ransom to Attackers -
The City of Tulsa, Oklahoma, announced on May 9, 2021, that it had been hit with a ransomware attack, but the Mayor is resolute in not paying the demanded...more
Colonial Pipeline paid hackers a ransom of $4.4 million in bitcoin soon after discovering a cybersecurity hack on its systems that began on May 6. The company’s acknowledgement comes after days of speculation about whether a...more
CYBERSECURITY -
President Biden Signs Executive Order to Strengthen Cybersecurity for Federal Government Following Colonial Pipeline Attack -
President Joe Biden signed an Executive Order on Wednesday, May 12, 2021,...more
5/14/2021
/ Biden Administration ,
Critical Infrastructure Sectors ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Sellers ,
FBI ,
Hackers ,
Pipelines ,
Regulatory Agenda ,
Supply Chain
Colonial Pipeline, a company that transports more than 100 million gallons of gasoline and other fuel daily across 14 states from Houston to New York Harbor, shut down the pipeline last Friday after discovering ransomware on...more
5/14/2021
/ Biden Administration ,
Critical Infrastructure Sectors ,
Cyber Attacks ,
Cybersecurity ,
Hackers ,
National Security ,
Oil & Gas ,
Pipelines ,
Ransomware ,
Supply Chain ,
Threat Management
Cyber-attacks and Cybersecurity Failure Are Top Risks of the Next Decade Says World Economic Forum -
Although somewhat obvious, the World Economic Forum, in partnership with Marsh McLennan, SK Group and Zurich Insurance...more
2/16/2021
/ Critical Infrastructure Sectors ,
Cryptocurrency ,
Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Cybertheft ,
Data Breach ,
Data Protection ,
Hackers ,
NYDFS ,
Personally Identifiable Information ,
Popular ,
Social Media
CYBERSECURITY -
Further Fall-Out from Russian Hacking of SolarWinds -
U.S. intelligence agencies, including the FBI, the Office of the Director of National Intelligence, the National Security Agency and the Cybersecurity...more
1/8/2021
/ Browser History ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Drones ,
Federal Breach Notification Standard ,
General Data Protection Regulation (GDPR) ,
Hackers ,
Personally Identifiable Information ,
Ports ,
Russia ,
Software ,
SolarWinds
The Irish Data Protection Commission (DPC) fined Twitter 450,000 euros (about US$546,000) for failing to timely notify the Irish DPC within the required 72 hours of discovering a Q4 2018 breach involving a bug in its Android...more
1/5/2021
/ Breach Notification Rule ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Data Protection Authority ,
Enforcement Actions ,
EU ,
Failure to Notify ,
General Data Protection Regulation (GDPR) ,
Ireland ,
Regulatory Violations ,
Twitter
The Federal Bureau of Investigations Internet Crime Complaint Center (IC3) recently issued a public service announcement warning private companies about the increasing numbers of ransomware attacks affecting private industry....more
10/14/2019
/ Americans with Disabilities Act (ADA) ,
California Consumer Privacy Act (CCPA) ,
Cyber Attacks ,
Cybersecurity ,
Dentists ,
Department of Defense (DOD) ,
Drones ,
FBI ,
Federal Aviation Administration (FAA) ,
Federal Contractors ,
Hackers ,
Health Care Providers ,
OCR ,
Personal Data ,
Personally Identifiable Information ,
PHI ,
Popular ,
Ransomware ,
SCOTUS ,
Title III ,
Unmanned Aircraft Systems ,
UPS ,
Vulnerability Assessments ,
Websites ,
WhatsApp
Darkreading.com has issued a survey entitled Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web, which states that malicious insiders are responsible for 27 percent of all cybercrime. This statistic...more
12/10/2018
/ Authentication ,
Cybersecurity ,
Dark Web ,
Data Breach ,
Data Privacy ,
Drones ,
GPS ,
Hackers ,
Law Enforcement ,
Marriott ,
Personally Identifiable Information ,
Popular ,
Putative Class Actions ,
Recruitment Incentives ,
State and Local Government ,
Unmanned Aircraft Systems ,
USPS ,
Vulnerability Assessments
Inogen, which manufactures portable oxygen devices, has alerted the Securities and Exchange Commission in a recent filing that it is notifying 30,000 individuals that their personal information was compromised when a hacker...more
4/20/2018
/ Airspace ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Drones ,
EPIC ,
Federal Aviation Administration (FAA) ,
Hackers ,
Medical Devices ,
Personal Data ,
Ransomware ,
Risk Management
On the heels of the ransomware that had the City of Atlanta scrambling last week, New York City Mayor Bill de Blasio announced the launch of “NYC Secure,” a free mobile app that will alert New York City residents of...more
4/10/2018
/ Blockchain ,
Cambridge Analytica ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Distributed Ledger Technology (DLT) ,
Drones ,
Electric Vehicles ,
Electronically Stored Information ,
Facebook ,
Legislative Agendas ,
New Legislation ,
Part 107 ,
Personal Data ,
Proposed Legislation ,
Ransomware ,
Social Media ,
State Data Breach Notification Statutes ,
Taxi Cabs ,
US v Microsoft
Power Company Fined for Contractor Copying Data to its Own Insecure Network -
Vendor management continues to be a problem for all industries, but some are scarier than others. The North American Electric Reliability Corp....more
3/30/2018
/ Asset Management ,
Cloud Storage ,
Cybersecurity ,
Data Breach ,
Driverless Cars ,
Drones ,
Electronically Stored Information ,
Energy Sector ,
Federal Aviation Administration (FAA) ,
FERC ,
Fraud ,
Identity Theft ,
Infrastructure ,
NERC ,
NIST ,
Part 107 ,
Popular ,
Social Security ,
State Data Breach Notification Statutes ,
Third-Party Service Provider ,
Unmanned Aircraft Systems ,
Utilities Sector ,
Vulnerability Assessments
Russians Continue to Attack U.S. Energy and Power Sectors -
Late last week, a joint statement by the Department of Homeland Security and the Federal Bureau of Investigation confirmed that the Russian government has been...more
3/23/2018
/ Cambridge Analytica ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Driverless Cars ,
Drones ,
Energy Sector ,
Exports ,
Facebook ,
Hackers ,
Online Travel Vendors ,
Orbitz ,
Personally Identifiable Information ,
Russia ,
Trump Administration ,
Uber ,
UK Data Protection Act ,
Unmanned Aircraft Systems
Health Care Organizations Saw an 89% Increase in Ransomware in 2017 -
Our experience last year is consistent with the conclusion of a new report issued by Cryptonite in its 2017 Health Care Cyber Research Report—that the...more
1/16/2018
/ Customs and Border Protection ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Drones ,
Financial Industry Regulatory Authority (FINRA) ,
Hackers ,
Health Care Providers ,
HIPAA Audits ,
Initial Coin Offering (ICOs) ,
Malware ,
Mobile Devices ,
OCR ,
Personally Identifiable Information ,
Privacy Concerns ,
Ransomware ,
Transportation Industry
This week, the world learned of widespread and serious vulnerabilities in most central processing units (CPU). CPUs manage the instructions received from the hardware and software running on a computer. The vulnerabilities,...more
We previously warned readers about the Locky ransomware, which is potent and designed to use phishing emails to lure users to click on links and attachments, including pdfs.
Now, researchers at Cylance have discovered...more
11/20/2017
/ Antitrust Provisions ,
Big Data ,
Colleges ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Drones ,
Educational Institutions ,
Email ,
Hackers ,
Information Technology ,
Malware ,
Personally Identifiable Information ,
Ransomware ,
Universities ,
Unmanned Aircraft Systems
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
10/24/2017
/ Amazon Marketplace ,
Biometric Information ,
Biometric Information Privacy Act ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Collection ,
Drones ,
Electronically Stored Information ,
Email ,
Extraterritoriality Rules ,
Hackers ,
Hyatt ,
Microsoft ,
Mobile Devices ,
Network Security ,
Personal Data ,
Privacy Concerns ,
Public Wireless Networks ,
Risk Management ,
SCOTUS ,
Stored Communications Act ,
US-CERT ,
Vulnerability Assessments ,
Wifi ,
Wireless Technology
Privacy laws in Asia-Pacific countries such as Japan, Australia, New Zealand and Singapore restrict the export of personal information except when the exporter meets certain qualifying conditions. One qualifying condition is...more
Yahoo’s troubles for failing to timely disclose security breaches provides rare insight into quantifying the financial and other costs to a company’s shareholders and leadership when a security breach occurs and is...more
3/13/2017
/ Clawbacks ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Email ,
Hackers ,
Information Technology ,
Personally Identifiable Information ,
Securities and Exchange Commission (SEC) ,
Telecommunications ,
Verizon ,
Yahoo!