article thumbnail

Ukraine’s GUR hacked the Russian Ministry of Defense

Security Affairs

Stolen documents include: confidential documents, including orders and reports circulated among over 2000 structural units of the Russian military service. software used by the Russian Ministry of Defense to encrypt and protect its data. ” reads the press release published by Ukraine’s GUR.

Hacking 121
article thumbnail

Navigating Compliance: Understanding India's Digital Personal Data Protection Act

Thales Cloud Protection & Licensing

This act, set to replace the existing frameworks under the Information Technology Act of 2000 and the SPDI Rules of 2011, provides a comprehensive approach to protecting digital personal data. It limits administrators' control over security activities and encryption keys, supporting two-factor authentication.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RansomBoggs Ransomware hit several Ukrainian entities, experts attribute it to Russia

Security Affairs

Sandworm (aka BlackEnergy and TeleBots ) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST). RansomBoggs encrypts files using AES-256 in CBC mode and appends the.chsch extension to the encrypted files.

article thumbnail

Ransomware related news headlines trending on Google

CyberSecurity Insiders

And it later paved the way to the spread of file encrypting malware onto the networks of over 13 firms, out of which 2 victims paid $2000 in BTC to regain access to their locked out systems. More details about the ransomware group involved in the incident will be updated after confirmation!

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

It foreshadowed how encryption would come to be used as a foundation for Internet commerce – by companies and criminals. Today companies face a challenge of identifying and deflecting encrypted traffic leveraged by malicious actors. The ILOVEYOU Worm (2000). This was considered a significant win for the U.S.

article thumbnail

Ransomware attack on PrismHR and Worlds largest Dairy Farm Lactalis

CyberSecurity Insiders

A ransomware attack is said to have taken place on the servers of PrismHR that offer Payroll related services to around 2000 companies across the world. PrismHR is yet to release an official statement on this note.

article thumbnail

Chinese actors behind attacks on industrial enterprises and public institutions

Security Affairs

The CVE-2017-11882 flaw is a memory-corruption issue that affects all versions of Microsoft Office released between 2000 and 2017. The emails used weaponized Microsoft Word documents exploiting the CVE-2017-11882 vulnerability. The vulnerability affects the MS Office component EQNEDT32.EXE