article thumbnail

Chinese Antivirus Firm Was Part of APT41 ‘Supply Chain’ Attack

Krebs on Security

” Once inside of a target organization, the hackers stole source code, software code signing certificates, customer account data and other information they could use or resell. “SonarX served as an easily searchable repository for social media data that previously had been obtained by CHENGDU 404.” Image: DOJ.

Antivirus 359
article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

GHz and 5 GHz bands, providing high-speed wireless internet connectivity (Kurkovsky, 2006). Regulations like the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA) mandate strict adherence to data security and privacy standards (Voigt et al., H., & Yau, K.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Abnormal Security Cloud email security 2019 Private Sqreen Application security 2019 Acquired: Datadog Demisto SOAR 2018 Acquired by PAN Skyhigh Cloud security 2012 Acquired: McAfee OpenDNS Internet security 2009 Acquired: Cisco Palo Alto Networks Cloud and network security 2006 NYSE: PANW. Insight Partners.