article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Health Insurance Portability and Accountability Act (HIPAA).

CSO 128
article thumbnail

The Microsoft Exchange Server hack: A timeline

CSO Magazine

Over the next few days, over 30,000 organizations in the US were attacked as hackers used several Exchange vulnerabilities to gain access to email accounts and install web shell malware , giving the cybercriminals ongoing administrative access to the victims' servers.

Hacking 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Okta revealed that its private GitHub repositories were hacked this month

Security Affairs

American identity and access management giant Okta revealed that that its private GitHub repositories were hacked this month. Okta revealed that its private GitHub repositories were hacked this month, the news was first reported by BleepingComputer which had access to ‘confidential’ email notification sent by Okta.

Hacking 99
article thumbnail

Podcast Episode 113: SAP CSO Justin Somaini and Election Hacks – No Voting Machines Required!

The Security Ledger

Everybody worries about hacked voting machines. In this week’s podcast (#113): Everybody worries about hacked voting machines. A shadowy hacking group calling itself the “Broken Eagle Task Force” (or BETF) is protesting the ‘global order,’ and looking to disrupt voting within the city’s environs. SAP CSO Justin Somaini.

CSO 40
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. — Dave Kennedy (@HackingDave) July 15, 2020. .

article thumbnail

Atomic Wallet hack leads to at least $35M in stolen crypto assets

CSO Magazine

A cyberattack on crypto wallet Atomic Wallet has resulted in at least $35 million worth of crypto assets being stolen since June 2, according to ZachXBT, an independent on-chain investigator known for tracing stolen crypto funds and assisting with hacked projects. The five most significant losses account for $17 million.

Hacking 96
article thumbnail

Hacking 2FA: 5 basic attack methods explained

CSO Magazine

As Roger Grimes wrote in this article about two-factor hacks three years ago, when MFA is done well it can be effective, but when IT managers take shortcuts it can be a disaster. of compromised accounts did not use MFA at all and only 11% of enterprise accounts are protected by some MFA method.

Hacking 122