Tag: office
-
Hacking Group ‘Silk Typhoon’ Linked to US Treasury Breach
The attack used a stolen remote support SaaS API key to exfiltrate data from workstations in the Treasury Department’s Office of Foreign Assets Control. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/hacking-group-silk-typhoon-linked-us-treasury-breach
-
US Treasury hack linked to Silk Typhoon Chinese state hackers
Chinese state-backed hackers, tracked as Silk Typhoon, have been linked to the U.S. Office of Foreign Assets Control (OFAC) hack in early December. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-treasury-hack-linked-to-silk-typhoon-chinese-state-hackers/
-
The biggest data breach fines, penalties, and settlements so far
Tags: access, apache, attack, breach, business, china, ciso, communications, compliance, control, credentials, credit-card, cyberattack, cybercrime, cybersecurity, data, data-breach, email, finance, flaw, framework, GDPR, google, hacker, Hardware, identity, Internet, law, leak, linkedin, microsoft, mobile, monitoring, network, office, phone, privacy, regulation, risk, service, software, technology, tool, training, update, vulnerabilitySizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data.Hit with a $ 1.3 billion fine for unlawfully transferring personal data from the European Union to the US, Meta tops the list of recent big-ticket sanctions, with one…
-
National Cyber Director Harry Coker looks back (and ahead) on the Cyber Director office
It’s made real strides, but there’s a lot more that it could be doing, he said, and more that needs to be done. First seen on cyberscoop.com Jump to article: cyberscoop.com/national-cyber-director-harry-coker-looks-back-and-ahead-on-the-cyber-director-office/
-
CISA Investigates Chinese Hacking of Treasury Department
US Cyber Defense Agency Confirms Role in Federal Probe Following ‘Major Incident’. The Cybersecurity and Infrastructure Security Agency is working closely with the Treasury Department in an ongoing investigation to determine the full scale and scope of a Chinese-linked hack targeting key offices tasked with sanctions enforcement, the agency confirmed Monday. First seen on govinfosecurity.com…
-
US Treasury office sanctions firm connected to state-sponsored Flax Typhoon threat group
A Beijing-based cybersecurity company, Integrity Technology Group Inc., is linked to years of exploitation activity targeting U.S. critical infrastructure. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/treasury-sanctions-flax-typhoon/736538/
-
U.S. Sanctions Chinese Cybersecurity Firm for State-Backed Hacking Campaigns
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Friday issued sanctions against a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyber attacks against U.S. victims.These attacks have been publicly attributed to a Chinese state-sponsored threat actor tracked as Flax Typhoon (aka Ethereal Panda or First seen on…
-
U.S. Treasury Sanctions Beijing Cybersecurity Firm for State-Backed Hacking Campaigns
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Friday issued sanctions against a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several cyber attacks against U.S. victims.These attacks have been publicly attributed to a Chinese state-sponsored threat actor tracked as Flax Typhoon (aka Ethereal Panda or First seen on…
-
US government sanctions Chinese cybersecurity company linked to APT group
The US Department of Treasury’s Office of Foreign Assets Control (OFAC) has issued sanctions against a Beijing cybersecurity company for its role in attacks attributed to a Chinese cyberespionage group known as Flax Typhoon.The company, called Integrity Technology Group (Integrity Tech), is accused of providing the computer infrastructure that Flax Typhoon used in its operations…
-
Treasury’s sanctions office reportedly subjected to Chinese hack
First seen on scworld.com Jump to article: www.scworld.com/brief/treasurys-sanctions-office-reportedly-subjected-to-chinese-hack
-
Around 3.3 million POP3 and IMAP mail servers lack TLS encryption
Over 3 million POP3 and IMAP mail servers lack TLS encryption, exposing them to network sniffing attacks. ShadowServer researchers reported that around 3.3 million POP3 and IMAP mail servers lack TLS encryption, exposing them to network sniffing attacks. POP3 (Post Office Protocol 3) and IMAP (Internet Message Access Protocol) are two protocols used to retrieve…
-
Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raid
OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop First seen on theregister.com Jump to article: www.theregister.com/2025/01/02/chinese_spies_targeted_sanctions_intel/
-
Chinese Hack Breached US Sanctions Office in Treasury Attack
Hackers Reportedly Target Treasury Department Offices Overseeing Economic Sanctions. A Chinese hack of the U.S. Department of Treasury targeted offices tasked with overseeing economic sanctions and financial investigations, as experts warn Beijing is increasingly escalating attacks on American critical infrastructure while preparing for potential future conflict. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/chinese-hack-breached-us-sanctions-office-in-treasury-attack-a-27202
-
Chinese hackers targeted sanctions office in Treasury attack
Chinese state-backed hackers have reportedly breached the Office of Foreign Assets Control (OFAC), a Treasury Department office that administers and enforces trade and economic sanctions programs. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/chinese-hackers-targeted-sanctions-office-in-treasury-attack/
-
Five Things To Know On The ‘Major’ US Treasury Department Hack
A China-linked breach tied to the compromise of BeyondTrust’s remote support tool has reportedly led to the breach of multiple offices within the U.S. Treasury Department. First seen on crn.com Jump to article: www.crn.com/news/security/2024/5-things-to-know-on-the-major-us-treasury-department-hack
-
Data Breaches in the USA in December 2024: 8,172,797 People Impacted
Analyzing the Maine Attorney General’s data For December 2024, IT Governance USA’s analysis of the Office of the Maine Attorney General’s data breach notifications found the following: We look at what’s reported to a regulator to help us identify significant real-world trends and patterns. We chose the Office of the Maine Attorney General as this…
-
Blown the cybersecurity budget? Here are 7 ways cyber pros can save money
Tags: access, advisory, ai, automation, business, cio, ciso, cloud, control, cyber, cybersecurity, finance, governance, group, guide, infrastructure, intelligence, international, jobs, office, risk, service, skills, software, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementIt’s hard to find a CISO or cybersecurity leader who has the money they need to pay for all the work they want to do.A majority of CISOs (57%) said they expect to see an increase in their cybersecurity budgets over the next one to two years, according to Deloitte’s Global Future of Cyber Report,…
-
The Dark Side of Virtual Offices: How Criminals Exploit Flexibility
Security researcher Lewis Henderson from Team Cymru unveils the shadowy underbelly of virtual office services. Praised for their ability to offer cost-effective flexibility to businesses, these services have become an... First seen on securityonline.info Jump to article: securityonline.info/the-dark-side-of-virtual-offices-how-criminals-exploit-flexibility/
-
Cybersecurity Snapshot: What Looms on Cyberland’s Horizon? Here’s What Tenable Experts Predict for 2025
Tags: access, ai, attack, best-practice, breach, business, cisa, ciso, cloud, computer, cyber, cyberattack, cybercrime, cybersecurity, dark-web, data, data-breach, exploit, flaw, guide, hacker, ibm, incident response, intelligence, lessons-learned, monitoring, office, resilience, risk, service, software, strategy, threat, tool, training, update, vulnerability, vulnerability-management, zero-trustWondering what cybersecurity trends will have the most impact in 2025? Check out six predictions from Tenable experts about cyber issues that should be on your radar screen in the new year, including AI security, data protection, cloud security… and much more! 1 – Data protection will become even more critical as AI usage surges…
-
How Will Health Data Privacy, Cyber Regs Shape Up in 2025?
Washington and Nevada were among states enacting new data privacy laws in 2024, and that trend among states will likely continue into 2025 as the next presidential administration comes into office promising to reduce federal regulations, said attorney Melissa Crespo of law firm Morrison Foerster. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/how-will-health-data-privacy-cyber-regs-shape-up-in-2025-i-5431
-
7 biggest cybersecurity stories of 2024
Tags: access, ai, alphv, at&t, attack, authentication, breach, business, china, cio, ciso, citrix, cloud, credentials, crowdstrike, crypto, cyber, cybercrime, cybersecurity, data, data-breach, deep-fake, detection, email, espionage, exploit, extortion, finance, google, government, group, hacking, healthcare, incident response, infection, insurance, intelligence, international, jobs, lockbit, malicious, malware, mandiant, mfa, microsoft, network, nis-2, north-korea, office, phishing, phone, privacy, ransomware, regulation, risk, risk-management, scam, service, software, strategy, tactics, technology, threat, ukraine, update, vulnerability, windowsCybersecurity headlines were plenty this year, with several breaches, attacks, and mishaps drawing worldwide attention.But a few incidents in particular had far-reaching consequences, with the potential to reshape industry protections, shake up how vendors secure customers’ systems, or drive security leaders to reassess their strategies.Longer-term trends such as increased cybersecurity regulations and the impact of…
-
State Department’s disinformation office to close after funding nixed in NDAA
The Global Engagement Center, which tracks and exposes foreign disinformation narratives in foreign countries, will see its authority to operate expire Dec. 24. First seen on cyberscoop.com Jump to article: cyberscoop.com/state-departments-disinformation-office-to-close-after-funding-nixed-in-ndaa/
-
Microsoft fixes bug behind random Office 365 deactivation errors
Microsoft has rolled out a fix for a known issue that causes random “Product Deactivated” errors for customers using Microsoft 365 Office apps. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-fixes-bug-behind-random-office-365-deactivation-errors/
-
ICO Warns of Mobile Phone Festive Privacy Snafu
The Information Commissioner’s Office has warned that millions of Brits don’t know how to erase personal data from their old devices First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ico-warns-festive-mobile-phone/
-
Enhance Microsoft security by ditching your hybrid setup for Entra-only join
Tags: ai, authentication, business, cloud, compliance, conference, credentials, email, firewall, group, identity, infrastructure, intelligence, Internet, microsoft, network, ntlm, office, powershell, risk, service, switch, technology, tool, vpn, windowsArtificial intelligence is top of mind for nearly everything Microsoft is doing these days, but there’s another goal the company would like to see its users strive to attain, one that may not be easily obtained, and that’s to be Entra-joined only.That means no more Active Directory (AD) and no more traditional domain: instead, your…
-
Cybersecurity Snapshot: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
Tags: access, ai, authentication, best-practice, business, china, cisa, cisco, cloud, computer, control, cyber, cybersecurity, data, data-breach, email, extortion, finance, framework, fraud, google, government, guide, hacker, identity, incident, incident response, infrastructure, intelligence, international, Internet, jobs, korea, kubernetes, law, lessons-learned, linux, login, malicious, microsoft, mobile, monitoring, network, north-korea, office, password, regulation, risk, risk-management, russia, service, software, tactics, technology, threat, tool, updateCheck out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the U.S. cyber incident response framework; the CIS Benchmarks; and local and state governments’ cyber challenges. Dive…
-
Managing Threats When Most of the Security Team Is Out of the Office
During holidays and slow weeks, teams thin out and attackers move in. Here are strategies to bridge gaps, stay vigilant, and keep systems secure during those lulls. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/managing-threats-when-security-on-vacation

