Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dark Pink APT Attacks

A recent wave of advanced persistent threat (APT) attacks is spreading throughout the Asia-Pacific (APAC) region, and these have been attributed to a newly identified group known as Dark Pink (also referred to as the Saaiwc Group). While evidence suggests that Dark Pink commenced its operations as early as mid-2021, the group’s activities escalated notably in the latter part of 2022.

Mega-Luxury Casino Owned by Las Vegas Sands Suffers Data Breach

In Singapore, there is a massive luxury resort named the Marina Bay Sands (MBS); its owner is state-side, known as the Las Vegas Sands (LVS). LVS hosts 11 properties in Asia and the US—MBS hosts more than 2,500 rooms. MBS is a vast resort with more than a million feet of entertainment options and 50+ on-campus restaurants. Sand’s knows a lot about their clients, and following a recent data breach, so do hackers.

BrickLink, LEGO Fanatic Building Site, Allegedly Targeted by Ransomware

The ever-changing universe of LEGO dominates the toy industry; LEGO is one of the most recognizable toy brands in the world, a perk of which is die-hard fans. LEGO fanatics flock to BrickLink, a privately owned website where individuals can design, sell, and buy block sets. LEGO also features some designs following community voting. An estimated 1.4 million people have registered accounts with the platform, including sellers and consumers.

Lessons from an InfoSec Icon: A Fireside Chat with PCI Guru Jeff Hall || Razorthorn Security

Hello and welcome to Razorwire, the podcast where we delve into the world of cybersecurity with top experts and industry leaders. I'm your host, James Rees, and I can't wait to share this episode with you. As a PCI DSS QSA, I’m delighted to have PCI expert Jeff Hall as my guest today. This episode will give you a unique perspective on how security has evolved from early mainframe days to today's interconnected, risk-focused practices. Jeff tells us about his hard-won lessons and wisdom gathered over decades steering information security programmes including the need for compliance to work alongside overall security and not hinder it, and why auditors should be viewed as allies, not adversaries.

A Guide to GDPR Article 30: RoPA (Records of Processing Activities)

Data privacy has never been more critical for business success as it is today, and organizations worldwide are grappling with the stringent requirements of the General Data Protection Regulation (GDPR). One crucial aspect of GDPR compliance is maintaining a Record of Processing Activities (RoPA), which serves as a testament to an organization’s commitment to data protection. But what exactly is a RoPA, and how can organizations create and manage one effectively?

Healthcare Trends that Impact Physical and Digital Security

It is of critical importance for healthcare institutions to ensure the safety of medical personnel, patients, records, equipment, and facilities. This must be done with minimal disruption to the doctors and nurses who are administering care. As healthcare facilities review and upgrade their physical and digital security systems, here are key trends impacting future healthcare.

Threat Assessment: Connected Medical Devices

The terminology that describes medical devices and connected medical devices can be confusing. Let’s start by looking at how these devices are defined. Medical Device: a contrivance designed and manufactured for use in healthcare, and not solely medicinal or nutritional. Internet of Medical Things (IoMT): devices linked to cloud platforms that store and analyze data.

Importance of Encryption in Messaging Apps

It's almost impossible to imagine modern life without using messengers and other text apps. We have all become more or less dependent on convenient online communication. After all, it is also lightning-fast. We use messaging apps for work, and to communicate with friends and family. And also to share personal information. Yet, are we sure that our content actually remains private? What is clear is that as the volume of digital communication increases, so does the importance of ensuring the privacy and security of our content.