Defending Against UNC3944/Scattered Spider: Cybercrime Hardening Guidance from the Frontlines – Mandiant

Background UNC3944, which overlaps with public reporting on Scattered Spider, is a financially-motivated threat actor characterized by its persistent use of social engineering and brazen communications with victims. In early operations, UNC3944 largely targeted telecommunications-related organizations to support SIM swap operations. However, after shifting to ransomware and data theft extortion in early 2023, they impacted […]

Commentaries and Analyses, Data Breach News, News
April 27, 2025
95 views 59 secs 0

FBI IC3, Verizon DBIR, Google M-Trends reports are out—here are key takeaways

Risky Biz News reports: There are a handful of seminal reports in the cybersecurity industry, and lo and behold, three of them were released on Wednesday. Mandiant’s team, now part of Google Cloud, released M-Trends, Verizon released its Data Breach Investigations Report (aka DBIR), and the FBI Internet Crime Complaint Center (IC3) released its yearly Internet Crime Report [PDF]. […]

News, Commentaries and Analyses, Data Breach News, Legal News
April 16, 2025
93 views 54 secs 0

BakerHostetler launches 2025 Data Security Incident Response Report

BakerHostetler has released its 2025 Data Security Incident Response Report, which provides insight and analysis from more than 1,250 data security incidents managed by the firm this past year. Their report features a deep dive into critical components of security incidents (e.g., response timeline, average ransom payment amount, frequency of litigation) as well as an examination of […]

Commentaries and Analyses, News
March 05, 2025
125 views 7 secs 0

China-linked APT Silk Typhoon targets IT Supply Chain

Microsoft warns that China-backed APT Silk Typhoon, which was linked to the US Treasury hack, is now targeting global IT supply chains, using IT firms to spy and move laterally. Security Affairs reports: Microsoft reported that China-linked APT group Silk Typhoon has shifted tactics to target IT solutions like remote management tools and cloud apps […]

Commentaries and Analyses, Data Breach News, Legal News
February 15, 2025
149 views 2 mins 0

Should India adopt a threshold-based data breach reporting?

MediaNama reports: India needs a threshold-based system for data breach reporting, speakers argued at MediaNama’s discussion on the draft Digital Personal Data Protection Rules (DPDP Rules, 2025) on February 7. This came as a comment during the session on the draft rules around data breaches. MediaNama conducted this discussion under the Chatham House Rule. (Chatham […]

Commentaries and Analyses, Legal News, News
December 10, 2024
301 views 35 secs 0

Should regulators do more naming and shaming?

The U.K. Information Commissioner’s Office did an interesting two-year trial and the results suggest that publicly reprimanding public sector entities over breaches and data leaks is an effective strategy — even without any monetary penalties. Infosecurity Magazine reports: The publication of reprimands following data leaks has been cited as an “effective” deterrent for public authorities. […]

Commentaries and Analyses, Vendor News
December 03, 2024
416 views 12 secs 0

Tips for Vacation Rental, Property Mgmt. Businesses Facing Vendor Cybersecurity Risk

Lawyers at JacksonLewis write: Last year, as reported on the Maine Attorney General’s Office website, Resort Data Processing (RDP) experienced a data breach affecting over 60,000 individuals caused by a “SQL injection vulnerability which allowed an unauthorized third party to redirect payment card information from in-process transactions on our RDP’s clients’ on-premises Internet Reservation Module (“IRM”) […]