Manage subject rights requests at scale with Microsoft Priva

Credit to Author: Lauren Goodwin| Date: Wed, 16 Mar 2022 16:00:00 +0000

Having the right technology and processes in place can make it possible to manage a large volume of SRRs efficiently and auditable. This post discusses SRR response use cases and how Microsoft Priva subject rights requests can be used for this purpose.

The post Manage subject rights requests at scale with Microsoft Priva appeared first on Microsoft Security Blog.

Read more

Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 16 Mar 2022 15:00:00 +0000

The Microsoft Defender for IoT research team has recently discovered the exact method through which MikroTik devices are used in Trickbot’s C2 infrastructure. In this blog, we share the analysis of this method and provide insights on how attackers gain access and how they use compromised IoT devices in Trickbot attacks.

The post Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure appeared first on Microsoft Security Blog.

Read more

CafePress faces $500,000 fine for data breach cover up

Credit to Author: Pieter Arntz| Date: Wed, 16 Mar 2022 14:57:42 +0000

The FTC has taken action against CafePress for the cover up of a data breach. The company is accused of lax security and deceptive practices.

The post CafePress faces $500,000 fine for data breach cover up appeared first on Malwarebytes Labs.

Read more