Tsaaro Weekly Privacy Newsletter
4th March, 2022
Tsaaro Weekly Privacy Newsletter
4th March, 2022

Russian troops on the border or cross-border cyber attacks? What’s scarier?

Russia’s hackers launched waves of cyberattacks as its tanks moved into Ukraine and its missiles targeted targets around the country. Ukrainian websites were defaced and taken offline in the weeks and days preceding up to the Russian invasion, and data-wiping malware was released on government networks.

According to experts, the US has almost likely planned for the greater risk of a Russian hack. In actuality, it would be surprising if the United States’ defensive postures were not already in place; the administration has very certainly deployed its defence systems.

With all of the invasions taking place in Ukraine, we can only hope and pray that what appears to be Europe’s first major war since World War II does not launch the next World War. However, experts have warned that the private sector, in particular, may not be adequately prepared, despite the fact that many businesses have been scrambling in recent years to better secure themselves against cyberattacks.

“The growth in ransomware and attacks over the past decade should have put private and public entities on alert to revamp their security postures, deploy new layers and tools, train staff, and continually improve their processes, unfortunately, cybersecurity programs are still viewed as a line item on a budget sheet, leaving many organizations and institutions vulnerable to disruption.” quoted by a Cybersecurity Expert.

In these times where we aim to grow our brand value 10x digitally each day, it is a growing concern to see private entities not focusing on securing their data and systems against cyberattacks. This is a sign for all private entities that cyberattacks need no borders and attacks can happen anytime from any part of the world.

Top Privacy & Cyber Security Updates of the Week!

Army of Cyber Hackers Rise Up to Back Ukraine

The horrific war between Ukraine and Russia is getting worse daily as the numbers of casualties are increasing day by day. But a new computer war is at the doorstep as an army of volunteer hackers is rising in cyberspace to defend Ukraine; this is a result of an initiative taken by the Digital Minister of Ukraine through which a number of people joined the group targeting the Companies and Institutions in Russia.

Read More

Army of Cyber Hackers Rise Up to Back Ukraine

The horrific war between Ukraine and Russia is getting worse daily as the numbers of casualties are increasing day by day. But a new computer war is at the doorstep as an army of volunteer hackers is rising in cyberspace to defend Ukraine; this is a result of an initiative taken by the Digital Minister of Ukraine through which a number of people joined the group targeting the Companies and Institutions in Russia.

Read More

Employee and Internal Data of Nvidia Stolen in Cyberattack

The US chip giant has admitted the alleged ransomware attack on the organization stating hackers stole proprietary information when they breached the company’s networks and have been leaking the data online. The company says the attack is nowhere impacting the business and it does not affect their service to their customers.

Read more

Employee and Internal Data of Nvidia Stolen in Cyberattack

The US chip giant has admitted the alleged ransomware attack on the organization stating hackers stole proprietary information when they breached the company’s networks and have been leaking the data online. The company says the attack is nowhere impacting the business and it does not affect their service to their customers.

Read more

US warns Chinese hackers to have their ‘most advanced’ backdoor yet

Threat hunters at Symantec are calling global attention to a new, highly sophisticated piece of malware being used by a Chinese threat actor to burrow into — and hijack data from — government and critical infrastructure targets. The malware, called Daxin, features “technical complexity previously unseen by such actors” and Security Week sources confirm it is the handiwork of a Chinese threat actor first documented by Microsoft in December 2012.

Read more

US warns Chinese hackers to have their ‘most advanced’ backdoor yet

Threat hunters at Symantec are calling global attention to a new, highly sophisticated piece of malware being used by a Chinese threat actor to burrow into — and hijack data from — government and critical infrastructure targets. The malware, called Daxin, features “technical complexity previously unseen by such actors” and Security Week sources confirm it is the handiwork of a Chinese threat actor first documented by Microsoft in December 2012.

Read more

Cyber Incident Disclosure Bill Passes in Senate Amid Fears of Russian Attacks

The invasion of Russia on Ukraine is now marking its impact on the whole world as the fear and tension can be seen in every part of the world. As the war has now reached cyberspace, the concern of every country is now on strengthening their cyber security infrastructure. In furtherance of this, the US has introduced a package of three bills named as Strengthening of American Cyber Security Act of 2022, which has been given the status of law in the senate.

Read more

Cyber Incident Disclosure Bill Passes in Senate Amid Fears of Russian Attacks

The invasion of Russia on Ukraine is now marking its impact on the whole world as the fear and tension can be seen in every part of the world. As the war has now reached cyberspace, the concern of every country is now on strengthening their cyber security infrastructure. In furtherance of this, the US has introduced a package of three bills named as Strengthening of American Cyber Security Act of 2022, which has been given the status of law in the senate.

Read more

Digital Asset launches privacy-focused blockchain Daml 2.0 for enterprise

Digital Asset, a software and services provider that helps enterprises build economic value through interconnected networks, today announced the general availability of Daml 2.0, the newest version of Digital Asset’s multi-party application platform. This version makes it easier than ever to build and deploy best-in-class, multi-party applications. Daml 2.0 includes Canton, a privacy-enabled distributed ledger that is enhanced when deployed with complementary blockchains. Canton ensures strong privacy and compliance — unique among multi-party systems — while synchronizing transactions across any supported blockchain or database.

Read more

Digital Asset launches privacy-focused blockchain Daml 2.0 for enterprise

Digital Asset, a software and services provider that helps enterprises build economic value through interconnected networks, today announced the general availability of Daml 2.0, the newest version of Digital Asset’s multi-party application platform. This version makes it easier than ever to build and deploy best-in-class, multi-party applications. Daml 2.0 includes Canton, a privacy-enabled distributed ledger that is enhanced when deployed with complementary blockchains. Canton ensures strong privacy and compliance — unique among multi-party systems — while synchronizing transactions across any supported blockchain or database.

Read more