Operational technology will gain more malicious attention from state-backed hackers, warns the European Union Agency for Cybersecurity. Geopolitics is driving changes in the threat landscape and the agency predicts retaliatory attacks for Western support of Kyiv.
All employees should consider upholding the security of the organization part of their job regardless of their official role at the company, says Equifax Business Information Security Officer Michael Owens. But creating an organization-wide cybersecurity culture is easier said than done.
North Korean state hacking group Kimsuky is developing Android malware targeted at South Korean users by disguising the apps as legitimate apps including a Google security plug-in and a document viewer. Seoul-based cybersecurity company S2W dubs the apps FastFire, FastSpy and FastViewer.
Parliament IT systems in two East European capitals were disrupted Thursday. The Poland Senate said a distributed denial-of-service attack partially originated from inside Russia. In Slovakia, a Parliament speaker postponed voting after telling lawmakers that vote-counting systems were not working.
The problem of zero-day exploits used by advanced spyware makers such as NSO Group is an urgent problem requiring government intervention, a Google cybersecurity executive told the European Parliament committee investigating member nations' use of the Pegasus spy app.
Apple has issued a slew of security updates amid reports that its iOS devices are being actively exploited via a zero-day vulnerability in the kernel. While Apple hasn't attributed the exploits to any specific group, experts say surveillance malware developers are a likely culprit.
Emennet Pasargad, the Iranian cyber threat actors behind an attempt to disrupt the U.S. presidential election in 2020, remains active, warns the FBI. The group conducts hack-and-leak operations and targeted a U.S. organization with a destructive attack within the last year.
Researchers from cybersecurity firm Eset found a variant of Android stalkerware dubbed FurBall slightly modified in a semi-successful bid to evade detection. The malware, dubbed FurBall, is a tool used by a hacking group linked to the Iranian government.
A new round of Pegasus infections among journalists and a human rights activist is sending shock waves into Mexican politics as the attorney general's office says it is investigating the previous presidential administration's purchase of the smartphone spy app.
Cybersecurity firm Eset says its spotted multiple hacks in Israel coming from a Lebanese threat group dubbed Polonium that's affiliated with Iran. The group employs custom-coded backdoors that use a slew of cloud storage accounts to handle command and control.
Self-proclaimed Russian hacktivist group KillNet took responsibility for distributed denial-of-service attacks launched against the public websites of several U.S. airports. It emerged in the wake of Russia's invasion of Ukraine and in May tried to stop online voting for the Eurovision Song Contest.
Count Log4Shell among Chinese hackers' favorite vulnerabilities, federal agencies say in a compilation of top exploits used by Beijing for state-sponsored cyber theft and espionage. Chinese state-sponsored hacking remains "one of the largest and most dynamic threats," warn the FBI, NSA and CISA.
In the latest weekly update, ISMG editors examine the story of a Maryland couple facing charges for giving military medical records to Russia, the sentencing of a former Seattle tech worker for her massive Capital One hack, and why David Hatfield resigned as co-CEO of cloud security vendor Lacework.
Compromised or stolen credentials are the most common initial cyberattack vector, averaging a cost of $4.5 million to organizations.
No matter their means of entry — brute force or dictionary attacks, credential stuffing, identifying misconfigured cloud resources, or phishing — credential-based attacks are...
Over his 23-year career in cybersecurity, Tom Kellermann has focused on policy, endpoints and even strategic investments. Now, in his new role as senior vice president of cyber strategy at Contrast Security, his mission is to protect code security - particularly in the public and financial sectors.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.