Online attackers are increasingly targeting the financial services sector. John Fokker, head of cyber investigations at Trellix, says his firm has charted a 22% quarterly increase in ransomware attacks on financial services, and APT detections have risen by 37%. Here's how the industry must respond.
Police in London say they've arrested seven people that the BBC reports are tied to the Lapsus$ hacking group, which has claimed responsibility for data breaches involving Okta, Microsoft, Nvidia, Ubisoft and more. The names of the suspects, who are mostly teenagers, have not been released.
Corporations are faced every day by insider and outsider threats and the Zero-Trust security approach is quickly becoming the standard for both corporations and federal agencies. While ZTN (Zero Trust Network Access) solutions are helping these corporations and agencies enhance control over their security...
TLS machine identity-related outages—from expired, misconfigured or unknown TLS certificates—are the Achilles heel of digital transformation projects. Do it wrong and perfectly functioning applications and services can be rendered inoperable. Worse still the security controls you rely on, from traffic inspection...
The number of major health data breaches posted to the federal tally so far in 2022 - and the total number of individuals affected by those breaches - has surged in recent weeks as reports of large hacking incidents continue to flow in to regulators.
Yet another ransomware-wielding group of criminals has hit an organization in the health sector. This time, it's cybercrime group RansomEXX, which has been trumpeting an attack against the Scottish Association for Mental Health. The crime gang says it has stolen more than 12GB of data from SAMH.
The integration of third-party components and software is an increasingly critical area of security risk that needs more attention from medical device manufacturers, says Anura Fernando, global head of medical device security at safety certification firm UL.
Today’s malware has evolved and become more sophisticated to evade detection. Even with the most up-to-date Advance Endpoint Protection (AEP), there can be attacks that get through, like fileless malware that uses authorized applications and protocols to perform malicious actions.
This whitepaper, Reduce Your...
As the Ukrainian military resists Russian advances toward its major population centers, its IT security teams are contending with record cyber incidents - although the same is true of their eastern neighbors, with Russia reporting "unprecedented" cyberattacks on its networks.
If Russia uses hack attacks to support its invasion, would Western governments want to immediately attribute those attacks or disruptions? Enter a Thursday alert from the U.S. government warning that it is "aware of possible threats to U.S. and international satellite communication networks."
Business leaders and CISOs continue to struggle with data security challenges that make it increasingly more difficult to guard against today’s cyber threats.
Download this whitepaper to learn about new data security software solutions to protect sensitive data more effectively.
Key topics include:
Data...
The pandemic has raised the ante significantly for the attack surface and the level of insider threats facing healthcare sector entities, according to Dave Bailey, vice president of security services, and attorney Andrew Mahler, vice president of privacy and compliance, of consultancy CynergisTek.
It is critical for medical device manufacturers to take a threat modeling approach early in a product's design stage, say MITRE medical device cybersecurity experts Margie Zuk and Penny Chase, co-authors of the recently released Playbook for Threat Modeling Medical Devices commissioned by the FDA.
To survive in today’s cyber threat landscape, security teams need the right resources paired with the appropriate strategy. Many organizations turn to managed security services (MSS) and managed detection and response (MDR) services, but many of the providers aren’t delivering the outcomes that clients had been...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.