Threat actors are sending SMS texts to trick banking customers into downloading new and improved Vultur banking malware that interacts with infected devices and alters files. Vultur typically misuses legitimate applications, enabling remote access to the VNC server on targeted devices.
Rubrik became the first security company to pursue an initial public offering since 2021, revealing increased sales, mounting losses and a heavy reliance on three channel partners. Rubrik said 76% of its $627.9 million in sales for the fiscal year ended Jan. 31 flowed through three channel partners.
A Department of Health and Human Services division that administers funding, training and other services to children and families is putting sensitive data at high risk because of gaps in cloud security controls and practices, according to a watchdog agency report.
Google says it will delete web browsing data generated by 136 million individuals who used the tech giant's Chrome browser in Incognito mode as part of a proposed settlement ending a class action lawsuit alleging the tech giant had misled consumers about privacy protections.
How are U.S. telecommunications firms combating illicit location tracking being used by bad actors at home and abroad against their subscribers? That's the focus of a new call for comment from the Federal Communications Commission, which wants to know whether or not existing defenses are working.
In a deep dive into the cybersecurity's industry's shift toward platformization, Netskope CEO Sanjay Beri explores the nuances of integrating multiple security services, the importance of truly integrated platforms and the future of cybersecurity architecture.
Nation-state attackers apparently backdoored widely used, open-source data compression software as part of a supply chain attack. Malicious code inserted into recent versions of XZ Utils was designed to facilitate full, remote access to an infected system.
The banking and financial services industry will see an increase in scams and frauds perpetrated through fake businesses, incentivizing bad actors to continue creating these fraudulent entities, said Mary Ann Miller, a fraud and cybercrime executive adviser with Prove.
In the latest weekly update, legal expert Jonathan Armstrong joined three ISMG editors to discuss the Department of Justice's antitrust lawsuit against Apple, ransomware payment dilemmas and AI copyright infringement fears - highlighting the intricate legal issues shaping big tech and cybersecurity.
Faced with relentless cyberattacks and the shortcomings of existing defenses, Sanaz Yashar embarked on a journey to create a security risk and mitigation platform, transforming frustration into startup Zafran, which emerged from stealth Thursday with more than $30 million in funding.
Coro completed a $100 million Series D round to expand its global footprint and enhance its channel program. The funding aims to address the needs of Europe's expansive midmarket business community through Coro's all-in-one modular cybersecurity platform.
The Office of Management and Budget issued the first-ever governmentwide guidance for mitigating risks associated with the federal use of artificial intelligence, including specific actions agencies must complete within a year to help ensure the responsible use of emerging tools and technologies.
What will it take to rid the world of SQL injection vulnerabilities, which remain too easily exploitable by attackers for ransacking databases and worse, despite having been classified as "unforgivable" for nearly two decades? U.S. government cybersecurity officials have thoughts.
According to a survey done by Forrester Consulting on IT decision makers in Australia and New Zealand, 46% of the organizations are interested in adopting the ZTNA strategy.
Zero Trust Network Access (ZTNA) is a foundational enabler in todays’ digital environment and this webinar delves deep into the strategies...
The Change Healthcare attack - the most disruptive cyber incident to ever hit the U.S. healthcare ecosystem - spotlights the risks that come from relying on a handful of major suppliers, said leaders of the Health Information Sharing and Analysis Center.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.