Recent high-profile security breaches have shown how cyber criminals are actively exploiting expanded network perimeters and weak authentication implementations to drive successful account takeovers and fraud across financial services. The New York Department of Financial Services Report on the 2020 Twitter hack...
French cybersecurity authorities are warning that widely used, open-source IT monitoring software called Centreon appears to have been hit by Russian hackers. But unlike the SolarWinds supply chain attack, in this campaign, attackers appear to have hacked outdated, unpatched versions of the software.
The ongoing lockdown may be complicating the path of Cupid's arrows. But as another Valentine's Day rolls around, authorities are warning that romance scammers - and other types of fraudsters - are alive and well and have been increasingly preying on unsuspecting victims around the world.
Bad bots are on every website with a login page. Even yours. Hackers and fraudsters use bots to validate sets of login credentials, gain access to credit card data, and sell personally identifiable information on the dark web They also use stolen account data to transfer money, purchase goods, or spread a specific...
Good news in the fight to prevent COVID-19 infections: Researchers report that a digital contact-tracing app rolled out in England and Wales that's designed to keep users' data private and secure is helping to blunt the spread of the pandemic. They urge continuing global uptake of such apps.
It is essential that government organizations and the private sector bodies in their supply chain have the
right solutions in place to minimize the risk of data loss in the public sector. Systems for data classification
and data loss prevention allow organizations to effectively control and manage data and ensure...
While many details about the SolarWinds Orion hack and full victim list remain unknown, experts have ascribed the apparent espionage campaign to Russia. Now, however, Reuters reports that a separate group of Chinese hackers was also exploiting SolarWinds vulnerabilities to hack targets.
From both a regulatory and a security perspective, it’s not enough to simply perform a risk analysis. The HIPAA Security Rule requires and today’s rapidly evolving threat landscape demands that healthcare organizations respond to the risks identified appropriately and effectively.
Read this guide for expert...
With ransomware continuing to fuel a massive surge in illicit profits, some experts have been calling on governments to launch offensive hacking teams to target cybercrime cartels. They're also calling for a review of cyber insurance payouts being used to fund ransoms.
Cybersecurity is a dynamic volatile environment, and security leaders must confront fast-paced business driven change and evolving threats. To do that, they must operationalize and automate the MITRE ATT&CK framework knowledge base of threats, tactics and techniques, as well as the skills and capabilities of their red...
New medical device technology makes it possible to deliver better patient care but generates enticing new opportunities for cyberattacks.
Read this ebook to learn how to protect healthcare data.
When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial to protecting brand equity and revenue. Cloud technology has eliminated the traditional network perimeter, leaving unsecured mobile endpoints vulnerable to attack. According to recent analyst research, mobile finance apps...
Good news on the cybercrime front: "Cryptocurrency-related crime fell significantly in 2020," compared to 2019, reports blockchain analysis firm Chainalysis. Unfortunately, in the same timeframe, ransomware profits surged 311%, stoking calls for a crackdown on ransom payments.
The new Biden administration has pledged to hold Russia accountable for its recent "reckless and adversarial" actions and has ordered a full-scale intelligence review of the SolarWinds hack. The moves signal the importance of cybersecurity to President Biden's national security agenda.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.