Four ISMG editors discuss the accelerating invasion of Ukraine by Russia and its potential impact on the cybersecurity industry; whether hacktivists are the new resistance fighters and the dangers that might trigger; and how a data leak may help researchers track and fight the Conti ransomware gang.
Guidance from the Healthcare Sector Coordinating Council provides healthcare delivery organizations and vendors with recommendations for including cybersecurity in contracts pertaining to the procurement of medical device products and related services.
U.S. officials say that while it would be nearly impossible for Russia to "flip the switch" and convert to cryptocurrency to stabilize its sanctioned economy, they caution that Russian elites and entities may yet try to skirt the measures by transferring and obfuscating funds across the blockchain.
Russia's National Coordination Center for Computer Incidents has published a list of 17,576 IP addresses and 166 domains that it says are targeting the country's information resources via distributed denial-of-service attacks. It also published a 20-point list of remediation measures.
Ransomware gang Lapsus$ has leaked credentials of 71,000 Nvidia employees on a Telegram page, Information Security Media Group has found. The data was stolen in a breach, data breach notification service Have I Been Pwned confirms.
Critical cybersecurity gaps in smart infusion pumps have put the data and care of hundreds of patients at risk, according to researchers at Unit 42 of cybersecurity firm Palo Alto Networks. They say that 75% of the 200,000 smart infusion pump networks they scanned contained known security gaps.
As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
This ISMG Security Report analyzes why Russia has not yet launched full-scale cyberattacks in Ukraine and the West and what we might expect to come. It also describes how organizations can bolster cyber defenses in times of crisis and outlines mistakes organizations make following a cyber incident.
A newly released conversation between two members of the Conti ransomware gang reveals concern about the war in Ukraine and its potential to disrupt their lucrative extortion racket. The conversation took place just a day before a massive data leak exposed the gang's inner workings.
Amid escalating violence in Ukraine and sanctions meant to hobble Moscow, the Senate has passed a landmark cybersecurity package that bundles three substantial measures - mandatory incident reporting for critical infrastructure, an update to federal IT security strategy, and FedRAMP authorization.
Global Insurance broker Aon has disclosed to the U.S. Securities and Exchange Commission that the company suffered a cyber incident that affected a limited number of systems. The incident was discovered on Feb. 25, and there is no indication of a breach of any corporate or customer information.
Ukrainian online newspaper Pravda has published what it says are details on 120,000 Russian soldiers, citing Ukraine's Center for Defense Strategies as the source. But chatter seen by Information Security Media Group on Telegram suggests that the source of the dataset is the hacker group ENIGMA.
Expel is out with its new forward-looking report, "Great eXpeltations," and ransomware and cryptojacking are among the topics covered. Jon Hencinski of Expel and Michael Darling of Venable share insights on attack trends and how to defend against them.
Monongalia Health System, a West Virginia-based entity that reported a phishing breach in December, affecting nearly 399,000 individuals, this week reported a separate security incident that appears to have potentially involved ransomware. Are the incidents related?
Federal authorities are warning healthcare and public health sector entities to be proactive and vigilant to at least three main potential threat groups, as well as various wiper malware, linked with Russia's attack on Ukraine.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.