As fresh wiper malware attacks target Ukrainian government and financial services organizations and contractors, security experts are urging organizations outside the country to avoid catastrophizing and stay focused on maintaining basic, essential cybersecurity defenses.
Older consumers are considered a more vulnerable population. They are the best kind of customers, and cybercriminals know that. They are known for having better credit and more funds, tend to be more trusting, and lack familiarity with new digital technologies. Fortunately, there is a way to help financial...
Russia-linked threat actor Sandworm aka Voodoo Bear has been found using a new malware, dubbed Cyclops Blink. Law enforcement and intelligence agencies in the U.S. and the U.K. have shared details of the malware, as well as the threat group's TTPs and indicators of compromise.
Technology giant ASUS subsidiary Asustor, which specializes in network-attached storage devices, on Friday issued updated guidelines on eliminating the Deadbolt ransomware strain from its NAS devices.
What's the price of a ransomware hit that disrupts a nation's critical infrastructure? Beyond months of patient disruption, Ireland's Health Service Executive says the May 2021 Conti ransomware attack against it could lead to $110 million in cleanup costs, plus more to revamp its IT infrastructure.
NBC News reports that President Joe Biden has been given a menu of options for conducting offensive cyber strikes again Russia. But the White House's press secretary says the report is "off base and does not reflect what is actually being discussed in any shape or form."
As Russia's military invasion and cyberattacks on Ukraine escalate, critical infrastructure entities, including those in the health sector of the U.S. and other countries condemning Russia's actions, must also be on high alert for potentially disruptive cyber assaults, some experts warn.
By baselining cyber maturity, one can create an organization's risk profile - and that is the key to being able to build a road map for prioritizing and addressing business risk. ISACA's Brian Fletcher shares insights on establishing the maturity goals for one's unique organization.
"Shadow data" - it's the new "shadow IT," and it puts your enterprise data at potential risk in public cloud environments. Amit Shaked, CEO and co-founder of Laminar, defines the risk, explains the threat and describes how best to mitigate it.
The ISMG Security Report analyzes the latest updates on the Ukraine-Russia crisis and offers cyber resiliency tips for organizations. It also describes how the Conti ransomware group has hired TrickBot malware developers and revisits one of the largest ransomware attacks ever in the U.S.
A week after a distributed denial-of-service attack on the Ukrainian Ministry of Defense, a DDoS attack has reportedly struck Ukranian government and bank websites - including the Ukrainian Ministry of Foreign Affairs, the Cabinet of Ministers and Verkhovna Rada, according to an early report.
The Ukrainian cyber police have arrested five individuals charged with stealing credit card data from at least 70,000 people, using 40 separate phishing sites. The losses from the attack are reported to amount to more than $172,656.
With a Russian invasion of Ukrainian territory now ensuing, Ukraine's network defenders say they've prepared to safeguard critical assets, which are now centrally stored in its capital, Kyiv. Only time will tell whether Russian troops advance toward the city.
In the latest "Proof of Concept," Grant Schneider, senior director of cybersecurity services at the law firm Venable, and Ari Redbord, head of legal and government affairs at TRM Labs, join editors at Information Security Media Group to discuss trending cybersecurity issues.
The "weaponization of data" in cyberattacks - where cybercriminals not only deploy ransomware but threaten to release stolen data on the internet - has quickly become one of the biggest threats facing many healthcare sector entities, says Adam Meyers of CrowdStrike.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.