Following a spate of cyberattacks and data breaches affecting millions of Australians, the government‘s cybersecurity minister recently announced the formation of a task force that will hunt down hackers and said she is contemplating a ban on ransomware payments.
Cyberattackers love to strike on weekends and holidays - that's not news. What is news: These attacks cost more than weekday incidents, and they take a heavy toll on defenders. Cybereason's Sam Curry shares insight from the new study "Organizations at Risk: Ransomware Attackers Don’t Take Holidays."
Hospitals face attacks from nation-states seeking medical research and cybercriminals using pediatric patient data to apply for loans, says Stoddard Manikin. Adversaries target pediatric records to exploit the patient's credit and adult records when pursuing insurance or prescription fraud.
Join us for an informative webinar session as we dive into the hard truth of phishing attacks. Phishing has evolved to be more precise and deceptive than ever before, with the influx of mobile devices, screen sizes and many other sophisticated schemes tricking users into divulging information that can compromise...
Cybercrime is always evolving as threat actors find new ways to infiltrate organizations, steal money, and cause damage. So what should you prepare for in 2023?
Join this webinar with Crane Hassold, Director of Threat Intelligence at Abnormal Security, where he’ll dive into the trends we saw in 2022 and provide...
Join us for an informative webinar session as we dive into the hard truth of phishing attacks. Phishing has evolved to be more precise and deceptive than ever before, with the influx of mobile devices, screen sizes and many other sophisticated schemes tricking users into divulging information that can compromise...
French defense multinational Thales confirmed that ransomware-as-a-service group LockBit published internal documents but emphasized its operations remain unaffected by the hack. The company says the source of the leak is likely a compromised user account of an online partner collaboration site.
A recent ransomware attack at a Texas hospital that knocked out phone and email systems for weeks is now even worse following OakBend Medical Center's admission that the hackers downloaded data from the medical records of up to 500,000 individuals.
The Australian government says hackers from Russia are behind the attack on Medibank, the country's largest private health insurer. Prime Minister Anthony Albanese said not just hackers but "the nation where these attacks are coming from should also be held accountable."
Police in Ontario arrested a dual Canadian-Russian national for his involvement with the LockBit ransomware-as-a-service gang. The United States is asking for the extradition of Mikhail Vasiliev, 33, to face a criminal charge in a New Jersey federal court of conspiracy to commit computer intrusion.
The stark consequences of ransomware became painfully clear in Australia this week as attackers began releasing data from health insurer Medibank, one of the country's largest health insurers. Also, leaked chat logs reveal how the attackers accessed Medibank's systems.
This edition of the ISMG Security Report discusses how Australian health insurer Medibank is facing stark consequences for not paying a ransom to a group of cyber extortionists, how to limit unnecessary cybersecurity exposure during M&A, and how to manage challenges in hybrid environments.
To assess if your organization is prepared to shut down ransomware attacks, we’ve assembled questions to help you evaluate your readiness level. Our interactive, downloadable self-assessment focuses on four key areas: vulnerability discovery, asset management, detection and response improvement, team cohesion.
Digital twins provide a powerful capability for the emulation of networks, enabling data-driven decision making processes. Modern threat deception and network digital twins can accurately model the impact of cyberattacks, as well as analysis, system testing and hardening, and training for each threat scenario.
...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.