More bad ransomware news: Following in the footsteps of Maze, now even more cybercrime gangs are threatening to not only crypto-lock systems but also leak stolen data. Such moves come following a banner year for ransomware operators, who are continuing to bring more advanced tactics to bear.
Security researchers are tracking a variant of the prolific Mirai botnet called Mukashi, that's taking advantage of vulnerabilities in network-area storage devices made by Zyxel and giving its operators the ability to launch DDoS attacks. Zyxel has issued a patch for the vulnerability.
Disinformation campaigns with ties to Russia are continuing in an attempt to impede other governments' responses to the COVID-19 pandemic, complicating public health efforts to combat the disease, European officials warn.
Security technologies are evolving at an incredible pace to protect the dynamic business IT environment against an innovative and agile threat landscape. Unfortunately, the staple of security testing is still based on pen-testing which can take several weeks, even months from initial engagement to the final report. A...
Security threats are advancing - but is your cybersecurity plan?
Develop a successful analytics-driven security operations strategy to improve your security operations center (SOC). No security journey can be successful without the right technology, and it's important to continually increase the efficiency of your...
Healthcare organizations now can take advantage of a new guide to best practices for cyber intelligence sharing - which could come in handy during the COVID-19 crisis, says Errol Weiss, chief security officer of the Health Information Sharing and Analysis Center.
In this modern era, businesses are being offered an extraordinary opportunity to capitalize on the enormous volumes of data being captured and created by technology.
The same holds true for accounts payable departments. By leveraging the right technology, they have the unprecedented potential to transform not only...
Bots touch virtually every part of our digital lives; they populate our news feed, tell the weather, provide stock market updates, and control search rankings. We use bots to book travel, access online customer support - even turn on the lights in our own homes.
It's no wonder that bots also now account for over half...
Growing data sources and intel feeds are making it more challenging for security teams to find the signal in a very noisy landscape, says Neustar's Brian McCann.
Threat intelligence consumers must realize the limitations faced by producers and formulate their own analysis and integration of third-party threat intelligence to incorporate other sources to fill in gaps where possible.
Download this report and learn how:
Malware-exclusive analysis may miss vital aspects of a...
The new Cyberspace Solarium Commission released its highly anticipated report this week that offers more than 75 U.S. cybersecurity recommendations and calls for sweeping reforms. Here's a look at the key proposals.
As sophisticated malware continues to evade existing detection tools and
processes, security teams must adopt new technologies and use them to deploy
new detection, hunt, and response capabilities.
Security teams looking to improve
threat intelligence, hunting, analysis, and rapid response capabilities...
Threat intelligence feeds are evolving, but Rob Cataldo of Kaspersky North America says it's important to put all this data into context to create better enterprise security.
Breach and Attack (BAS) simulation enables security practitioners to think and act like an adversary. BAS that connects the MITRE ATT&CK TTPs into a full APT kill chain enables them to effectively answer the question "How would an APT attack affect our organization?"
Download this eBook to learn more about:
How BAS...
RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over COVID-19 also dominated.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.