Nearly three weeks ago, Iran's state railway company was hit with a cyberattack that was disruptive and - somewhat unusually - also playful. Security firm SentinelOne says analyzing the wiper malware involved offers tantalizing clues about the attackers' skills, but no clear attribution.
The latest edition of the ISMG Security Report features an analysis of the disappearance of ransomware-as-a-service groups, such as REvil and Darkside, and how that impacts the wider cybercrime ecosystem. Also featured: ransomware recovery tips; regulating cyber surveillance tools.
The Israeli government paid a visit on Wednesday to NSO Group, the company whose spyware is alleged to have been covertly installed on the mobile devices of journalists and activists. The visit comes as Israel faces growing pressure to see if NSO Group's spyware, called Pegasus, has been misused.
A new ransomware group called BlackMatter has debuted, claiming to offer the best features of REvil and DarkSide - both apparently defunct - as well as LockBit. A new attack using REvil's code has also been spotted, but a security expert says it's likely the work of a former affiliate.
Healthcare went through five years of transformation over the course of 2020. How does this new telehealth focus most change how healthcare security leaders must view cybersecurity?
In an eBook with Information Security Media Group, Hank Schless of Lookout discusses:
Calls are growing for an investigation into how commercial Pegasus spyware developed by Israel's NSO Group gets sold to autocratic governments and used to target journalists, lawyers, human rights advocates and others, with some lawmakers saying "the hacking-for-hire industry must be brought under control."
With corporate America beginning to ask employees to come back to their offices in the fall, cybersecurity teams have the huge task of ensuring that the work environment is safe. This is particularly true of IoT devices, as many have been left unprotected for months.
This edition of the ISMG Security Report features an analysis of ongoing investigations into the use of NSO Group's Pegasus spyware to spy on dissidents, journalists, political rivals, business leaders and even heads of state - and discussion of whether the commercial spyware business model should be banned.
As ransomware continues to pummel organizations, if they do get hit, then from an incident response standpoint, what are the essential steps they should take to smooth their recovery? Veteran ransomware-battler Fabian Wosar, CTO of Emsisoft, shares essential steps and guidance for recovery.
Cyber attacks on critical infrastructure are on the rise. A recent survey found that 9 out of 10 OT organizations experienced at least one intrusion in the past year.
Read the solution brief to learn:
Why operational technology endpoints are vulnerable
How FortiEDR addresses challenges of OT environments
With traditional endpoint security solutions, it’s not a matter of if a security breach happens, but when. These EDR solutions not only lack the ability to keep pace with modern threats, but come with hidden costs that drain budgets and slow operations.
In the world of operational technology (OT), one small change or networking issue can have a significant effect on production, automation systems and even safety. Staying on top of what’s happening in the control network is mission critical – but one can’t monitor and manage what you can’t see.
Following revelations that commercial spyware vendor NSO Group was able to exploit the latest model of the Apple iPhone to install surveillance software, experts describe how Apple could be doing more to lock down its iOS mobile operating system as well as curtail attacks by making them much costlier to run.
How can insurers take advantage of face authentication to verify customer identity online and prevent fraud?
We've all heard gruesome stories of people hiding a corpse so they can continue to claim a friend or relative's pension. Unfortunately, deepfakes and other technology make it much easier for fraudsters to...
Nozomi Networks Vantage™ leverages the power and simplicity of software as a service
(SaaS) to deliver unmatched security and visibility across your OT, IoT, and IT networks.
Vantage accelerates digital transformation for the largest and most complex
Vantage delivers the immediate awareness...