Especially for healthcare organizations, repelling ransomware attacks hinges on having robust monitoring and defenses in place to spot the signs of an unfolding attack and shut it down before crypto-locking malware gets unleashed, says Peter Mackenzie, director of incident response at Sophos.
A novel botnet dubbed "Zerobot" by Fortinet researchers is taking advantage of vulnerabilities in a slew of networking equipment and networked cameras with an emphasis on equipment manufactured in East Asia. The botnet exploits 21 separate vulnerabilities.
As the potential harm posed by technology increases, the cybersecurity stakes are changing, warned speakers at Black Hat Europe. With governments taking a greater interest in regulating cybersecurity - and perhaps practitioners - experts urged practitioners to collectively guide their own destiny.
This week's edition of the ISMG Security Report discusses the mistakes enterprises commonly make when building ransomware defenses, the cybersecurity capabilities being built by the U.S. Department of Energy, and the first female CEO at Securonix - one of only a handful in the vendor community.
Indian cybersecurity firm CloudSEK says another cybersecurity firm used a compromised collaboration platform credential to obtain access to its training webpages. CEO Rahul Sasi did not identify the alleged perpetrator and says the hacker did not obtain access to the company code base and database.
Microsoft Office's use of Internet Explorer to render HTML is the gift that keeps giving for North Korean hackers. Security researchers at Google say they spotted a Pyongyang threat actor using a now-patched JavaScript engine flaw via a malicious Office document.
Data management, supply chain assurance and regulatory evolution are among the topics touched upon in this look at the year ahead with Troy Leach, chief strategy officer of the Cloud Security Alliance. Find out what trends Leach is watching and the predictions he makes for 2023.
Patients of at least seven hospitals affiliated with CommonSpirit have been affected by a data breach involving the Chicago-based hospital chain's October ransomware incident. None of the affected hospitals appear to have filed a breach report with the U.S. Department of Health and Human Services.
Smartphone giant Apple says that starting later this year, users can enable end-to-end encryption of iPhone backups stored in the company's commercial cloud. Apple took pains to frame its announcement in the context of cloud computing data breaches.
Permira's $5.8 billion acquisition of Mimecast has allowed the email security vendor to make product and technology investments that don't provide an immediate financial return. Several buyers expressed interest in taking Mimecast private, and CEO Peter Bauer is glad the firm ended up with Permira.
Asset management historically either looked at network traffic or attempted to put an agent on everything, which Axonius CEO Dean Sysman says left organizations drowning in data. Axonius focuses solely on bringing data together from a customer's existing infrastructure and controls.
As a former Division 1 athlete and coach, security leader Ty Howard learned that "repetition" and "being relentless" are keys to success and were invaluable lessons for his career as a CISO. He shares how camaraderie and professional growth help inspire his team and collaboration with the IT group.
The U.K. Department for Environment, Food and Rural Affairs relies heavily on applications no longer supported by their vendor. Current levels of modernization spending are not sufficient to "reduce cybersecurity and resilience risks to an acceptable level," warns the National Audit Office.
"Who here thinks your network or environment will become more complex next year?" a cybersecurity veteran asked the audience at Black Hat Europe this week in London. As attackers' capabilities continue to improve, Jeff Moss said defenders must learn to succeed or fail faster.
Hackers, possibly North Korea's Lazarus Group, are behind a campaign that socially engineers cryptocurrency traders into opening an Excel spreadsheet loaded with a malicious macro. Pyongyang hackers specialize in cryptocurrency theft as the regime seeks hard currency to fuel weapons development.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.