The Food and Drug Administration is urging blood suppliers - a recent target of attacks - to bolster their cybersecurity practices to prevent and mitigate cyber incidents that could affect the supply and safety of critical blood and blood components used for transfusions and other patient care.
Adversaries are exploiting legitimate processes in endpoint and cloud environments, bypassing detection by leveraging native systems. In the cloud, misconfigured environments and stolen credentials are driving the threat landscape, said Terrance DeJesus, senior security research engineer, Elastic.
Nation-state attackers pose a growing cybersecurity threat driven by specific geopolitical or economic objectives. These actors often target organizations with valuable data, using advanced techniques such as reconnaissance, said Ryan Roobian, global solutions architect, Google Cloud.
Your vulnerability management program may have critical blind spots. Join three industry leaders as they examine whether traditional approaches are still effective against today’s evolving threats, and what needs to change.
Technical Deep-Dive:
Hidden flaws in current vulnerability management approaches;
Why...
A threat actor with suspected ties to Russian nation-state hackers has listed thousands of IoT devices as proxy networks within minutes of their initial compromise. A campaign that began in 2020 has so far infected 20,000 IoT devices, according to a new report by Trend Micro.
Bitsight's $115 million acquisition of Cybersixgill will merge automated threat intelligence with risk exposure tools. This strategic move reflects the growing demand for streamlined cybersecurity solutions and aligns with Bitsight's mission to enhance cyber-risk management.
In the latest weekly update, ISMG editors explored the growing threat of disrupted ransomware attacks as a public health crisis, the potential global impact of a Donald Trump's second presidential term, and implications of the latest big merger in the cybersecurity market.
Godzilla webshell, a Chinese-language backdoor known for its stealth and ability to execute commands and manipulate files, is publicly available on GitHub, and federal authorities have issued a stern warning to the healthcare sector to prepare for this threat and inevitable cyberattacks.
Defence-oriented cybersecurity strategies have historically been favoured to protect organisations’ digital assets. This approach has its roots in the castle-and-moat strategy, which was utilised in the 1990s and early 2000s to protect a small number of known assets.
However, defensive strategies are inherently...
SoftBank-backed merger between Trustwave and Cybereason brings together leading MDR, EDR, DFIR and threat intelligence capabilities. The combined organization aims to improve AI-driven detection and enhance Microsoft E5 support, targeting enterprise, mid-market, and public sector clients worldwide.
Federal authorities are warning the healthcare sector of an array of cyberthreats - including Scattered Spider hacks, living-off-the-land attacks, and bad actors looking to exploit weaknesses such as F5 misconfigurations and also so-called "Miracle Exploit" flaws in some Oracle software.
Join our upcoming webinar where we will delve into critical challenges like managing data overload, ensuring contextual relevance, achieving real-time visibility, and fostering secure collaboration. We’ll explore innovative approaches, including the integration of advanced threat intelligence frameworks, methods for...
Join our upcoming webinar where we will delve into critical challenges like managing data overload, ensuring contextual relevance, achieving real-time visibility, and fostering secure collaboration. We’ll explore innovative approaches, including the integration of advanced threat intelligence frameworks, methods for...
Cryptocurrency-seeking hackers are increasingly targeting macOS users. So warn security researchers as they track a rise in macOS backdoors and information-stealing malware, much of which traces back to a well-known cryptocurrency heist culprit: North Korea.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.