Stop the presses: Britain's Guardian Media Group has been hit by a "serious IT incident," believed to be ransomware, that appears to have encrypted numerous systems. Experts say ransomware groups love to strike over the holidays, adding pressure on victims to pay a ransom quickly and quietly.
A banking Trojan is on a rampage thanks to its ability to mimic the appearance of more than 400 applications, including leading financial and crypto exchange applications, in 16 countries. Godfather is an upgraded version of the Anubis banking Trojan, reports cybersecurity firm Group-IB.
Bad hackers so often get portrayed as bombastic villains who can "hack the Gibson" while breathlessly exclaiming, "We're in!" Real-world "hack attacks" are typically much more mundane, including an alleged scheme enabling taxi drivers to jump to the head of the line at JFK Airport.
CISO Mike Manrod of Grand Canyon Education is seeing very clever evasion tactics employed by initial access brokers who gain "an initial foothold into a network or into a set of infrastructure and then sell that foothold or get that foothold for an affiliated partner organization."
Anything that can write a software code can also write malware. The latest AI technology can do it in seconds. Even worse, it could open the door to rapid innovation for hackers with little or no technical skills or help them overcome language barriers to writing the perfect phishing email.
A hacker selling a data set purportedly containing emails stripped from the FBI's InfraGard public-private cybersecurity forum obtained access by sending an application, which the bureau approved, reports independent cybersecurity journalist Brian Krebs.
Ransomware operations have become expert at finding ways to make a victim pay. But experts say there are multiple steps healthcare sector entities in particular can take to better protect themselves and ensure that they can quickly restore systems and never have to consider paying a ransom.
To get zero trust strategy right, it is important to know what exactly to protect and decide what your crown jewels are. Three panelists discuss the various ways to do that and also offer their thoughts on whether zero trust is need for everything.
Months after a global law enforcement team took down the world's largest darknet marketplace, a dozen others have taken its place. The new platforms operate in the Russian language, bring in more volume than the very profitable Hydra, and run operations differently from their Western counterparts.
Hosted services company Rackspace is warning customers about the increasing risk of phishing attacks following a ransomware attack causing ongoing outages to its hosted Exchange environment. The Texas-based firm also is now facing a class action lawsuit.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity and privacy issues, including the evolution of the CISO role, the community impact of ransomware attacks targeting hospitals, and trends in cybersecurity customers' buying behavior.
Ransomware gangs rely on shotgun-style attacks using phishing or stolen remote access credentials to target individuals. This strategy snares less poorly prepared organizations, and that often means healthcare entities. Experts share insights on this plague on healthcare and what to do about it.
Especially for healthcare organizations, repelling ransomware attacks hinges on having robust monitoring and defenses in place to spot the signs of an unfolding attack and shut it down before crypto-locking malware gets unleashed, says Peter Mackenzie, director of incident response at Sophos.
This week's edition of the ISMG Security Report discusses the mistakes enterprises commonly make when building ransomware defenses, the cybersecurity capabilities being built by the U.S. Department of Energy, and the first female CEO at Securonix - one of only a handful in the vendor community.
The prospect of attackers using voice impersonation, deepfake technologies and misinformation against healthcare sector entities is a serious threat that entities need to be closely monitoring, says Dave Summit, vice president of cybersecurity at Florida Cancer Specialists and Research Institute.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.