With Australia's data breach reporting law now in effect, its healthcare sector has recently reported the highest number of data breaches - a finding that is sure to intensify the already intense scrutiny of the country's controversial e-health records project.
While well known, fewer than 1% of internet users have visited the dark web and even among IT security professionals, only 1 in 7 have ever ventured to a dark web forum or site. This lack of direct experience helps explain why there is so much fear and misinformation being spread. But it also suggests that many in the...
With the cybersecurity threat landscape growing and evolving
rapidly, many enterprises and other large organizations are
seeking more effective ways to protect themselves and their
employees from these threats.
One of the most effective strategies for doing this is to take a more
dynamic and proactive approach to...
Whether you've visited the Dark Web or not, you're likely aware that
it's comprised of various anonymous forums and black markets.
Many of these Dark Web black markets are used for illegal activities,
like buying and selling drugs, weapons, confidential documents
and illegal services. While you may not be in the...
API endpoints have become a weak link in today's enterprise networks. Organizations are deploying Application Program Interface (API)
endpoints at an ever-increasing rate to keep up with the demands of
mobile applications, server-to-server communication, and microservice
requirements. This creates a broader attack...
Struggling European electronics giant Dixons Carphone says its investigation into a 2017 data breach has found that 10 million customers' personal details - up from its previous estimate of 1.2 million - were compromised. It previously reported that 5.9 million payment cards were also compromised.
A large Midwestern health network says a successful phishing campaign exposed a raft of personal and medical data stored in its email systems. The count of affected victims numbers 1.4 million, although investigators believe stealing personal data was not the attackers' goal.
The fundamentals of governance, risk and compliance are sorely lacking in too many organizations that are striving to improve cybersecurity, says Malcolm Palmore, an assistant special agent at the FBI.
A family care clinic in Missouri says those investigating and mitigating a recent ransomware attack discovered that its systems were "loaded with a variety of malware programs." Experts say such post-breach discoveries are common.
A hacking incident at Boys Town National Research Hospital is the largest ever reported by a pediatric care provider or children's hospital, according to the federal health data breach tally. A wide variety of data on 105,000 individuals was exposed, opening the door to potential fraud.
This edition of the ISMG Security Report features Elvis Chan, a supervisory special agent at the FBI, discussing ongoing efforts to thwart Russian interference in the U.S. midterm election this fall, and Alberto Yepez of ForgePoint Capital addressing cryptocurrency security issues.
Most cybersecurity tools are designed to help identify, alert on, and in some cases prevent a particular type of malicious activity. Current technologies send alerts and may even prevent specific types of attacks, but the burden remains with the organization to figure out whether that alert is meaningful in a broader...
There's no question that the threat landscape is constantly shifting for financial services companies. Throughout 2017 and the first half of 2018, we've seen a continued increase in attacks that directly target financial
organizations, which comes as no surprise. However, increased access to user and account data has...
In our modern age of digital connections and ubiquitous Internet access, both organizations and individuals face a "double-edged sword" when using web-based technologies. As we've increased our usage of the World Wide Web, our digital footprints have grown exponentially, and as a result, so has the digital attack...
Cyber threat intelligence (CTI), when used correctly, provides visibility into attacks and
threats. However, security analysts are dealing with too many sources of intelligence. They
aren't able to correlate and narrow all these sources of intelligence to those events and
vulnerabilities that really matter. The...