Hackers can strike any industry, but there has been an alarming increase in targeted and successful cyberattacks in healthcare. Now, more than ever, it's essential that your healthcare organization is prepared and has strategies in place for managing data breaches. Here are seven strategies to use.
Ransomware attacks and ransom demands ramped up in 2022, making resiliency the operative word. But as we head into 2023, speed of recovery is the new #1, says Andrew Stone of Pure Storage. He discusses strategies before, during and after attacks.
A member of a criminal data breach forum that tried to sell the email addresses of 400 million Twitter users to CEO Elon Musk last month has now posted the stolen data for anyone to download for free. The 63GB of data includes names, handles, creation dates, follower counts and email addresses.
Hundreds of U.S. counties continue to work with pen and paper after a cyberattack on their digital records management vendor last week disrupted methods to view, add and edit government records. The attack slowed the processing of birth certificates, marriage licenses and real estate transactions.
Acquiring Area 1 Security has allowed Cloudflare to extend its network protection capabilities from DDoS attacks to phishing emails, says co-founder and CEO Matthew Prince. Area 1's technology means customers will enjoy a better rate of detection with fewer false positives than legacy offerings.
Rail and locomotive company Wabtec Corp. notified customers about a data breach that exposed some individuals' personal and sensitive information. Ransomware-as-a-service group LockBit posted the data on its leak site after the company refused to pay a $30 million ransom.
Arizona has long been a leader in leveraging IT and providing digital services, but across the state and country alike, new challenges are emerging in the wake of the pandemic, and with them come new threats and risk factors, including remote work security, says Ryan Murray, deputy state CISO.
Britain's The Guardian newspaper has asked staff to continue working from home until Jan. 23 as the company continues to resolve issues with its network, which was compromised by ransomware hackers in December. The attack affected on-premises infrastructure but left cloud-based systems unscathed.
The U.S. attorney in New York has established a task force to trace and recover funds missing from FTX and manage probes related to the firm's collapse. The team comprises prosecutors with expertise in securities and commodities fraud, money laundering and asset forfeiture and cybersecurity.
Rackspace says the ransomware-wielding attackers who disrupted its hosted Microsoft Exchange Server environment last month wielded a zero-day exploit, described by CrowdStrike as being "a previously undisclosed exploit method for Exchange," to gain remote, direct access to servers it hosted.
The BlackCat ransomware-as-a-service group created a spoofed website closely mimicking the website of a victim in order to spread stolen data online. The victim is a small U.S. accounting firm whose stolen files apparently include tax returns and passport scans.
U.S. banking regulators warned banks to be wary of cryptocurrencies, writing in a joint statement that digital assets on decentralized networks are "highly likely to be inconsistent with safe and sound banking requirements." The missive comes after a volatile year for cryptocurrency.
Former cryptocurrency billionaire Sam Bankman-Fried entered a "not guilty" plea in Manhattan federal district court Tuesday. He faces up to 115 years in prison if found guilty on all counts. Bankman-Fried has been out on $250 million bail in home detention with his parents in California.
A Toronto pediatric hospital says it has restored nearly two-thirds of the systems affected by a mid-December ransomware attack but will evaluate whether to use a decryptor supplied by the LockBit ransomware-as-a-service group. LockBit says an affiliate violated a policy against attacking hospitals.
Poland is warning that Russian hackers have intensified activities in national cyberspace with the aim of "destabilization, intimidation and sowing chaos." Poland is a staging ground for military aid to Kyiv and a destination for more than 1.4 million refugees who fled Moscow's war of conquest.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.