The tally of entities notifying federal regulators about mega health data breaches involving Clop cybercrime group hacks on Progress Software's MOVEit file transfer application keeps growing, and millions of additional individuals have been affected.
A previously unknown threat group orchestrated a supply chain attack using a Chinese encryption app to target victims mostly located in Hong Kong. Korplug, the backdoor incorporated into the encryption app, "is known to be used by multiple APT groups," Symantec says.
AI holds great promise for certain applications in healthcare, particularly around clinical research, but security leaders - and others involved in governance within medical institutions - must be ready for the implications, said John Frushour, CISO of New York-Presbyterian Hospital.
Join us to learn from Cisco about what new, modern and sophisticated threats look like today, and how these complex threats make it harder to succeed at effective threat detection and response
A British jury found that two teenagers had been members of the Lapsus$ hacking group that attacked Uber, Okta, Rockstar and other organizations. Lapsus$ earned notoriety for stealing data via low-complexity attacks and holding it to ransom, taunting victims and leaking stolen data.
Business email compromise continues to be a significant threat and is one of the most financially damaging online crimes. Attackers continue to innovate and grow in sophistication, which means defenders need to leverage new technology, warned Mike Britton, CISO of Abnormal Security.
As the digital landscape evolves, security teams need skills and training platforms that can provide the right resources for an organization "by showing what someone has got in terms of skills, without necessarily fully relying on their CVs," said Jess Burn, senior analyst at Forrester.
Recent legal actions against CISOs have spawned a debate on whether security leaders should be held accountable for security incidents. CISOs should manage this shifted liability through real-time documentation and collaboration with law enforcement, said attorney Stephen Reynolds.
Grant Bourzikas shared his experience as the new CISO at Cloudflare, highlighting a 90-day period during which he engaged with customers, internal nonsecurity personnel, executives and his team to gather insights on Cloudflare's security landscape.
Ransomware-wielding hackers are moving faster than ever to pull the trigger on malicious encryption - but they could be bumping up against the limits of how fast they can go, say security researchers at Sophos. Better endpoint detection may be spurring ransomware hackers into acting faster.
Join us to learn how taking an open approach to XDR and leveraging native but also third-party tools can result in better detections of threats, and a more coordinated response strategy!
Organizations engaged in software production often run their applications and services within cloud environments. CEO Ganesh Pai advocates the "shift-up" approach for enhanced cloud security, which focuses on operational visibility extending from software composition to production workloads.
The Cuba ransomware group is exploiting a bug in data backup software exposed in March, warn BlackBerry security researchers. The firm says the Cuba group in June attacked a critical infrastructure organization in the United States and an IT integrator in Latin America.
Sharing information and threat intelligence "collectively" is critical in order for health and public health sector entities to be able to defeat their cyber adversaries, said Nitin Natarajan, deputy director of the Cybersecurity Information and Security Agency.
A ransomware campaign by the recently emerged Monti ransomware group is targeting victims with a new Linux variant of its malware. The threat group is the latest in a growing number of ransomware groups finding profit in going after Linux infrastructure.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.