Reports on how the U.S. Congress is taking steps to toughen cybersecurity lead the latest edition of the ISMG Security Report. Also, an analysis of a Government Accountability Office study on the IoT landscape and the security threats facing the internet of things.
A series of email alerts from the Department of Health and Human Services about the WannaCry ransomware campaign - and a number of related daily conference calls with industry stakeholders - appear to be part of a ramped-up push to improve cyber information sharing in the healthcare sector.
Life after WannaCry: Already, other cybercrime gangs appear to be jumping on the SMB-targeting bandwagon, including the operators behind Uiwix ransomware. Thankfully, security experts say, these attacks pose scant risk.
The Shadow Brokers leaked spying tools - likely stolen from the National Security Agency - that aided WannaCry. But the hackers blame Microsoft and the U.S. government for the ransomware outbreak and are promising fresh exploits.
As computer security analysts begin to unwind the mystery behind the global wave of WannaCry ransomware, a familiar name has surfaced: Lazarus, the nickname for a suspected elite North Korean hacking group.
Weeks before the WannaCry outbreak, other attackers unleashed malware that targeted the same SMB flaw in Windows. But instead of installing ransomware, this campaign instead infected endpoints with Adylkuzz cryptocurrency mining software, security researchers say.
The words of Assistant to the President Thomas Bossert, who boldly pledges to outdo previous administrations on improving federal government cybersecurity, lead the latest edition of the ISMG Security Report. Also, Microsoft's exasperation with the NSA over WannaCry ransomware.
Disney is reportedly being targeted by cyber-extortionist hackers who have threatened to release a stolen, prerelease copy of the movie studio's fifth "Pirates of the Caribbean" film unless they receive a ransom, payable in bitcoins.
As organizations around the globe - including hospitals in the United Kingdom - recover from the WannaCry ransomware campaign, healthcare entities in the United States so far appear to have mostly avoided the crisis. But why?
Microsoft's chief legal officer has slammed U.S. spy agencies, warning that civilians are at risk if governments stockpile libraries of software vulnerabilities that eventually fall into the hands of cybercriminals.
Criminals have long aimed to separate people from their possessions. So for anyone who follows ransomware, the WannaCry outbreak won't come as a shock. Nor will longstanding advice for surviving ransomware shakedowns: Prepare, or prepare to pay.
Drop everything and patch all Windows devices against the SMB flaw or else shut them down, security experts warn in the wake of the global outbreak of WannaCry ransomware infections. And they're predicting new infections will surge.
The massive WannaCry outbreak has led to allegations that some sectors and organizations, such as Britain's National Health Service, were widely infected because of widespread Windows XP use. In fact, unpatched Windows 7 systems may be partly to blame.