With the exception of one large theft incident involving an insider, hacker attacks - including some involving ransomware - continue to be the leading culprits in the biggest health data breaches reported so far this year. What's next?
Like in the recent WannaCry attacks, the U.S. healthcare sector has so far mostly avoided becoming a victim of NotPetya, the malware menacing many organizations across the globe. Who had been affected so far?
As the WannaCry outbreak demonstrated, many organizations run outdated operating systems. Too often when systems - and especially embedded devices - still function, there isn't a convincing business case for upgrading. ESET's Mark James asks: Whose fault is that?
As nation-state directed cybercrime increases, the FBI is bringing counter-intelligence expertise to bear in its investigations. Todd Carroll of the FBI's Chicago field office talks about attack trends and the new skills and collaboration needed to stop attackers.
When malware comes gunning for your national health service, you're going to take it personally. And that's just one reason why the WannaCry outbreak in particular boosted cybersecurity awareness in the U.K. and around the world, says Barracuda's Hatem Naguib.
As the count of NotPetya victims grows, Ukraine warns that it's also being targeted with a new WannaCry lookalike that hit state power distributor Ukrenergo. Security researchers say that marks the fourth recent campaign targeting Ukraine that's based on lookalike ransomware.
In the wake of the surge in business email compromise incidents, many organizations have implemented new anti-phishing controls. But the attackers are countering the counter-measures, says Agari's Wes Dobry. What is the best response?
Deducing intent from malware code is tricky, but computer security experts appear to agree that the latest wave of file-encrypting malware was never designed to make its creators rich. Instead, it's intended to destroy disks.
Malware known as NotPetya, SortaPetya or GoldenEye continues to spread globally, infecting endpoints via leaked Equation Group exploits as well as built-in Windows tools. Here's a roundup of what we know about the supposed ransomware and its spread so far.
A watchdog agency's annual security review of the Department of Veterans Affairs, the nation's largest healthcare provider, makes 33 recommendations for how the VA can address a variety of continuing vulnerabilities, but only three of them are new. What are the latest concerns?
The Cyber Threat Alliance is developing playbooks that will show organizations how to stop hackers from causing havoc. Alliance President Michael Daniel explains how the playbook could help to disrupt a cyber attacker's business model and processes.
Is Petya worse than WannaCry? The second global outbreak of file-encrypting malware in as many months sees cyberattackers having designed potent, rapidly spreading malicious code far faster than organizations have been shoring up their defenses.
A massive, global ransomware outbreak has been hitting airports, banks, shipping firms and other businesses across Europe and beyond. Security experts say the apparent Petya variant appears to spread in part by exploiting the "EternalBlue" SMB flaw in Windows, previously targeted by WannaCry.
How can a supercomputer help enterprise security teams respond to today's evolving threat landscape? Martin Borrett of IBM and Ronan Murphy of Smarttech discuss the promise and impact of Watson for Cyber Security.
Does the healthcare sector need another cyber threat information sharing center? That's a question some U.S. senators and others are asking as HHS prepares to formally launch one.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.