The ongoing COVID-19 pandemic continues to fuel new opportunities for cybercriminals, malicious insiders and other adversaries who are posing new security threats to the privacy of patient health data, says attorney Erik Weinick of law firm Otterbourg P.C.
The latest edition of the ISMG Security Report discusses how ransomware-as-a-service groups are shifting their business models, how investigators battling cybercrime have been hindered by GDPR, and how employees consider workplace "choice" a key factor for job satisfaction.
In 2020, companies around the world spent more than $18B in ransoms.The inconvenient truth is that threat preparation, particularly for high-stakes threats like ransomware, requires a whole-company approach.
Download the eBook to learn:
Where are the key vulnerabilities to ransomware attacks;
Available threat...
Ragnar Locker ransomware group released 361 gigabytes of what appears to be confidential data belonging to Greek national natural gas operator DESFA. The threat group says the alleged victim did not negotiate with it. The company confirmed a cyberattack and said it would not pay the ransom.
It’s a considerable challenge to defend organizations against rapidly evolving, increasingly complex cyberthreats. Attackers are continuously adapting and evolving behaviour-wise and are also leveraging new vulnerabilities and everyday IT infrastructure to evade detection and stay one step ahead of security...
The threat landscape is getting far too complex for organizations to manage effectively and very few organizations have the right resources to manage their security program around-the-clock while proactively defending against new and emerging threats.
According to Gartner, by 2025, 50% of organizations will be...
In a recent survey of 5,400 IT professionals across 30 countries, 37% of them admitted that their organization had been a victim of a ransomware attack in the previous 12 months, with the average recovery bill coming in at an eye-watering $1.85M.
But the main question that we all are still asking is that do we...
According to a recent report 68% of Organizations fell victims to Cyberattacks last year in-spite of the claim that they were using world-class protection. As cyber threats become ever more complex, the pressure to have the right endpoint security in place has also grown.
This Guide provides the clarity by giving...
Ransomware continues to be one of the top cyber threats facing organizations, with 37% admitting having been victimized in the last 12 months. It is critical, therefore, that you have advanced protection technologies in place to keep your organization secure.
This checklist identifies items to stop attacks from...
A Texas-based hospital is apparently still contending with pressure to pay an extortion group that claims to have stolen patient data months ago, while a French medical center responds to a weekend attack and demands to pay a $10 million ransom.
Accenture analyzed the top 20 most active ransomware leak sites to see how threat actors are posting sensitive corporate information and making the data easy to search and exploit. Accenture's Robert Boyce explains how cybercriminals are weaponizing stolen ransomware data for follow-up attacks.
Ransomware karma: The notorious LockBit 3.0 ransomware gang's site has been disrupted via a days-long distributed-denial-of-service attack, with administrator LockBitSupp reporting that it appears to be retribution for the gang leaking files stolen from a recent victim: security firm Entrust.
Expel is out with its latest quarterly threat report, which reveals that Identity-based attacks now account for 56% of incidents identified by Expel's SOC. Jon Hencinski shares highlights from the report and how to respond to BEC, ransomware and attackers who have found ways to defeat MFA.
Cloud collaboration suites like Microsoft 365 are critical to business success, but have become significant entry points for potential exploitation. Just as your team relies on email and collaboration tools to accomplish their goals, so too do sophisticated threat actors. And while the built-in security of Microsoft...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.