This Thursday - [Webinar] See How a Ransomware Attack Unfolds - From The Criminal's Point Of View
Join CI's Director of Adversary Replication and Detection, Jeremy Johnson, this upcoming Thursday, 2/18, for a real-time demonstration of a ransomware attack from the point of view of the threat actor. Demonstrating the latest tactics seen in the field right now, Jeremy will be joined by CTO Mike Simon and DEFCON Black Badge and CI Consultant Alethe Denis to explain how InfoSec teams can minimize the risks and prepare to respond.
Washington auditor’s office warned agencies of data-breach risks. Then it got hacked
In revealing the breach, McCarthy repeatedly pointed blame at Accellion, the California tech firm whose aging digital file-sharing service, known as FTA, the auditor’s office had relied on for more than a decade. But McCarthy’s office also is culpable, cybersecurity experts told The Seattle Times. They criticized the auditor’s reliance on two-decade-old technology to store and transmit sensitive data — and some questioned whether the auditor needed to amass so much detailed personal information in the first place.
Water control system cyber incidents are more frequent and impactful than people are aware
There have been suggestions the Oldsmar cyberattack occurred because of the lack of enforceable cyber security regulations in the water industry. [...] The Oldsmar water system cyberattack was not just about inadequate remote access but also about the need to include engineering considerations. It is also important to know what has already happened like the 2007 sodium hydroxide case where more than 100 people were hospitalized.
HIPAA and 2021 Healthcare Data Security Trends
Globally, cyber resilience frameworks will emerge as everyday strategies to address compromised data. The end goal will be to protect data, reduce or eliminate data breaches, and meet the growing list of regulatory compliance requirements, under HIPAA, GDPR and new regulations like the CCPA in California.
It will take more than the first cyberattack-related death for healthcare’s security wakeup call
Disruptions to operations create other issues and delays in care can result in patient harm therefore it wouldn’t be a stretch to postulate that security events have had negative patient outcomes. However, despite numerous ransomware reports, no direct link of a security event to a patient death had been observed until September 2020 where the first patient death linked to ransomware-induced by delay of care was reported.
13 patient data breach lawsuits in the past year
Along with the uptick in cybersecurity incidents at hospitals and health systems, patients have begun to take action in response to their data potentially being mishandled. Here are 13 patient data breaches in the past year that have resulted in lawsuits filed by patients.
10 Reasons Check-the-Box Compliance Puts Your Organization at Risk
Compliance does not necessarily equate to effective cybersecurity, and the process of ensuring compliance may not eliminate key risks. While compliance can help you identify and assess short-term acceptable risk, your organization should have a clear picture of your organizational risk appetite and how that appetite might change over time.
State and local digital infrastructure is rife with vulnerabilities
In 2019, the Senate passed the State and Local Government Cybersecurity Act designed to create grants and other programs to help states and localities fend off ransomware attacks and other threats. In 2020, the House passed its own bill, the State and Local Cybersecurity Improvement Act, also creating a federal grant program to go toward state and local government cybersecurity efforts. [Neither] has yet passed into law, [...] thus leaving states and municipalities without federal funding in the foreseeable future.
Protecting the cybersecurity of America’s networks
The FCC has both the responsibility and the authority to protect the nation’s networks. The opening lines—Page 1, Title I, Section 1—of the Communications Act establishes the FCC, among other reasons, “…for the purpose of the national defense, [and] for the purpose of promoting safety of life and property…” When those lines were written in 1934, no one could imagine the digital networks of today. [...] As a result, the statute gives the FCC responsibility and the broad authority to take action to preserve and promote these national purposes.
Security Think Tank: Renewed US stability may ease cyber tensions
On the one hand, a more stable influence at the helm in the US potentially facilitates far greater levels of international cooperation and therefore a more integrated approach than has been evident over the past four years; but on the other hand, with a significant volume of internal issues to handle, the new administration may seek to put its own house in order first.
Langevin hopeful new Armed Services panel will shine new spotlight on cybersecurity
Langevin is gearing up to chair the newly established subcommittee on Cyber, Innovative Technologies, and Information Systems, which is set to intensify the focus of the House Armed Services Committee on cybersecurity concerns at the Department of Defense (DOD).
French cyber agency reveals suspected Russian hacks
France's national cyber security agency said Monday that it had discovered suspected Russian hacking attacks starting in 2017 that affected several French organisations. "This campaign mostly affected information technology providers, especially web hosting providers," said the French National Agency for the Security of Information Systems (ANSSI).
Zuckerberg responds to Apple’s privacy policies: “We need to inflict pain”
Facebook, whose business model and competitive advantage rely on this kind of tracking, responded by telling investors to expect falling revenues—and by running full-page newspaper ads declaring that the change would hurt small businesses. Further, Facebook has explored filing a lawsuit against Apple, alleging that the smartphone maker's policies are anticompetitive.
Surveillance Technology and the Rule of Law
We also have to consider the inherent conservatism of the legal system. The Supreme Court eschews addressing new technological considerations with sweeping opinions. [...] It shows the extreme reluctance of the Supreme Court to move concurrently with the pace of technological change. And this disconnect can only lead to infringement of social and individual liberties that many public and private actors are eagerly willing to commit.
This phishing email promises you a bonus - but actually delivers this Windows trojan malware
The backdoor has been used in attacks targeting industries including healthcare, technology, manufacturing and logistics across North America and Europe. Researchers have linked it to the developers of Trickbot, one of the most common forms of malware for criminal hackers looking to gain entry to networks.
Cybercrooks Rake in $304M in Romance Scams
These gambits typically start with a an online connection that turns into daily communications; the scammer hones a relationship with the target from afar before eventually asking for money. A besotted target then sends funds in the form of a gift card (this payment type was up 80 percent in 2020, the FTC found) or a wire transfer.
Microsoft says it found 1,000-plus developers' fingerprints on the SolarWinds attack
“When we analysed everything that we saw at Microsoft, we asked ourselves how many engineers have probably worked on these attacks. And the answer we came to was, well, certainly more than 1,000.” If anyone understands the havoc 1,000 developers can create, it’s Microsoft.