The network detection and response market is "relatively unchallenged at this point by other markets," and detection is the most important use case, says Nat Smith of Gartner, who shares key findings from the company's report titled Emerging Trends: Top Use Cases for Network Detection and Response.
Two recent hacking incidents - one involving ransomware and the other involving the exfiltration of sensitive data for hundreds of thousands of individuals - are among the latest examples of the serious cybersecurity threats and risks facing healthcare organizations and their patients' information.
Cyberattacks on the EU's healthcare sector grew by nearly 50% in 2020, over 2019, and continue to pose serious threats to patient safety as well as to the entire health supply chain, says a new report calling for the development of more healthcare-specific incident response teams among EU members.
The Emotet botnet, which was hampered by law enforcement actions earlier this year, is making a comeback. The resurgence appears to be due to help from old friends: cybercriminals running the Trickbot botnet. Unfortunatel,y the development may fuel more ransomware attacks.
The U.S. and Israel will expand their diplomatic relationship around cybersecurity, announcing a bilateral task force this week that will support cybersecurity and fintech innovation. The news follows recent action by the U.S. Department of Commerce to blacklist Israeli spyware firm NSO Group.
Dutch police have detained Moscow businessman Denis Dubnikov after the U.S. accused him of receiving bitcoins worth $400,000 paid to Ryuk as ransoms by its victims. The U.S. is seeking to extradite the suspect, as the Biden administration's crackdown on ransomware continues.
The FBI says it has fixed a software misconfiguration that was abused to send fake emails falsely warning of a cyberattack. As many as 100,000 hoax emails were sent in two waves early Saturday morning, originating from a legitimate FBI domain.
Federal authorities have issued alerts about security vulnerabilities identified in medical device products from manufacturers Siemens and Philips. The two advisories cover 13 flaws in Siemens' Nucleus Real-Time Operating System TCP/IP stack and three issues in certain Philips MRI products.
NSO Group CEO-designate Itzik Benbenisti, currently NSO's co-president, has resigned from the Israel-based intelligence company, citing its blacklisting by the U.S. Department of Commerce last week. But the company has other troubles, too.
The top cybercrime threats facing organizations in Europe and beyond include ransomware affiliate programs, more sophisticated mobile malware and cryptocurrency-hawking investment fraud, among other types of crime, according to Europol's latest Internet Organized Crime Threat Assessment.
Acceleration to the cloud is affecting all
industries as organizations take advantage of
the flexibility, efficiencies and security benefits
of being able to hyperscale their abilities to
elastically spin up large-scale environments in
seconds. But these new cloud-native and hybrid
cloud environments, which use...
A penetration testing company discovered a critical zero-day vulnerability in Palo Alto Networks' GlobalProtect VPN product but did not inform the company until about 11 months later. The situation stirred debate over whether that posed unnecessary risks.
New Jersey state regulators have smacked two vendors with a hefty financial settlement and corrective action plan for their involvement in a 2016 printing and mailing mishap that compromised the health information of nearly 56,000 residents.
Vulnerabilities in Apple Pay, Samsung Pay and Google Pay allow attackers to make unlimited purchases using stolen smartphones enabled with express transport schemes, according to a research report from Positive Technologies. These findings were presented at Black Hat Europe this week.
The fact is, organisations across ANZ are facing a higher risk of being breached than ever before. The shift to remote and hybrid working has thrown up significant security challenges, specifically exchanging files and data. Employees' need to collaborate from different locations and share sensitive corporate data...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.