Nearly three weeks ago, Iran's state railway company was hit with a cyberattack that was disruptive and - somewhat unusually - also playful. Security firm SentinelOne says analyzing the wiper malware involved offers tantalizing clues about the attackers' skills, but no clear attribution.
The Israeli government paid a visit on Wednesday to NSO Group, the company whose spyware is alleged to have been covertly installed on the mobile devices of journalists and activists. The visit comes as Israel faces growing pressure to see if NSO Group's spyware, called Pegasus, has been misused.
Healthcare went through five years of transformation over the course of 2020. How does this new telehealth focus most change how healthcare security leaders must view cybersecurity?
In an eBook with Information Security Media Group, Hank Schless of Lookout discusses:
Calls are growing for an investigation into how commercial Pegasus spyware developed by Israel's NSO Group gets sold to autocratic governments and used to target journalists, lawyers, human rights advocates and others, with some lawmakers saying "the hacking-for-hire industry must be brought under control."
Ransomware-wielding criminals continue to find innovative new ways to extort victims, develop technically and sidestep skills shortages by delivering ransomware as a service, said Robert Hannigan, the former head of U.K. intelligence agency GCHQ, in his Infosecurity Europe 2021 virtual keynote speech.
The REvil ransomware operation behind the massive attack centering on Kaseya, which develops software used by managed service providers, has offered to decrypt all victims - MSPs as well as their customers - for $70 million in bitcoins. Experts note this isn't the first time REvil has hit MSPs, or even Kaseya.
The Covid-19 pandemic has vastly changed the world and the socioeconomic landscape, and quickly moved the world further online. Identity fraud rates and financial crime followed suit, posing additional challenges for businesses.
In this webinar Veriff co-founder and CPO (Chief Product Officer) Janer Gorohhov...
A government watchdog is urging NASA to make multiple improvements to its cybersecurity and risk management policies to counter threats to the space agency's network, infrastructure and data. NASA, in turn, is working toward making some security improvements outlined by the GAO by the end of this year.
It's been two years since Gartner first gave a name to Secure Access Service Edge. But it's quickly emerging as a popular architecture for digitally transformed enterprises. Elton Fontaine of Palo Alto Networks discusses SASE use cases for state and municipal government, as well as higher education.
With no federal privacy law in place, individual states in the US are working to create their own privacy laws to protect their residents. California’s law is already in place, and Virginia just recently passed one of its own. Colorado has a law on the table for voting, while other states are trying repeatedly to...
You see the news: how many healthcare entities are struck by ransomware. But how many of them conducted business impact analyses before they were victims? Too few, says Cathie Brown of Clearwater. She discusses the value of doing a BIA before the crisis strikes.
Announced in September 2020 as part of the new Digital Finance Strategy, the Digital Operational Resilience Act (DORA) is being carried out by the EU to harmonize Information and Communications Technology (ICT) risk requirements across Europe. This regulation specifically targets the banking and financial services...
As the U.S. hammers out national infrastructure legislation, implements President Biden's recent cybersecurity executive order and adopts other related initiatives, more attention and funding needs to be allocated to strengthen the healthcare sector's cybersecurity posture, industry groups urge.
KYC (Know Your Customer) is all about knowing your customers are who they say they are. But if you think your regulatory requirements stop at onboarding: think again. Your firm is responsible for preventing fraud and financial crimes throughout the entire customer journey.
In this guide, we'll walk you through how...