The cybersecurity landscape is marked by sophisticated malware strains designed to harvest sensitive data, get a foothold on company networks, and generally wreak havoc. A new report from ReliaQuest examines five malware variants that have recently impacted the threat landscape…
Tag: Information Security Buzz
Ransom Denied: Cyber Insurance Claims Shrink as Businesses Opt for DIY Recovery
Claims on cyber insurance have dropped by more than a third between 2022 and 2024, despite more organizations than ever having this type of cover. This was revealed in Databarracks’ Data Health Check – an annual survey of 500 UK…
Ransomware’s Record Year: 2024 Earnings Soar Amid Overall Cybercrime Dip
In a year marked by significant shifts in the cybercrime landscape, 2024 is on track to become the highest-grossing year for ransomware, even as overall illicit activity on the blockchain has declined by nearly 20% year-to-date. This trend highlights the…
Interoperability in Healthcare: How APIs are Bridging the Gap
Interoperability is the lifeblood of the modern healthcare sector. Effective patient care relies on the ability of disparate healthcare systems, devices, and applications to seamlessly access, exchange, and ultimately use data; without interoperability, this would not be possible. A failure…
Ransomware Gangs Introduce New EDR-Killing Tool
Sophos researchers have uncovered a new tool, EDRKillShifter, that malicious actors are using to target endpoint detection and response (EDR) systems. The discovery came after an unsuccessful ransomware attack in May. The threat actors deployed the tool to disable endpoint…
National Public Data Admits to Breach Leaking Millions of Social Security Numbers
Background check provider National Public Data (NPD) has confirmed a data breach after hackers leaked a stolen database containing millions of Social Security numbers and other sensitive information. The compromised data reportedly includes names, email addresses, phone numbers, Social Security…
Pool your Cybersecurity Resources to Build The Perfect Security Ecosystem
Cybersecurity has never been something to set once and leave running in the background—it is a constantly evolving landscape. While the migration of data and applications to the cloud provides numerous business benefits, many organisations struggle to secure their networks…
Cybersecurity in Healthcare: A New Era of Regulation, Incentives, and Patient Safety
Over the last few years, attacks against the healthcare sector have been severe and widespread, targeting sensitive patient data and critical medical operations. The 2020 ransomware attack on Universal Health Services, which led to the shutdown of systems across 400…
Taming Identity Sprawl With a Least Privilege Approach
Remember the Hydra, the multi-headed creature from Greek mythology? Warriors attempting to slay the beast faced a seemingly impossible challenge: when they cut off one head, multiple heads re-emerged. Security teams entrusted with Identity and Access Management (IAM) can relate…
China-linked Attackers Target Russian Govt Entities
Researchers from Kaspersky have detected a series of ongoing targeted cyberattacks on dozens of computers at Russian government entities and IT organizations. The bad actors infected devices via phishing emails with malicious shortcut attachments. These shortcuts were used to deliver…
Russian Sentenced to 40 Months for Selling Stolen Data on Dark Web
A Moscow-based Russian national, Georgy Kavzharadze, has been sentenced to 40 months in federal prison for selling stolen financial information on the dark web marketplace known as Slilpp. The US Attorney’s Office for the District of Columbia announced that Kavzharadze,…
Malware Loaders Dominate Cybersecurity Threats in 2024
Malware loaders are a significant threat in the cybersecurity landscape, with nearly 40% of all malware observed in critical security incidents involving these specialized tools. Among the most prevalent loaders are “SocGholish,” “GootLoader,” and “Raspberry Robin,” which have been frequently…
When Disinformation Floods the Internet, Preserving Truth Requires Proper Equipment
The World Wide Web is the greatest tool for sharing information humankind has ever created. Unfortunately, lies and fake news spread over the Internet just as well. It is so easy for disinformation to proliferate online that it takes the…
Email Breach Report 2024: The Most Vulnerable Names and Providers Exposed
In 2024, email breaches continue to pose a significant threat to personal and corporate security, with millions of email addresses exposed in data hacks. An email breach occurs when malicious actors infiltrate a company’s system, stealing customer data, including email…
NIST Debuts First Set of Finalized Post-Quantum Encryption Standards
The US Department of Commerce’s National Institute of Standards and Technology (NIST) has officially released its first set of finalized encryption standards designed to withstand attacks from quantum computers. These post-quantum encryption standards are expected to secure a wide array…
Twitter’s AI Ambitions Face GDPR Backlash: Nine New Complaints Filed
Twitter, recently rebranded as “X,” is under increased scrutiny after nine additional complaints were filed across Europe, alleging the company unlawfully used the personal data of over 60 million EU/EEA users to train its AI technologies without their consent. This…
Email Security Risk Remains Alarmingly High
A staggering 94% of companies have fallen victim to phishing attacks over the last year, while 91% experienced data loss or exfiltration incidents. It’s not surprising, then, that 95% of cybersecurity leaders are increasingly stressed about email security, particularly phishing…
Six Reasons Healthcare Organizations Need Robust Cybersecurity
Medical organizations must implement robust cybersecurity solutions due to the sensitivity of the data they handle and the increasing frequency of cyberattacks. As these organizations rely more heavily on technology for storing and managing patient data in the digital era,…
Emerging Exfiltration Tools Highlight Growing Threats to Enterprise Data
Cybercriminals have significantly increased their use of data-exfiltration tools, which are highly effective for stealing sensitive data and evading detection. This was revealed in a recent report by ReliaQuest, which highlights the evolving strategies of threat actors in the digital…
The Importance of APIs/API Security in Financial Services
In the evolving financial services landscape, Application Programming Interfaces (APIs) have become fundamental tools for facilitating seamless digital transactions and interactions. However, as the reliance on these technologies grows, so does the need for stringent API security. Ensuring the safety…